Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2023 01:38
Static task
static1
General
-
Target
0c36a4bf9d6d03a7703c26040f65d8aa0d883b2f100cf80492824c80fdc1856f.exe
-
Size
1.1MB
-
MD5
a6f1c1b72eea5bc7f8e275aff7d34dcd
-
SHA1
b9f3187a1ce6dfd2b7d4747617cd78f867941666
-
SHA256
0c36a4bf9d6d03a7703c26040f65d8aa0d883b2f100cf80492824c80fdc1856f
-
SHA512
c994b7986096ee8cf390eb5786b6028ea5269460feb9c521513935d38401ae9f80286c45187412b9240110d27f851e6f29b1d696568b11929e27f3c81fcca34f
-
SSDEEP
24576:ZyRipbhw35QOdkYAxZALY3eCIOiJNb4HCx:Mm2BdNAxuyxo6
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Extracted
vjw0rm
http://vj5566.duckdns.org:5566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o5586462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o5586462.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o5586462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o5586462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o5586462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o5586462.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x0002000000021a95-275.dat family_wshrat behavioral1/files/0x0002000000022cb8-278.dat family_wshrat -
Blocklisted process makes network request 5 IoCs
flow pid Process 41 1584 wscript.exe 42 1584 wscript.exe 44 1232 wscript.exe 45 1232 wscript.exe 48 3316 WScript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation s1588475.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation legends.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation windows.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 16 IoCs
pid Process 4688 z8018025.exe 1216 z7073002.exe 1316 o5586462.exe 4156 p6611860.exe 2520 r7578743.exe 1268 r7578743.exe 4416 s1588475.exe 3044 s1588475.exe 4136 legends.exe 4880 legends.exe 1396 windows.exe 3312 legends.exe 3864 legends.exe 1176 legends.exe 2296 legends.exe 764 legends.exe -
Loads dropped DLL 1 IoCs
pid Process 4112 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o5586462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o5586462.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c36a4bf9d6d03a7703c26040f65d8aa0d883b2f100cf80492824c80fdc1856f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7073002.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BXBCC2V24Z = "\"C:\\Users\\Admin\\AppData\\Roaming\\windows.js\"" WScript.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0c36a4bf9d6d03a7703c26040f65d8aa0d883b2f100cf80492824c80fdc1856f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8018025.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8018025.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7073002.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2520 set thread context of 1268 2520 r7578743.exe 95 PID 4416 set thread context of 3044 4416 s1588475.exe 97 PID 4136 set thread context of 4880 4136 legends.exe 99 PID 3312 set thread context of 3864 3312 legends.exe 120 PID 1176 set thread context of 764 1176 legends.exe 124 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2136 4156 WerFault.exe 91 4832 764 WerFault.exe 124 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2476 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings wscript.exe -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 45 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 41 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 42 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 44 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1316 o5586462.exe 1316 o5586462.exe 1268 r7578743.exe 1268 r7578743.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1316 o5586462.exe Token: SeDebugPrivilege 2520 r7578743.exe Token: SeDebugPrivilege 4416 s1588475.exe Token: SeDebugPrivilege 4136 legends.exe Token: SeDebugPrivilege 1268 r7578743.exe Token: SeDebugPrivilege 3312 legends.exe Token: SeDebugPrivilege 1176 legends.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 s1588475.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 764 legends.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4688 4144 0c36a4bf9d6d03a7703c26040f65d8aa0d883b2f100cf80492824c80fdc1856f.exe 85 PID 4144 wrote to memory of 4688 4144 0c36a4bf9d6d03a7703c26040f65d8aa0d883b2f100cf80492824c80fdc1856f.exe 85 PID 4144 wrote to memory of 4688 4144 0c36a4bf9d6d03a7703c26040f65d8aa0d883b2f100cf80492824c80fdc1856f.exe 85 PID 4688 wrote to memory of 1216 4688 z8018025.exe 86 PID 4688 wrote to memory of 1216 4688 z8018025.exe 86 PID 4688 wrote to memory of 1216 4688 z8018025.exe 86 PID 1216 wrote to memory of 1316 1216 z7073002.exe 87 PID 1216 wrote to memory of 1316 1216 z7073002.exe 87 PID 1216 wrote to memory of 1316 1216 z7073002.exe 87 PID 1216 wrote to memory of 4156 1216 z7073002.exe 91 PID 1216 wrote to memory of 4156 1216 z7073002.exe 91 PID 1216 wrote to memory of 4156 1216 z7073002.exe 91 PID 4688 wrote to memory of 2520 4688 z8018025.exe 94 PID 4688 wrote to memory of 2520 4688 z8018025.exe 94 PID 4688 wrote to memory of 2520 4688 z8018025.exe 94 PID 2520 wrote to memory of 1268 2520 r7578743.exe 95 PID 2520 wrote to memory of 1268 2520 r7578743.exe 95 PID 2520 wrote to memory of 1268 2520 r7578743.exe 95 PID 2520 wrote to memory of 1268 2520 r7578743.exe 95 PID 2520 wrote to memory of 1268 2520 r7578743.exe 95 PID 2520 wrote to memory of 1268 2520 r7578743.exe 95 PID 2520 wrote to memory of 1268 2520 r7578743.exe 95 PID 2520 wrote to memory of 1268 2520 r7578743.exe 95 PID 4144 wrote to memory of 4416 4144 0c36a4bf9d6d03a7703c26040f65d8aa0d883b2f100cf80492824c80fdc1856f.exe 96 PID 4144 wrote to memory of 4416 4144 0c36a4bf9d6d03a7703c26040f65d8aa0d883b2f100cf80492824c80fdc1856f.exe 96 PID 4144 wrote to memory of 4416 4144 0c36a4bf9d6d03a7703c26040f65d8aa0d883b2f100cf80492824c80fdc1856f.exe 96 PID 4416 wrote to memory of 3044 4416 s1588475.exe 97 PID 4416 wrote to memory of 3044 4416 s1588475.exe 97 PID 4416 wrote to memory of 3044 4416 s1588475.exe 97 PID 4416 wrote to memory of 3044 4416 s1588475.exe 97 PID 4416 wrote to memory of 3044 4416 s1588475.exe 97 PID 4416 wrote to memory of 3044 4416 s1588475.exe 97 PID 4416 wrote to memory of 3044 4416 s1588475.exe 97 PID 4416 wrote to memory of 3044 4416 s1588475.exe 97 PID 4416 wrote to memory of 3044 4416 s1588475.exe 97 PID 4416 wrote to memory of 3044 4416 s1588475.exe 97 PID 3044 wrote to memory of 4136 3044 s1588475.exe 98 PID 3044 wrote to memory of 4136 3044 s1588475.exe 98 PID 3044 wrote to memory of 4136 3044 s1588475.exe 98 PID 4136 wrote to memory of 4880 4136 legends.exe 99 PID 4136 wrote to memory of 4880 4136 legends.exe 99 PID 4136 wrote to memory of 4880 4136 legends.exe 99 PID 4136 wrote to memory of 4880 4136 legends.exe 99 PID 4136 wrote to memory of 4880 4136 legends.exe 99 PID 4136 wrote to memory of 4880 4136 legends.exe 99 PID 4136 wrote to memory of 4880 4136 legends.exe 99 PID 4136 wrote to memory of 4880 4136 legends.exe 99 PID 4136 wrote to memory of 4880 4136 legends.exe 99 PID 4136 wrote to memory of 4880 4136 legends.exe 99 PID 4880 wrote to memory of 2476 4880 legends.exe 100 PID 4880 wrote to memory of 2476 4880 legends.exe 100 PID 4880 wrote to memory of 2476 4880 legends.exe 100 PID 4880 wrote to memory of 2852 4880 legends.exe 102 PID 4880 wrote to memory of 2852 4880 legends.exe 102 PID 4880 wrote to memory of 2852 4880 legends.exe 102 PID 2852 wrote to memory of 1884 2852 cmd.exe 104 PID 2852 wrote to memory of 1884 2852 cmd.exe 104 PID 2852 wrote to memory of 1884 2852 cmd.exe 104 PID 2852 wrote to memory of 1040 2852 cmd.exe 105 PID 2852 wrote to memory of 1040 2852 cmd.exe 105 PID 2852 wrote to memory of 1040 2852 cmd.exe 105 PID 2852 wrote to memory of 1520 2852 cmd.exe 106 PID 2852 wrote to memory of 1520 2852 cmd.exe 106 PID 2852 wrote to memory of 1520 2852 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c36a4bf9d6d03a7703c26040f65d8aa0d883b2f100cf80492824c80fdc1856f.exe"C:\Users\Admin\AppData\Local\Temp\0c36a4bf9d6d03a7703c26040f65d8aa0d883b2f100cf80492824c80fdc1856f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8018025.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8018025.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7073002.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7073002.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5586462.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5586462.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6611860.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6611860.exe4⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 9285⤵
- Program crash
PID:2136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7578743.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7578743.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7578743.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7578743.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1588475.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1588475.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1588475.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1588475.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F6⤵
- Creates scheduled task(s)
PID:2476
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1884
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"7⤵PID:1040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E7⤵PID:1520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"7⤵PID:1708
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E7⤵PID:2712
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000009001\windows.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\windows.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\lRDdN.vbs"7⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
PID:1584 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\lRDdN.vbs"8⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:1232 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\windows.js"9⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:3316
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4112
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4156 -ip 41561⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:2296
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 123⤵
- Program crash
PID:4832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 764 -ip 7641⤵PID:4376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
961KB
MD51e45fe18b7642563dcc89523baada137
SHA1c51842d8d96bfe6d934d470c339a9e2ddfe138c1
SHA2569f3123cd1b81bfd8414fb7a630a4ce6d1d4ea638f8c4fcedd7788e7b3670b25c
SHA5120047f1877d8ebd6cb1aaa7b338818308f1518848d12ef3627e316f03d6290983b103da4ac193095f43de629f61a17cb236b81fcd578ae29f1e33b8efc38a33d7
-
Filesize
961KB
MD51e45fe18b7642563dcc89523baada137
SHA1c51842d8d96bfe6d934d470c339a9e2ddfe138c1
SHA2569f3123cd1b81bfd8414fb7a630a4ce6d1d4ea638f8c4fcedd7788e7b3670b25c
SHA5120047f1877d8ebd6cb1aaa7b338818308f1518848d12ef3627e316f03d6290983b103da4ac193095f43de629f61a17cb236b81fcd578ae29f1e33b8efc38a33d7
-
Filesize
961KB
MD51e45fe18b7642563dcc89523baada137
SHA1c51842d8d96bfe6d934d470c339a9e2ddfe138c1
SHA2569f3123cd1b81bfd8414fb7a630a4ce6d1d4ea638f8c4fcedd7788e7b3670b25c
SHA5120047f1877d8ebd6cb1aaa7b338818308f1518848d12ef3627e316f03d6290983b103da4ac193095f43de629f61a17cb236b81fcd578ae29f1e33b8efc38a33d7
-
Filesize
961KB
MD51e45fe18b7642563dcc89523baada137
SHA1c51842d8d96bfe6d934d470c339a9e2ddfe138c1
SHA2569f3123cd1b81bfd8414fb7a630a4ce6d1d4ea638f8c4fcedd7788e7b3670b25c
SHA5120047f1877d8ebd6cb1aaa7b338818308f1518848d12ef3627e316f03d6290983b103da4ac193095f43de629f61a17cb236b81fcd578ae29f1e33b8efc38a33d7
-
Filesize
961KB
MD51e45fe18b7642563dcc89523baada137
SHA1c51842d8d96bfe6d934d470c339a9e2ddfe138c1
SHA2569f3123cd1b81bfd8414fb7a630a4ce6d1d4ea638f8c4fcedd7788e7b3670b25c
SHA5120047f1877d8ebd6cb1aaa7b338818308f1518848d12ef3627e316f03d6290983b103da4ac193095f43de629f61a17cb236b81fcd578ae29f1e33b8efc38a33d7
-
Filesize
961KB
MD51e45fe18b7642563dcc89523baada137
SHA1c51842d8d96bfe6d934d470c339a9e2ddfe138c1
SHA2569f3123cd1b81bfd8414fb7a630a4ce6d1d4ea638f8c4fcedd7788e7b3670b25c
SHA5120047f1877d8ebd6cb1aaa7b338818308f1518848d12ef3627e316f03d6290983b103da4ac193095f43de629f61a17cb236b81fcd578ae29f1e33b8efc38a33d7
-
Filesize
961KB
MD51e45fe18b7642563dcc89523baada137
SHA1c51842d8d96bfe6d934d470c339a9e2ddfe138c1
SHA2569f3123cd1b81bfd8414fb7a630a4ce6d1d4ea638f8c4fcedd7788e7b3670b25c
SHA5120047f1877d8ebd6cb1aaa7b338818308f1518848d12ef3627e316f03d6290983b103da4ac193095f43de629f61a17cb236b81fcd578ae29f1e33b8efc38a33d7
-
Filesize
961KB
MD51e45fe18b7642563dcc89523baada137
SHA1c51842d8d96bfe6d934d470c339a9e2ddfe138c1
SHA2569f3123cd1b81bfd8414fb7a630a4ce6d1d4ea638f8c4fcedd7788e7b3670b25c
SHA5120047f1877d8ebd6cb1aaa7b338818308f1518848d12ef3627e316f03d6290983b103da4ac193095f43de629f61a17cb236b81fcd578ae29f1e33b8efc38a33d7
-
Filesize
961KB
MD51e45fe18b7642563dcc89523baada137
SHA1c51842d8d96bfe6d934d470c339a9e2ddfe138c1
SHA2569f3123cd1b81bfd8414fb7a630a4ce6d1d4ea638f8c4fcedd7788e7b3670b25c
SHA5120047f1877d8ebd6cb1aaa7b338818308f1518848d12ef3627e316f03d6290983b103da4ac193095f43de629f61a17cb236b81fcd578ae29f1e33b8efc38a33d7
-
Filesize
961KB
MD51e45fe18b7642563dcc89523baada137
SHA1c51842d8d96bfe6d934d470c339a9e2ddfe138c1
SHA2569f3123cd1b81bfd8414fb7a630a4ce6d1d4ea638f8c4fcedd7788e7b3670b25c
SHA5120047f1877d8ebd6cb1aaa7b338818308f1518848d12ef3627e316f03d6290983b103da4ac193095f43de629f61a17cb236b81fcd578ae29f1e33b8efc38a33d7
-
Filesize
961KB
MD51e45fe18b7642563dcc89523baada137
SHA1c51842d8d96bfe6d934d470c339a9e2ddfe138c1
SHA2569f3123cd1b81bfd8414fb7a630a4ce6d1d4ea638f8c4fcedd7788e7b3670b25c
SHA5120047f1877d8ebd6cb1aaa7b338818308f1518848d12ef3627e316f03d6290983b103da4ac193095f43de629f61a17cb236b81fcd578ae29f1e33b8efc38a33d7
-
Filesize
961KB
MD51e45fe18b7642563dcc89523baada137
SHA1c51842d8d96bfe6d934d470c339a9e2ddfe138c1
SHA2569f3123cd1b81bfd8414fb7a630a4ce6d1d4ea638f8c4fcedd7788e7b3670b25c
SHA5120047f1877d8ebd6cb1aaa7b338818308f1518848d12ef3627e316f03d6290983b103da4ac193095f43de629f61a17cb236b81fcd578ae29f1e33b8efc38a33d7
-
Filesize
702KB
MD5d67e248ef351b320514da71a7e9812ee
SHA1f1941ed1fcc1589895c608b888204911fa4d9fa8
SHA256073f6d347f520132bbbed3cd63d4d84216c0b8363b34cd1019346195f6095e7f
SHA512dd92c4db39fd67f277a6ce726a26e06c744fb7d8e8c49b5b62f71c1d0a1455c080a432610893d6c232431ba81b7d067348cad87367853d8149fd5161e76f2aa5
-
Filesize
702KB
MD5d67e248ef351b320514da71a7e9812ee
SHA1f1941ed1fcc1589895c608b888204911fa4d9fa8
SHA256073f6d347f520132bbbed3cd63d4d84216c0b8363b34cd1019346195f6095e7f
SHA512dd92c4db39fd67f277a6ce726a26e06c744fb7d8e8c49b5b62f71c1d0a1455c080a432610893d6c232431ba81b7d067348cad87367853d8149fd5161e76f2aa5
-
Filesize
904KB
MD5006180563f1354d6a9acf1f5a0568e0d
SHA1401e1d1339223fc7a4c0f70d8642eefeefc370a4
SHA256442db1d8794c2ce0ddc6d214a1bc657f51b9688b9dc278e987ed681067fd4649
SHA512dc6f7da6dd2f50202a5a52177bdd6aabf7c2f9830b97dfc50b1abf0548e6243a9db2a04ce78400b741f17b1d526e36cce810c97191e123e2185bc6fbe921b7ef
-
Filesize
904KB
MD5006180563f1354d6a9acf1f5a0568e0d
SHA1401e1d1339223fc7a4c0f70d8642eefeefc370a4
SHA256442db1d8794c2ce0ddc6d214a1bc657f51b9688b9dc278e987ed681067fd4649
SHA512dc6f7da6dd2f50202a5a52177bdd6aabf7c2f9830b97dfc50b1abf0548e6243a9db2a04ce78400b741f17b1d526e36cce810c97191e123e2185bc6fbe921b7ef
-
Filesize
904KB
MD5006180563f1354d6a9acf1f5a0568e0d
SHA1401e1d1339223fc7a4c0f70d8642eefeefc370a4
SHA256442db1d8794c2ce0ddc6d214a1bc657f51b9688b9dc278e987ed681067fd4649
SHA512dc6f7da6dd2f50202a5a52177bdd6aabf7c2f9830b97dfc50b1abf0548e6243a9db2a04ce78400b741f17b1d526e36cce810c97191e123e2185bc6fbe921b7ef
-
Filesize
306KB
MD5895afae1bcfa183b7079166678e70ebf
SHA1e3a7259f8096cd3f8c1ef8909149793faa5dbad1
SHA256537b266e11e2fdb58fa71eadebc6d8017259569bb62fa9ae0a473cbb039b3d15
SHA5124372201085b186100517b141b1d44d55ec153989fa6cec882683b1c84e38e8a0cb2044f730d6a5565b8f4a71e736325ac3ff3dfeeb7298f1254f00fa0b909c18
-
Filesize
306KB
MD5895afae1bcfa183b7079166678e70ebf
SHA1e3a7259f8096cd3f8c1ef8909149793faa5dbad1
SHA256537b266e11e2fdb58fa71eadebc6d8017259569bb62fa9ae0a473cbb039b3d15
SHA5124372201085b186100517b141b1d44d55ec153989fa6cec882683b1c84e38e8a0cb2044f730d6a5565b8f4a71e736325ac3ff3dfeeb7298f1254f00fa0b909c18
-
Filesize
185KB
MD5be3e7145e5d75634c087694e0073e71f
SHA102e86079c4570b1eeac81754da1cb21cfc23d5a3
SHA25697972138e4d88b5309f99642cd5b700729f5818f593721b3cf1b562886a181b6
SHA512a4d7ede7f7e8687be90fd1d19a7a67c4a52164630b5005b92341661b5cbb15305b0c4553b492ad9451d3793d44805917861f29411f4b8668fc5e747b3d58efed
-
Filesize
185KB
MD5be3e7145e5d75634c087694e0073e71f
SHA102e86079c4570b1eeac81754da1cb21cfc23d5a3
SHA25697972138e4d88b5309f99642cd5b700729f5818f593721b3cf1b562886a181b6
SHA512a4d7ede7f7e8687be90fd1d19a7a67c4a52164630b5005b92341661b5cbb15305b0c4553b492ad9451d3793d44805917861f29411f4b8668fc5e747b3d58efed
-
Filesize
145KB
MD5c5c05d50c894f344c4d9291816f8ee08
SHA1465f008748a94872a659e8b5a2a0b4f29d2d8bec
SHA256ba21c7ef56aee22b1aaeb2bcdc60dcf7bba4eb7246a950d584ddaf9ed16512bb
SHA512aaca66503885d3ae4710d2003707a4816813aa9abb27d405531033868f6abc90b5ad609623b00014ed6e577ad51e20e42550c620d6059752e4bcf62842ef96f8
-
Filesize
145KB
MD5c5c05d50c894f344c4d9291816f8ee08
SHA1465f008748a94872a659e8b5a2a0b4f29d2d8bec
SHA256ba21c7ef56aee22b1aaeb2bcdc60dcf7bba4eb7246a950d584ddaf9ed16512bb
SHA512aaca66503885d3ae4710d2003707a4816813aa9abb27d405531033868f6abc90b5ad609623b00014ed6e577ad51e20e42550c620d6059752e4bcf62842ef96f8
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
185KB
MD543fca5129026c9b6b49ce26c27759df2
SHA146a4acdd5faae42e04ba753f69e6e777324ae8e9
SHA256a6772f8687d81d92138a6cfa10ead2b3c409a0884053a1600c640ae65eea517e
SHA512c465b24ebba4ce399e7e8605b8b93993e92916b653c42c470e9168a8a9573bfc42bb1dc730674e1fc7656453820fc3a19240514c1bd2b8acf32d87ffa09cf228
-
Filesize
185KB
MD543fca5129026c9b6b49ce26c27759df2
SHA146a4acdd5faae42e04ba753f69e6e777324ae8e9
SHA256a6772f8687d81d92138a6cfa10ead2b3c409a0884053a1600c640ae65eea517e
SHA512c465b24ebba4ce399e7e8605b8b93993e92916b653c42c470e9168a8a9573bfc42bb1dc730674e1fc7656453820fc3a19240514c1bd2b8acf32d87ffa09cf228
-
Filesize
3KB
MD514d1d9d3dc5e8d0eac04d5b78645a2ea
SHA1aa14b5a613919e41c4d97fef48ff1a24ff06fd2b
SHA25692d5609974d3d52dc028185e819111679f0ff052c1e3b951e2eee9b18e361f36
SHA512e13cc2ca8b4dc4564a2176e4bc06d2a3271a957918cb84589402462ea2fe33782eb92ab1575187ab07ac3e270e8301607bff6b7ccb1dd688666be940716f092c