Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2023 18:53
Static task
static1
General
-
Target
29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exe
-
Size
960KB
-
MD5
973d6bd3e5ecc2ded165ee0857c4bb4e
-
SHA1
a64f51bf2fa87ca1649c68f7b8f51580337b1600
-
SHA256
29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117
-
SHA512
6de356e61be977a10a340f5e638063c03afb3bf8c55c8bab152b7d27d08c55e762fd0e5c479b2c01acbb643efa303daed0b8a62014dcaa996f3b2a955c4b13d6
-
SSDEEP
24576:FyvxDwHXpTkyGR3pUo9nBAvYzFQ81v5I+Om9vos1rS53Nw9o:gvdiPE5UOnBAAq8TdHvZ1rk3N
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Signatures
-
Processes:
v3992ac.exetz5561.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v3992ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz5561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz5561.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v3992ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v3992ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v3992ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v3992ac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz5561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz5561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz5561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz5561.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v3992ac.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1012-210-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-211-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-214-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-217-0x00000000023A0000-0x00000000023B0000-memory.dmp family_redline behavioral1/memory/1012-223-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-221-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-218-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-225-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-227-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-229-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-231-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-233-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-235-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-237-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-239-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-241-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-243-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-245-0x0000000002440000-0x000000000247E000-memory.dmp family_redline behavioral1/memory/1012-247-0x0000000002440000-0x000000000247E000-memory.dmp family_redline -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
legenda.exebuil.exey03Yc45.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation legenda.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation buil.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation y03Yc45.exe -
Executes dropped EXE 12 IoCs
Processes:
zap9950.exezap9596.exezap3993.exetz5561.exev3992ac.exew99nQ79.exexiGnN57.exey03Yc45.exelegenda.exebuil.exelegenda.exelegenda.exepid process 4980 zap9950.exe 4964 zap9596.exe 4288 zap3993.exe 3612 tz5561.exe 3160 v3992ac.exe 1012 w99nQ79.exe 3376 xiGnN57.exe 3768 y03Yc45.exe 2356 legenda.exe 464 buil.exe 3608 legenda.exe 1668 legenda.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1904 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
v3992ac.exetz5561.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v3992ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v3992ac.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz5561.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exezap9950.exezap9596.exezap3993.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap9950.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap9950.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap9596.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap9596.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap3993.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap3993.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 65 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4428 3160 WerFault.exe v3992ac.exe 980 1012 WerFault.exe w99nQ79.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
tz5561.exev3992ac.exew99nQ79.exexiGnN57.exepid process 3612 tz5561.exe 3612 tz5561.exe 3160 v3992ac.exe 3160 v3992ac.exe 1012 w99nQ79.exe 1012 w99nQ79.exe 3376 xiGnN57.exe 3376 xiGnN57.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
tz5561.exev3992ac.exew99nQ79.exexiGnN57.exebuil.exedescription pid process Token: SeDebugPrivilege 3612 tz5561.exe Token: SeDebugPrivilege 3160 v3992ac.exe Token: SeDebugPrivilege 1012 w99nQ79.exe Token: SeDebugPrivilege 3376 xiGnN57.exe Token: SeDebugPrivilege 464 buil.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exezap9950.exezap9596.exezap3993.exey03Yc45.exelegenda.execmd.exebuil.execmd.exedescription pid process target process PID 2236 wrote to memory of 4980 2236 29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exe zap9950.exe PID 2236 wrote to memory of 4980 2236 29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exe zap9950.exe PID 2236 wrote to memory of 4980 2236 29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exe zap9950.exe PID 4980 wrote to memory of 4964 4980 zap9950.exe zap9596.exe PID 4980 wrote to memory of 4964 4980 zap9950.exe zap9596.exe PID 4980 wrote to memory of 4964 4980 zap9950.exe zap9596.exe PID 4964 wrote to memory of 4288 4964 zap9596.exe zap3993.exe PID 4964 wrote to memory of 4288 4964 zap9596.exe zap3993.exe PID 4964 wrote to memory of 4288 4964 zap9596.exe zap3993.exe PID 4288 wrote to memory of 3612 4288 zap3993.exe tz5561.exe PID 4288 wrote to memory of 3612 4288 zap3993.exe tz5561.exe PID 4288 wrote to memory of 3160 4288 zap3993.exe v3992ac.exe PID 4288 wrote to memory of 3160 4288 zap3993.exe v3992ac.exe PID 4288 wrote to memory of 3160 4288 zap3993.exe v3992ac.exe PID 4964 wrote to memory of 1012 4964 zap9596.exe w99nQ79.exe PID 4964 wrote to memory of 1012 4964 zap9596.exe w99nQ79.exe PID 4964 wrote to memory of 1012 4964 zap9596.exe w99nQ79.exe PID 4980 wrote to memory of 3376 4980 zap9950.exe xiGnN57.exe PID 4980 wrote to memory of 3376 4980 zap9950.exe xiGnN57.exe PID 4980 wrote to memory of 3376 4980 zap9950.exe xiGnN57.exe PID 2236 wrote to memory of 3768 2236 29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exe y03Yc45.exe PID 2236 wrote to memory of 3768 2236 29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exe y03Yc45.exe PID 2236 wrote to memory of 3768 2236 29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exe y03Yc45.exe PID 3768 wrote to memory of 2356 3768 y03Yc45.exe legenda.exe PID 3768 wrote to memory of 2356 3768 y03Yc45.exe legenda.exe PID 3768 wrote to memory of 2356 3768 y03Yc45.exe legenda.exe PID 2356 wrote to memory of 4792 2356 legenda.exe schtasks.exe PID 2356 wrote to memory of 4792 2356 legenda.exe schtasks.exe PID 2356 wrote to memory of 4792 2356 legenda.exe schtasks.exe PID 2356 wrote to memory of 2664 2356 legenda.exe cmd.exe PID 2356 wrote to memory of 2664 2356 legenda.exe cmd.exe PID 2356 wrote to memory of 2664 2356 legenda.exe cmd.exe PID 2664 wrote to memory of 4696 2664 cmd.exe cmd.exe PID 2664 wrote to memory of 4696 2664 cmd.exe cmd.exe PID 2664 wrote to memory of 4696 2664 cmd.exe cmd.exe PID 2664 wrote to memory of 2364 2664 cmd.exe cacls.exe PID 2664 wrote to memory of 2364 2664 cmd.exe cacls.exe PID 2664 wrote to memory of 2364 2664 cmd.exe cacls.exe PID 2664 wrote to memory of 1072 2664 cmd.exe cacls.exe PID 2664 wrote to memory of 1072 2664 cmd.exe cacls.exe PID 2664 wrote to memory of 1072 2664 cmd.exe cacls.exe PID 2664 wrote to memory of 4928 2664 cmd.exe cmd.exe PID 2664 wrote to memory of 4928 2664 cmd.exe cmd.exe PID 2664 wrote to memory of 4928 2664 cmd.exe cmd.exe PID 2664 wrote to memory of 4528 2664 cmd.exe cacls.exe PID 2664 wrote to memory of 4528 2664 cmd.exe cacls.exe PID 2664 wrote to memory of 4528 2664 cmd.exe cacls.exe PID 2664 wrote to memory of 1968 2664 cmd.exe cacls.exe PID 2664 wrote to memory of 1968 2664 cmd.exe cacls.exe PID 2664 wrote to memory of 1968 2664 cmd.exe cacls.exe PID 2356 wrote to memory of 464 2356 legenda.exe buil.exe PID 2356 wrote to memory of 464 2356 legenda.exe buil.exe PID 464 wrote to memory of 2100 464 buil.exe cmd.exe PID 464 wrote to memory of 2100 464 buil.exe cmd.exe PID 2100 wrote to memory of 224 2100 cmd.exe chcp.com PID 2100 wrote to memory of 224 2100 cmd.exe chcp.com PID 2100 wrote to memory of 208 2100 cmd.exe PING.EXE PID 2100 wrote to memory of 208 2100 cmd.exe PING.EXE PID 2356 wrote to memory of 1904 2356 legenda.exe rundll32.exe PID 2356 wrote to memory of 1904 2356 legenda.exe rundll32.exe PID 2356 wrote to memory of 1904 2356 legenda.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exe"C:\Users\Admin\AppData\Local\Temp\29522d1ce57a8d854452100a8ac5772a90ee0a46772b7a077f94ec2672976117.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9950.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9950.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9596.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9596.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3993.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3993.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5561.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5561.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3992ac.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3992ac.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3160 -s 10846⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w99nQ79.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w99nQ79.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 20405⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xiGnN57.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xiGnN57.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y03Yc45.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y03Yc45.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exe"C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650016⤵
-
C:\Windows\system32\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3160 -ip 31601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1012 -ip 10121⤵
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exeFilesize
32KB
MD5495ce8bc963f4b0d156e4b7e5ed97ed4
SHA12a2f72bbb5f111e0c8dd9038ea213dca3783e266
SHA25666e254d86a825aaba511f1d0b75ceb4520fa38d518b305a770a03fdb17dc1243
SHA5125ad2ea5696ffecf3318c5c2233da79fc0b849ac92a1550adda04f915196f831292f39058f38fd636b5615d93bbe6eedb489b0ef96bd7199c8a6ab1605e13e244
-
C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exeFilesize
32KB
MD5495ce8bc963f4b0d156e4b7e5ed97ed4
SHA12a2f72bbb5f111e0c8dd9038ea213dca3783e266
SHA25666e254d86a825aaba511f1d0b75ceb4520fa38d518b305a770a03fdb17dc1243
SHA5125ad2ea5696ffecf3318c5c2233da79fc0b849ac92a1550adda04f915196f831292f39058f38fd636b5615d93bbe6eedb489b0ef96bd7199c8a6ab1605e13e244
-
C:\Users\Admin\AppData\Local\Temp\1000082001\buil.exeFilesize
32KB
MD5495ce8bc963f4b0d156e4b7e5ed97ed4
SHA12a2f72bbb5f111e0c8dd9038ea213dca3783e266
SHA25666e254d86a825aaba511f1d0b75ceb4520fa38d518b305a770a03fdb17dc1243
SHA5125ad2ea5696ffecf3318c5c2233da79fc0b849ac92a1550adda04f915196f831292f39058f38fd636b5615d93bbe6eedb489b0ef96bd7199c8a6ab1605e13e244
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y03Yc45.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y03Yc45.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9950.exeFilesize
776KB
MD529ebbd6f75b7f3a2c0227aa30ec530c7
SHA10c3526f8605703e61ec1bc54a3df2ddb594d2971
SHA2562ff453b9c1dc1bf6f090ac34d343a65811190116ebf955d018e708f71d80c437
SHA512b35da2a8f43e59f616c5f79e2465ba999f389f447a573219e44e96ec8b8bf755736c3d5ab1d50cbfdf01006d874d64040700d55d31011e602cb819d27c860ef0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap9950.exeFilesize
776KB
MD529ebbd6f75b7f3a2c0227aa30ec530c7
SHA10c3526f8605703e61ec1bc54a3df2ddb594d2971
SHA2562ff453b9c1dc1bf6f090ac34d343a65811190116ebf955d018e708f71d80c437
SHA512b35da2a8f43e59f616c5f79e2465ba999f389f447a573219e44e96ec8b8bf755736c3d5ab1d50cbfdf01006d874d64040700d55d31011e602cb819d27c860ef0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xiGnN57.exeFilesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xiGnN57.exeFilesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9596.exeFilesize
634KB
MD5a40877d49263e47ca31b576aaa38ce42
SHA1a1be4e3761124400cf73ce32998bb76ef0e5878f
SHA25618a80cc71f7fb49bd1c1816e92a98a38028f3ec26fe9442defbe25d89ea34498
SHA5127943e945bd9b34dbb45b276bcb3dbcdeac52a26951c2f17b08fd40b92a36086b30e308debe81bb37a224740763475afbf91e251049ef7a7405183623438369f8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9596.exeFilesize
634KB
MD5a40877d49263e47ca31b576aaa38ce42
SHA1a1be4e3761124400cf73ce32998bb76ef0e5878f
SHA25618a80cc71f7fb49bd1c1816e92a98a38028f3ec26fe9442defbe25d89ea34498
SHA5127943e945bd9b34dbb45b276bcb3dbcdeac52a26951c2f17b08fd40b92a36086b30e308debe81bb37a224740763475afbf91e251049ef7a7405183623438369f8
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w99nQ79.exeFilesize
288KB
MD55da2368dbce45a781b79db60845b21b3
SHA11c79b07c450dbf714e824677f082e3e1b01577c0
SHA256ebe02b22ef66c54299e1ec17f5dadbd95bc93287b487e8206d5a7219a75e14bf
SHA5123c92d35e221d7db5a26f1087e4a0cba198039b0358206c16ca74d95432abe21a9acdcfef5b401c33e014b6ff3664f2b0478e738e3be4d9f69d3b26d819bf284e
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w99nQ79.exeFilesize
288KB
MD55da2368dbce45a781b79db60845b21b3
SHA11c79b07c450dbf714e824677f082e3e1b01577c0
SHA256ebe02b22ef66c54299e1ec17f5dadbd95bc93287b487e8206d5a7219a75e14bf
SHA5123c92d35e221d7db5a26f1087e4a0cba198039b0358206c16ca74d95432abe21a9acdcfef5b401c33e014b6ff3664f2b0478e738e3be4d9f69d3b26d819bf284e
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3993.exeFilesize
314KB
MD5238187c5ef93f131e246da0f4162e7f3
SHA1de6285b25d00cf48d3240e0c845ff48e1b743712
SHA256922be56ab07521894ef74c89740d49e37bf9c606dcae700d9eb253399a324bf9
SHA512c4585081650ce89452761d8d09a380b488dfb0f89b11a38c026abcb5dfe525bf68104ca79787e9e42b7d271689bc485621b861cbceacfc5e777779f6f82d94b0
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3993.exeFilesize
314KB
MD5238187c5ef93f131e246da0f4162e7f3
SHA1de6285b25d00cf48d3240e0c845ff48e1b743712
SHA256922be56ab07521894ef74c89740d49e37bf9c606dcae700d9eb253399a324bf9
SHA512c4585081650ce89452761d8d09a380b488dfb0f89b11a38c026abcb5dfe525bf68104ca79787e9e42b7d271689bc485621b861cbceacfc5e777779f6f82d94b0
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5561.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5561.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3992ac.exeFilesize
230KB
MD5dfb5e307f3eada8a0f7f4efd44faa19d
SHA1e2e6e8b9abc8fc5c84ba278db5b0fb48ed5e2d4f
SHA256ea34510993a3149feb9dac9cc65c6e05b6b670926d62cb525a6a5c4c844a6efc
SHA512598a767031ec4132fcb539d3309f7f4b8abccbc581bb11c088f7cd76c8ec140f30860b5fd0cd0f3f21502adea8a69299d6d7d8dde9774a8a034e7ee000c337b9
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3992ac.exeFilesize
230KB
MD5dfb5e307f3eada8a0f7f4efd44faa19d
SHA1e2e6e8b9abc8fc5c84ba278db5b0fb48ed5e2d4f
SHA256ea34510993a3149feb9dac9cc65c6e05b6b670926d62cb525a6a5c4c844a6efc
SHA512598a767031ec4132fcb539d3309f7f4b8abccbc581bb11c088f7cd76c8ec140f30860b5fd0cd0f3f21502adea8a69299d6d7d8dde9774a8a034e7ee000c337b9
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
memory/464-1175-0x0000010D1CD60000-0x0000010D1CDB0000-memory.dmpFilesize
320KB
-
memory/464-1176-0x0000010D01DC0000-0x0000010D01DD0000-memory.dmpFilesize
64KB
-
memory/464-1174-0x0000010D01A50000-0x0000010D01A5E000-memory.dmpFilesize
56KB
-
memory/1012-1130-0x00000000065D0000-0x0000000006646000-memory.dmpFilesize
472KB
-
memory/1012-1122-0x00000000058B0000-0x00000000058C2000-memory.dmpFilesize
72KB
-
memory/1012-1134-0x00000000023A0000-0x00000000023B0000-memory.dmpFilesize
64KB
-
memory/1012-1133-0x0000000006880000-0x0000000006DAC000-memory.dmpFilesize
5.2MB
-
memory/1012-1132-0x00000000066B0000-0x0000000006872000-memory.dmpFilesize
1.8MB
-
memory/1012-1131-0x0000000006650000-0x00000000066A0000-memory.dmpFilesize
320KB
-
memory/1012-1129-0x00000000023A0000-0x00000000023B0000-memory.dmpFilesize
64KB
-
memory/1012-210-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-211-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-213-0x00000000004D0000-0x000000000051B000-memory.dmpFilesize
300KB
-
memory/1012-214-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-215-0x00000000023A0000-0x00000000023B0000-memory.dmpFilesize
64KB
-
memory/1012-217-0x00000000023A0000-0x00000000023B0000-memory.dmpFilesize
64KB
-
memory/1012-219-0x00000000023A0000-0x00000000023B0000-memory.dmpFilesize
64KB
-
memory/1012-223-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-221-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-218-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-225-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-227-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-229-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-231-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-233-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-235-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-237-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-239-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-241-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-243-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-245-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-247-0x0000000002440000-0x000000000247E000-memory.dmpFilesize
248KB
-
memory/1012-1120-0x00000000050D0000-0x00000000056E8000-memory.dmpFilesize
6.1MB
-
memory/1012-1121-0x0000000005770000-0x000000000587A000-memory.dmpFilesize
1.0MB
-
memory/1012-1128-0x00000000023A0000-0x00000000023B0000-memory.dmpFilesize
64KB
-
memory/1012-1123-0x00000000058D0000-0x000000000590C000-memory.dmpFilesize
240KB
-
memory/1012-1124-0x00000000023A0000-0x00000000023B0000-memory.dmpFilesize
64KB
-
memory/1012-1125-0x0000000005BC0000-0x0000000005C52000-memory.dmpFilesize
584KB
-
memory/1012-1126-0x0000000005C60000-0x0000000005CC6000-memory.dmpFilesize
408KB
-
memory/3160-187-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-168-0x00000000021A0000-0x00000000021B0000-memory.dmpFilesize
64KB
-
memory/3160-198-0x00000000021A0000-0x00000000021B0000-memory.dmpFilesize
64KB
-
memory/3160-200-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3160-205-0x0000000000400000-0x00000000004BA000-memory.dmpFilesize
744KB
-
memory/3160-204-0x00000000021A0000-0x00000000021B0000-memory.dmpFilesize
64KB
-
memory/3160-203-0x00000000021A0000-0x00000000021B0000-memory.dmpFilesize
64KB
-
memory/3160-197-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-195-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-191-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-167-0x00000000004C0000-0x00000000004ED000-memory.dmpFilesize
180KB
-
memory/3160-193-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-189-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-199-0x00000000021A0000-0x00000000021B0000-memory.dmpFilesize
64KB
-
memory/3160-179-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-185-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-183-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-181-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-201-0x00000000021A0000-0x00000000021B0000-memory.dmpFilesize
64KB
-
memory/3160-177-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-175-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-173-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-171-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-170-0x0000000002440000-0x0000000002452000-memory.dmpFilesize
72KB
-
memory/3160-169-0x0000000004A70000-0x0000000005014000-memory.dmpFilesize
5.6MB
-
memory/3376-1141-0x0000000005B70000-0x0000000005B80000-memory.dmpFilesize
64KB
-
memory/3376-1140-0x0000000000F80000-0x0000000000FB2000-memory.dmpFilesize
200KB
-
memory/3612-161-0x0000000000C40000-0x0000000000C4A000-memory.dmpFilesize
40KB