Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2025, 01:16
Behavioral task
behavioral1
Sample
2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe
-
Size
12.7MB
-
MD5
457f582efe68576b39e1e54c319c923f
-
SHA1
75878071f6fd7ce0dac3b90529c15699941528f9
-
SHA256
adfcffc7faf99bfb32d9de46b8c137759fbcc39885631bb6a218746cab0cd136
-
SHA512
28deb16b0bcf3fef45d051c0c72dfc106c243002cd31b4fcaf79696133325821d101bc53b13900208883ed2e7f9c1437cc528a321b064d0d0a52bd2d65387176
-
SSDEEP
196608:o3XTYQmknGzwHaOtVPHd9swFBubKLtchEYX2AxFpx4g1JoHZiDzDhpyT4t23:4ujzwV3BubKyeapug7ciDzDhpyTv3
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 4 IoCs
resource yara_rule behavioral1/memory/2620-0-0x0000000000400000-0x0000000000A6E000-memory.dmp family_blackmoon behavioral1/memory/2620-4-0x0000000000400000-0x0000000000A6E000-memory.dmp family_blackmoon behavioral1/files/0x0007000000024247-6.dat family_blackmoon behavioral1/memory/2188-8-0x0000000000400000-0x0000000000A6E000-memory.dmp family_blackmoon -
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
mimikatz is an open source tool to dump credentials on Windows 4 IoCs
resource yara_rule behavioral1/memory/2620-0-0x0000000000400000-0x0000000000A6E000-memory.dmp mimikatz behavioral1/memory/2620-4-0x0000000000400000-0x0000000000A6E000-memory.dmp mimikatz behavioral1/files/0x0007000000024247-6.dat mimikatz behavioral1/memory/2188-8-0x0000000000400000-0x0000000000A6E000-memory.dmp mimikatz -
Executes dropped EXE 2 IoCs
pid Process 2188 vtukhlg.exe 2476 vtukhlg.exe -
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description flow ioc pid Process Destination IP 33 117.50.22.22 4952 nslookup.exe Destination IP 69 208.67.222.222 3840 nslookup.exe Destination IP 103 208.67.222.222 228 nslookup.exe Destination IP 124 208.67.222.222 4624 nslookup.exe Destination IP 34 208.67.222.222 408 nslookup.exe Destination IP 51 117.50.22.22 3584 nslookup.exe Destination IP 70 208.67.220.220 3824 nslookup.exe Destination IP 84 117.50.22.22 2600 nslookup.exe Destination IP 87 208.67.222.222 4404 nslookup.exe Destination IP 97 117.50.11.11 3036 nslookup.exe Destination IP 106 208.67.220.220 5176 nslookup.exe Destination IP 120 117.50.22.22 832 nslookup.exe Destination IP 49 117.50.11.11 1944 nslookup.exe Destination IP 79 117.50.11.11 2396 nslookup.exe Destination IP 98 117.50.11.11 3036 nslookup.exe Destination IP 99 117.50.11.11 3036 nslookup.exe Destination IP 128 208.67.220.220 4744 nslookup.exe Destination IP 158 117.50.11.11 1872 nslookup.exe Destination IP 37 208.67.220.220 4076 nslookup.exe Destination IP 135 117.50.11.11 1292 nslookup.exe Destination IP 169 208.67.222.222 5616 nslookup.exe Destination IP 186 117.50.22.22 4964 nslookup.exe Destination IP 188 117.50.22.22 2476 vtukhlg.exe Destination IP 193 208.67.220.220 5776 nslookup.exe Destination IP 194 208.67.220.220 2476 vtukhlg.exe Destination IP 20 117.50.11.11 448 nslookup.exe Destination IP 24 117.50.22.22 4952 nslookup.exe Destination IP 83 117.50.22.22 2600 nslookup.exe Destination IP 100 117.50.22.22 3288 nslookup.exe Destination IP 102 117.50.22.22 3288 nslookup.exe Destination IP 118 117.50.11.11 4324 nslookup.exe Destination IP 147 208.67.222.222 3088 nslookup.exe Destination IP 151 208.67.220.220 4796 nslookup.exe Destination IP 23 117.50.11.11 448 nslookup.exe Destination IP 50 117.50.11.11 1944 nslookup.exe Destination IP 88 208.67.220.220 1704 nslookup.exe Destination IP 125 208.67.222.222 4624 nslookup.exe Destination IP 127 208.67.220.220 4744 nslookup.exe Destination IP 167 208.67.222.222 5616 nslookup.exe Destination IP 190 208.67.222.222 2476 vtukhlg.exe Destination IP 90 208.67.220.220 1704 nslookup.exe Destination IP 104 208.67.222.222 228 nslookup.exe Destination IP 121 117.50.22.22 832 nslookup.exe Destination IP 126 208.67.220.220 4744 nslookup.exe Destination IP 139 117.50.22.22 4560 nslookup.exe Destination IP 148 208.67.222.222 3088 nslookup.exe Destination IP 187 117.50.22.22 2476 vtukhlg.exe Destination IP 36 208.67.222.222 408 nslookup.exe Destination IP 52 117.50.22.22 3584 nslookup.exe Destination IP 80 117.50.11.11 2396 nslookup.exe Destination IP 123 208.67.222.222 4624 nslookup.exe Destination IP 137 117.50.11.11 1292 nslookup.exe Destination IP 165 117.50.22.22 1740 nslookup.exe Destination IP 166 117.50.22.22 1740 nslookup.exe Destination IP 168 208.67.222.222 5616 nslookup.exe Destination IP 86 208.67.222.222 4404 nslookup.exe Destination IP 39 208.67.220.220 4076 nslookup.exe Destination IP 138 117.50.22.22 4560 nslookup.exe Destination IP 170 208.67.220.220 6056 nslookup.exe Destination IP 206 117.50.22.22 1400 nslookup.exe Destination IP 208 117.50.22.22 1400 nslookup.exe Destination IP 213 208.67.220.220 5248 nslookup.exe Destination IP 105 208.67.222.222 228 nslookup.exe Destination IP 107 208.67.220.220 5176 nslookup.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies vtukhlg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 vtukhlg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 vtukhlg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE vtukhlg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\bgshgugb\vtukhlg.exe 2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe File opened for modification C:\Windows\bgshgugb\vtukhlg.exe 2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtukhlg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vtukhlg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2120 cmd.exe 372 PING.EXE -
NSIS installer 1 IoCs
resource yara_rule behavioral1/files/0x0007000000024247-6.dat nsis_installer_2 -
Modifies data under HKEY_USERS 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" vtukhlg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" vtukhlg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" vtukhlg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" vtukhlg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix vtukhlg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" vtukhlg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" vtukhlg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ vtukhlg.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 372 PING.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2620 2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2620 2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe Token: SeDebugPrivilege 2188 vtukhlg.exe Token: SeDebugPrivilege 2476 vtukhlg.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2620 2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe 2188 vtukhlg.exe 2476 vtukhlg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2120 2620 2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe 87 PID 2620 wrote to memory of 2120 2620 2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe 87 PID 2620 wrote to memory of 2120 2620 2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe 87 PID 2120 wrote to memory of 372 2120 cmd.exe 89 PID 2120 wrote to memory of 372 2120 cmd.exe 89 PID 2120 wrote to memory of 372 2120 cmd.exe 89 PID 2120 wrote to memory of 2188 2120 cmd.exe 92 PID 2120 wrote to memory of 2188 2120 cmd.exe 92 PID 2120 wrote to memory of 2188 2120 cmd.exe 92 PID 2476 wrote to memory of 4528 2476 vtukhlg.exe 94 PID 2476 wrote to memory of 4528 2476 vtukhlg.exe 94 PID 2476 wrote to memory of 4528 2476 vtukhlg.exe 94 PID 4528 wrote to memory of 4784 4528 cmd.exe 96 PID 4528 wrote to memory of 4784 4528 cmd.exe 96 PID 4528 wrote to memory of 4784 4528 cmd.exe 96 PID 2476 wrote to memory of 4756 2476 vtukhlg.exe 99 PID 2476 wrote to memory of 4756 2476 vtukhlg.exe 99 PID 2476 wrote to memory of 4756 2476 vtukhlg.exe 99 PID 4756 wrote to memory of 4776 4756 cmd.exe 101 PID 4756 wrote to memory of 4776 4756 cmd.exe 101 PID 4756 wrote to memory of 4776 4756 cmd.exe 101 PID 2476 wrote to memory of 4860 2476 vtukhlg.exe 102 PID 2476 wrote to memory of 4860 2476 vtukhlg.exe 102 PID 2476 wrote to memory of 4860 2476 vtukhlg.exe 102 PID 4860 wrote to memory of 448 4860 cmd.exe 104 PID 4860 wrote to memory of 448 4860 cmd.exe 104 PID 4860 wrote to memory of 448 4860 cmd.exe 104 PID 2476 wrote to memory of 5908 2476 vtukhlg.exe 108 PID 2476 wrote to memory of 5908 2476 vtukhlg.exe 108 PID 2476 wrote to memory of 5908 2476 vtukhlg.exe 108 PID 5908 wrote to memory of 4952 5908 cmd.exe 110 PID 5908 wrote to memory of 4952 5908 cmd.exe 110 PID 5908 wrote to memory of 4952 5908 cmd.exe 110 PID 2476 wrote to memory of 4604 2476 vtukhlg.exe 113 PID 2476 wrote to memory of 4604 2476 vtukhlg.exe 113 PID 2476 wrote to memory of 4604 2476 vtukhlg.exe 113 PID 4604 wrote to memory of 408 4604 cmd.exe 115 PID 4604 wrote to memory of 408 4604 cmd.exe 115 PID 4604 wrote to memory of 408 4604 cmd.exe 115 PID 2476 wrote to memory of 5372 2476 vtukhlg.exe 116 PID 2476 wrote to memory of 5372 2476 vtukhlg.exe 116 PID 2476 wrote to memory of 5372 2476 vtukhlg.exe 116 PID 5372 wrote to memory of 4076 5372 cmd.exe 118 PID 5372 wrote to memory of 4076 5372 cmd.exe 118 PID 5372 wrote to memory of 4076 5372 cmd.exe 118 PID 2476 wrote to memory of 1432 2476 vtukhlg.exe 119 PID 2476 wrote to memory of 1432 2476 vtukhlg.exe 119 PID 2476 wrote to memory of 1432 2476 vtukhlg.exe 119 PID 1432 wrote to memory of 3996 1432 cmd.exe 121 PID 1432 wrote to memory of 3996 1432 cmd.exe 121 PID 1432 wrote to memory of 3996 1432 cmd.exe 121 PID 2476 wrote to memory of 720 2476 vtukhlg.exe 122 PID 2476 wrote to memory of 720 2476 vtukhlg.exe 122 PID 2476 wrote to memory of 720 2476 vtukhlg.exe 122 PID 720 wrote to memory of 1748 720 cmd.exe 124 PID 720 wrote to memory of 1748 720 cmd.exe 124 PID 720 wrote to memory of 1748 720 cmd.exe 124 PID 2476 wrote to memory of 2996 2476 vtukhlg.exe 125 PID 2476 wrote to memory of 2996 2476 vtukhlg.exe 125 PID 2476 wrote to memory of 2996 2476 vtukhlg.exe 125 PID 2996 wrote to memory of 1944 2996 cmd.exe 127 PID 2996 wrote to memory of 1944 2996 cmd.exe 127 PID 2996 wrote to memory of 1944 2996 cmd.exe 127 PID 2476 wrote to memory of 3600 2476 vtukhlg.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe"C:\Users\Admin\AppData\Local\Temp\2025-04-22_457f582efe68576b39e1e54c319c923f_amadey_cloudeye_elex_hacktools_mimikatz_rhadamanthys_smoke-loader.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\bgshgugb\vtukhlg.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:372
-
-
C:\Windows\bgshgugb\vtukhlg.exeC:\Windows\bgshgugb\vtukhlg.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2188
-
-
-
C:\Windows\bgshgugb\vtukhlg.exeC:\Windows\bgshgugb\vtukhlg.exe1⤵
- Executes dropped EXE
- Unexpected DNS network traffic destination
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A aj.0x0x0x0x0.best 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A aj.0x0x0x0x0.best 8.8.8.83⤵
- System Location Discovery: System Language Discovery
PID:4784
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A aj.0x0x0x0x0.best 1.1.1.12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A aj.0x0x0x0x0.best 1.1.1.13⤵
- System Location Discovery: System Language Discovery
PID:4776
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A aj.0x0x0x0x0.best 117.50.11.112⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A aj.0x0x0x0x0.best 117.50.11.113⤵
- Unexpected DNS network traffic destination
PID:448
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A aj.0x0x0x0x0.best 117.50.22.222⤵
- Suspicious use of WriteProcessMemory
PID:5908 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A aj.0x0x0x0x0.best 117.50.22.223⤵
- Unexpected DNS network traffic destination
PID:4952
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A aj.0x0x0x0x0.best 208.67.222.2222⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A aj.0x0x0x0x0.best 208.67.222.2223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:408
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A aj.0x0x0x0x0.best 208.67.220.2202⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5372 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A aj.0x0x0x0x0.best 208.67.220.2203⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4076
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A xs.0x0x0x0x0.club 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A xs.0x0x0x0x0.club 8.8.8.83⤵PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A xs.0x0x0x0x0.club 1.1.1.12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A xs.0x0x0x0x0.club 1.1.1.13⤵PID:1748
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A xs.0x0x0x0x0.club 117.50.11.112⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A xs.0x0x0x0x0.club 117.50.11.113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A xs.0x0x0x0x0.club 117.50.22.222⤵
- System Location Discovery: System Language Discovery
PID:3600 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A xs.0x0x0x0x0.club 117.50.22.223⤵
- Unexpected DNS network traffic destination
PID:3584
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A xs.0x0x0x0x0.club 208.67.222.2222⤵PID:2876
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A xs.0x0x0x0x0.club 208.67.222.2223⤵
- Unexpected DNS network traffic destination
PID:3840
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A xs.0x0x0x0x0.club 208.67.220.2202⤵
- System Location Discovery: System Language Discovery
PID:2616 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A xs.0x0x0x0x0.club 208.67.220.2203⤵
- Unexpected DNS network traffic destination
PID:3824
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ui.0x0x0x0x0.xyz 8.8.8.82⤵PID:2752
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ui.0x0x0x0x0.xyz 8.8.8.83⤵PID:712
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ui.0x0x0x0x0.xyz 1.1.1.12⤵
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ui.0x0x0x0x0.xyz 1.1.1.13⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ui.0x0x0x0x0.xyz 117.50.11.112⤵
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ui.0x0x0x0x0.xyz 117.50.11.113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ui.0x0x0x0x0.xyz 117.50.22.222⤵
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ui.0x0x0x0x0.xyz 117.50.22.223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ui.0x0x0x0x0.xyz 208.67.222.2222⤵PID:5516
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ui.0x0x0x0x0.xyz 208.67.222.2223⤵
- Unexpected DNS network traffic destination
PID:4404
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ui.0x0x0x0x0.xyz 208.67.220.2202⤵PID:2244
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ui.0x0x0x0x0.xyz 208.67.220.2203⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:1704
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A qb.1c1c1c1c.best 8.8.8.82⤵PID:6052
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A qb.1c1c1c1c.best 8.8.8.83⤵PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A qb.1c1c1c1c.best 1.1.1.12⤵
- System Location Discovery: System Language Discovery
PID:540 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A qb.1c1c1c1c.best 1.1.1.13⤵
- System Location Discovery: System Language Discovery
PID:4968
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A qb.1c1c1c1c.best 117.50.11.112⤵
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A qb.1c1c1c1c.best 117.50.11.113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A qb.1c1c1c1c.best 117.50.22.222⤵PID:5652
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A qb.1c1c1c1c.best 117.50.22.223⤵
- Unexpected DNS network traffic destination
PID:3288
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A qb.1c1c1c1c.best 208.67.222.2222⤵
- System Location Discovery: System Language Discovery
PID:5864 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A qb.1c1c1c1c.best 208.67.222.2223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:228
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A qb.1c1c1c1c.best 208.67.220.2202⤵PID:4352
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A qb.1c1c1c1c.best 208.67.220.2203⤵
- Unexpected DNS network traffic destination
PID:5176
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ce.1c1c1c1c.club 8.8.8.82⤵
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ce.1c1c1c1c.club 8.8.8.83⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ce.1c1c1c1c.club 1.1.1.12⤵PID:3636
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ce.1c1c1c1c.club 1.1.1.13⤵PID:3972
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ce.1c1c1c1c.club 117.50.11.112⤵PID:2780
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ce.1c1c1c1c.club 117.50.11.113⤵
- Unexpected DNS network traffic destination
PID:4324
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ce.1c1c1c1c.club 117.50.22.222⤵PID:2416
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ce.1c1c1c1c.club 117.50.22.223⤵
- Unexpected DNS network traffic destination
PID:832
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ce.1c1c1c1c.club 208.67.222.2222⤵
- System Location Discovery: System Language Discovery
PID:6124 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ce.1c1c1c1c.club 208.67.222.2223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4624
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A ce.1c1c1c1c.club 208.67.220.2202⤵PID:4784
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A ce.1c1c1c1c.club 208.67.220.2203⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4744
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A jz.1c1c1c1c.xyz 8.8.8.82⤵PID:5812
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A jz.1c1c1c1c.xyz 8.8.8.83⤵
- System Location Discovery: System Language Discovery
PID:5284
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A jz.1c1c1c1c.xyz 1.1.1.12⤵PID:4960
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A jz.1c1c1c1c.xyz 1.1.1.13⤵PID:5936
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A jz.1c1c1c1c.xyz 117.50.11.112⤵PID:5536
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A jz.1c1c1c1c.xyz 117.50.11.113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:1292
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A jz.1c1c1c1c.xyz 117.50.22.222⤵
- System Location Discovery: System Language Discovery
PID:3196 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A jz.1c1c1c1c.xyz 117.50.22.223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4560
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A jz.1c1c1c1c.xyz 208.67.222.2222⤵
- System Location Discovery: System Language Discovery
PID:3392 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A jz.1c1c1c1c.xyz 208.67.222.2223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:3088
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A jz.1c1c1c1c.xyz 208.67.220.2202⤵PID:5872
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A jz.1c1c1c1c.xyz 208.67.220.2203⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.info 8.8.8.82⤵PID:1140
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.info 8.8.8.83⤵PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.info 1.1.1.12⤵
- System Location Discovery: System Language Discovery
PID:6088 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.info 1.1.1.13⤵PID:5724
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.info 117.50.11.112⤵
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.info 117.50.11.113⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.info 117.50.22.222⤵
- System Location Discovery: System Language Discovery
PID:720 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.info 117.50.22.223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:1740
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.info 208.67.222.2222⤵
- System Location Discovery: System Language Discovery
PID:5568 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.info 208.67.222.2223⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:5616
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.info 208.67.220.2202⤵PID:2088
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.info 208.67.220.2203⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:6056
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.kingminer.club 8.8.8.82⤵
- System Location Discovery: System Language Discovery
PID:544 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.kingminer.club 8.8.8.83⤵
- System Location Discovery: System Language Discovery
PID:4388
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.kingminer.club 1.1.1.12⤵
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.kingminer.club 1.1.1.13⤵
- System Location Discovery: System Language Discovery
PID:5416
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.kingminer.club 117.50.11.112⤵
- System Location Discovery: System Language Discovery
PID:5324 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.kingminer.club 117.50.11.113⤵
- System Location Discovery: System Language Discovery
PID:436
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.kingminer.club 117.50.22.222⤵
- System Location Discovery: System Language Discovery
PID:2616 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.kingminer.club 117.50.22.223⤵
- Unexpected DNS network traffic destination
PID:4964
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.kingminer.club 208.67.222.2222⤵PID:4500
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.kingminer.club 208.67.222.2223⤵PID:6048
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.kingminer.club 208.67.220.2202⤵PID:3356
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.kingminer.club 208.67.220.2203⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:5776
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.in 8.8.8.82⤵
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.in 8.8.8.83⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.in 1.1.1.12⤵PID:5280
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.in 1.1.1.13⤵
- System Location Discovery: System Language Discovery
PID:1788
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.in 117.50.11.112⤵
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.in 117.50.11.113⤵PID:3148
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.in 117.50.22.222⤵
- System Location Discovery: System Language Discovery
PID:1080 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.in 117.50.22.223⤵
- Unexpected DNS network traffic destination
PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.in 208.67.222.2222⤵PID:452
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.in 208.67.222.2223⤵PID:3644
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A bk.heroherohero.in 208.67.220.2202⤵
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A bk.heroherohero.in 208.67.220.2203⤵
- Unexpected DNS network traffic destination
- System Location Discovery: System Language Discovery
PID:5248
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c nslookup -qt=A 0xMine1.lib 185.121.177.1772⤵PID:212
-
C:\Windows\SysWOW64\nslookup.exenslookup -qt=A 0xMine1.lib 185.121.177.1773⤵
- System Location Discovery: System Language Discovery
PID:5652
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.7MB
MD5b8fb94081bf817c6c82af72249529e00
SHA114ea874c7e8633865fa61f73d739d956b095e852
SHA25619e52d07ed22f85a2bba270c187d00f1e3f07ebbe894e6c3b05c4d0b9f18bf95
SHA512256ddce9cb34bf410c4e72de25e8bb2f6dad591314c6df04a5e5cb50df65457e82c0dcab500af2fd2651cee7c5cc1e6b604614c0d8dbf481ed369a61ee001b24