Analysis
-
max time kernel
116s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2023 04:31
Static task
static1
General
-
Target
e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exe
-
Size
1.0MB
-
MD5
c129a342786004aa59300ef1529e7854
-
SHA1
b1c920ed1e6b43ff76ed5c041fe74278db78623e
-
SHA256
e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7
-
SHA512
6d9acc46df4c66d0b266d84713fdbd2991fd0c85c2e801b6abed44d604e6205fa16519a9c4d34e3681650dd5373a670f2f59e09729d19407f2a6ad704128497f
-
SSDEEP
24576:NyhBMmYWTZtoBsNHhhLv5QG7Dczy0sTcKqntP9A0+dIg2w:oRoeJhhgzrKIVA1dI
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
netu
193.233.20.32:4125
-
auth_value
9641925ae487005582b5cf30476dd305
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Signatures
-
Processes:
tz6660.exev5540WN.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz6660.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v5540WN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v5540WN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v5540WN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v5540WN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz6660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz6660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz6660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz6660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v5540WN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v5540WN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz6660.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2956-206-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-207-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-209-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-211-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-213-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-215-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-217-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-219-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-221-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-226-0x0000000004B40000-0x0000000004B50000-memory.dmp family_redline behavioral1/memory/2956-225-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-229-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-231-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-233-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-235-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-237-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-239-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-241-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2956-243-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
y35Ng90.exelegenda.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation y35Ng90.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation legenda.exe -
Executes dropped EXE 11 IoCs
Processes:
zap8082.exezap3783.exezap3732.exetz6660.exev5540WN.exew03Zz82.exexgbLt91.exey35Ng90.exelegenda.exeLummas.exelegenda.exepid process 3604 zap8082.exe 3540 zap3783.exe 3488 zap3732.exe 5064 tz6660.exe 2860 v5540WN.exe 2956 w03Zz82.exe 3980 xgbLt91.exe 1256 y35Ng90.exe 3500 legenda.exe 1000 Lummas.exe 2996 legenda.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3004 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
tz6660.exev5540WN.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz6660.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v5540WN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v5540WN.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
zap3783.exezap3732.exee588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exezap8082.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap3783.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap3783.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap3732.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap3732.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap8082.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap8082.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Lummas.exedescription pid process target process PID 1000 set thread context of 4736 1000 Lummas.exe jsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4484 2860 WerFault.exe v5540WN.exe 4992 2956 WerFault.exe w03Zz82.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
tz6660.exev5540WN.exew03Zz82.exexgbLt91.exeLummas.exepid process 5064 tz6660.exe 5064 tz6660.exe 2860 v5540WN.exe 2860 v5540WN.exe 2956 w03Zz82.exe 2956 w03Zz82.exe 3980 xgbLt91.exe 3980 xgbLt91.exe 1000 Lummas.exe 1000 Lummas.exe 1000 Lummas.exe 1000 Lummas.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
tz6660.exev5540WN.exew03Zz82.exexgbLt91.exeLummas.exedescription pid process Token: SeDebugPrivilege 5064 tz6660.exe Token: SeDebugPrivilege 2860 v5540WN.exe Token: SeDebugPrivilege 2956 w03Zz82.exe Token: SeDebugPrivilege 3980 xgbLt91.exe Token: SeDebugPrivilege 1000 Lummas.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exezap8082.exezap3783.exezap3732.exey35Ng90.exelegenda.execmd.exeLummas.exedescription pid process target process PID 552 wrote to memory of 3604 552 e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exe zap8082.exe PID 552 wrote to memory of 3604 552 e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exe zap8082.exe PID 552 wrote to memory of 3604 552 e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exe zap8082.exe PID 3604 wrote to memory of 3540 3604 zap8082.exe zap3783.exe PID 3604 wrote to memory of 3540 3604 zap8082.exe zap3783.exe PID 3604 wrote to memory of 3540 3604 zap8082.exe zap3783.exe PID 3540 wrote to memory of 3488 3540 zap3783.exe zap3732.exe PID 3540 wrote to memory of 3488 3540 zap3783.exe zap3732.exe PID 3540 wrote to memory of 3488 3540 zap3783.exe zap3732.exe PID 3488 wrote to memory of 5064 3488 zap3732.exe tz6660.exe PID 3488 wrote to memory of 5064 3488 zap3732.exe tz6660.exe PID 3488 wrote to memory of 2860 3488 zap3732.exe v5540WN.exe PID 3488 wrote to memory of 2860 3488 zap3732.exe v5540WN.exe PID 3488 wrote to memory of 2860 3488 zap3732.exe v5540WN.exe PID 3540 wrote to memory of 2956 3540 zap3783.exe w03Zz82.exe PID 3540 wrote to memory of 2956 3540 zap3783.exe w03Zz82.exe PID 3540 wrote to memory of 2956 3540 zap3783.exe w03Zz82.exe PID 3604 wrote to memory of 3980 3604 zap8082.exe xgbLt91.exe PID 3604 wrote to memory of 3980 3604 zap8082.exe xgbLt91.exe PID 3604 wrote to memory of 3980 3604 zap8082.exe xgbLt91.exe PID 552 wrote to memory of 1256 552 e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exe y35Ng90.exe PID 552 wrote to memory of 1256 552 e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exe y35Ng90.exe PID 552 wrote to memory of 1256 552 e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exe y35Ng90.exe PID 1256 wrote to memory of 3500 1256 y35Ng90.exe legenda.exe PID 1256 wrote to memory of 3500 1256 y35Ng90.exe legenda.exe PID 1256 wrote to memory of 3500 1256 y35Ng90.exe legenda.exe PID 3500 wrote to memory of 1320 3500 legenda.exe schtasks.exe PID 3500 wrote to memory of 1320 3500 legenda.exe schtasks.exe PID 3500 wrote to memory of 1320 3500 legenda.exe schtasks.exe PID 3500 wrote to memory of 584 3500 legenda.exe cmd.exe PID 3500 wrote to memory of 584 3500 legenda.exe cmd.exe PID 3500 wrote to memory of 584 3500 legenda.exe cmd.exe PID 584 wrote to memory of 4416 584 cmd.exe cmd.exe PID 584 wrote to memory of 4416 584 cmd.exe cmd.exe PID 584 wrote to memory of 4416 584 cmd.exe cmd.exe PID 584 wrote to memory of 2644 584 cmd.exe cacls.exe PID 584 wrote to memory of 2644 584 cmd.exe cacls.exe PID 584 wrote to memory of 2644 584 cmd.exe cacls.exe PID 584 wrote to memory of 2252 584 cmd.exe cacls.exe PID 584 wrote to memory of 2252 584 cmd.exe cacls.exe PID 584 wrote to memory of 2252 584 cmd.exe cacls.exe PID 584 wrote to memory of 460 584 cmd.exe cmd.exe PID 584 wrote to memory of 460 584 cmd.exe cmd.exe PID 584 wrote to memory of 460 584 cmd.exe cmd.exe PID 584 wrote to memory of 1340 584 cmd.exe cacls.exe PID 584 wrote to memory of 1340 584 cmd.exe cacls.exe PID 584 wrote to memory of 1340 584 cmd.exe cacls.exe PID 584 wrote to memory of 2280 584 cmd.exe cacls.exe PID 584 wrote to memory of 2280 584 cmd.exe cacls.exe PID 584 wrote to memory of 2280 584 cmd.exe cacls.exe PID 3500 wrote to memory of 1000 3500 legenda.exe Lummas.exe PID 3500 wrote to memory of 1000 3500 legenda.exe Lummas.exe PID 1000 wrote to memory of 444 1000 Lummas.exe ilasm.exe PID 1000 wrote to memory of 444 1000 Lummas.exe ilasm.exe PID 1000 wrote to memory of 2176 1000 Lummas.exe csc.exe PID 1000 wrote to memory of 2176 1000 Lummas.exe csc.exe PID 1000 wrote to memory of 4736 1000 Lummas.exe jsc.exe PID 1000 wrote to memory of 4736 1000 Lummas.exe jsc.exe PID 1000 wrote to memory of 4736 1000 Lummas.exe jsc.exe PID 1000 wrote to memory of 4736 1000 Lummas.exe jsc.exe PID 1000 wrote to memory of 4736 1000 Lummas.exe jsc.exe PID 1000 wrote to memory of 4736 1000 Lummas.exe jsc.exe PID 1000 wrote to memory of 4736 1000 Lummas.exe jsc.exe PID 1000 wrote to memory of 4736 1000 Lummas.exe jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exe"C:\Users\Admin\AppData\Local\Temp\e588c37044529af066c2a5dc55cf0f3993975328c80ee50af59e02b6bc3a51b7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap8082.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap8082.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3783.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3783.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3732.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3732.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6660.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6660.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5540WN.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5540WN.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 10166⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w03Zz82.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w03Zz82.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 16485⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgbLt91.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgbLt91.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y35Ng90.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y35Ng90.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000169001\Lummas.exe"C:\Users\Admin\AppData\Local\Temp\1000169001\Lummas.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"5⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"5⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"5⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2860 -ip 28601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2956 -ip 29561⤵
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000169001\Lummas.exeFilesize
1.9MB
MD5ffc87cf5de85e0a6a3941bc91780d928
SHA16029ea950091d269d9626343a8defefd1b6c5c1c
SHA256adfb9a94a162120159f2b496ff473ee14024f24192cc13cf9f829bbae6c4023c
SHA51298a8f5b8073267e1435a7df8bbc2249f226cb82cda16a18a4e8525d8b068f93aeeca577cff3faf2bacda4493028ae4232189ba98c22883ec9face8cd29105556
-
C:\Users\Admin\AppData\Local\Temp\1000169001\Lummas.exeFilesize
1.9MB
MD5ffc87cf5de85e0a6a3941bc91780d928
SHA16029ea950091d269d9626343a8defefd1b6c5c1c
SHA256adfb9a94a162120159f2b496ff473ee14024f24192cc13cf9f829bbae6c4023c
SHA51298a8f5b8073267e1435a7df8bbc2249f226cb82cda16a18a4e8525d8b068f93aeeca577cff3faf2bacda4493028ae4232189ba98c22883ec9face8cd29105556
-
C:\Users\Admin\AppData\Local\Temp\1000169001\Lummas.exeFilesize
1.9MB
MD5ffc87cf5de85e0a6a3941bc91780d928
SHA16029ea950091d269d9626343a8defefd1b6c5c1c
SHA256adfb9a94a162120159f2b496ff473ee14024f24192cc13cf9f829bbae6c4023c
SHA51298a8f5b8073267e1435a7df8bbc2249f226cb82cda16a18a4e8525d8b068f93aeeca577cff3faf2bacda4493028ae4232189ba98c22883ec9face8cd29105556
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y35Ng90.exeFilesize
235KB
MD599384e5a4dda0d08412fcbadf6572fe1
SHA1528d3220c97e71b9d496e085456ab77c055c5bb8
SHA2568709422e30caed7ba244ac989337afc887129f88c3faa3fcd736e37d58aba7af
SHA512899b1f89c941bd2ca346f36672344417a4ef9a47f82f31ff7d28f804f2400ef5671afb2f06997b52e26c8301e6171a0482a1d94c5fed931a1cd0efa28cc6c9c6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y35Ng90.exeFilesize
235KB
MD599384e5a4dda0d08412fcbadf6572fe1
SHA1528d3220c97e71b9d496e085456ab77c055c5bb8
SHA2568709422e30caed7ba244ac989337afc887129f88c3faa3fcd736e37d58aba7af
SHA512899b1f89c941bd2ca346f36672344417a4ef9a47f82f31ff7d28f804f2400ef5671afb2f06997b52e26c8301e6171a0482a1d94c5fed931a1cd0efa28cc6c9c6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap8082.exeFilesize
854KB
MD5273442e96024cee1817a31d08c0255af
SHA1faaa11cf675bc59d4ea93b71dbb507e81cbf09c2
SHA256de94825676727b73f0b650d1495f7e8a7409f34617e9939449b27d7d24cf8e6d
SHA5123498dcabce23af219ed1c240d42bb082f7e53130b1c562f9a1890cc617faf56b6887eafa2a2dbfdb28677f84ecdf42e9cebd3097dc4453533348e08efe2466c1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap8082.exeFilesize
854KB
MD5273442e96024cee1817a31d08c0255af
SHA1faaa11cf675bc59d4ea93b71dbb507e81cbf09c2
SHA256de94825676727b73f0b650d1495f7e8a7409f34617e9939449b27d7d24cf8e6d
SHA5123498dcabce23af219ed1c240d42bb082f7e53130b1c562f9a1890cc617faf56b6887eafa2a2dbfdb28677f84ecdf42e9cebd3097dc4453533348e08efe2466c1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgbLt91.exeFilesize
175KB
MD56e6348171944d0a7bd3c6dd5dbf2df30
SHA1c1ec8d7e2322451f1971c78f0f3201184c7584a4
SHA256711483035ed606a34f0e65da5b05f6d5837aa3b64aba6e92459f31bc93ead287
SHA5123b59744fd8983ec036cd2affeee2c1f5652e594f7e4134f205195426c2e458cfe4c01a0873faf5ee5f1cd585dbdd1f20c7e4268c66401e8ff8640b0e8db863b1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xgbLt91.exeFilesize
175KB
MD56e6348171944d0a7bd3c6dd5dbf2df30
SHA1c1ec8d7e2322451f1971c78f0f3201184c7584a4
SHA256711483035ed606a34f0e65da5b05f6d5837aa3b64aba6e92459f31bc93ead287
SHA5123b59744fd8983ec036cd2affeee2c1f5652e594f7e4134f205195426c2e458cfe4c01a0873faf5ee5f1cd585dbdd1f20c7e4268c66401e8ff8640b0e8db863b1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3783.exeFilesize
712KB
MD5e3bea9abe519a5524dcf82201ae28ce3
SHA1405576467bacbf341b8fd5ab05a988aab32b5789
SHA256f585190bd71b4764a331ce57dee4ae2755f0c88710595333d14dd74791a6abcb
SHA51252bedf0f092df1cdde241dfbf6de4ce0015dd997ffc53cdb97ea5026fb01157c72db2e7cd342521e328cf9e53c4cf411f658bc0704cf56abfaa40e54d656306a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3783.exeFilesize
712KB
MD5e3bea9abe519a5524dcf82201ae28ce3
SHA1405576467bacbf341b8fd5ab05a988aab32b5789
SHA256f585190bd71b4764a331ce57dee4ae2755f0c88710595333d14dd74791a6abcb
SHA51252bedf0f092df1cdde241dfbf6de4ce0015dd997ffc53cdb97ea5026fb01157c72db2e7cd342521e328cf9e53c4cf411f658bc0704cf56abfaa40e54d656306a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w03Zz82.exeFilesize
383KB
MD5ea7a20cf834418c03375e8afdb31fa49
SHA13f2c713484255232378331a909a7ad19c6a979e1
SHA2561a399954b360e1d516f072bc57307f92d0a05bdb3e538743b8779da6f958be23
SHA512ff84007af4563b9df39cf64bd0d4f78dc15878bf13b71357df06b385ea79aad07e4df9b5d66688e506a77229fdfc4bbff424bd5f53380e0e2f13346a69a90bfa
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w03Zz82.exeFilesize
383KB
MD5ea7a20cf834418c03375e8afdb31fa49
SHA13f2c713484255232378331a909a7ad19c6a979e1
SHA2561a399954b360e1d516f072bc57307f92d0a05bdb3e538743b8779da6f958be23
SHA512ff84007af4563b9df39cf64bd0d4f78dc15878bf13b71357df06b385ea79aad07e4df9b5d66688e506a77229fdfc4bbff424bd5f53380e0e2f13346a69a90bfa
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3732.exeFilesize
352KB
MD595d2c72d363e4550e32132bd5cbf68bd
SHA1e26ab779d5f5935afbd0e3ebee8960d83b81d53a
SHA2569ef8f8926bad6925177bb9db761d1fb030fcce69c22995182ce7760aa28eb050
SHA5120d80d85a6b239dc3205e43f86fd5dfbc741084eb48b39f9ce7c2ca227848aaf06f20225cae0c440df0e08bae66d65c620e3e19b512491a65bcbed33b731d6bc9
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3732.exeFilesize
352KB
MD595d2c72d363e4550e32132bd5cbf68bd
SHA1e26ab779d5f5935afbd0e3ebee8960d83b81d53a
SHA2569ef8f8926bad6925177bb9db761d1fb030fcce69c22995182ce7760aa28eb050
SHA5120d80d85a6b239dc3205e43f86fd5dfbc741084eb48b39f9ce7c2ca227848aaf06f20225cae0c440df0e08bae66d65c620e3e19b512491a65bcbed33b731d6bc9
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6660.exeFilesize
11KB
MD5ef36915953487fc84279c436635d4a3a
SHA1f3ee5b10c606a9f3e63f88c965992d754d68902b
SHA256d8e291ba4a960ff4548551080729d200655eab4fba46bb8cf2300876cd764f4a
SHA512700b0de9cda6a6381b79533af1e7ff74e510cc43c613e40f8889804f7e25ac50be365190861b68d4cc2323ce025b486b8582c8eabb05010bcc7734e4ae5ab7eb
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz6660.exeFilesize
11KB
MD5ef36915953487fc84279c436635d4a3a
SHA1f3ee5b10c606a9f3e63f88c965992d754d68902b
SHA256d8e291ba4a960ff4548551080729d200655eab4fba46bb8cf2300876cd764f4a
SHA512700b0de9cda6a6381b79533af1e7ff74e510cc43c613e40f8889804f7e25ac50be365190861b68d4cc2323ce025b486b8582c8eabb05010bcc7734e4ae5ab7eb
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5540WN.exeFilesize
325KB
MD55f28745dbc2334b52a9776de065708da
SHA1c5351759895ff80915be4ca43984222a19c0c12f
SHA25637cf6b81601fef0190043141deb9353afc01f840da7912997e16a0ad5afc4a9f
SHA512fd355447649e493eea97e057dc58e5b6610b88615b45fb8cb193c59b3b0115dac50b7f71a12e4edb470d64d157d22fa4f96fc08b5c6fe30a2af8bb2134a7a10a
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5540WN.exeFilesize
325KB
MD55f28745dbc2334b52a9776de065708da
SHA1c5351759895ff80915be4ca43984222a19c0c12f
SHA25637cf6b81601fef0190043141deb9353afc01f840da7912997e16a0ad5afc4a9f
SHA512fd355447649e493eea97e057dc58e5b6610b88615b45fb8cb193c59b3b0115dac50b7f71a12e4edb470d64d157d22fa4f96fc08b5c6fe30a2af8bb2134a7a10a
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD599384e5a4dda0d08412fcbadf6572fe1
SHA1528d3220c97e71b9d496e085456ab77c055c5bb8
SHA2568709422e30caed7ba244ac989337afc887129f88c3faa3fcd736e37d58aba7af
SHA512899b1f89c941bd2ca346f36672344417a4ef9a47f82f31ff7d28f804f2400ef5671afb2f06997b52e26c8301e6171a0482a1d94c5fed931a1cd0efa28cc6c9c6
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD599384e5a4dda0d08412fcbadf6572fe1
SHA1528d3220c97e71b9d496e085456ab77c055c5bb8
SHA2568709422e30caed7ba244ac989337afc887129f88c3faa3fcd736e37d58aba7af
SHA512899b1f89c941bd2ca346f36672344417a4ef9a47f82f31ff7d28f804f2400ef5671afb2f06997b52e26c8301e6171a0482a1d94c5fed931a1cd0efa28cc6c9c6
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD599384e5a4dda0d08412fcbadf6572fe1
SHA1528d3220c97e71b9d496e085456ab77c055c5bb8
SHA2568709422e30caed7ba244ac989337afc887129f88c3faa3fcd736e37d58aba7af
SHA512899b1f89c941bd2ca346f36672344417a4ef9a47f82f31ff7d28f804f2400ef5671afb2f06997b52e26c8301e6171a0482a1d94c5fed931a1cd0efa28cc6c9c6
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD599384e5a4dda0d08412fcbadf6572fe1
SHA1528d3220c97e71b9d496e085456ab77c055c5bb8
SHA2568709422e30caed7ba244ac989337afc887129f88c3faa3fcd736e37d58aba7af
SHA512899b1f89c941bd2ca346f36672344417a4ef9a47f82f31ff7d28f804f2400ef5671afb2f06997b52e26c8301e6171a0482a1d94c5fed931a1cd0efa28cc6c9c6
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
memory/1000-1171-0x000001F9F6B60000-0x000001F9F6D4E000-memory.dmpFilesize
1.9MB
-
memory/1000-1172-0x000001F9F8A20000-0x000001F9F8A30000-memory.dmpFilesize
64KB
-
memory/2860-180-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-188-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-198-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-199-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/2860-201-0x0000000000400000-0x0000000002B7E000-memory.dmpFilesize
39.5MB
-
memory/2860-184-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-194-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-182-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-186-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-192-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-190-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-196-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-178-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-176-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-174-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-172-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-171-0x00000000070F0000-0x0000000007102000-memory.dmpFilesize
72KB
-
memory/2860-170-0x0000000007250000-0x00000000077F4000-memory.dmpFilesize
5.6MB
-
memory/2860-169-0x0000000007240000-0x0000000007250000-memory.dmpFilesize
64KB
-
memory/2860-168-0x0000000007240000-0x0000000007250000-memory.dmpFilesize
64KB
-
memory/2860-167-0x0000000002B80000-0x0000000002BAD000-memory.dmpFilesize
180KB
-
memory/2956-225-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-1131-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/2956-237-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-239-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-241-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-243-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-1116-0x0000000007A20000-0x0000000008038000-memory.dmpFilesize
6.1MB
-
memory/2956-1117-0x0000000008040000-0x000000000814A000-memory.dmpFilesize
1.0MB
-
memory/2956-1118-0x0000000004E80000-0x0000000004E92000-memory.dmpFilesize
72KB
-
memory/2956-1119-0x0000000004EA0000-0x0000000004EDC000-memory.dmpFilesize
240KB
-
memory/2956-1120-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/2956-1122-0x00000000083C0000-0x0000000008426000-memory.dmpFilesize
408KB
-
memory/2956-1123-0x0000000008A90000-0x0000000008B22000-memory.dmpFilesize
584KB
-
memory/2956-1124-0x0000000008C80000-0x0000000008E42000-memory.dmpFilesize
1.8MB
-
memory/2956-1125-0x0000000008E60000-0x000000000938C000-memory.dmpFilesize
5.2MB
-
memory/2956-1126-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/2956-1127-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/2956-1128-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/2956-1129-0x00000000094D0000-0x0000000009546000-memory.dmpFilesize
472KB
-
memory/2956-1130-0x0000000009550000-0x00000000095A0000-memory.dmpFilesize
320KB
-
memory/2956-233-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-235-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-206-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-207-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-231-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-228-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/2956-229-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-226-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/2956-224-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/2956-221-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-222-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/2956-219-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-217-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-215-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-209-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-211-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/2956-213-0x0000000004AC0000-0x0000000004AFF000-memory.dmpFilesize
252KB
-
memory/3980-1138-0x00000000054A0000-0x00000000054B0000-memory.dmpFilesize
64KB
-
memory/3980-1137-0x0000000000BB0000-0x0000000000BE2000-memory.dmpFilesize
200KB
-
memory/4736-1180-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/4736-1179-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/4736-1178-0x0000000000400000-0x000000000055E000-memory.dmpFilesize
1.4MB
-
memory/5064-161-0x0000000000FF0000-0x0000000000FFA000-memory.dmpFilesize
40KB