Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2023, 04:30
Static task
static1
Behavioral task
behavioral1
Sample
5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d.exe
Resource
win10v2004-20230220-en
General
-
Target
5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d.exe
-
Size
977KB
-
MD5
aa94c837aaac604b01383e813336c0e4
-
SHA1
29dacaad50ac310c5774ca638520cc3aae0ce09f
-
SHA256
5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d
-
SHA512
3be421797d94040e733ae7f12c10c48750bed3949f4dec41d6dc87faa1d2a3a6bb89a97e3e393c22736a20009a6d7b01bae0ac6355f4c8efdae14de6aecff7b8
-
SSDEEP
24576:fy3m27ZPmmMSRIQVLZ0w5jBrY3YdoXcKfsPNVGXM:q3RFPmmMSpLZ0wRBrY3iosKUPNVi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
nado
176.113.115.145:4125
-
auth_value
a648e365d8e0df895a84152ad68ffc56
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
redline
83.217.11.28:30827
-
auth_value
2b0f3dc1f2266e50326d5210b0ebf9a3
Extracted
redline
@DridexxSupport
188.212.124.133:16312
-
auth_value
e5a22ab56ec9b2f984d6e4504915843a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v5025rK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v5025rK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz4450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz4450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz4450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz4450.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v5025rK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz4450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz4450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v5025rK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v5025rK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v5025rK.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/4564-215-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-217-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-214-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-219-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-221-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-223-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-225-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-227-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-229-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-231-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-233-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-235-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-237-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-239-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-241-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-243-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-245-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/4564-247-0x0000000007740000-0x000000000777F000-memory.dmp family_redline -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation y81uN49.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation legenda.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation Spfteysaad.exe -
Executes dropped EXE 14 IoCs
pid Process 1324 zap8775.exe 1508 zap0147.exe 4348 zap7619.exe 4408 tz4450.exe 3908 v5025rK.exe 4564 w98Kz39.exe 5080 xvmhj37.exe 2812 y81uN49.exe 912 legenda.exe 1020 Spfteysaad.exe 4052 BTC_coldwal_extrc.exe 1524 legenda.exe 4812 Spfteysaad.exe 2776 legenda.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz4450.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v5025rK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v5025rK.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap8775.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap0147.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xlhsemudcu = "\"C:\\Users\\Admin\\AppData\\Roaming\\Zvkscdmjuiy\\Xlhsemudcu.exe\"" Spfteysaad.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap8775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap0147.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap7619.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap7619.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4052 set thread context of 4088 4052 BTC_coldwal_extrc.exe 120 PID 1020 set thread context of 4812 1020 Spfteysaad.exe 126 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2900 3908 WerFault.exe 94 832 4564 WerFault.exe 97 860 4052 WerFault.exe 119 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1700 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4408 tz4450.exe 4408 tz4450.exe 3908 v5025rK.exe 3908 v5025rK.exe 4564 w98Kz39.exe 4564 w98Kz39.exe 5080 xvmhj37.exe 5080 xvmhj37.exe 1616 powershell.exe 1616 powershell.exe 4088 RegSvcs.exe 4088 RegSvcs.exe 4812 Spfteysaad.exe 4812 Spfteysaad.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4408 tz4450.exe Token: SeDebugPrivilege 3908 v5025rK.exe Token: SeDebugPrivilege 4564 w98Kz39.exe Token: SeDebugPrivilege 5080 xvmhj37.exe Token: SeDebugPrivilege 1020 Spfteysaad.exe Token: SeDebugPrivilege 1616 powershell.exe Token: SeDebugPrivilege 4088 RegSvcs.exe Token: SeDebugPrivilege 4812 Spfteysaad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 1324 5036 5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d.exe 85 PID 5036 wrote to memory of 1324 5036 5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d.exe 85 PID 5036 wrote to memory of 1324 5036 5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d.exe 85 PID 1324 wrote to memory of 1508 1324 zap8775.exe 86 PID 1324 wrote to memory of 1508 1324 zap8775.exe 86 PID 1324 wrote to memory of 1508 1324 zap8775.exe 86 PID 1508 wrote to memory of 4348 1508 zap0147.exe 87 PID 1508 wrote to memory of 4348 1508 zap0147.exe 87 PID 1508 wrote to memory of 4348 1508 zap0147.exe 87 PID 4348 wrote to memory of 4408 4348 zap7619.exe 88 PID 4348 wrote to memory of 4408 4348 zap7619.exe 88 PID 4348 wrote to memory of 3908 4348 zap7619.exe 94 PID 4348 wrote to memory of 3908 4348 zap7619.exe 94 PID 4348 wrote to memory of 3908 4348 zap7619.exe 94 PID 1508 wrote to memory of 4564 1508 zap0147.exe 97 PID 1508 wrote to memory of 4564 1508 zap0147.exe 97 PID 1508 wrote to memory of 4564 1508 zap0147.exe 97 PID 1324 wrote to memory of 5080 1324 zap8775.exe 105 PID 1324 wrote to memory of 5080 1324 zap8775.exe 105 PID 1324 wrote to memory of 5080 1324 zap8775.exe 105 PID 5036 wrote to memory of 2812 5036 5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d.exe 106 PID 5036 wrote to memory of 2812 5036 5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d.exe 106 PID 5036 wrote to memory of 2812 5036 5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d.exe 106 PID 2812 wrote to memory of 912 2812 y81uN49.exe 107 PID 2812 wrote to memory of 912 2812 y81uN49.exe 107 PID 2812 wrote to memory of 912 2812 y81uN49.exe 107 PID 912 wrote to memory of 1700 912 legenda.exe 108 PID 912 wrote to memory of 1700 912 legenda.exe 108 PID 912 wrote to memory of 1700 912 legenda.exe 108 PID 912 wrote to memory of 2604 912 legenda.exe 110 PID 912 wrote to memory of 2604 912 legenda.exe 110 PID 912 wrote to memory of 2604 912 legenda.exe 110 PID 2604 wrote to memory of 4516 2604 cmd.exe 112 PID 2604 wrote to memory of 4516 2604 cmd.exe 112 PID 2604 wrote to memory of 4516 2604 cmd.exe 112 PID 2604 wrote to memory of 4744 2604 cmd.exe 113 PID 2604 wrote to memory of 4744 2604 cmd.exe 113 PID 2604 wrote to memory of 4744 2604 cmd.exe 113 PID 2604 wrote to memory of 1456 2604 cmd.exe 114 PID 2604 wrote to memory of 1456 2604 cmd.exe 114 PID 2604 wrote to memory of 1456 2604 cmd.exe 114 PID 2604 wrote to memory of 2856 2604 cmd.exe 115 PID 2604 wrote to memory of 2856 2604 cmd.exe 115 PID 2604 wrote to memory of 2856 2604 cmd.exe 115 PID 2604 wrote to memory of 2796 2604 cmd.exe 116 PID 2604 wrote to memory of 2796 2604 cmd.exe 116 PID 2604 wrote to memory of 2796 2604 cmd.exe 116 PID 2604 wrote to memory of 1576 2604 cmd.exe 117 PID 2604 wrote to memory of 1576 2604 cmd.exe 117 PID 2604 wrote to memory of 1576 2604 cmd.exe 117 PID 912 wrote to memory of 1020 912 legenda.exe 118 PID 912 wrote to memory of 1020 912 legenda.exe 118 PID 912 wrote to memory of 1020 912 legenda.exe 118 PID 912 wrote to memory of 4052 912 legenda.exe 119 PID 912 wrote to memory of 4052 912 legenda.exe 119 PID 912 wrote to memory of 4052 912 legenda.exe 119 PID 4052 wrote to memory of 4088 4052 BTC_coldwal_extrc.exe 120 PID 4052 wrote to memory of 4088 4052 BTC_coldwal_extrc.exe 120 PID 4052 wrote to memory of 4088 4052 BTC_coldwal_extrc.exe 120 PID 4052 wrote to memory of 4088 4052 BTC_coldwal_extrc.exe 120 PID 4052 wrote to memory of 4088 4052 BTC_coldwal_extrc.exe 120 PID 1020 wrote to memory of 1616 1020 Spfteysaad.exe 123 PID 1020 wrote to memory of 1616 1020 Spfteysaad.exe 123 PID 1020 wrote to memory of 1616 1020 Spfteysaad.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d.exe"C:\Users\Admin\AppData\Local\Temp\5fe327111a51129fa96bcd1a4caffbb2ee95534e3c90415cb00e4884b663787d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap8775.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap8775.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0147.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0147.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7619.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7619.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4450.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4450.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5025rK.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v5025rK.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 10806⤵
- Program crash
PID:2900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w98Kz39.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w98Kz39.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 15205⤵
- Program crash
PID:832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xvmhj37.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xvmhj37.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y81uN49.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y81uN49.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
PID:1700
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵PID:4744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵PID:1456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2856
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵PID:2796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵PID:1576
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000217001\Spfteysaad.exe"C:\Users\Admin\AppData\Local\Temp\1000217001\Spfteysaad.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\1000217001\Spfteysaad.exeC:\Users\Admin\AppData\Local\Temp\1000217001\Spfteysaad.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000218001\BTC_coldwal_extrc.exe"C:\Users\Admin\AppData\Local\Temp\1000218001\BTC_coldwal_extrc.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 5725⤵
- Program crash
PID:860
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2936
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3908 -ip 39081⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4564 -ip 45641⤵PID:1032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4052 -ip 40521⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
PID:1524
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
PID:2776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5777c191192611ccd3ad42445d9b4fbff
SHA17102e6210880506e7d72644490c653f0d63bef69
SHA256c2c03dac7c91dd00f36b854abf0f004c5ac1b21a6799fe3d5c36c778c11ecec7
SHA5121a153ac56d3d6c76df88da46a13062ce2ff2849926756ec4e58b11ff1090807e16c32092d9f6a432b721a4b1930d838fcf4404c91480c6c830b07ca18f38f324
-
Filesize
2.3MB
MD58f3e8fa1ba9c4c10680a9135a2ab6724
SHA140786bac389dcd6b175f9973b81e706cdb9806cf
SHA2569c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a
SHA512851aa6b4c91a3d7ffa1ca93c7b1b651e2df0537679d564d0b4868acd1b8757eb0e3dca05b8752706717d96b1526049cb85a44427d9bbd425d0c1ec783cda5836
-
Filesize
2.3MB
MD58f3e8fa1ba9c4c10680a9135a2ab6724
SHA140786bac389dcd6b175f9973b81e706cdb9806cf
SHA2569c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a
SHA512851aa6b4c91a3d7ffa1ca93c7b1b651e2df0537679d564d0b4868acd1b8757eb0e3dca05b8752706717d96b1526049cb85a44427d9bbd425d0c1ec783cda5836
-
Filesize
2.3MB
MD58f3e8fa1ba9c4c10680a9135a2ab6724
SHA140786bac389dcd6b175f9973b81e706cdb9806cf
SHA2569c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a
SHA512851aa6b4c91a3d7ffa1ca93c7b1b651e2df0537679d564d0b4868acd1b8757eb0e3dca05b8752706717d96b1526049cb85a44427d9bbd425d0c1ec783cda5836
-
Filesize
2.3MB
MD58f3e8fa1ba9c4c10680a9135a2ab6724
SHA140786bac389dcd6b175f9973b81e706cdb9806cf
SHA2569c1cee20e92c68a18b34672ff0a8ba4c931e90a18b47ffca826cb2053cb2ee1a
SHA512851aa6b4c91a3d7ffa1ca93c7b1b651e2df0537679d564d0b4868acd1b8757eb0e3dca05b8752706717d96b1526049cb85a44427d9bbd425d0c1ec783cda5836
-
Filesize
1.1MB
MD535c4dd09a4b5af6a852a27e85ae0c462
SHA1a0fdd51b1e5718e26223f50960b95e2e4082ed91
SHA256ad8e1b53dd81ce9a9ca730a8503cc17095dc8ce0e3c559b13bf36ca679115799
SHA512eaa27c343aabbeaa6e33fa7bdb4ae2bd9048420a7a2adbba245e84201e280e5982760bed9a3dd7012c2c9875d244a196d68d756ee16cb7fc4197bc3e616a823a
-
Filesize
1.1MB
MD535c4dd09a4b5af6a852a27e85ae0c462
SHA1a0fdd51b1e5718e26223f50960b95e2e4082ed91
SHA256ad8e1b53dd81ce9a9ca730a8503cc17095dc8ce0e3c559b13bf36ca679115799
SHA512eaa27c343aabbeaa6e33fa7bdb4ae2bd9048420a7a2adbba245e84201e280e5982760bed9a3dd7012c2c9875d244a196d68d756ee16cb7fc4197bc3e616a823a
-
Filesize
1.1MB
MD535c4dd09a4b5af6a852a27e85ae0c462
SHA1a0fdd51b1e5718e26223f50960b95e2e4082ed91
SHA256ad8e1b53dd81ce9a9ca730a8503cc17095dc8ce0e3c559b13bf36ca679115799
SHA512eaa27c343aabbeaa6e33fa7bdb4ae2bd9048420a7a2adbba245e84201e280e5982760bed9a3dd7012c2c9875d244a196d68d756ee16cb7fc4197bc3e616a823a
-
Filesize
235KB
MD5912c769fa0e6b04ce4afa80689a5629d
SHA1a2de29f768a964d7f4a4e067312b0dc2266ae136
SHA25613958a8fbf512d5fa1537286b4ebc5192d04dcbd888f80ac608d1763b6b93e44
SHA51213b39b90db0d457647b6ed45a5c5c26052f2d4934eb088461c6955e2a4e2d69bd5d7ef7f449a7580b54e30ef9fbb9b622cce5d047cb3be273c3790af06f04c91
-
Filesize
235KB
MD5912c769fa0e6b04ce4afa80689a5629d
SHA1a2de29f768a964d7f4a4e067312b0dc2266ae136
SHA25613958a8fbf512d5fa1537286b4ebc5192d04dcbd888f80ac608d1763b6b93e44
SHA51213b39b90db0d457647b6ed45a5c5c26052f2d4934eb088461c6955e2a4e2d69bd5d7ef7f449a7580b54e30ef9fbb9b622cce5d047cb3be273c3790af06f04c91
-
Filesize
805KB
MD55cd24f55d8b3eafb1d3d12a0b837f237
SHA1bd97df24944353c131f2e69bbf1ae16f6f0d2e0f
SHA25636b6d7015966a00f241a2778ace5ec230b5e67a89e961e92311b4d66d324e9b3
SHA5122c26cf50b04d5a158f69fe0fdebadb7b8d5e7068ac23b78f028278077a6371a967d26a7424450a134175cfc509476d5f196bc5a924c740905051e49b3ffb868b
-
Filesize
805KB
MD55cd24f55d8b3eafb1d3d12a0b837f237
SHA1bd97df24944353c131f2e69bbf1ae16f6f0d2e0f
SHA25636b6d7015966a00f241a2778ace5ec230b5e67a89e961e92311b4d66d324e9b3
SHA5122c26cf50b04d5a158f69fe0fdebadb7b8d5e7068ac23b78f028278077a6371a967d26a7424450a134175cfc509476d5f196bc5a924c740905051e49b3ffb868b
-
Filesize
175KB
MD519041144b80c7eba3acefd12733a8738
SHA13cb71c81a2986c6318cc73444195b4620be5bfdc
SHA25643a51352554de3ce80dd9a59f6e26777d6d5e58bb0d0807b15765e549653ffdd
SHA512dc80726a13425ff0ada91f73b6e7c81ab028fdf299cbae3653832db50f8cc6665a2165851be66366022d5ee1d7b8821335368bebdaabba66f50189108a264aca
-
Filesize
175KB
MD519041144b80c7eba3acefd12733a8738
SHA13cb71c81a2986c6318cc73444195b4620be5bfdc
SHA25643a51352554de3ce80dd9a59f6e26777d6d5e58bb0d0807b15765e549653ffdd
SHA512dc80726a13425ff0ada91f73b6e7c81ab028fdf299cbae3653832db50f8cc6665a2165851be66366022d5ee1d7b8821335368bebdaabba66f50189108a264aca
-
Filesize
663KB
MD5848bc2a4f7704f53e24763a18d7b755c
SHA14a2ad071659b645dc765323dfa5f2afee63a9758
SHA2563382a5ff05993fcaf87a7cdeb268375aa9cf14eb11639b34af175f4f8ac34526
SHA512f4e0ee28dda617b87cb5f5db2ff5d3b6d171852d792ec1bd9849ff26d8291d5d4706cfebabd6896e605a8a629f9dacf111536684a3a0a464d6ebdaed6c8a4a52
-
Filesize
663KB
MD5848bc2a4f7704f53e24763a18d7b755c
SHA14a2ad071659b645dc765323dfa5f2afee63a9758
SHA2563382a5ff05993fcaf87a7cdeb268375aa9cf14eb11639b34af175f4f8ac34526
SHA512f4e0ee28dda617b87cb5f5db2ff5d3b6d171852d792ec1bd9849ff26d8291d5d4706cfebabd6896e605a8a629f9dacf111536684a3a0a464d6ebdaed6c8a4a52
-
Filesize
333KB
MD598cb773c8d03ddc2e31ddd30afffc4d7
SHA1c2293f8373665a6b345206fddbd8cf0f21a20a96
SHA256fe64620cf5781a60996ad63be3bf148cd5a0a9872bd5bf8fe322b5bb5808dbc1
SHA512562e3e9236c8646d96866fe61ca1b95ad12d093d969196575376c53e1377244513f55e159603cb0c86e2990337c88522acd900f99ff6ad1e87dd38a5ab60438b
-
Filesize
333KB
MD598cb773c8d03ddc2e31ddd30afffc4d7
SHA1c2293f8373665a6b345206fddbd8cf0f21a20a96
SHA256fe64620cf5781a60996ad63be3bf148cd5a0a9872bd5bf8fe322b5bb5808dbc1
SHA512562e3e9236c8646d96866fe61ca1b95ad12d093d969196575376c53e1377244513f55e159603cb0c86e2990337c88522acd900f99ff6ad1e87dd38a5ab60438b
-
Filesize
328KB
MD57b1b0c4c31cfa4e3588b4a43268d1484
SHA1c7d733490e1c681a17160fcac995db7229717ae5
SHA256254909fb7040543e88719b5333fc6c48267519737f582a532300f8815ea3f233
SHA51225c8ee7241fd2ab0e1358e0012d53e84f9573a5250b7ea443235b85951745a7ea25708a614cde9ccf7e24aec887572d37df766acff63ad5c989be8347725b2f6
-
Filesize
328KB
MD57b1b0c4c31cfa4e3588b4a43268d1484
SHA1c7d733490e1c681a17160fcac995db7229717ae5
SHA256254909fb7040543e88719b5333fc6c48267519737f582a532300f8815ea3f233
SHA51225c8ee7241fd2ab0e1358e0012d53e84f9573a5250b7ea443235b85951745a7ea25708a614cde9ccf7e24aec887572d37df766acff63ad5c989be8347725b2f6
-
Filesize
12KB
MD5739a9954a33f1fdb1388474767971a4e
SHA111470742fa3234500ec21ba8f20e75e4b1d6a206
SHA2560fe3a07b20f219342da0f3a4d7cfd39debc3b6e90b6fc7c4e0c589061d8a6cb5
SHA5126f20f170c2839218114ffc8ef28336a937974070176530ab1becaf617dd82e6f74713546c2cd40fa79224bef65d8a73194c38a85a53ee783084d9b5e27d4c9c7
-
Filesize
12KB
MD5739a9954a33f1fdb1388474767971a4e
SHA111470742fa3234500ec21ba8f20e75e4b1d6a206
SHA2560fe3a07b20f219342da0f3a4d7cfd39debc3b6e90b6fc7c4e0c589061d8a6cb5
SHA5126f20f170c2839218114ffc8ef28336a937974070176530ab1becaf617dd82e6f74713546c2cd40fa79224bef65d8a73194c38a85a53ee783084d9b5e27d4c9c7
-
Filesize
275KB
MD5a6c745c28868c314f008919aa7822c04
SHA1d3f038116c6194aa55bee26e598783b2e9ed4c63
SHA256a941ea66bd46e37ed11ef43947119569c7c1e87eda758dd8920fcb2b49d28022
SHA512c4107eebdb85333209053be96aa8d17f35b285cf9f965dd4dcbc4cd0872e466b7ca27f2651a77f812b89962c9ae2d41cebafe047b952cf94b3302608310852a1
-
Filesize
275KB
MD5a6c745c28868c314f008919aa7822c04
SHA1d3f038116c6194aa55bee26e598783b2e9ed4c63
SHA256a941ea66bd46e37ed11ef43947119569c7c1e87eda758dd8920fcb2b49d28022
SHA512c4107eebdb85333209053be96aa8d17f35b285cf9f965dd4dcbc4cd0872e466b7ca27f2651a77f812b89962c9ae2d41cebafe047b952cf94b3302608310852a1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
235KB
MD5912c769fa0e6b04ce4afa80689a5629d
SHA1a2de29f768a964d7f4a4e067312b0dc2266ae136
SHA25613958a8fbf512d5fa1537286b4ebc5192d04dcbd888f80ac608d1763b6b93e44
SHA51213b39b90db0d457647b6ed45a5c5c26052f2d4934eb088461c6955e2a4e2d69bd5d7ef7f449a7580b54e30ef9fbb9b622cce5d047cb3be273c3790af06f04c91
-
Filesize
235KB
MD5912c769fa0e6b04ce4afa80689a5629d
SHA1a2de29f768a964d7f4a4e067312b0dc2266ae136
SHA25613958a8fbf512d5fa1537286b4ebc5192d04dcbd888f80ac608d1763b6b93e44
SHA51213b39b90db0d457647b6ed45a5c5c26052f2d4934eb088461c6955e2a4e2d69bd5d7ef7f449a7580b54e30ef9fbb9b622cce5d047cb3be273c3790af06f04c91
-
Filesize
235KB
MD5912c769fa0e6b04ce4afa80689a5629d
SHA1a2de29f768a964d7f4a4e067312b0dc2266ae136
SHA25613958a8fbf512d5fa1537286b4ebc5192d04dcbd888f80ac608d1763b6b93e44
SHA51213b39b90db0d457647b6ed45a5c5c26052f2d4934eb088461c6955e2a4e2d69bd5d7ef7f449a7580b54e30ef9fbb9b622cce5d047cb3be273c3790af06f04c91
-
Filesize
235KB
MD5912c769fa0e6b04ce4afa80689a5629d
SHA1a2de29f768a964d7f4a4e067312b0dc2266ae136
SHA25613958a8fbf512d5fa1537286b4ebc5192d04dcbd888f80ac608d1763b6b93e44
SHA51213b39b90db0d457647b6ed45a5c5c26052f2d4934eb088461c6955e2a4e2d69bd5d7ef7f449a7580b54e30ef9fbb9b622cce5d047cb3be273c3790af06f04c91
-
Filesize
235KB
MD5912c769fa0e6b04ce4afa80689a5629d
SHA1a2de29f768a964d7f4a4e067312b0dc2266ae136
SHA25613958a8fbf512d5fa1537286b4ebc5192d04dcbd888f80ac608d1763b6b93e44
SHA51213b39b90db0d457647b6ed45a5c5c26052f2d4934eb088461c6955e2a4e2d69bd5d7ef7f449a7580b54e30ef9fbb9b622cce5d047cb3be273c3790af06f04c91
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
Filesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0