Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2023, 01:15
Static task
static1
General
-
Target
623955cd6372716d695a5f9957f84875085e5c5d011abfeb65d36b756fea3a13.exe
-
Size
1.1MB
-
MD5
2c9c1dcd97fe8377f9bb841f9de3d324
-
SHA1
72f0ace05ad54c2d1b2a4ed351eeebef84192551
-
SHA256
623955cd6372716d695a5f9957f84875085e5c5d011abfeb65d36b756fea3a13
-
SHA512
ed22905cac4bde9521fa889e6d31d15e548d298e2a7c9f4c66ea37d7211e1a9b8d12540acf4b40ab81c2af31ef2fb959d04769f5bd769b855099ebd2d3911f83
-
SSDEEP
24576:EyLd/MAvYWbQ0iwwQHxqkSPCzcqEwWaqp6wchRQtgEoKx68K:TLdZfXSPa+5p6wchCCr
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Extracted
vjw0rm
http://vj5566.duckdns.org:5566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o4587438.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o4587438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o4587438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o4587438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o4587438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o4587438.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x0006000000023137-274.dat family_wshrat behavioral1/files/0x000600000002313b-277.dat family_wshrat -
Blocklisted process makes network request 5 IoCs
flow pid Process 27 4368 wscript.exe 28 4368 wscript.exe 30 5072 wscript.exe 31 5072 wscript.exe 33 1256 WScript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation legends.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation windows.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation s0548241.exe -
Executes dropped EXE 16 IoCs
pid Process 2108 z5302561.exe 3820 z7011905.exe 1056 o4587438.exe 4588 p5087070.exe 1588 r1662265.exe 4712 r1662265.exe 2660 s0548241.exe 4208 s0548241.exe 4852 legends.exe 3536 legends.exe 1304 windows.exe 3096 legends.exe 1280 legends.exe 2428 legends.exe 744 legends.exe 984 legends.exe -
Loads dropped DLL 1 IoCs
pid Process 4144 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o4587438.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o4587438.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 623955cd6372716d695a5f9957f84875085e5c5d011abfeb65d36b756fea3a13.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7011905.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7011905.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BXBCC2V24Z = "\"C:\\Users\\Admin\\AppData\\Roaming\\windows.js\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5302561.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 623955cd6372716d695a5f9957f84875085e5c5d011abfeb65d36b756fea3a13.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5302561.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1588 set thread context of 4712 1588 r1662265.exe 93 PID 2660 set thread context of 4208 2660 s0548241.exe 95 PID 4852 set thread context of 3536 4852 legends.exe 97 PID 3096 set thread context of 2428 3096 legends.exe 119 PID 744 set thread context of 984 744 legends.exe 122 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5056 4588 WerFault.exe 89 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 408 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings wscript.exe -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 27 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 28 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 30 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 31 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1056 o4587438.exe 1056 o4587438.exe 4712 r1662265.exe 4712 r1662265.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1056 o4587438.exe Token: SeDebugPrivilege 1588 r1662265.exe Token: SeDebugPrivilege 2660 s0548241.exe Token: SeDebugPrivilege 4852 legends.exe Token: SeDebugPrivilege 4712 r1662265.exe Token: SeDebugPrivilege 3096 legends.exe Token: SeDebugPrivilege 744 legends.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4208 s0548241.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 2108 5088 623955cd6372716d695a5f9957f84875085e5c5d011abfeb65d36b756fea3a13.exe 83 PID 5088 wrote to memory of 2108 5088 623955cd6372716d695a5f9957f84875085e5c5d011abfeb65d36b756fea3a13.exe 83 PID 5088 wrote to memory of 2108 5088 623955cd6372716d695a5f9957f84875085e5c5d011abfeb65d36b756fea3a13.exe 83 PID 2108 wrote to memory of 3820 2108 z5302561.exe 84 PID 2108 wrote to memory of 3820 2108 z5302561.exe 84 PID 2108 wrote to memory of 3820 2108 z5302561.exe 84 PID 3820 wrote to memory of 1056 3820 z7011905.exe 85 PID 3820 wrote to memory of 1056 3820 z7011905.exe 85 PID 3820 wrote to memory of 1056 3820 z7011905.exe 85 PID 3820 wrote to memory of 4588 3820 z7011905.exe 89 PID 3820 wrote to memory of 4588 3820 z7011905.exe 89 PID 3820 wrote to memory of 4588 3820 z7011905.exe 89 PID 2108 wrote to memory of 1588 2108 z5302561.exe 92 PID 2108 wrote to memory of 1588 2108 z5302561.exe 92 PID 2108 wrote to memory of 1588 2108 z5302561.exe 92 PID 1588 wrote to memory of 4712 1588 r1662265.exe 93 PID 1588 wrote to memory of 4712 1588 r1662265.exe 93 PID 1588 wrote to memory of 4712 1588 r1662265.exe 93 PID 1588 wrote to memory of 4712 1588 r1662265.exe 93 PID 1588 wrote to memory of 4712 1588 r1662265.exe 93 PID 1588 wrote to memory of 4712 1588 r1662265.exe 93 PID 1588 wrote to memory of 4712 1588 r1662265.exe 93 PID 1588 wrote to memory of 4712 1588 r1662265.exe 93 PID 5088 wrote to memory of 2660 5088 623955cd6372716d695a5f9957f84875085e5c5d011abfeb65d36b756fea3a13.exe 94 PID 5088 wrote to memory of 2660 5088 623955cd6372716d695a5f9957f84875085e5c5d011abfeb65d36b756fea3a13.exe 94 PID 5088 wrote to memory of 2660 5088 623955cd6372716d695a5f9957f84875085e5c5d011abfeb65d36b756fea3a13.exe 94 PID 2660 wrote to memory of 4208 2660 s0548241.exe 95 PID 2660 wrote to memory of 4208 2660 s0548241.exe 95 PID 2660 wrote to memory of 4208 2660 s0548241.exe 95 PID 2660 wrote to memory of 4208 2660 s0548241.exe 95 PID 2660 wrote to memory of 4208 2660 s0548241.exe 95 PID 2660 wrote to memory of 4208 2660 s0548241.exe 95 PID 2660 wrote to memory of 4208 2660 s0548241.exe 95 PID 2660 wrote to memory of 4208 2660 s0548241.exe 95 PID 2660 wrote to memory of 4208 2660 s0548241.exe 95 PID 2660 wrote to memory of 4208 2660 s0548241.exe 95 PID 4208 wrote to memory of 4852 4208 s0548241.exe 96 PID 4208 wrote to memory of 4852 4208 s0548241.exe 96 PID 4208 wrote to memory of 4852 4208 s0548241.exe 96 PID 4852 wrote to memory of 3536 4852 legends.exe 97 PID 4852 wrote to memory of 3536 4852 legends.exe 97 PID 4852 wrote to memory of 3536 4852 legends.exe 97 PID 4852 wrote to memory of 3536 4852 legends.exe 97 PID 4852 wrote to memory of 3536 4852 legends.exe 97 PID 4852 wrote to memory of 3536 4852 legends.exe 97 PID 4852 wrote to memory of 3536 4852 legends.exe 97 PID 4852 wrote to memory of 3536 4852 legends.exe 97 PID 4852 wrote to memory of 3536 4852 legends.exe 97 PID 4852 wrote to memory of 3536 4852 legends.exe 97 PID 3536 wrote to memory of 408 3536 legends.exe 98 PID 3536 wrote to memory of 408 3536 legends.exe 98 PID 3536 wrote to memory of 408 3536 legends.exe 98 PID 3536 wrote to memory of 2412 3536 legends.exe 100 PID 3536 wrote to memory of 2412 3536 legends.exe 100 PID 3536 wrote to memory of 2412 3536 legends.exe 100 PID 2412 wrote to memory of 2272 2412 cmd.exe 102 PID 2412 wrote to memory of 2272 2412 cmd.exe 102 PID 2412 wrote to memory of 2272 2412 cmd.exe 102 PID 2412 wrote to memory of 1468 2412 cmd.exe 103 PID 2412 wrote to memory of 1468 2412 cmd.exe 103 PID 2412 wrote to memory of 1468 2412 cmd.exe 103 PID 2412 wrote to memory of 544 2412 cmd.exe 104 PID 2412 wrote to memory of 544 2412 cmd.exe 104 PID 2412 wrote to memory of 544 2412 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\623955cd6372716d695a5f9957f84875085e5c5d011abfeb65d36b756fea3a13.exe"C:\Users\Admin\AppData\Local\Temp\623955cd6372716d695a5f9957f84875085e5c5d011abfeb65d36b756fea3a13.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5302561.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5302561.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7011905.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7011905.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4587438.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4587438.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5087070.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5087070.exe4⤵
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 9285⤵
- Program crash
PID:5056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1662265.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1662265.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1662265.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1662265.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0548241.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0548241.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0548241.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0548241.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F6⤵
- Creates scheduled task(s)
PID:408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2272
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"7⤵PID:1468
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E7⤵PID:544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"7⤵PID:5020
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E7⤵PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000009001\windows.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\windows.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\lRDdN.vbs"7⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
PID:4368 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\lRDdN.vbs"8⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:5072 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\windows.js"9⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:1256
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4144
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4588 -ip 45881⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:744 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
961KB
MD5e62550cb5b903d8365c9804ff98c95f2
SHA194180bcf14840b1b420367b6f402fd5590f779b2
SHA2562cf153ff62aaef9b1a7e9abe2380755945f4f919a91ee6d3200999e728b72b4a
SHA512d274dc143275372b58d2c29e48ccd11afcb510ac4b5809aa4831244c2865408e761decf36308faaada5527b2161086ceb2626ad43905c46a40dd0638c39edb9c
-
Filesize
961KB
MD5e62550cb5b903d8365c9804ff98c95f2
SHA194180bcf14840b1b420367b6f402fd5590f779b2
SHA2562cf153ff62aaef9b1a7e9abe2380755945f4f919a91ee6d3200999e728b72b4a
SHA512d274dc143275372b58d2c29e48ccd11afcb510ac4b5809aa4831244c2865408e761decf36308faaada5527b2161086ceb2626ad43905c46a40dd0638c39edb9c
-
Filesize
961KB
MD5e62550cb5b903d8365c9804ff98c95f2
SHA194180bcf14840b1b420367b6f402fd5590f779b2
SHA2562cf153ff62aaef9b1a7e9abe2380755945f4f919a91ee6d3200999e728b72b4a
SHA512d274dc143275372b58d2c29e48ccd11afcb510ac4b5809aa4831244c2865408e761decf36308faaada5527b2161086ceb2626ad43905c46a40dd0638c39edb9c
-
Filesize
961KB
MD5e62550cb5b903d8365c9804ff98c95f2
SHA194180bcf14840b1b420367b6f402fd5590f779b2
SHA2562cf153ff62aaef9b1a7e9abe2380755945f4f919a91ee6d3200999e728b72b4a
SHA512d274dc143275372b58d2c29e48ccd11afcb510ac4b5809aa4831244c2865408e761decf36308faaada5527b2161086ceb2626ad43905c46a40dd0638c39edb9c
-
Filesize
961KB
MD5e62550cb5b903d8365c9804ff98c95f2
SHA194180bcf14840b1b420367b6f402fd5590f779b2
SHA2562cf153ff62aaef9b1a7e9abe2380755945f4f919a91ee6d3200999e728b72b4a
SHA512d274dc143275372b58d2c29e48ccd11afcb510ac4b5809aa4831244c2865408e761decf36308faaada5527b2161086ceb2626ad43905c46a40dd0638c39edb9c
-
Filesize
961KB
MD5e62550cb5b903d8365c9804ff98c95f2
SHA194180bcf14840b1b420367b6f402fd5590f779b2
SHA2562cf153ff62aaef9b1a7e9abe2380755945f4f919a91ee6d3200999e728b72b4a
SHA512d274dc143275372b58d2c29e48ccd11afcb510ac4b5809aa4831244c2865408e761decf36308faaada5527b2161086ceb2626ad43905c46a40dd0638c39edb9c
-
Filesize
961KB
MD5e62550cb5b903d8365c9804ff98c95f2
SHA194180bcf14840b1b420367b6f402fd5590f779b2
SHA2562cf153ff62aaef9b1a7e9abe2380755945f4f919a91ee6d3200999e728b72b4a
SHA512d274dc143275372b58d2c29e48ccd11afcb510ac4b5809aa4831244c2865408e761decf36308faaada5527b2161086ceb2626ad43905c46a40dd0638c39edb9c
-
Filesize
961KB
MD5e62550cb5b903d8365c9804ff98c95f2
SHA194180bcf14840b1b420367b6f402fd5590f779b2
SHA2562cf153ff62aaef9b1a7e9abe2380755945f4f919a91ee6d3200999e728b72b4a
SHA512d274dc143275372b58d2c29e48ccd11afcb510ac4b5809aa4831244c2865408e761decf36308faaada5527b2161086ceb2626ad43905c46a40dd0638c39edb9c
-
Filesize
961KB
MD5e62550cb5b903d8365c9804ff98c95f2
SHA194180bcf14840b1b420367b6f402fd5590f779b2
SHA2562cf153ff62aaef9b1a7e9abe2380755945f4f919a91ee6d3200999e728b72b4a
SHA512d274dc143275372b58d2c29e48ccd11afcb510ac4b5809aa4831244c2865408e761decf36308faaada5527b2161086ceb2626ad43905c46a40dd0638c39edb9c
-
Filesize
961KB
MD5e62550cb5b903d8365c9804ff98c95f2
SHA194180bcf14840b1b420367b6f402fd5590f779b2
SHA2562cf153ff62aaef9b1a7e9abe2380755945f4f919a91ee6d3200999e728b72b4a
SHA512d274dc143275372b58d2c29e48ccd11afcb510ac4b5809aa4831244c2865408e761decf36308faaada5527b2161086ceb2626ad43905c46a40dd0638c39edb9c
-
Filesize
961KB
MD5e62550cb5b903d8365c9804ff98c95f2
SHA194180bcf14840b1b420367b6f402fd5590f779b2
SHA2562cf153ff62aaef9b1a7e9abe2380755945f4f919a91ee6d3200999e728b72b4a
SHA512d274dc143275372b58d2c29e48ccd11afcb510ac4b5809aa4831244c2865408e761decf36308faaada5527b2161086ceb2626ad43905c46a40dd0638c39edb9c
-
Filesize
961KB
MD5e62550cb5b903d8365c9804ff98c95f2
SHA194180bcf14840b1b420367b6f402fd5590f779b2
SHA2562cf153ff62aaef9b1a7e9abe2380755945f4f919a91ee6d3200999e728b72b4a
SHA512d274dc143275372b58d2c29e48ccd11afcb510ac4b5809aa4831244c2865408e761decf36308faaada5527b2161086ceb2626ad43905c46a40dd0638c39edb9c
-
Filesize
702KB
MD5500a155aa80beaa3b3a46db971c4d1f5
SHA1499088e00e9cdb01d89b9e1d45590b6f82162c3e
SHA256a72d78795a7d5c271ccb80924fc20c0cfdec156247dab5701e6d24c202b97c80
SHA512e2104cff4bed1c79126a87a54871b3ed07289bd98b1e3c967dd7b5b73f98de180d890047049cfdc038ef2ce2e05047cd1cce9f265a4610918e3e6054358b767b
-
Filesize
702KB
MD5500a155aa80beaa3b3a46db971c4d1f5
SHA1499088e00e9cdb01d89b9e1d45590b6f82162c3e
SHA256a72d78795a7d5c271ccb80924fc20c0cfdec156247dab5701e6d24c202b97c80
SHA512e2104cff4bed1c79126a87a54871b3ed07289bd98b1e3c967dd7b5b73f98de180d890047049cfdc038ef2ce2e05047cd1cce9f265a4610918e3e6054358b767b
-
Filesize
904KB
MD53f12b146ecf1f84bbe6b12dc61d27200
SHA19e415077c54f78cfe9383a9162681aea0bb077c0
SHA256c771edb638331db55344bedeed91f3936c9d45dcae9c8f49dae5c56d06b99a90
SHA5120bc3a96ecc803923d8ae402860fd69dd4286c9013d1201e4b7268ccd0a1a36b5996410f415224027ab8deea36d8ba413034e52cb89b8c25ecffa36b7f46bbeb9
-
Filesize
904KB
MD53f12b146ecf1f84bbe6b12dc61d27200
SHA19e415077c54f78cfe9383a9162681aea0bb077c0
SHA256c771edb638331db55344bedeed91f3936c9d45dcae9c8f49dae5c56d06b99a90
SHA5120bc3a96ecc803923d8ae402860fd69dd4286c9013d1201e4b7268ccd0a1a36b5996410f415224027ab8deea36d8ba413034e52cb89b8c25ecffa36b7f46bbeb9
-
Filesize
904KB
MD53f12b146ecf1f84bbe6b12dc61d27200
SHA19e415077c54f78cfe9383a9162681aea0bb077c0
SHA256c771edb638331db55344bedeed91f3936c9d45dcae9c8f49dae5c56d06b99a90
SHA5120bc3a96ecc803923d8ae402860fd69dd4286c9013d1201e4b7268ccd0a1a36b5996410f415224027ab8deea36d8ba413034e52cb89b8c25ecffa36b7f46bbeb9
-
Filesize
306KB
MD539f941b04d00bf5c0afde01f5281cc7d
SHA1993601e8b801d5de1ccf7302769b5fa19c2f73ee
SHA256d135efa2ee8502003a27176c244c09cb5aec4beb7e47faad3bc6266f9f322792
SHA51243d241171d0c6ebe0847adc9180884736f4b789a62f5ea2bb821c5abfca04042e6b3f67b09bb5b6dafe27c16a095ecc34a5a4070d94a21d975c26edb7e79526f
-
Filesize
306KB
MD539f941b04d00bf5c0afde01f5281cc7d
SHA1993601e8b801d5de1ccf7302769b5fa19c2f73ee
SHA256d135efa2ee8502003a27176c244c09cb5aec4beb7e47faad3bc6266f9f322792
SHA51243d241171d0c6ebe0847adc9180884736f4b789a62f5ea2bb821c5abfca04042e6b3f67b09bb5b6dafe27c16a095ecc34a5a4070d94a21d975c26edb7e79526f
-
Filesize
185KB
MD564ca871c20d6a60b73cd8edc830cfec4
SHA18f4eb9360d10c36d99b2dfae8d18f3aabe52bbfd
SHA256aeab8b138fce2af5d663d0dc72e1f845ee0939150f3de4dfbbe8f0f14603cade
SHA512809e90c419583f1f0317ad7b8d6aa087b7460c17b96a82120703732567b9e748e6bff9f553bee5ec7725a531b5598e51d5503955741b9eec215141eb423e4cdf
-
Filesize
185KB
MD564ca871c20d6a60b73cd8edc830cfec4
SHA18f4eb9360d10c36d99b2dfae8d18f3aabe52bbfd
SHA256aeab8b138fce2af5d663d0dc72e1f845ee0939150f3de4dfbbe8f0f14603cade
SHA512809e90c419583f1f0317ad7b8d6aa087b7460c17b96a82120703732567b9e748e6bff9f553bee5ec7725a531b5598e51d5503955741b9eec215141eb423e4cdf
-
Filesize
145KB
MD557eb75fac240729fb4fef487b8dae9d5
SHA127868659a05ba0e899d9d583593f2e74a4c29ba3
SHA2562847d16d0794de9b0218fdfb97a09e9eba3bc7c1da7263a43291d398973da72a
SHA5122f300a6ce058af154193943ca59926de5c50daa92deda7912a5abd6ff8d98e23d5f136303eb8f210efae5e93dd62cef5e34b2da465ddcf5174f55978f1e7118a
-
Filesize
145KB
MD557eb75fac240729fb4fef487b8dae9d5
SHA127868659a05ba0e899d9d583593f2e74a4c29ba3
SHA2562847d16d0794de9b0218fdfb97a09e9eba3bc7c1da7263a43291d398973da72a
SHA5122f300a6ce058af154193943ca59926de5c50daa92deda7912a5abd6ff8d98e23d5f136303eb8f210efae5e93dd62cef5e34b2da465ddcf5174f55978f1e7118a
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
185KB
MD543fca5129026c9b6b49ce26c27759df2
SHA146a4acdd5faae42e04ba753f69e6e777324ae8e9
SHA256a6772f8687d81d92138a6cfa10ead2b3c409a0884053a1600c640ae65eea517e
SHA512c465b24ebba4ce399e7e8605b8b93993e92916b653c42c470e9168a8a9573bfc42bb1dc730674e1fc7656453820fc3a19240514c1bd2b8acf32d87ffa09cf228
-
Filesize
185KB
MD543fca5129026c9b6b49ce26c27759df2
SHA146a4acdd5faae42e04ba753f69e6e777324ae8e9
SHA256a6772f8687d81d92138a6cfa10ead2b3c409a0884053a1600c640ae65eea517e
SHA512c465b24ebba4ce399e7e8605b8b93993e92916b653c42c470e9168a8a9573bfc42bb1dc730674e1fc7656453820fc3a19240514c1bd2b8acf32d87ffa09cf228
-
Filesize
3KB
MD514d1d9d3dc5e8d0eac04d5b78645a2ea
SHA1aa14b5a613919e41c4d97fef48ff1a24ff06fd2b
SHA25692d5609974d3d52dc028185e819111679f0ff052c1e3b951e2eee9b18e361f36
SHA512e13cc2ca8b4dc4564a2176e4bc06d2a3271a957918cb84589402462ea2fe33782eb92ab1575187ab07ac3e270e8301607bff6b7ccb1dd688666be940716f092c