Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/04/2025, 22:30
Behavioral task
behavioral1
Sample
2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250410-en
General
-
Target
2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe
-
Size
9.4MB
-
MD5
46e8bd935752ea7e517e1e494b44ec94
-
SHA1
c58a29bde28c9270ec75878cdefdc8adb0578300
-
SHA256
44e9bc74393f799d862141e41c87f6e83a27d66108a93998ead04c0bd21d0916
-
SHA512
f3ee6cd2a85e703978384525552472aadb798ab16b4f2c9522fe94a474d411322dbc2b1f73d1422872b474d24f9747b240a771081d90f9f0419289df75686cde
-
SSDEEP
98304:os0vXTBJYa5mknGzZr+HaOKSVPFtmOZ9G1rxwFB5URUSKnaSOProSCa:o3XTYQmknGzwHaOtVPHd9swFBubKL
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral2/memory/2256-0-0x0000000000400000-0x0000000000A6E000-memory.dmp family_blackmoon behavioral2/memory/2256-4-0x0000000000400000-0x0000000000A6E000-memory.dmp family_blackmoon behavioral2/files/0x001900000002b09d-6.dat family_blackmoon behavioral2/memory/2224-8-0x0000000000400000-0x0000000000A6E000-memory.dmp family_blackmoon -
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 4 IoCs
resource yara_rule behavioral2/memory/2256-0-0x0000000000400000-0x0000000000A6E000-memory.dmp mimikatz behavioral2/memory/2256-4-0x0000000000400000-0x0000000000A6E000-memory.dmp mimikatz behavioral2/files/0x001900000002b09d-6.dat mimikatz behavioral2/memory/2224-8-0x0000000000400000-0x0000000000A6E000-memory.dmp mimikatz -
Executes dropped EXE 2 IoCs
pid Process 2224 tyydbyb.exe 2556 tyydbyb.exe -
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description flow ioc pid Process Destination IP 51 208.67.222.222 2008 nslookup.exe Destination IP 55 208.67.220.220 5532 nslookup.exe Destination IP 81 117.50.11.11 3932 nslookup.exe Destination IP 125 208.67.222.222 240 nslookup.exe Destination IP 130 208.67.220.220 340 nslookup.exe Destination IP 141 117.50.11.11 2556 tyydbyb.exe Destination IP 142 117.50.22.22 4396 nslookup.exe Destination IP 144 117.50.22.22 2556 tyydbyb.exe Destination IP 19 208.67.220.220 4632 nslookup.exe Destination IP 37 208.67.220.220 5788 nslookup.exe Destination IP 69 208.67.222.222 4372 nslookup.exe Destination IP 74 208.67.220.220 5404 nslookup.exe Destination IP 86 117.50.22.22 5708 nslookup.exe Destination IP 149 208.67.220.220 5188 nslookup.exe Destination IP 48 117.50.22.22 4732 nslookup.exe Destination IP 9 117.50.11.11 5000 nslookup.exe Destination IP 11 117.50.22.22 5056 nslookup.exe Destination IP 13 117.50.22.22 5056 nslookup.exe Destination IP 14 208.67.222.222 3300 nslookup.exe Destination IP 30 117.50.22.22 5412 nslookup.exe Destination IP 33 208.67.222.222 1620 nslookup.exe Destination IP 83 117.50.11.11 3932 nslookup.exe Destination IP 16 208.67.222.222 3300 nslookup.exe Destination IP 46 117.50.11.11 3352 nslookup.exe Destination IP 54 208.67.220.220 5532 nslookup.exe Destination IP 88 208.67.222.222 3448 nslookup.exe Destination IP 91 208.67.220.220 5848 nslookup.exe Destination IP 101 117.50.11.11 2076 nslookup.exe Destination IP 107 208.67.222.222 496 nslookup.exe Destination IP 108 208.67.222.222 496 nslookup.exe Destination IP 66 117.50.22.22 416 nslookup.exe Destination IP 67 117.50.22.22 416 nslookup.exe Destination IP 105 117.50.22.22 2408 nslookup.exe Destination IP 120 117.50.11.11 3728 nslookup.exe Destination IP 139 117.50.11.11 4380 nslookup.exe Destination IP 160 117.50.11.11 1168 nslookup.exe Destination IP 28 117.50.11.11 6068 nslookup.exe Destination IP 7 117.50.11.11 5000 nslookup.exe Destination IP 12 117.50.22.22 5056 nslookup.exe Destination IP 45 117.50.11.11 3352 nslookup.exe Destination IP 111 208.67.220.220 4108 nslookup.exe Destination IP 119 117.50.11.11 3728 nslookup.exe Destination IP 124 117.50.22.22 4816 nslookup.exe Destination IP 159 117.50.11.11 1168 nslookup.exe Destination IP 32 117.50.22.22 5412 nslookup.exe Destination IP 53 208.67.222.222 2008 nslookup.exe Destination IP 63 117.50.11.11 2012 nslookup.exe Destination IP 64 117.50.11.11 2012 nslookup.exe Destination IP 82 117.50.11.11 3932 nslookup.exe Destination IP 89 208.67.222.222 3448 nslookup.exe Destination IP 18 208.67.220.220 4632 nslookup.exe Destination IP 84 117.50.22.22 5708 nslookup.exe Destination IP 87 208.67.222.222 3448 nslookup.exe Destination IP 112 208.67.220.220 4108 nslookup.exe Destination IP 126 208.67.222.222 240 nslookup.exe Destination IP 128 208.67.220.220 340 nslookup.exe Destination IP 143 117.50.22.22 2556 tyydbyb.exe Destination IP 17 208.67.220.220 4632 nslookup.exe Destination IP 49 117.50.22.22 4732 nslookup.exe Destination IP 52 208.67.222.222 2008 nslookup.exe Destination IP 65 117.50.11.11 2012 nslookup.exe Destination IP 70 208.67.222.222 4372 nslookup.exe Destination IP 123 117.50.22.22 4816 nslookup.exe Destination IP 162 117.50.22.22 5428 nslookup.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 tyydbyb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE tyydbyb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies tyydbyb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 tyydbyb.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\bzabiyih\tyydbyb.exe 2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe File opened for modification C:\Windows\bzabiyih\tyydbyb.exe 2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tyydbyb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tyydbyb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 340 PING.EXE 5264 cmd.exe -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x001900000002b09d-6.dat nsis_installer_2 -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ tyydbyb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" tyydbyb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" tyydbyb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" tyydbyb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" tyydbyb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix tyydbyb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" tyydbyb.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" tyydbyb.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 340 PING.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2256 2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2256 2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe Token: SeDebugPrivilege 2224 tyydbyb.exe Token: SeDebugPrivilege 2556 tyydbyb.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2256 2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe 2224 tyydbyb.exe 2556 tyydbyb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 5264 2256 2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe 78 PID 2256 wrote to memory of 5264 2256 2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe 78 PID 2256 wrote to memory of 5264 2256 2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe 78 PID 5264 wrote to memory of 340 5264 cmd.exe 80 PID 5264 wrote to memory of 340 5264 cmd.exe 80 PID 5264 wrote to memory of 340 5264 cmd.exe 80 PID 5264 wrote to memory of 2224 5264 cmd.exe 81 PID 5264 wrote to memory of 2224 5264 cmd.exe 81 PID 5264 wrote to memory of 2224 5264 cmd.exe 81 PID 2556 wrote to memory of 1396 2556 tyydbyb.exe 83 PID 2556 wrote to memory of 1396 2556 tyydbyb.exe 83 PID 2556 wrote to memory of 1396 2556 tyydbyb.exe 83 PID 1396 wrote to memory of 3036 1396 cmd.exe 85 PID 1396 wrote to memory of 3036 1396 cmd.exe 85 PID 1396 wrote to memory of 3036 1396 cmd.exe 85 PID 2556 wrote to memory of 5988 2556 tyydbyb.exe 86 PID 2556 wrote to memory of 5988 2556 tyydbyb.exe 86 PID 2556 wrote to memory of 5988 2556 tyydbyb.exe 86 PID 5988 wrote to memory of 5116 5988 cmd.exe 88 PID 5988 wrote to memory of 5116 5988 cmd.exe 88 PID 5988 wrote to memory of 5116 5988 cmd.exe 88 PID 2556 wrote to memory of 2284 2556 tyydbyb.exe 89 PID 2556 wrote to memory of 2284 2556 tyydbyb.exe 89 PID 2556 wrote to memory of 2284 2556 tyydbyb.exe 89 PID 2284 wrote to memory of 5000 2284 cmd.exe 91 PID 2284 wrote to memory of 5000 2284 cmd.exe 91 PID 2284 wrote to memory of 5000 2284 cmd.exe 91 PID 2556 wrote to memory of 4936 2556 tyydbyb.exe 92 PID 2556 wrote to memory of 4936 2556 tyydbyb.exe 92 PID 2556 wrote to memory of 4936 2556 tyydbyb.exe 92 PID 4936 wrote to memory of 5056 4936 cmd.exe 94 PID 4936 wrote to memory of 5056 4936 cmd.exe 94 PID 4936 wrote to memory of 5056 4936 cmd.exe 94 PID 2556 wrote to memory of 4396 2556 tyydbyb.exe 95 PID 2556 wrote to memory of 4396 2556 tyydbyb.exe 95 PID 2556 wrote to memory of 4396 2556 tyydbyb.exe 95 PID 4396 wrote to memory of 3300 4396 cmd.exe 97 PID 4396 wrote to memory of 3300 4396 cmd.exe 97 PID 4396 wrote to memory of 3300 4396 cmd.exe 97 PID 2556 wrote to memory of 2316 2556 tyydbyb.exe 98 PID 2556 wrote to memory of 2316 2556 tyydbyb.exe 98 PID 2556 wrote to memory of 2316 2556 tyydbyb.exe 98 PID 2316 wrote to memory of 4632 2316 cmd.exe 100 PID 2316 wrote to memory of 4632 2316 cmd.exe 100 PID 2316 wrote to memory of 4632 2316 cmd.exe 100 PID 2556 wrote to memory of 2812 2556 tyydbyb.exe 101 PID 2556 wrote to memory of 2812 2556 tyydbyb.exe 101 PID 2556 wrote to memory of 2812 2556 tyydbyb.exe 101 PID 2812 wrote to memory of 5020 2812 cmd.exe 103 PID 2812 wrote to memory of 5020 2812 cmd.exe 103 PID 2812 wrote to memory of 5020 2812 cmd.exe 103 PID 2556 wrote to memory of 5188 2556 tyydbyb.exe 104 PID 2556 wrote to memory of 5188 2556 tyydbyb.exe 104 PID 2556 wrote to memory of 5188 2556 tyydbyb.exe 104 PID 5188 wrote to memory of 5104 5188 cmd.exe 106 PID 5188 wrote to memory of 5104 5188 cmd.exe 106 PID 5188 wrote to memory of 5104 5188 cmd.exe 106 PID 2556 wrote to memory of 3868 2556 tyydbyb.exe 107 PID 2556 wrote to memory of 3868 2556 tyydbyb.exe 107 PID 2556 wrote to memory of 3868 2556 tyydbyb.exe 107 PID 3868 wrote to memory of 6068 3868 cmd.exe 109 PID 3868 wrote to memory of 6068 3868 cmd.exe 109 PID 3868 wrote to memory of 6068 3868 cmd.exe 109 PID 2556 wrote to memory of 3016 2556 tyydbyb.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-21_46e8bd935752ea7e517e1e494b44ec94_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\bzabiyih\tyydbyb.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5264 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:340
-
-
C:\Windows\bzabiyih\tyydbyb.exeC:\Windows\bzabiyih\tyydbyb.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2224
-
-
-
C:\Windows\bzabiyih\tyydbyb.exeC:\Windows\bzabiyih\tyydbyb.exe1⤵
- Executes dropped EXE
- Unexpected DNS network traffic destination
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A aj.0x0x0x0x0.best 8.8.8.82⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A aj.0x0x0x0x0.best 8.8.8.83⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A aj.0x0x0x0x0.best 1.1.1.12⤵
- Suspicious use of WriteProcessMemory
PID:5988 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A aj.0x0x0x0x0.best 1.1.1.13⤵
- System Location Discovery: System Language Discovery
PID:5116
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A aj.0x0x0x0x0.best 117.50.11.112⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A aj.0x0x0x0x0.best 117.50.11.113⤵
- Unexpected DNS network traffic destination
PID:5000
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A aj.0x0x0x0x0.best 117.50.22.222⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A aj.0x0x0x0x0.best 117.50.22.223⤵
- Unexpected DNS network traffic destination
PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A aj.0x0x0x0x0.best 208.67.222.2222⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A aj.0x0x0x0x0.best 208.67.222.2223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:3300
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A aj.0x0x0x0x0.best 208.67.220.2202⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A aj.0x0x0x0x0.best 208.67.220.2203⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4632
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A xs.0x0x0x0x0.club 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A xs.0x0x0x0x0.club 8.8.8.83⤵
- System Location Discovery: System Language Discovery
PID:5020
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A xs.0x0x0x0x0.club 1.1.1.12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5188 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A xs.0x0x0x0x0.club 1.1.1.13⤵
- System Location Discovery: System Language Discovery
PID:5104
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A xs.0x0x0x0x0.club 117.50.11.112⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A xs.0x0x0x0x0.club 117.50.11.113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:6068
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A xs.0x0x0x0x0.club 117.50.22.222⤵
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A xs.0x0x0x0x0.club 117.50.22.223⤵
- Unexpected DNS network traffic destination
PID:5412
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A xs.0x0x0x0x0.club 208.67.222.2222⤵PID:6056
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A xs.0x0x0x0x0.club 208.67.222.2223⤵
- Unexpected DNS network traffic destination
PID:1620
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A xs.0x0x0x0x0.club 208.67.220.2202⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A xs.0x0x0x0x0.club 208.67.220.2203⤵
- Unexpected DNS network traffic destination
PID:5788
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ui.0x0x0x0x0.xyz 8.8.8.82⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ui.0x0x0x0x0.xyz 8.8.8.83⤵PID:5220
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ui.0x0x0x0x0.xyz 1.1.1.12⤵PID:2448
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ui.0x0x0x0x0.xyz 1.1.1.13⤵
- System Location Discovery: System Language Discovery
PID:5824
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ui.0x0x0x0x0.xyz 117.50.11.112⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ui.0x0x0x0x0.xyz 117.50.11.113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:3352
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ui.0x0x0x0x0.xyz 117.50.22.222⤵PID:1600
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ui.0x0x0x0x0.xyz 117.50.22.223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4732
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ui.0x0x0x0x0.xyz 208.67.222.2222⤵PID:3540
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ui.0x0x0x0x0.xyz 208.67.222.2223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ui.0x0x0x0x0.xyz 208.67.220.2202⤵
- System Location Discovery: System Language Discovery
PID:2088 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ui.0x0x0x0x0.xyz 208.67.220.2203⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:5532
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A qb.1c1c1c1c.best 8.8.8.82⤵PID:4280
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A qb.1c1c1c1c.best 8.8.8.83⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A qb.1c1c1c1c.best 1.1.1.12⤵
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A qb.1c1c1c1c.best 1.1.1.13⤵
- System Location Discovery: System Language Discovery
PID:5476
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A qb.1c1c1c1c.best 117.50.11.112⤵PID:5896
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A qb.1c1c1c1c.best 117.50.11.113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A qb.1c1c1c1c.best 117.50.22.222⤵
- System Location Discovery: System Language Discovery
PID:5400 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A qb.1c1c1c1c.best 117.50.22.223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:416
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A qb.1c1c1c1c.best 208.67.222.2222⤵
- System Location Discovery: System Language Discovery
PID:1584 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A qb.1c1c1c1c.best 208.67.222.2223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4372
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A qb.1c1c1c1c.best 208.67.220.2202⤵PID:972
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A qb.1c1c1c1c.best 208.67.220.2203⤵
- Unexpected DNS network traffic destination
PID:5404
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ce.1c1c1c1c.club 8.8.8.82⤵
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ce.1c1c1c1c.club 8.8.8.83⤵PID:132
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ce.1c1c1c1c.club 1.1.1.12⤵
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ce.1c1c1c1c.club 1.1.1.13⤵
- System Location Discovery: System Language Discovery
PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ce.1c1c1c1c.club 117.50.11.112⤵
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ce.1c1c1c1c.club 117.50.11.113⤵
- Unexpected DNS network traffic destination
PID:3932
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ce.1c1c1c1c.club 117.50.22.222⤵
- System Location Discovery: System Language Discovery
PID:1040 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ce.1c1c1c1c.club 117.50.22.223⤵
- Unexpected DNS network traffic destination
PID:5708
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ce.1c1c1c1c.club 208.67.222.2222⤵PID:6132
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ce.1c1c1c1c.club 208.67.222.2223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:3448
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ce.1c1c1c1c.club 208.67.220.2202⤵
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ce.1c1c1c1c.club 208.67.220.2203⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:5848
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A jz.1c1c1c1c.xyz 8.8.8.82⤵PID:4072
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A jz.1c1c1c1c.xyz 8.8.8.83⤵
- System Location Discovery: System Language Discovery
PID:2248
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A jz.1c1c1c1c.xyz 1.1.1.12⤵PID:6112
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A jz.1c1c1c1c.xyz 1.1.1.13⤵PID:3264
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A jz.1c1c1c1c.xyz 117.50.11.112⤵
- System Location Discovery: System Language Discovery
PID:5772 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A jz.1c1c1c1c.xyz 117.50.11.113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A jz.1c1c1c1c.xyz 117.50.22.222⤵PID:932
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A jz.1c1c1c1c.xyz 117.50.22.223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A jz.1c1c1c1c.xyz 208.67.222.2222⤵
- System Location Discovery: System Language Discovery
PID:5580 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A jz.1c1c1c1c.xyz 208.67.222.2223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:496
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A jz.1c1c1c1c.xyz 208.67.220.2202⤵
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A jz.1c1c1c1c.xyz 208.67.220.2203⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4108
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.info 8.8.8.82⤵PID:1232
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.info 8.8.8.83⤵PID:3752
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.info 1.1.1.12⤵PID:5472
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.info 1.1.1.13⤵PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.info 117.50.11.112⤵
- System Location Discovery: System Language Discovery
PID:3484 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.info 117.50.11.113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:3728
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.info 117.50.22.222⤵PID:4460
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.info 117.50.22.223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4816
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.info 208.67.222.2222⤵
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.info 208.67.222.2223⤵
- Unexpected DNS network traffic destination
PID:240
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.info 208.67.220.2202⤵PID:2384
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.info 208.67.220.2203⤵
- Unexpected DNS network traffic destination
PID:340
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.kingminer.club 8.8.8.82⤵PID:2196
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.kingminer.club 8.8.8.83⤵
- System Location Discovery: System Language Discovery
PID:1352
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.kingminer.club 1.1.1.12⤵
- System Location Discovery: System Language Discovery
PID:6004 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.kingminer.club 1.1.1.13⤵PID:4988
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.kingminer.club 117.50.11.112⤵
- System Location Discovery: System Language Discovery
PID:4992 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.kingminer.club 117.50.11.113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4380
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.kingminer.club 117.50.22.222⤵
- System Location Discovery: System Language Discovery
PID:4468 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.kingminer.club 117.50.22.223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4396
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.kingminer.club 208.67.222.2222⤵PID:2808
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.kingminer.club 208.67.222.2223⤵PID:3288
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.kingminer.club 208.67.220.2202⤵
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.kingminer.club 208.67.220.2203⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:5188
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.in 8.8.8.82⤵PID:4912
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.in 8.8.8.83⤵PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.in 1.1.1.12⤵
- System Location Discovery: System Language Discovery
PID:4668 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.in 1.1.1.13⤵PID:3848
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.in 117.50.11.112⤵PID:1088
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.in 117.50.11.113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:1168
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.in 117.50.22.222⤵
- System Location Discovery: System Language Discovery
PID:4796 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.in 117.50.22.223⤵
- Unexpected DNS network traffic destination
PID:5428
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.5MB
MD5f610e85b78ca6438ba5339168568d7a8
SHA183d13d2f64e99a90353fe992fac1649b27e26e88
SHA256137150dd0b8179f12d2d566a6fa278d92c45ead818bddbaf844bfbf7736f71c0
SHA5129b12055a6579623e6b3e0e67dd9e3ea2576fb6358a18232a4c7615beefbec552634e8119251f37435a404fbda92e4a6d81213373bbceb859b2a787db0ee07310