Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2023 18:10
Static task
static1
General
-
Target
c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exe
-
Size
961KB
-
MD5
281387082ed88d1732446b84bd91fb89
-
SHA1
5411fa26a4713464f58d802e18fb872c545cf875
-
SHA256
c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a
-
SHA512
3e746418966b07ef152fd324306d8788769bc7bdb8227fcbf8bffbe1e0eabbd692514bc30f6fe7d9ec87aa7575d506c21f01ed7fc4517769da0ab9b731acf948
-
SSDEEP
24576:oyVXD7AjgduyZ/IjVdjzFxQBZvjCWas54mOz66xckW7TM:vtOyZQjL8jrndZ6x7W
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Signatures
-
Processes:
v7198Dl.exetz3358.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v7198Dl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v7198Dl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v7198Dl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v7198Dl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz3358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz3358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz3358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v7198Dl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v7198Dl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz3358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz3358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz3358.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1428-208-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-209-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-211-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-213-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-215-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-217-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-219-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-221-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-223-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-225-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-227-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-229-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-231-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-233-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-235-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-237-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-239-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-241-0x0000000004A90000-0x0000000004ACE000-memory.dmp family_redline behavioral1/memory/1428-345-0x0000000004AF0000-0x0000000004B00000-memory.dmp family_redline -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
y38VW72.exelegenda.exebuil.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation y38VW72.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation legenda.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation buil.exe -
Executes dropped EXE 11 IoCs
Processes:
zap4524.exezap1653.exezap2060.exetz3358.exev7198Dl.exew72NC46.exexgDuj84.exey38VW72.exelegenda.exebuil.exelegenda.exepid process 1308 zap4524.exe 3788 zap1653.exe 2960 zap2060.exe 1572 tz3358.exe 2980 v7198Dl.exe 1428 w72NC46.exe 1900 xgDuj84.exe 3704 y38VW72.exe 4476 legenda.exe 4916 buil.exe 4612 legenda.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4348 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
tz3358.exev7198Dl.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz3358.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v7198Dl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v7198Dl.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exezap4524.exezap1653.exezap2060.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap4524.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap4524.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap1653.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap1653.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap2060.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap2060.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 38 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2420 2980 WerFault.exe v7198Dl.exe 4772 1428 WerFault.exe w72NC46.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
tz3358.exev7198Dl.exew72NC46.exexgDuj84.exepid process 1572 tz3358.exe 1572 tz3358.exe 2980 v7198Dl.exe 2980 v7198Dl.exe 1428 w72NC46.exe 1428 w72NC46.exe 1900 xgDuj84.exe 1900 xgDuj84.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
tz3358.exev7198Dl.exew72NC46.exexgDuj84.exebuil.exedescription pid process Token: SeDebugPrivilege 1572 tz3358.exe Token: SeDebugPrivilege 2980 v7198Dl.exe Token: SeDebugPrivilege 1428 w72NC46.exe Token: SeDebugPrivilege 1900 xgDuj84.exe Token: SeDebugPrivilege 4916 buil.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exezap4524.exezap1653.exezap2060.exey38VW72.exelegenda.execmd.exebuil.execmd.exedescription pid process target process PID 620 wrote to memory of 1308 620 c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exe zap4524.exe PID 620 wrote to memory of 1308 620 c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exe zap4524.exe PID 620 wrote to memory of 1308 620 c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exe zap4524.exe PID 1308 wrote to memory of 3788 1308 zap4524.exe zap1653.exe PID 1308 wrote to memory of 3788 1308 zap4524.exe zap1653.exe PID 1308 wrote to memory of 3788 1308 zap4524.exe zap1653.exe PID 3788 wrote to memory of 2960 3788 zap1653.exe zap2060.exe PID 3788 wrote to memory of 2960 3788 zap1653.exe zap2060.exe PID 3788 wrote to memory of 2960 3788 zap1653.exe zap2060.exe PID 2960 wrote to memory of 1572 2960 zap2060.exe tz3358.exe PID 2960 wrote to memory of 1572 2960 zap2060.exe tz3358.exe PID 2960 wrote to memory of 2980 2960 zap2060.exe v7198Dl.exe PID 2960 wrote to memory of 2980 2960 zap2060.exe v7198Dl.exe PID 2960 wrote to memory of 2980 2960 zap2060.exe v7198Dl.exe PID 3788 wrote to memory of 1428 3788 zap1653.exe w72NC46.exe PID 3788 wrote to memory of 1428 3788 zap1653.exe w72NC46.exe PID 3788 wrote to memory of 1428 3788 zap1653.exe w72NC46.exe PID 1308 wrote to memory of 1900 1308 zap4524.exe xgDuj84.exe PID 1308 wrote to memory of 1900 1308 zap4524.exe xgDuj84.exe PID 1308 wrote to memory of 1900 1308 zap4524.exe xgDuj84.exe PID 620 wrote to memory of 3704 620 c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exe y38VW72.exe PID 620 wrote to memory of 3704 620 c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exe y38VW72.exe PID 620 wrote to memory of 3704 620 c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exe y38VW72.exe PID 3704 wrote to memory of 4476 3704 y38VW72.exe legenda.exe PID 3704 wrote to memory of 4476 3704 y38VW72.exe legenda.exe PID 3704 wrote to memory of 4476 3704 y38VW72.exe legenda.exe PID 4476 wrote to memory of 3268 4476 legenda.exe schtasks.exe PID 4476 wrote to memory of 3268 4476 legenda.exe schtasks.exe PID 4476 wrote to memory of 3268 4476 legenda.exe schtasks.exe PID 4476 wrote to memory of 4448 4476 legenda.exe cmd.exe PID 4476 wrote to memory of 4448 4476 legenda.exe cmd.exe PID 4476 wrote to memory of 4448 4476 legenda.exe cmd.exe PID 4448 wrote to memory of 3780 4448 cmd.exe cmd.exe PID 4448 wrote to memory of 3780 4448 cmd.exe cmd.exe PID 4448 wrote to memory of 3780 4448 cmd.exe cmd.exe PID 4448 wrote to memory of 1232 4448 cmd.exe cacls.exe PID 4448 wrote to memory of 1232 4448 cmd.exe cacls.exe PID 4448 wrote to memory of 1232 4448 cmd.exe cacls.exe PID 4448 wrote to memory of 4684 4448 cmd.exe cacls.exe PID 4448 wrote to memory of 4684 4448 cmd.exe cacls.exe PID 4448 wrote to memory of 4684 4448 cmd.exe cacls.exe PID 4448 wrote to memory of 4696 4448 cmd.exe cmd.exe PID 4448 wrote to memory of 4696 4448 cmd.exe cmd.exe PID 4448 wrote to memory of 4696 4448 cmd.exe cmd.exe PID 4448 wrote to memory of 2060 4448 cmd.exe cacls.exe PID 4448 wrote to memory of 2060 4448 cmd.exe cacls.exe PID 4448 wrote to memory of 2060 4448 cmd.exe cacls.exe PID 4448 wrote to memory of 3796 4448 cmd.exe cacls.exe PID 4448 wrote to memory of 3796 4448 cmd.exe cacls.exe PID 4448 wrote to memory of 3796 4448 cmd.exe cacls.exe PID 4476 wrote to memory of 4916 4476 legenda.exe buil.exe PID 4476 wrote to memory of 4916 4476 legenda.exe buil.exe PID 4916 wrote to memory of 4516 4916 buil.exe cmd.exe PID 4916 wrote to memory of 4516 4916 buil.exe cmd.exe PID 4516 wrote to memory of 3240 4516 cmd.exe chcp.com PID 4516 wrote to memory of 3240 4516 cmd.exe chcp.com PID 4516 wrote to memory of 4108 4516 cmd.exe PING.EXE PID 4516 wrote to memory of 4108 4516 cmd.exe PING.EXE PID 4476 wrote to memory of 4348 4476 legenda.exe rundll32.exe PID 4476 wrote to memory of 4348 4476 legenda.exe rundll32.exe PID 4476 wrote to memory of 4348 4476 legenda.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exe"C:\Users\Admin\AppData\Local\Temp\c8a203a4b1ba8256d43fb3fd0b857b89b9764bae9c4a0aedcb1765665362910a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4524.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4524.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap1653.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap1653.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2060.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2060.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3358.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3358.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7198Dl.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7198Dl.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 10846⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w72NC46.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w72NC46.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 13325⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgDuj84.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgDuj84.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38VW72.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38VW72.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exe"C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650016⤵
-
C:\Windows\system32\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2980 -ip 29801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1428 -ip 14281⤵
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exeFilesize
32KB
MD5495ce8bc963f4b0d156e4b7e5ed97ed4
SHA12a2f72bbb5f111e0c8dd9038ea213dca3783e266
SHA25666e254d86a825aaba511f1d0b75ceb4520fa38d518b305a770a03fdb17dc1243
SHA5125ad2ea5696ffecf3318c5c2233da79fc0b849ac92a1550adda04f915196f831292f39058f38fd636b5615d93bbe6eedb489b0ef96bd7199c8a6ab1605e13e244
-
C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exeFilesize
32KB
MD5495ce8bc963f4b0d156e4b7e5ed97ed4
SHA12a2f72bbb5f111e0c8dd9038ea213dca3783e266
SHA25666e254d86a825aaba511f1d0b75ceb4520fa38d518b305a770a03fdb17dc1243
SHA5125ad2ea5696ffecf3318c5c2233da79fc0b849ac92a1550adda04f915196f831292f39058f38fd636b5615d93bbe6eedb489b0ef96bd7199c8a6ab1605e13e244
-
C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exeFilesize
32KB
MD5495ce8bc963f4b0d156e4b7e5ed97ed4
SHA12a2f72bbb5f111e0c8dd9038ea213dca3783e266
SHA25666e254d86a825aaba511f1d0b75ceb4520fa38d518b305a770a03fdb17dc1243
SHA5125ad2ea5696ffecf3318c5c2233da79fc0b849ac92a1550adda04f915196f831292f39058f38fd636b5615d93bbe6eedb489b0ef96bd7199c8a6ab1605e13e244
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38VW72.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y38VW72.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4524.exeFilesize
777KB
MD5da26fbd7eaa52af1d60632144aa78dbf
SHA158ce6f64f86e70256de897ae7594a98bf2491007
SHA2561bf297ca9fe07709003a481de2c39da8d92c6273d59a494f68fc8729540ebf5f
SHA51201188a145b60cb98dcae8afb568c9c5b7579ad60dc403fd76cc497dae5879b7c304212e524acfb7b7c7aa2a25ccadf819f8d22c05260056fa424df81f83757ce
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4524.exeFilesize
777KB
MD5da26fbd7eaa52af1d60632144aa78dbf
SHA158ce6f64f86e70256de897ae7594a98bf2491007
SHA2561bf297ca9fe07709003a481de2c39da8d92c6273d59a494f68fc8729540ebf5f
SHA51201188a145b60cb98dcae8afb568c9c5b7579ad60dc403fd76cc497dae5879b7c304212e524acfb7b7c7aa2a25ccadf819f8d22c05260056fa424df81f83757ce
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgDuj84.exeFilesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgDuj84.exeFilesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap1653.exeFilesize
635KB
MD547647a50b800f10ab57006f5ebdd1bcb
SHA1d651a4e7bbedb0625bdc29a0f7fb89d896210668
SHA256dacd18dad358f745af6b2e11bf91b61956ec0f9e7e65de8be6e159829bf4664c
SHA512b1ffb9692b37af6bad6638e743e095d2f34b04c3241f2e65caa56a1cc49d53d07b0a4c8ff29efd3270255566e39ccc4197a6c7ec402cfbce651a0e16a305dd6c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap1653.exeFilesize
635KB
MD547647a50b800f10ab57006f5ebdd1bcb
SHA1d651a4e7bbedb0625bdc29a0f7fb89d896210668
SHA256dacd18dad358f745af6b2e11bf91b61956ec0f9e7e65de8be6e159829bf4664c
SHA512b1ffb9692b37af6bad6638e743e095d2f34b04c3241f2e65caa56a1cc49d53d07b0a4c8ff29efd3270255566e39ccc4197a6c7ec402cfbce651a0e16a305dd6c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w72NC46.exeFilesize
288KB
MD5f3feaf91b21b9cd1fe731cbefb9128f6
SHA1bdb18aed944ed6bfce8785bd29d5e5ce786fa48c
SHA25647e17f09815487c60f1278b3ae2fd8c698680230b8b18c822b37bf91d4635474
SHA512a93fb5b76735f4eddeb25cf6c8aca564054994b59970ca3b7567f320eb8f25542712be51fc85ef37018a46516f3819b8b1e3a72da497e9739b2bc4b10f69ebf2
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w72NC46.exeFilesize
288KB
MD5f3feaf91b21b9cd1fe731cbefb9128f6
SHA1bdb18aed944ed6bfce8785bd29d5e5ce786fa48c
SHA25647e17f09815487c60f1278b3ae2fd8c698680230b8b18c822b37bf91d4635474
SHA512a93fb5b76735f4eddeb25cf6c8aca564054994b59970ca3b7567f320eb8f25542712be51fc85ef37018a46516f3819b8b1e3a72da497e9739b2bc4b10f69ebf2
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2060.exeFilesize
314KB
MD5a969517bfa42bda356db1894420dcad1
SHA18b2bea308fbd9c9f29dacb377c0f1c5d5aefd318
SHA256f2cb33697efc5e56687193599b6dc2ee02f231be3ee88b385971be32ee192585
SHA51217cb80d690e5180a766ccf29eda1adf3b43c6a180d7fe0e65fbfd4659ed1626557f36d3ad66081159e339d13f49f86f18536dd6a6704c1b6ce35d12cdbbebf40
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2060.exeFilesize
314KB
MD5a969517bfa42bda356db1894420dcad1
SHA18b2bea308fbd9c9f29dacb377c0f1c5d5aefd318
SHA256f2cb33697efc5e56687193599b6dc2ee02f231be3ee88b385971be32ee192585
SHA51217cb80d690e5180a766ccf29eda1adf3b43c6a180d7fe0e65fbfd4659ed1626557f36d3ad66081159e339d13f49f86f18536dd6a6704c1b6ce35d12cdbbebf40
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3358.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz3358.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7198Dl.exeFilesize
230KB
MD50d6e4eb025b2d569fff7987552b2c5d4
SHA1b173efce9e2913680eba494d581c396d82479e8c
SHA2568b3e25354852ecb17b3c94ebe9518ce15eca42c16e8b674be49d29897b674a44
SHA512fc6b1de31780148b1f5e1aacd171eda161ca7611eee2b6c1707579ab52e71c6666de81e95ef9a4c6d88bdb81fc0eb38ea818bf0e40ff0c836e57b38f4f53d76d
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7198Dl.exeFilesize
230KB
MD50d6e4eb025b2d569fff7987552b2c5d4
SHA1b173efce9e2913680eba494d581c396d82479e8c
SHA2568b3e25354852ecb17b3c94ebe9518ce15eca42c16e8b674be49d29897b674a44
SHA512fc6b1de31780148b1f5e1aacd171eda161ca7611eee2b6c1707579ab52e71c6666de81e95ef9a4c6d88bdb81fc0eb38ea818bf0e40ff0c836e57b38f4f53d76d
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
memory/1428-1127-0x00000000066A0000-0x0000000006862000-memory.dmpFilesize
1.8MB
-
memory/1428-1118-0x00000000058B0000-0x00000000059BA000-memory.dmpFilesize
1.0MB
-
memory/1428-1132-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/1428-1130-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/1428-1129-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/1428-1128-0x0000000006880000-0x0000000006DAC000-memory.dmpFilesize
5.2MB
-
memory/1428-1125-0x0000000006530000-0x0000000006580000-memory.dmpFilesize
320KB
-
memory/1428-1124-0x0000000006490000-0x0000000006506000-memory.dmpFilesize
472KB
-
memory/1428-1123-0x00000000063C0000-0x0000000006452000-memory.dmpFilesize
584KB
-
memory/1428-208-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-209-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-211-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-213-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-215-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-217-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-219-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-221-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-223-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-225-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-227-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-229-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-231-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-233-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-235-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-237-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-239-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-241-0x0000000004A90000-0x0000000004ACE000-memory.dmpFilesize
248KB
-
memory/1428-341-0x0000000000510000-0x000000000055B000-memory.dmpFilesize
300KB
-
memory/1428-343-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/1428-345-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/1428-1117-0x0000000005210000-0x0000000005828000-memory.dmpFilesize
6.1MB
-
memory/1428-1122-0x0000000005D00000-0x0000000005D66000-memory.dmpFilesize
408KB
-
memory/1428-1119-0x00000000059F0000-0x0000000005A02000-memory.dmpFilesize
72KB
-
memory/1428-1120-0x0000000005A10000-0x0000000005A4C000-memory.dmpFilesize
240KB
-
memory/1428-1121-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/1572-161-0x0000000000890000-0x000000000089A000-memory.dmpFilesize
40KB
-
memory/1900-1137-0x00000000007C0000-0x00000000007F2000-memory.dmpFilesize
200KB
-
memory/1900-1138-0x00000000050B0000-0x00000000050C0000-memory.dmpFilesize
64KB
-
memory/2980-182-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-178-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-201-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/2980-200-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/2980-199-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2980-198-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-188-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-186-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-203-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/2980-194-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-184-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-196-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-180-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-190-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-176-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-174-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-172-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-171-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-192-0x00000000024C0000-0x00000000024D2000-memory.dmpFilesize
72KB
-
memory/2980-167-0x0000000004CC0000-0x0000000005264000-memory.dmpFilesize
5.6MB
-
memory/2980-168-0x00000000004C0000-0x00000000004ED000-memory.dmpFilesize
180KB
-
memory/2980-170-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/2980-169-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/4916-1173-0x00000223AA220000-0x00000223AA230000-memory.dmpFilesize
64KB
-
memory/4916-1172-0x00000223AA180000-0x00000223AA1D0000-memory.dmpFilesize
320KB
-
memory/4916-1171-0x000002238FD40000-0x000002238FD4E000-memory.dmpFilesize
56KB