Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 03:48
General
-
Target
2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader.exe
-
Size
11.5MB
-
MD5
4b8ad282bc117ed1009571fc9864ee27
-
SHA1
02236728c141950819b9597fdea93488c8795bb6
-
SHA256
a0845820dbe245ab0c6e1fce93d8b845fed849e392f80e94387e287407f413e8
-
SHA512
0f2d343e1a7f0a03d53320479d97b5a487c5d0e3e8af41a686df534361455c09ac843489f622fa206789be00dbaa4e01ba978a18eeaa8ce0fd97307233acee6f
-
SSDEEP
196608:9EaOk2c1uwl1CPwDv3uFhi43v13uFnCPws8S/VW08Sr8lQeY3YKmknGzwHIPHd9H:95nEwl1CPwDv3uFY43v13uFnCPwa/VWH
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 5 IoCs
resource yara_rule behavioral1/memory/776-0-0x0000000000400000-0x0000000000CEB000-memory.dmp family_blackmoon behavioral1/memory/776-4-0x0000000000400000-0x0000000000CEB000-memory.dmp family_blackmoon behavioral1/files/0x000700000002421a-5.dat family_blackmoon behavioral1/memory/4564-8-0x0000000000400000-0x0000000000CEB000-memory.dmp family_blackmoon behavioral1/memory/4692-18-0x0000000000400000-0x0000000000466000-memory.dmp family_blackmoon -
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 4 IoCs
resource yara_rule behavioral1/memory/776-0-0x0000000000400000-0x0000000000CEB000-memory.dmp mimikatz behavioral1/memory/776-4-0x0000000000400000-0x0000000000CEB000-memory.dmp mimikatz behavioral1/files/0x000700000002421a-5.dat mimikatz behavioral1/memory/4564-8-0x0000000000400000-0x0000000000CEB000-memory.dmp mimikatz -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts meisrey.exe -
Executes dropped EXE 3 IoCs
pid Process 4564 meisrey.exe 4612 meisrey.exe 4692 zyckrstmghhbuvp25910.exe -
Unexpected DNS network traffic destination 60 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description flow ioc pid Process Destination IP 117 207.148.83.241 4584 nslookup.exe Destination IP 40 163.172.168.171 668 nslookup.exe Destination IP 56 94.103.153.176 2728 nslookup.exe Destination IP 83 51.77.227.84 5004 nslookup.exe Destination IP 101 51.75.173.177 3680 nslookup.exe Destination IP 139 159.203.38.175 3508 nslookup.exe Destination IP 147 51.254.25.115 3672 nslookup.exe Destination IP 112 13.239.157.177 4924 nslookup.exe Destination IP 72 94.103.153.176 2728 nslookup.exe Destination IP 87 188.226.146.136 4916 nslookup.exe Destination IP 98 51.75.173.177 3680 nslookup.exe Destination IP 134 142.4.205.47 4628 nslookup.exe Destination IP 141 159.203.38.175 3508 nslookup.exe Destination IP 145 66.70.228.164 4476 nslookup.exe Destination IP 149 185.84.81.194 5128 nslookup.exe Destination IP 73 207.192.71.13 1244 nslookup.exe Destination IP 76 178.63.116.152 5108 nslookup.exe Destination IP 86 188.226.146.136 4916 nslookup.exe Destination IP 143 66.70.228.164 4476 nslookup.exe Destination IP 146 66.70.228.164 4476 nslookup.exe Destination IP 105 79.124.7.81 2196 nslookup.exe Destination IP 133 142.4.205.47 4628 nslookup.exe Destination IP 137 198.100.148.224 1920 nslookup.exe Destination IP 138 198.100.148.224 1920 nslookup.exe Destination IP 62 94.103.153.176 2728 nslookup.exe Destination IP 126 165.227.40.43 5084 nslookup.exe Destination IP 150 185.84.81.194 5128 nslookup.exe Destination IP 42 163.172.168.171 668 nslookup.exe Destination IP 79 178.63.116.152 5108 nslookup.exe Destination IP 110 5.132.191.104 3632 nslookup.exe Destination IP 111 5.132.191.104 3632 nslookup.exe Destination IP 125 165.227.40.43 5084 nslookup.exe Destination IP 135 198.100.148.224 1920 nslookup.exe Destination IP 131 142.4.205.47 4628 nslookup.exe Destination IP 75 207.192.71.13 1244 nslookup.exe Destination IP 84 51.77.227.84 5004 nslookup.exe Destination IP 108 144.76.103.143 4452 nslookup.exe Destination IP 30 161.97.219.84 4572 nslookup.exe Destination IP 85 188.226.146.136 4916 nslookup.exe Destination IP 102 79.124.7.81 2196 nslookup.exe Destination IP 127 142.4.204.111 4508 nslookup.exe Destination IP 148 51.254.25.115 3672 nslookup.exe Destination IP 80 178.63.116.152 5108 nslookup.exe Destination IP 120 207.148.83.241 4584 nslookup.exe Destination IP 49 163.172.168.171 668 nslookup.exe Destination IP 142 159.203.38.175 3508 nslookup.exe Destination IP 31 161.97.219.84 4572 nslookup.exe Destination IP 81 51.77.227.84 5004 nslookup.exe Destination IP 104 79.124.7.81 2196 nslookup.exe Destination IP 106 144.76.103.143 4452 nslookup.exe Destination IP 119 207.148.83.241 4584 nslookup.exe Destination IP 123 165.227.40.43 5084 nslookup.exe Destination IP 109 144.76.103.143 4452 nslookup.exe Destination IP 129 142.4.204.111 4508 nslookup.exe Destination IP 130 142.4.204.111 4508 nslookup.exe Destination IP 32 161.97.219.84 4572 nslookup.exe Destination IP 74 207.192.71.13 1244 nslookup.exe Destination IP 100 51.75.173.177 3680 nslookup.exe Destination IP 115 13.239.157.177 4924 nslookup.exe Destination IP 116 13.239.157.177 4924 nslookup.exe -
resource yara_rule behavioral1/files/0x000700000002422f-14.dat upx behavioral1/memory/4692-15-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/4692-18-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\tyfbpeqb\meisrey.exe 2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader.exe File opened for modification C:\Windows\tyfbpeqb\meisrey.exe 2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader.exe File created C:\Windows\tyfbpeqb\zyckrstmghhbuvp25910.exe meisrey.exe -
System Location Discovery: System Language Discovery 1 TTPs 47 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language meisrey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language meisrey.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6108 cmd.exe 960 PING.EXE -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x000700000002421a-5.dat nsis_installer_2 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 960 PING.EXE -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe 4692 zyckrstmghhbuvp25910.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 776 2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 776 2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader.exe Token: SeDebugPrivilege 4564 meisrey.exe Token: SeDebugPrivilege 4612 meisrey.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 776 2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader.exe 4564 meisrey.exe 4612 meisrey.exe 4692 zyckrstmghhbuvp25910.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 776 wrote to memory of 6108 776 2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader.exe 85 PID 776 wrote to memory of 6108 776 2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader.exe 85 PID 776 wrote to memory of 6108 776 2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader.exe 85 PID 6108 wrote to memory of 960 6108 cmd.exe 87 PID 6108 wrote to memory of 960 6108 cmd.exe 87 PID 6108 wrote to memory of 960 6108 cmd.exe 87 PID 6108 wrote to memory of 4564 6108 cmd.exe 97 PID 6108 wrote to memory of 4564 6108 cmd.exe 97 PID 6108 wrote to memory of 4564 6108 cmd.exe 97 PID 4612 wrote to memory of 4692 4612 meisrey.exe 99 PID 4612 wrote to memory of 4692 4612 meisrey.exe 99 PID 4612 wrote to memory of 4692 4612 meisrey.exe 99 PID 4612 wrote to memory of 5912 4612 meisrey.exe 100 PID 4612 wrote to memory of 5912 4612 meisrey.exe 100 PID 4612 wrote to memory of 5912 4612 meisrey.exe 100 PID 5912 wrote to memory of 4572 5912 cmd.exe 102 PID 5912 wrote to memory of 4572 5912 cmd.exe 102 PID 5912 wrote to memory of 4572 5912 cmd.exe 102 PID 4612 wrote to memory of 2952 4612 meisrey.exe 106 PID 4612 wrote to memory of 2952 4612 meisrey.exe 106 PID 4612 wrote to memory of 2952 4612 meisrey.exe 106 PID 2952 wrote to memory of 668 2952 cmd.exe 108 PID 2952 wrote to memory of 668 2952 cmd.exe 108 PID 2952 wrote to memory of 668 2952 cmd.exe 108 PID 4612 wrote to memory of 5060 4612 meisrey.exe 111 PID 4612 wrote to memory of 5060 4612 meisrey.exe 111 PID 4612 wrote to memory of 5060 4612 meisrey.exe 111 PID 5060 wrote to memory of 2728 5060 cmd.exe 113 PID 5060 wrote to memory of 2728 5060 cmd.exe 113 PID 5060 wrote to memory of 2728 5060 cmd.exe 113 PID 4612 wrote to memory of 2780 4612 meisrey.exe 121 PID 4612 wrote to memory of 2780 4612 meisrey.exe 121 PID 4612 wrote to memory of 2780 4612 meisrey.exe 121 PID 2780 wrote to memory of 1244 2780 cmd.exe 123 PID 2780 wrote to memory of 1244 2780 cmd.exe 123 PID 2780 wrote to memory of 1244 2780 cmd.exe 123 PID 4612 wrote to memory of 3496 4612 meisrey.exe 124 PID 4612 wrote to memory of 3496 4612 meisrey.exe 124 PID 4612 wrote to memory of 3496 4612 meisrey.exe 124 PID 3496 wrote to memory of 5108 3496 cmd.exe 126 PID 3496 wrote to memory of 5108 3496 cmd.exe 126 PID 3496 wrote to memory of 5108 3496 cmd.exe 126 PID 4612 wrote to memory of 640 4612 meisrey.exe 127 PID 4612 wrote to memory of 640 4612 meisrey.exe 127 PID 4612 wrote to memory of 640 4612 meisrey.exe 127 PID 640 wrote to memory of 5004 640 cmd.exe 129 PID 640 wrote to memory of 5004 640 cmd.exe 129 PID 640 wrote to memory of 5004 640 cmd.exe 129 PID 4612 wrote to memory of 1400 4612 meisrey.exe 130 PID 4612 wrote to memory of 1400 4612 meisrey.exe 130 PID 4612 wrote to memory of 1400 4612 meisrey.exe 130 PID 1400 wrote to memory of 4916 1400 cmd.exe 132 PID 1400 wrote to memory of 4916 1400 cmd.exe 132 PID 1400 wrote to memory of 4916 1400 cmd.exe 132 PID 4612 wrote to memory of 5600 4612 meisrey.exe 134 PID 4612 wrote to memory of 5600 4612 meisrey.exe 134 PID 4612 wrote to memory of 5600 4612 meisrey.exe 134 PID 5600 wrote to memory of 3680 5600 cmd.exe 136 PID 5600 wrote to memory of 3680 5600 cmd.exe 136 PID 5600 wrote to memory of 3680 5600 cmd.exe 136 PID 4612 wrote to memory of 3068 4612 meisrey.exe 137 PID 4612 wrote to memory of 3068 4612 meisrey.exe 137 PID 4612 wrote to memory of 3068 4612 meisrey.exe 137 PID 3068 wrote to memory of 2196 3068 cmd.exe 139
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-03_4b8ad282bc117ed1009571fc9864ee27_amadey_cloudeye_hacktools_mimikatz_rhadamanthys_smoke-loader.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\tyfbpeqb\meisrey.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:6108 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:960
-
-
C:\Windows\tyfbpeqb\meisrey.exeC:\Windows\tyfbpeqb\meisrey.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4564
-
-
-
C:\Windows\tyfbpeqb\meisrey.exeC:\Windows\tyfbpeqb\meisrey.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\tyfbpeqb\zyckrstmghhbuvp25910.exeC:\Windows\tyfbpeqb\zyckrstmghhbuvp25910.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4692
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 161.97.219.842⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5912 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 161.97.219.843⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4572
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 163.172.168.1712⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 163.172.168.1713⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:668
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 94.103.153.1762⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 94.103.153.1763⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 207.192.71.132⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 207.192.71.133⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:1244
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 178.63.116.1522⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 178.63.116.1523⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 51.77.227.842⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 51.77.227.843⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 188.226.146.1362⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 188.226.146.1363⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4916
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 51.75.173.1772⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5600 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 51.75.173.1773⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:3680
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 79.124.7.812⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 79.124.7.813⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 144.76.103.1432⤵
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 144.76.103.1433⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4452
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 5.132.191.1042⤵
- System Location Discovery: System Language Discovery
PID:4636 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 5.132.191.1043⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:3632
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 13.239.157.1772⤵
- System Location Discovery: System Language Discovery
PID:5816 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 13.239.157.1773⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4924
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 207.148.83.2412⤵
- System Location Discovery: System Language Discovery
PID:3304 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 207.148.83.2413⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4584
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 165.227.40.432⤵
- System Location Discovery: System Language Discovery
PID:748 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 165.227.40.433⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:5084
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 142.4.204.1112⤵
- System Location Discovery: System Language Discovery
PID:4572 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 142.4.204.1113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4508
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 142.4.205.472⤵
- System Location Discovery: System Language Discovery
PID:4664 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 142.4.205.473⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4628
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 198.100.148.2242⤵
- System Location Discovery: System Language Discovery
PID:5560 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 198.100.148.2243⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 159.203.38.1752⤵
- System Location Discovery: System Language Discovery
PID:5892 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 159.203.38.1753⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:3508
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 66.70.228.1642⤵
- System Location Discovery: System Language Discovery
PID:5588 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 66.70.228.1643⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4476
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 51.254.25.1152⤵
- System Location Discovery: System Language Discovery
PID:5404 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 51.254.25.1153⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:3672
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A amxread.lib 185.84.81.1942⤵
- System Location Discovery: System Language Discovery
PID:668 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A amxread.lib 185.84.81.1943⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:5128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.5MB
MD5c8985815e0b205d8466f4de4a7a2c6d6
SHA16fa3d620316a55cad06e0bde017ff8de8508288a
SHA25643a18dc59fc1f9f4dba4816e52091d29492c066d90c9122c5710f09915d5570f
SHA5125a36f951c0723d2a15b07f9de3807ffb2ab03409912390bc73d519d0c7d882c14f8c61b2e34a2b77fb7b69b0781e477b793d90cb951aee68a709905595215cc1
-
Filesize
69KB
MD58a761ad0a469caa921b8a1bdb989b9d1
SHA14584c31d116e15f402cc17122edd304eb6c95b2e
SHA256875abc09f1abc43dfcc8a9c2a5e541c9a8bcaf33a4e8faa20c58947f8c8b56fa
SHA512d2e541a9a245ea883b54e06583c5db4532e042e333f633e9dc20a1fd5d8d11c46a283274bcde0f972234a63f95e518a27da50f34a1899d88a398bbeb76cb371f