Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
19/03/2023, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067.exe
Resource
win10-20230220-en
General
-
Target
0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067.exe
-
Size
1003KB
-
MD5
68f3a49538f9cbb020accc645a1a0e97
-
SHA1
96eca84269774f8d470e766753e99b360f40dd2b
-
SHA256
0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067
-
SHA512
e583aeb446ae5ef9e730912bb481ecb5c20fe7ac0f661416dd4671542483d98fdd1ba1d0ce483f4a47047e75cfbbd9aab57838576b2ed7ddc37eb2f97a01d5f1
-
SSDEEP
24576:ZyFcv5ZCD9ShANIDMLerl9MHAeO+wW/Y+4rXo6asFXu:MKv52ShsIDMLehGHABJ8Y+4rXK8
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
redline
build_main
80.85.156.168:20189
-
auth_value
5e5c9cacc6d168f8ade7fb6419edb114
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz7675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz7675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v4367mO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v4367mO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v4367mO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v4367mO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz7675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz7675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz7675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v4367mO.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4768-199-0x00000000023E0000-0x0000000002426000-memory.dmp family_redline behavioral1/memory/4768-200-0x0000000002740000-0x0000000002784000-memory.dmp family_redline behavioral1/memory/4768-201-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-202-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-204-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-206-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-214-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-211-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-216-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-218-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-220-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-222-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-224-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-226-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-228-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-230-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-232-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-234-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-236-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-238-0x0000000002740000-0x000000000277E000-memory.dmp family_redline behavioral1/memory/4768-1119-0x0000000004F30000-0x0000000004F40000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
pid Process 2336 zap5067.exe 2548 zap4986.exe 2960 zap7957.exe 4248 tz7675.exe 1016 v4367mO.exe 4768 w38zo00.exe 64 xYOlE28.exe 4720 y20Cm27.exe 4404 legenda.exe 4220 KMuffPQJRlr6.exe 3200 LowesDistillery.exe 3516 legenda.exe 2076 legenda.exe -
Loads dropped DLL 1 IoCs
pid Process 192 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz7675.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v4367mO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v4367mO.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe Key opened \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe Key opened \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap7957.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap5067.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap5067.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap4986.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap4986.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap7957.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4220 set thread context of 3716 4220 KMuffPQJRlr6.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 LowesDistillery.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier LowesDistillery.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4324 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4248 tz7675.exe 4248 tz7675.exe 1016 v4367mO.exe 1016 v4367mO.exe 4768 w38zo00.exe 4768 w38zo00.exe 64 xYOlE28.exe 64 xYOlE28.exe 3716 AppLaunch.exe 3716 AppLaunch.exe 3200 LowesDistillery.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4248 tz7675.exe Token: SeDebugPrivilege 1016 v4367mO.exe Token: SeDebugPrivilege 4768 w38zo00.exe Token: SeDebugPrivilege 64 xYOlE28.exe Token: SeDebugPrivilege 3200 LowesDistillery.exe Token: SeDebugPrivilege 3716 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2336 2088 0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067.exe 66 PID 2088 wrote to memory of 2336 2088 0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067.exe 66 PID 2088 wrote to memory of 2336 2088 0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067.exe 66 PID 2336 wrote to memory of 2548 2336 zap5067.exe 67 PID 2336 wrote to memory of 2548 2336 zap5067.exe 67 PID 2336 wrote to memory of 2548 2336 zap5067.exe 67 PID 2548 wrote to memory of 2960 2548 zap4986.exe 68 PID 2548 wrote to memory of 2960 2548 zap4986.exe 68 PID 2548 wrote to memory of 2960 2548 zap4986.exe 68 PID 2960 wrote to memory of 4248 2960 zap7957.exe 69 PID 2960 wrote to memory of 4248 2960 zap7957.exe 69 PID 2960 wrote to memory of 1016 2960 zap7957.exe 70 PID 2960 wrote to memory of 1016 2960 zap7957.exe 70 PID 2960 wrote to memory of 1016 2960 zap7957.exe 70 PID 2548 wrote to memory of 4768 2548 zap4986.exe 71 PID 2548 wrote to memory of 4768 2548 zap4986.exe 71 PID 2548 wrote to memory of 4768 2548 zap4986.exe 71 PID 2336 wrote to memory of 64 2336 zap5067.exe 73 PID 2336 wrote to memory of 64 2336 zap5067.exe 73 PID 2336 wrote to memory of 64 2336 zap5067.exe 73 PID 2088 wrote to memory of 4720 2088 0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067.exe 74 PID 2088 wrote to memory of 4720 2088 0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067.exe 74 PID 2088 wrote to memory of 4720 2088 0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067.exe 74 PID 4720 wrote to memory of 4404 4720 y20Cm27.exe 75 PID 4720 wrote to memory of 4404 4720 y20Cm27.exe 75 PID 4720 wrote to memory of 4404 4720 y20Cm27.exe 75 PID 4404 wrote to memory of 4324 4404 legenda.exe 76 PID 4404 wrote to memory of 4324 4404 legenda.exe 76 PID 4404 wrote to memory of 4324 4404 legenda.exe 76 PID 4404 wrote to memory of 3216 4404 legenda.exe 78 PID 4404 wrote to memory of 3216 4404 legenda.exe 78 PID 4404 wrote to memory of 3216 4404 legenda.exe 78 PID 3216 wrote to memory of 5012 3216 cmd.exe 80 PID 3216 wrote to memory of 5012 3216 cmd.exe 80 PID 3216 wrote to memory of 5012 3216 cmd.exe 80 PID 3216 wrote to memory of 4276 3216 cmd.exe 81 PID 3216 wrote to memory of 4276 3216 cmd.exe 81 PID 3216 wrote to memory of 4276 3216 cmd.exe 81 PID 3216 wrote to memory of 4588 3216 cmd.exe 82 PID 3216 wrote to memory of 4588 3216 cmd.exe 82 PID 3216 wrote to memory of 4588 3216 cmd.exe 82 PID 3216 wrote to memory of 3604 3216 cmd.exe 83 PID 3216 wrote to memory of 3604 3216 cmd.exe 83 PID 3216 wrote to memory of 3604 3216 cmd.exe 83 PID 3216 wrote to memory of 4244 3216 cmd.exe 84 PID 3216 wrote to memory of 4244 3216 cmd.exe 84 PID 3216 wrote to memory of 4244 3216 cmd.exe 84 PID 3216 wrote to memory of 5004 3216 cmd.exe 85 PID 3216 wrote to memory of 5004 3216 cmd.exe 85 PID 3216 wrote to memory of 5004 3216 cmd.exe 85 PID 4404 wrote to memory of 4220 4404 legenda.exe 86 PID 4404 wrote to memory of 4220 4404 legenda.exe 86 PID 4404 wrote to memory of 4220 4404 legenda.exe 86 PID 4220 wrote to memory of 3716 4220 KMuffPQJRlr6.exe 88 PID 4220 wrote to memory of 3716 4220 KMuffPQJRlr6.exe 88 PID 4220 wrote to memory of 3716 4220 KMuffPQJRlr6.exe 88 PID 4220 wrote to memory of 3716 4220 KMuffPQJRlr6.exe 88 PID 4220 wrote to memory of 3716 4220 KMuffPQJRlr6.exe 88 PID 4404 wrote to memory of 3200 4404 legenda.exe 89 PID 4404 wrote to memory of 3200 4404 legenda.exe 89 PID 4404 wrote to memory of 3200 4404 legenda.exe 89 PID 3200 wrote to memory of 320 3200 LowesDistillery.exe 90 PID 3200 wrote to memory of 320 3200 LowesDistillery.exe 90 PID 3200 wrote to memory of 320 3200 LowesDistillery.exe 90 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067.exe"C:\Users\Admin\AppData\Local\Temp\0ef24c17b8e8ae387390eb7fa5bfea9adddbb08929eaf1495f1227e8687d5067.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5067.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5067.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4986.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4986.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7957.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7957.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7675.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7675.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4367mO.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4367mO.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w38zo00.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w38zo00.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xYOlE28.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xYOlE28.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:64
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y20Cm27.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y20Cm27.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
PID:4324
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵PID:4276
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵PID:4588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵PID:4244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵PID:5004
-
-
-
C:\Users\Admin\AppData\Roaming\1000075000\KMuffPQJRlr6.exe"C:\Users\Admin\AppData\Roaming\1000075000\KMuffPQJRlr6.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000076001\LowesDistillery.exe"C:\Users\Admin\AppData\Local\Temp\1000076001\LowesDistillery.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3200 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All5⤵PID:320
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:4920
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile6⤵PID:4880
-
-
C:\Windows\SysWOW64\findstr.exefindstr All6⤵PID:4912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key5⤵PID:3212
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:916
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile name="65001" key=clear6⤵PID:656
-
-
C:\Windows\SysWOW64\findstr.exefindstr Key6⤵PID:2572
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
PID:3516
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
PID:2076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
537KB
MD5f0a2d9e0876b2de2d5f5b7936a299e9f
SHA11b55b7a5c97e180d29dd884650ce7b54db1f2ab7
SHA256b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c
SHA5122a654178b30c5976dce0ee0272f289a526fb30cd2a2d6276ec0acfcc20c61771618ae4058914dce81863bfae0b0e87a1a310ec95c0d64aa6960dfad39a55c522
-
Filesize
537KB
MD5f0a2d9e0876b2de2d5f5b7936a299e9f
SHA11b55b7a5c97e180d29dd884650ce7b54db1f2ab7
SHA256b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c
SHA5122a654178b30c5976dce0ee0272f289a526fb30cd2a2d6276ec0acfcc20c61771618ae4058914dce81863bfae0b0e87a1a310ec95c0d64aa6960dfad39a55c522
-
Filesize
537KB
MD5f0a2d9e0876b2de2d5f5b7936a299e9f
SHA11b55b7a5c97e180d29dd884650ce7b54db1f2ab7
SHA256b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c
SHA5122a654178b30c5976dce0ee0272f289a526fb30cd2a2d6276ec0acfcc20c61771618ae4058914dce81863bfae0b0e87a1a310ec95c0d64aa6960dfad39a55c522
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
819KB
MD5b682b8b5d7c08c9e875b1eaa1a8dcce3
SHA18e053f81d603a579a44a09469c64a0685ce3760f
SHA256ba644e64e05d52465dceab2daf9f8f395c12686a1120f652975a403812d2aea1
SHA512acaf7daf974b9186553dc818640cf394e040c5327fa843d59ed33868f9fa75423529d21be577e056abe733430e871d5ccd9833acdf1603424a0f93c02bfd93c3
-
Filesize
819KB
MD5b682b8b5d7c08c9e875b1eaa1a8dcce3
SHA18e053f81d603a579a44a09469c64a0685ce3760f
SHA256ba644e64e05d52465dceab2daf9f8f395c12686a1120f652975a403812d2aea1
SHA512acaf7daf974b9186553dc818640cf394e040c5327fa843d59ed33868f9fa75423529d21be577e056abe733430e871d5ccd9833acdf1603424a0f93c02bfd93c3
-
Filesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
Filesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
Filesize
677KB
MD503952ab9fe58019333a6bc1dc245ca7f
SHA1fabd2872b5cea572f6cb4cc67abc687a4dafa452
SHA256f065828b61aea843a58dd14085cdc8806a32c665c5bb7bd2ca7cb2a30bce2466
SHA5124f519a4222afa6e64f50d02cf35a832a1d3c6c3d5808ebaad253dd834c73e86b87df96071fae70bdf1f1cb0b0d9197e794a262e2558ec971cc214f0b06b3b730
-
Filesize
677KB
MD503952ab9fe58019333a6bc1dc245ca7f
SHA1fabd2872b5cea572f6cb4cc67abc687a4dafa452
SHA256f065828b61aea843a58dd14085cdc8806a32c665c5bb7bd2ca7cb2a30bce2466
SHA5124f519a4222afa6e64f50d02cf35a832a1d3c6c3d5808ebaad253dd834c73e86b87df96071fae70bdf1f1cb0b0d9197e794a262e2558ec971cc214f0b06b3b730
-
Filesize
349KB
MD5843c07e52c3e775b7ec14545d52fe721
SHA12ad51441677e25df3ea6dda63624b971baa965f6
SHA2560a2c77c920cc18b7c76be298a09d0a84abe7411929f0ba6e8984837fa2347c9b
SHA512649098c3d85be53a4756530a17072e5b75d735c475968a237db5811d4ba9c4f964cb046d3a7c11a7614d5445291e7b3449df350111fa2a58629470331b1ccc29
-
Filesize
349KB
MD5843c07e52c3e775b7ec14545d52fe721
SHA12ad51441677e25df3ea6dda63624b971baa965f6
SHA2560a2c77c920cc18b7c76be298a09d0a84abe7411929f0ba6e8984837fa2347c9b
SHA512649098c3d85be53a4756530a17072e5b75d735c475968a237db5811d4ba9c4f964cb046d3a7c11a7614d5445291e7b3449df350111fa2a58629470331b1ccc29
-
Filesize
334KB
MD5c0b41d8d3732598d32880aefada019c3
SHA1f18c9a1d85a5abbd14d03911490678a186a0f1d1
SHA256250aac314cef5daeff61993727c8577064ebedbabebe488e87e37adf9f2535a7
SHA5123d92af26bc362e0d758aa6ddf07400c1458af2d7b2e8b8f9bf41d1da81deead10de05a21f2395af27c0903115d597f540d36082dbda87dfd0e1d47a2747f4281
-
Filesize
334KB
MD5c0b41d8d3732598d32880aefada019c3
SHA1f18c9a1d85a5abbd14d03911490678a186a0f1d1
SHA256250aac314cef5daeff61993727c8577064ebedbabebe488e87e37adf9f2535a7
SHA5123d92af26bc362e0d758aa6ddf07400c1458af2d7b2e8b8f9bf41d1da81deead10de05a21f2395af27c0903115d597f540d36082dbda87dfd0e1d47a2747f4281
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD5a20aa9f549b97208544e49e27599e8d2
SHA1c3466774d477fd9f2f3de3305e1b0a6854153152
SHA256400aa4ef99837615a439beff580cf010e13fb77d6043d664768ed003838fe649
SHA512390e03eb112429aaee1b79d0392e82e247fb5cedc2ad6d45d9817485d23d5ad5f67b0d8d746cadf0f5f64d7f92f4040a51036f1297117cecfdf2de978618c44a
-
Filesize
290KB
MD5a20aa9f549b97208544e49e27599e8d2
SHA1c3466774d477fd9f2f3de3305e1b0a6854153152
SHA256400aa4ef99837615a439beff580cf010e13fb77d6043d664768ed003838fe649
SHA512390e03eb112429aaee1b79d0392e82e247fb5cedc2ad6d45d9817485d23d5ad5f67b0d8d746cadf0f5f64d7f92f4040a51036f1297117cecfdf2de978618c44a
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
261KB
MD5d4dc65ad800c813f2620480ea13465c8
SHA1706b23422f53bf4b77145621d537084686b1a84a
SHA2566fda74eb6edbc572002d77d77ce0818d03faedd0be77367ffd02e44ff0e595c8
SHA512a9500576f848ef86a522f19ac9b7b3cdacc2e03b38a188ef13afa11b48cd12af9f23dc838f1cfed2bf1e7b3d82a7cfdcf6e83add97191ede5a8a8011424f5608
-
Filesize
261KB
MD5d4dc65ad800c813f2620480ea13465c8
SHA1706b23422f53bf4b77145621d537084686b1a84a
SHA2566fda74eb6edbc572002d77d77ce0818d03faedd0be77367ffd02e44ff0e595c8
SHA512a9500576f848ef86a522f19ac9b7b3cdacc2e03b38a188ef13afa11b48cd12af9f23dc838f1cfed2bf1e7b3d82a7cfdcf6e83add97191ede5a8a8011424f5608
-
Filesize
261KB
MD5d4dc65ad800c813f2620480ea13465c8
SHA1706b23422f53bf4b77145621d537084686b1a84a
SHA2566fda74eb6edbc572002d77d77ce0818d03faedd0be77367ffd02e44ff0e595c8
SHA512a9500576f848ef86a522f19ac9b7b3cdacc2e03b38a188ef13afa11b48cd12af9f23dc838f1cfed2bf1e7b3d82a7cfdcf6e83add97191ede5a8a8011424f5608
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2