Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2023, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16.exe
Resource
win10v2004-20230220-en
General
-
Target
2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16.exe
-
Size
1003KB
-
MD5
c9b80a43283f73cdef9f4de8df02eda8
-
SHA1
756e697ea228f99f6264a98af3eef230068350e2
-
SHA256
2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16
-
SHA512
31a202a0deaff123ec8a7241741f7e6e80629c20656332885d55e0a2d4ac90d2d0e6b05561c7d8edea24d9e966335acb20f9a8666c02c5d939a55a7509b63493
-
SSDEEP
24576:ey5v4MiAlpCdMUWpNldeZTnuNUvIkzegMCvBLcCnyL09:thhpLbldeIGeYpXy4
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
redline
build_main
80.85.156.168:20189
-
auth_value
5e5c9cacc6d168f8ade7fb6419edb114
Extracted
redline
Rocket
95.217.188.21:7283
-
auth_value
0095203c91b01efccf3842dc176e53f2
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v9141nM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v9141nM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v9141nM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz8109.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz8109.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz8109.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz8109.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v9141nM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v9141nM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v9141nM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz8109.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz8109.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4240-210-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-211-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-215-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-213-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-217-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-219-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-221-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-223-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-225-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-227-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-229-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-231-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-233-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-235-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-237-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-239-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-241-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-243-0x00000000053C0000-0x00000000053FE000-memory.dmp family_redline behavioral1/memory/4240-256-0x0000000002730000-0x0000000002740000-memory.dmp family_redline -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation y70Ne88.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation legenda.exe -
Executes dropped EXE 14 IoCs
pid Process 4292 zap4826.exe 2432 zap5857.exe 4456 zap2786.exe 2856 tz8109.exe 4528 v9141nM.exe 4240 w59RP60.exe 4172 xPsLZ33.exe 3824 y70Ne88.exe 2944 legenda.exe 3232 KMuffPQJRlr6.exe 1848 LowesDistillery.exe 4896 AlCapone99.exe 3836 legenda.exe 3232 legenda.exe -
Loads dropped DLL 1 IoCs
pid Process 3380 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v9141nM.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz8109.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v9141nM.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap2786.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap2786.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap4826.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap4826.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap5857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap5857.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 68 ip-api.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3232 set thread context of 4040 3232 KMuffPQJRlr6.exe 126 PID 4896 set thread context of 1032 4896 AlCapone99.exe 130 -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1364 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4536 4528 WerFault.exe 93 2992 4240 WerFault.exe 96 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 LowesDistillery.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier LowesDistillery.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2820 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2856 tz8109.exe 2856 tz8109.exe 4528 v9141nM.exe 4528 v9141nM.exe 4240 w59RP60.exe 4240 w59RP60.exe 4172 xPsLZ33.exe 4172 xPsLZ33.exe 1032 AppLaunch.exe 4040 AppLaunch.exe 4040 AppLaunch.exe 1848 LowesDistillery.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2856 tz8109.exe Token: SeDebugPrivilege 4528 v9141nM.exe Token: SeDebugPrivilege 4240 w59RP60.exe Token: SeDebugPrivilege 4172 xPsLZ33.exe Token: SeDebugPrivilege 1848 LowesDistillery.exe Token: SeDebugPrivilege 1032 AppLaunch.exe Token: SeDebugPrivilege 4040 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 4292 396 2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16.exe 86 PID 396 wrote to memory of 4292 396 2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16.exe 86 PID 396 wrote to memory of 4292 396 2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16.exe 86 PID 4292 wrote to memory of 2432 4292 zap4826.exe 87 PID 4292 wrote to memory of 2432 4292 zap4826.exe 87 PID 4292 wrote to memory of 2432 4292 zap4826.exe 87 PID 2432 wrote to memory of 4456 2432 zap5857.exe 88 PID 2432 wrote to memory of 4456 2432 zap5857.exe 88 PID 2432 wrote to memory of 4456 2432 zap5857.exe 88 PID 4456 wrote to memory of 2856 4456 zap2786.exe 89 PID 4456 wrote to memory of 2856 4456 zap2786.exe 89 PID 4456 wrote to memory of 4528 4456 zap2786.exe 93 PID 4456 wrote to memory of 4528 4456 zap2786.exe 93 PID 4456 wrote to memory of 4528 4456 zap2786.exe 93 PID 2432 wrote to memory of 4240 2432 zap5857.exe 96 PID 2432 wrote to memory of 4240 2432 zap5857.exe 96 PID 2432 wrote to memory of 4240 2432 zap5857.exe 96 PID 4292 wrote to memory of 4172 4292 zap4826.exe 106 PID 4292 wrote to memory of 4172 4292 zap4826.exe 106 PID 4292 wrote to memory of 4172 4292 zap4826.exe 106 PID 396 wrote to memory of 3824 396 2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16.exe 112 PID 396 wrote to memory of 3824 396 2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16.exe 112 PID 396 wrote to memory of 3824 396 2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16.exe 112 PID 3824 wrote to memory of 2944 3824 y70Ne88.exe 113 PID 3824 wrote to memory of 2944 3824 y70Ne88.exe 113 PID 3824 wrote to memory of 2944 3824 y70Ne88.exe 113 PID 2944 wrote to memory of 2820 2944 legenda.exe 114 PID 2944 wrote to memory of 2820 2944 legenda.exe 114 PID 2944 wrote to memory of 2820 2944 legenda.exe 114 PID 2944 wrote to memory of 4992 2944 legenda.exe 116 PID 2944 wrote to memory of 4992 2944 legenda.exe 116 PID 2944 wrote to memory of 4992 2944 legenda.exe 116 PID 4992 wrote to memory of 3276 4992 cmd.exe 118 PID 4992 wrote to memory of 3276 4992 cmd.exe 118 PID 4992 wrote to memory of 3276 4992 cmd.exe 118 PID 4992 wrote to memory of 3776 4992 cmd.exe 119 PID 4992 wrote to memory of 3776 4992 cmd.exe 119 PID 4992 wrote to memory of 3776 4992 cmd.exe 119 PID 4992 wrote to memory of 2344 4992 cmd.exe 120 PID 4992 wrote to memory of 2344 4992 cmd.exe 120 PID 4992 wrote to memory of 2344 4992 cmd.exe 120 PID 4992 wrote to memory of 4220 4992 cmd.exe 121 PID 4992 wrote to memory of 4220 4992 cmd.exe 121 PID 4992 wrote to memory of 4220 4992 cmd.exe 121 PID 4992 wrote to memory of 5008 4992 cmd.exe 122 PID 4992 wrote to memory of 5008 4992 cmd.exe 122 PID 4992 wrote to memory of 5008 4992 cmd.exe 122 PID 4992 wrote to memory of 2592 4992 cmd.exe 123 PID 4992 wrote to memory of 2592 4992 cmd.exe 123 PID 4992 wrote to memory of 2592 4992 cmd.exe 123 PID 2944 wrote to memory of 3232 2944 legenda.exe 124 PID 2944 wrote to memory of 3232 2944 legenda.exe 124 PID 2944 wrote to memory of 3232 2944 legenda.exe 124 PID 3232 wrote to memory of 4040 3232 KMuffPQJRlr6.exe 126 PID 3232 wrote to memory of 4040 3232 KMuffPQJRlr6.exe 126 PID 3232 wrote to memory of 4040 3232 KMuffPQJRlr6.exe 126 PID 3232 wrote to memory of 4040 3232 KMuffPQJRlr6.exe 126 PID 3232 wrote to memory of 4040 3232 KMuffPQJRlr6.exe 126 PID 2944 wrote to memory of 1848 2944 legenda.exe 127 PID 2944 wrote to memory of 1848 2944 legenda.exe 127 PID 2944 wrote to memory of 1848 2944 legenda.exe 127 PID 2944 wrote to memory of 4896 2944 legenda.exe 128 PID 2944 wrote to memory of 4896 2944 legenda.exe 128 PID 2944 wrote to memory of 4896 2944 legenda.exe 128 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 LowesDistillery.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16.exe"C:\Users\Admin\AppData\Local\Temp\2668e63ef3d506d617dec39e6391e9ff39cbd86bc6e18a5f91d67cff8bbd8c16.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4826.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4826.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5857.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap5857.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2786.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2786.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8109.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8109.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9141nM.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9141nM.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 11006⤵
- Program crash
PID:4536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w59RP60.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w59RP60.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 20605⤵
- Program crash
PID:2992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPsLZ33.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xPsLZ33.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y70Ne88.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y70Ne88.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
PID:2820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3276
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵PID:3776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵PID:2344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵PID:5008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵PID:2592
-
-
-
C:\Users\Admin\AppData\Roaming\1000075000\KMuffPQJRlr6.exe"C:\Users\Admin\AppData\Roaming\1000075000\KMuffPQJRlr6.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000076001\LowesDistillery.exe"C:\Users\Admin\AppData\Local\Temp\1000076001\LowesDistillery.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1848 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All5⤵PID:2548
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:4880
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile6⤵PID:1592
-
-
C:\Windows\SysWOW64\findstr.exefindstr All6⤵PID:100
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key5⤵PID:396
-
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:2360
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile name="65001" key=clear6⤵PID:3276
-
-
C:\Windows\SysWOW64\findstr.exefindstr Key6⤵PID:4676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000079001\AlCapone99.exe"C:\Users\Admin\AppData\Local\Temp\1000079001\AlCapone99.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3380
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4528 -ip 45281⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4240 -ip 42401⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
PID:3836
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
PID:3232
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5467e33722458ccc9dd774bee4132446a
SHA1787f5f211299ef097f3640d964711a42d5465280
SHA256af8285f93b2846eb221831e8dbf92fd72005e246af67f40035b12c4065685289
SHA512897f362ad8be6e1538f682ec94007406f0f74b1ce4ab264cc029b140b0d101ee8e825106f95d03d2e3ce77445038524579c18ffb51e2b6e1274efdbf2501c317
-
Filesize
537KB
MD5f0a2d9e0876b2de2d5f5b7936a299e9f
SHA11b55b7a5c97e180d29dd884650ce7b54db1f2ab7
SHA256b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c
SHA5122a654178b30c5976dce0ee0272f289a526fb30cd2a2d6276ec0acfcc20c61771618ae4058914dce81863bfae0b0e87a1a310ec95c0d64aa6960dfad39a55c522
-
Filesize
537KB
MD5f0a2d9e0876b2de2d5f5b7936a299e9f
SHA11b55b7a5c97e180d29dd884650ce7b54db1f2ab7
SHA256b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c
SHA5122a654178b30c5976dce0ee0272f289a526fb30cd2a2d6276ec0acfcc20c61771618ae4058914dce81863bfae0b0e87a1a310ec95c0d64aa6960dfad39a55c522
-
Filesize
537KB
MD5f0a2d9e0876b2de2d5f5b7936a299e9f
SHA11b55b7a5c97e180d29dd884650ce7b54db1f2ab7
SHA256b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c
SHA5122a654178b30c5976dce0ee0272f289a526fb30cd2a2d6276ec0acfcc20c61771618ae4058914dce81863bfae0b0e87a1a310ec95c0d64aa6960dfad39a55c522
-
Filesize
261KB
MD53db6d94b8df4916aa7cb0d67f2bba3f6
SHA1b27b508ce16462268b6a96a727007755fe62c8a1
SHA25615b31a3a4ab58991a4e7c7e2cc49fdec1002ea907effb2402b949263dcf0a0bd
SHA51247495567ab11743ec6e16ca61f86904a27383c6feb6c6d45015215679549a7137ca007164bc8ed9e5aa6a26006433327600679c4803ebb98d4c980e92dd0c1d4
-
Filesize
261KB
MD53db6d94b8df4916aa7cb0d67f2bba3f6
SHA1b27b508ce16462268b6a96a727007755fe62c8a1
SHA25615b31a3a4ab58991a4e7c7e2cc49fdec1002ea907effb2402b949263dcf0a0bd
SHA51247495567ab11743ec6e16ca61f86904a27383c6feb6c6d45015215679549a7137ca007164bc8ed9e5aa6a26006433327600679c4803ebb98d4c980e92dd0c1d4
-
Filesize
261KB
MD53db6d94b8df4916aa7cb0d67f2bba3f6
SHA1b27b508ce16462268b6a96a727007755fe62c8a1
SHA25615b31a3a4ab58991a4e7c7e2cc49fdec1002ea907effb2402b949263dcf0a0bd
SHA51247495567ab11743ec6e16ca61f86904a27383c6feb6c6d45015215679549a7137ca007164bc8ed9e5aa6a26006433327600679c4803ebb98d4c980e92dd0c1d4
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
819KB
MD5ba1f75ee74e20678ec5fd4796e09f2d2
SHA17193eb274d56e6aecf14196248f5080868535500
SHA256ac79f887a00e364d73bfa9012d50f2c63e5da9de24b72467182b16f16d323605
SHA5125de35533797c32a7969e45b4b675cb16bb18ea19ff2a4446b6a978e37dba5125abf59403127132e136e61b4385983db18614cc0f1976c2491966d8da7662eab6
-
Filesize
819KB
MD5ba1f75ee74e20678ec5fd4796e09f2d2
SHA17193eb274d56e6aecf14196248f5080868535500
SHA256ac79f887a00e364d73bfa9012d50f2c63e5da9de24b72467182b16f16d323605
SHA5125de35533797c32a7969e45b4b675cb16bb18ea19ff2a4446b6a978e37dba5125abf59403127132e136e61b4385983db18614cc0f1976c2491966d8da7662eab6
-
Filesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
Filesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
Filesize
676KB
MD57d3d001131aa7ecacbb1028f1aa6475f
SHA16ec0068fc6cac2b5712310775707cf4bc759f745
SHA2561e73d03e7a56152c161724e1d8d8ea72847341e8b9bfc397dab1efe0a14ff8a0
SHA5128606f7058a56a97510254632c9ded1d597849c5e0fe1dc04d78cc2533d8180e631c40150a3806d8aa1d3c1c6dcc03978964161b2c5c2c11aeab7fb3df76d61c3
-
Filesize
676KB
MD57d3d001131aa7ecacbb1028f1aa6475f
SHA16ec0068fc6cac2b5712310775707cf4bc759f745
SHA2561e73d03e7a56152c161724e1d8d8ea72847341e8b9bfc397dab1efe0a14ff8a0
SHA5128606f7058a56a97510254632c9ded1d597849c5e0fe1dc04d78cc2533d8180e631c40150a3806d8aa1d3c1c6dcc03978964161b2c5c2c11aeab7fb3df76d61c3
-
Filesize
349KB
MD515453a4d088aea3ed2fdda0a0628c7e1
SHA16fb8d47f26386406c8607d6304045c677ded129c
SHA2568af1b19435ba84a2c4630136a5d0917cba17ed3b344adf21f21c825ff8c887cc
SHA5129a98dda4b551739bb11de31676b6c1b717e88bd9af45428f80c47bb956a06673c785aaafbec33dd9323582a2ef16bceeda254f008d747c44a950c8e992c40446
-
Filesize
349KB
MD515453a4d088aea3ed2fdda0a0628c7e1
SHA16fb8d47f26386406c8607d6304045c677ded129c
SHA2568af1b19435ba84a2c4630136a5d0917cba17ed3b344adf21f21c825ff8c887cc
SHA5129a98dda4b551739bb11de31676b6c1b717e88bd9af45428f80c47bb956a06673c785aaafbec33dd9323582a2ef16bceeda254f008d747c44a950c8e992c40446
-
Filesize
334KB
MD57d584047e26da37afa9cb380a6a27cf5
SHA1778741affee433b27b7941dbfec1876aaec90326
SHA256dfcef052b8d1640dafc82de1372576b47cc6023f130cb057647d2366df096284
SHA5123af73489bff64419dd4c23d2a76fee72a934691cf701279728c4e999419aa0f8ff0d8b06ff53cb3eabf4143ad8aab49f9005394d4336b129016491b07e2602ab
-
Filesize
334KB
MD57d584047e26da37afa9cb380a6a27cf5
SHA1778741affee433b27b7941dbfec1876aaec90326
SHA256dfcef052b8d1640dafc82de1372576b47cc6023f130cb057647d2366df096284
SHA5123af73489bff64419dd4c23d2a76fee72a934691cf701279728c4e999419aa0f8ff0d8b06ff53cb3eabf4143ad8aab49f9005394d4336b129016491b07e2602ab
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD5e7141bbf7d2771a14ea8a373ab0a67ac
SHA1efb12121c090e5d45fc6fed0ec28c82425605099
SHA2567b460fa44965c497b548866cd6deaae6bae1fb488e969d35fba2cecf71ec96bd
SHA5126a64c21b3e1ff93d8184d500731e6c96860152a85bd16f5da0db919b3c4c3590877ca0e34fa7d79cf62629a0a1cdd2d9431e568db0e710fa0bed087afd4433e1
-
Filesize
290KB
MD5e7141bbf7d2771a14ea8a373ab0a67ac
SHA1efb12121c090e5d45fc6fed0ec28c82425605099
SHA2567b460fa44965c497b548866cd6deaae6bae1fb488e969d35fba2cecf71ec96bd
SHA5126a64c21b3e1ff93d8184d500731e6c96860152a85bd16f5da0db919b3c4c3590877ca0e34fa7d79cf62629a0a1cdd2d9431e568db0e710fa0bed087afd4433e1
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
261KB
MD5d4dc65ad800c813f2620480ea13465c8
SHA1706b23422f53bf4b77145621d537084686b1a84a
SHA2566fda74eb6edbc572002d77d77ce0818d03faedd0be77367ffd02e44ff0e595c8
SHA512a9500576f848ef86a522f19ac9b7b3cdacc2e03b38a188ef13afa11b48cd12af9f23dc838f1cfed2bf1e7b3d82a7cfdcf6e83add97191ede5a8a8011424f5608
-
Filesize
261KB
MD5d4dc65ad800c813f2620480ea13465c8
SHA1706b23422f53bf4b77145621d537084686b1a84a
SHA2566fda74eb6edbc572002d77d77ce0818d03faedd0be77367ffd02e44ff0e595c8
SHA512a9500576f848ef86a522f19ac9b7b3cdacc2e03b38a188ef13afa11b48cd12af9f23dc838f1cfed2bf1e7b3d82a7cfdcf6e83add97191ede5a8a8011424f5608
-
Filesize
261KB
MD5d4dc65ad800c813f2620480ea13465c8
SHA1706b23422f53bf4b77145621d537084686b1a84a
SHA2566fda74eb6edbc572002d77d77ce0818d03faedd0be77367ffd02e44ff0e595c8
SHA512a9500576f848ef86a522f19ac9b7b3cdacc2e03b38a188ef13afa11b48cd12af9f23dc838f1cfed2bf1e7b3d82a7cfdcf6e83add97191ede5a8a8011424f5608
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0