Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2023 01:25
Static task
static1
Behavioral task
behavioral1
Sample
82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791.exe
Resource
win10v2004-20230220-en
General
-
Target
82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791.exe
-
Size
1.1MB
-
MD5
a21264085fd8e40c0a55171a6b1f1360
-
SHA1
9e4ecbd8c5af834d55d9c230d0c702f3299cf80b
-
SHA256
82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791
-
SHA512
6e9b18cf79b3ede2334d38834c37eabc41af3d78d634f4f95a82e14484edc244fc16c5249ad58c1db3d64148bea6ab99fbf544dd58649ab1224abb40b82acb6c
-
SSDEEP
24576:VyUGTkEmBQFreBOc7H5Pr5pEVC+En4FZFSEPO:wH/cQreBxlPNutQApP
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Extracted
vjw0rm
http://vj5566.duckdns.org:5566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o5989063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o5989063.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o5989063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o5989063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o5989063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o5989063.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000600000001e7f6-263.dat family_wshrat behavioral1/files/0x00030000000226f1-266.dat family_wshrat -
Blocklisted process makes network request 5 IoCs
flow pid Process 32 3600 wscript.exe 33 3600 wscript.exe 35 1736 wscript.exe 36 1736 wscript.exe 38 2868 WScript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation s9254909.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation legends.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation windows.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 16 IoCs
pid Process 1844 z7661904.exe 3912 z3190640.exe 4108 o5989063.exe 2396 p0934373.exe 1464 r8562614.exe 4856 r8562614.exe 4872 s9254909.exe 3548 s9254909.exe 2468 legends.exe 3372 legends.exe 4792 legends.exe 1116 windows.exe 4872 legends.exe 3416 legends.exe 1700 legends.exe 2920 legends.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o5989063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o5989063.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3190640.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7661904.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BXBCC2V24Z = "\"C:\\Users\\Admin\\AppData\\Roaming\\windows.js\"" WScript.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7661904.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3190640.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1464 set thread context of 4856 1464 r8562614.exe 96 PID 4872 set thread context of 3548 4872 s9254909.exe 100 PID 2468 set thread context of 4792 2468 legends.exe 103 PID 4872 set thread context of 1700 4872 legends.exe 127 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4656 2396 WerFault.exe 91 4100 4856 WerFault.exe 96 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2128 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings wscript.exe -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 36 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 32 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 33 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 35 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4108 o5989063.exe 4108 o5989063.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4108 o5989063.exe Token: SeDebugPrivilege 1464 r8562614.exe Token: SeDebugPrivilege 4872 s9254909.exe Token: SeDebugPrivilege 2468 legends.exe Token: SeDebugPrivilege 4872 legends.exe Token: SeDebugPrivilege 2920 legends.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3548 s9254909.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4856 r8562614.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3968 wrote to memory of 1844 3968 82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791.exe 85 PID 3968 wrote to memory of 1844 3968 82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791.exe 85 PID 3968 wrote to memory of 1844 3968 82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791.exe 85 PID 1844 wrote to memory of 3912 1844 z7661904.exe 86 PID 1844 wrote to memory of 3912 1844 z7661904.exe 86 PID 1844 wrote to memory of 3912 1844 z7661904.exe 86 PID 3912 wrote to memory of 4108 3912 z3190640.exe 87 PID 3912 wrote to memory of 4108 3912 z3190640.exe 87 PID 3912 wrote to memory of 4108 3912 z3190640.exe 87 PID 3912 wrote to memory of 2396 3912 z3190640.exe 91 PID 3912 wrote to memory of 2396 3912 z3190640.exe 91 PID 3912 wrote to memory of 2396 3912 z3190640.exe 91 PID 1844 wrote to memory of 1464 1844 z7661904.exe 95 PID 1844 wrote to memory of 1464 1844 z7661904.exe 95 PID 1844 wrote to memory of 1464 1844 z7661904.exe 95 PID 1464 wrote to memory of 4856 1464 r8562614.exe 96 PID 1464 wrote to memory of 4856 1464 r8562614.exe 96 PID 1464 wrote to memory of 4856 1464 r8562614.exe 96 PID 1464 wrote to memory of 4856 1464 r8562614.exe 96 PID 1464 wrote to memory of 4856 1464 r8562614.exe 96 PID 1464 wrote to memory of 4856 1464 r8562614.exe 96 PID 1464 wrote to memory of 4856 1464 r8562614.exe 96 PID 1464 wrote to memory of 4856 1464 r8562614.exe 96 PID 3968 wrote to memory of 4872 3968 82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791.exe 98 PID 3968 wrote to memory of 4872 3968 82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791.exe 98 PID 3968 wrote to memory of 4872 3968 82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791.exe 98 PID 4872 wrote to memory of 3548 4872 s9254909.exe 100 PID 4872 wrote to memory of 3548 4872 s9254909.exe 100 PID 4872 wrote to memory of 3548 4872 s9254909.exe 100 PID 4872 wrote to memory of 3548 4872 s9254909.exe 100 PID 4872 wrote to memory of 3548 4872 s9254909.exe 100 PID 4872 wrote to memory of 3548 4872 s9254909.exe 100 PID 4872 wrote to memory of 3548 4872 s9254909.exe 100 PID 4872 wrote to memory of 3548 4872 s9254909.exe 100 PID 4872 wrote to memory of 3548 4872 s9254909.exe 100 PID 4872 wrote to memory of 3548 4872 s9254909.exe 100 PID 3548 wrote to memory of 2468 3548 s9254909.exe 101 PID 3548 wrote to memory of 2468 3548 s9254909.exe 101 PID 3548 wrote to memory of 2468 3548 s9254909.exe 101 PID 2468 wrote to memory of 3372 2468 legends.exe 102 PID 2468 wrote to memory of 3372 2468 legends.exe 102 PID 2468 wrote to memory of 3372 2468 legends.exe 102 PID 2468 wrote to memory of 3372 2468 legends.exe 102 PID 2468 wrote to memory of 4792 2468 legends.exe 103 PID 2468 wrote to memory of 4792 2468 legends.exe 103 PID 2468 wrote to memory of 4792 2468 legends.exe 103 PID 2468 wrote to memory of 4792 2468 legends.exe 103 PID 2468 wrote to memory of 4792 2468 legends.exe 103 PID 2468 wrote to memory of 4792 2468 legends.exe 103 PID 2468 wrote to memory of 4792 2468 legends.exe 103 PID 2468 wrote to memory of 4792 2468 legends.exe 103 PID 2468 wrote to memory of 4792 2468 legends.exe 103 PID 2468 wrote to memory of 4792 2468 legends.exe 103 PID 4792 wrote to memory of 2128 4792 legends.exe 106 PID 4792 wrote to memory of 2128 4792 legends.exe 106 PID 4792 wrote to memory of 2128 4792 legends.exe 106 PID 4792 wrote to memory of 2516 4792 legends.exe 108 PID 4792 wrote to memory of 2516 4792 legends.exe 108 PID 4792 wrote to memory of 2516 4792 legends.exe 108 PID 2516 wrote to memory of 2800 2516 cmd.exe 110 PID 2516 wrote to memory of 2800 2516 cmd.exe 110 PID 2516 wrote to memory of 2800 2516 cmd.exe 110 PID 2516 wrote to memory of 2388 2516 cmd.exe 111 PID 2516 wrote to memory of 2388 2516 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791.exe"C:\Users\Admin\AppData\Local\Temp\82548329bb9a46a2dda0a85d5fbaf605d8712e609a14c459d185511ac1ad3791.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7661904.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7661904.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3190640.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3190640.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5989063.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o5989063.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0934373.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0934373.exe4⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 9285⤵
- Program crash
PID:4656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8562614.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8562614.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8562614.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8562614.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 125⤵
- Program crash
PID:4100
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9254909.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9254909.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9254909.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9254909.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Executes dropped EXE
PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F6⤵
- Creates scheduled task(s)
PID:2128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2800
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"7⤵PID:2388
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E7⤵PID:4368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3400
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"7⤵PID:4256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E7⤵PID:1312
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000009001\windows.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\windows.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:1116 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\lRDdN.vbs"7⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
PID:3600 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\lRDdN.vbs"8⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:1736 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\windows.js"9⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:2868
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2088
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2396 -ip 23961⤵PID:532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4856 -ip 48561⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:3416
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵PID:3144
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
961KB
MD56e5c6879480c9fafae388deb67eb7006
SHA134298d5e6d74d8fc06d0b6e41d11e077374b122c
SHA2567e78b11f520939d355b9ae7c1aa228ec93922fc62d62328187e79be89557f5f5
SHA512f6e3248c4ecc24d14be4eadbd396edfa569c489824dfd61aea2c27ec57101fc277bd84911b2a5fc2e0d880afe8d657ebf49f13fa5e81a672ab5d3405afa1b580
-
Filesize
961KB
MD56e5c6879480c9fafae388deb67eb7006
SHA134298d5e6d74d8fc06d0b6e41d11e077374b122c
SHA2567e78b11f520939d355b9ae7c1aa228ec93922fc62d62328187e79be89557f5f5
SHA512f6e3248c4ecc24d14be4eadbd396edfa569c489824dfd61aea2c27ec57101fc277bd84911b2a5fc2e0d880afe8d657ebf49f13fa5e81a672ab5d3405afa1b580
-
Filesize
961KB
MD56e5c6879480c9fafae388deb67eb7006
SHA134298d5e6d74d8fc06d0b6e41d11e077374b122c
SHA2567e78b11f520939d355b9ae7c1aa228ec93922fc62d62328187e79be89557f5f5
SHA512f6e3248c4ecc24d14be4eadbd396edfa569c489824dfd61aea2c27ec57101fc277bd84911b2a5fc2e0d880afe8d657ebf49f13fa5e81a672ab5d3405afa1b580
-
Filesize
961KB
MD56e5c6879480c9fafae388deb67eb7006
SHA134298d5e6d74d8fc06d0b6e41d11e077374b122c
SHA2567e78b11f520939d355b9ae7c1aa228ec93922fc62d62328187e79be89557f5f5
SHA512f6e3248c4ecc24d14be4eadbd396edfa569c489824dfd61aea2c27ec57101fc277bd84911b2a5fc2e0d880afe8d657ebf49f13fa5e81a672ab5d3405afa1b580
-
Filesize
961KB
MD56e5c6879480c9fafae388deb67eb7006
SHA134298d5e6d74d8fc06d0b6e41d11e077374b122c
SHA2567e78b11f520939d355b9ae7c1aa228ec93922fc62d62328187e79be89557f5f5
SHA512f6e3248c4ecc24d14be4eadbd396edfa569c489824dfd61aea2c27ec57101fc277bd84911b2a5fc2e0d880afe8d657ebf49f13fa5e81a672ab5d3405afa1b580
-
Filesize
961KB
MD56e5c6879480c9fafae388deb67eb7006
SHA134298d5e6d74d8fc06d0b6e41d11e077374b122c
SHA2567e78b11f520939d355b9ae7c1aa228ec93922fc62d62328187e79be89557f5f5
SHA512f6e3248c4ecc24d14be4eadbd396edfa569c489824dfd61aea2c27ec57101fc277bd84911b2a5fc2e0d880afe8d657ebf49f13fa5e81a672ab5d3405afa1b580
-
Filesize
961KB
MD56e5c6879480c9fafae388deb67eb7006
SHA134298d5e6d74d8fc06d0b6e41d11e077374b122c
SHA2567e78b11f520939d355b9ae7c1aa228ec93922fc62d62328187e79be89557f5f5
SHA512f6e3248c4ecc24d14be4eadbd396edfa569c489824dfd61aea2c27ec57101fc277bd84911b2a5fc2e0d880afe8d657ebf49f13fa5e81a672ab5d3405afa1b580
-
Filesize
961KB
MD56e5c6879480c9fafae388deb67eb7006
SHA134298d5e6d74d8fc06d0b6e41d11e077374b122c
SHA2567e78b11f520939d355b9ae7c1aa228ec93922fc62d62328187e79be89557f5f5
SHA512f6e3248c4ecc24d14be4eadbd396edfa569c489824dfd61aea2c27ec57101fc277bd84911b2a5fc2e0d880afe8d657ebf49f13fa5e81a672ab5d3405afa1b580
-
Filesize
961KB
MD56e5c6879480c9fafae388deb67eb7006
SHA134298d5e6d74d8fc06d0b6e41d11e077374b122c
SHA2567e78b11f520939d355b9ae7c1aa228ec93922fc62d62328187e79be89557f5f5
SHA512f6e3248c4ecc24d14be4eadbd396edfa569c489824dfd61aea2c27ec57101fc277bd84911b2a5fc2e0d880afe8d657ebf49f13fa5e81a672ab5d3405afa1b580
-
Filesize
961KB
MD56e5c6879480c9fafae388deb67eb7006
SHA134298d5e6d74d8fc06d0b6e41d11e077374b122c
SHA2567e78b11f520939d355b9ae7c1aa228ec93922fc62d62328187e79be89557f5f5
SHA512f6e3248c4ecc24d14be4eadbd396edfa569c489824dfd61aea2c27ec57101fc277bd84911b2a5fc2e0d880afe8d657ebf49f13fa5e81a672ab5d3405afa1b580
-
Filesize
961KB
MD56e5c6879480c9fafae388deb67eb7006
SHA134298d5e6d74d8fc06d0b6e41d11e077374b122c
SHA2567e78b11f520939d355b9ae7c1aa228ec93922fc62d62328187e79be89557f5f5
SHA512f6e3248c4ecc24d14be4eadbd396edfa569c489824dfd61aea2c27ec57101fc277bd84911b2a5fc2e0d880afe8d657ebf49f13fa5e81a672ab5d3405afa1b580
-
Filesize
961KB
MD56e5c6879480c9fafae388deb67eb7006
SHA134298d5e6d74d8fc06d0b6e41d11e077374b122c
SHA2567e78b11f520939d355b9ae7c1aa228ec93922fc62d62328187e79be89557f5f5
SHA512f6e3248c4ecc24d14be4eadbd396edfa569c489824dfd61aea2c27ec57101fc277bd84911b2a5fc2e0d880afe8d657ebf49f13fa5e81a672ab5d3405afa1b580
-
Filesize
702KB
MD5dfea47085042fa850044da295a8c3745
SHA1f4630a713ce66dc1fbc23c24fa7910b59a2fe696
SHA256ef390a2788321033f57e6036501d375a04fca15387509f170d87b3b0897cd7b2
SHA51289f72d4646464a54121c97bdfdf2b0d13d63c700fe5c82dfcaf26231788e717e553f7c6aa98b0589a799203f7ea1f308bc0e66ae3bf019e341949e6e2fade0ad
-
Filesize
702KB
MD5dfea47085042fa850044da295a8c3745
SHA1f4630a713ce66dc1fbc23c24fa7910b59a2fe696
SHA256ef390a2788321033f57e6036501d375a04fca15387509f170d87b3b0897cd7b2
SHA51289f72d4646464a54121c97bdfdf2b0d13d63c700fe5c82dfcaf26231788e717e553f7c6aa98b0589a799203f7ea1f308bc0e66ae3bf019e341949e6e2fade0ad
-
Filesize
904KB
MD5bc5b298673af042653ef74d5b461cff9
SHA1276266b2e268e012c66b785e76bb20d81332840a
SHA256104351a0d48bae4a54c4a3ae5fecc1498a7abe2db2f75a08561bd897481e2167
SHA512b9e60f19b9675f87bf9655a2b2d054c92b613a5813737020dc261981612933c469fda0a7ad5184d22d0e1bfbde1dfdc645fd5ba8369dc4eb794c1ec197b20728
-
Filesize
904KB
MD5bc5b298673af042653ef74d5b461cff9
SHA1276266b2e268e012c66b785e76bb20d81332840a
SHA256104351a0d48bae4a54c4a3ae5fecc1498a7abe2db2f75a08561bd897481e2167
SHA512b9e60f19b9675f87bf9655a2b2d054c92b613a5813737020dc261981612933c469fda0a7ad5184d22d0e1bfbde1dfdc645fd5ba8369dc4eb794c1ec197b20728
-
Filesize
904KB
MD5bc5b298673af042653ef74d5b461cff9
SHA1276266b2e268e012c66b785e76bb20d81332840a
SHA256104351a0d48bae4a54c4a3ae5fecc1498a7abe2db2f75a08561bd897481e2167
SHA512b9e60f19b9675f87bf9655a2b2d054c92b613a5813737020dc261981612933c469fda0a7ad5184d22d0e1bfbde1dfdc645fd5ba8369dc4eb794c1ec197b20728
-
Filesize
306KB
MD5c726db1763aa807bc55f0ae890b98cef
SHA1328fa64c122aa9b8871e83633b72e7e739d0a47a
SHA256a6ea4a17d5d43386ea798c4cdb7c68e3985cb7c6701e97c60ff6910d35d1078e
SHA51254e12ccfdfe96c2491e6c04637827650b8978cecd93e6a567a74a09f0e448bee1044b6f351d5b8473257041ff9de5e9b8026697d17245e0c22487d8207736bdf
-
Filesize
306KB
MD5c726db1763aa807bc55f0ae890b98cef
SHA1328fa64c122aa9b8871e83633b72e7e739d0a47a
SHA256a6ea4a17d5d43386ea798c4cdb7c68e3985cb7c6701e97c60ff6910d35d1078e
SHA51254e12ccfdfe96c2491e6c04637827650b8978cecd93e6a567a74a09f0e448bee1044b6f351d5b8473257041ff9de5e9b8026697d17245e0c22487d8207736bdf
-
Filesize
185KB
MD5c0ddcdf784609e62ffe60e32380a8f9c
SHA1328983db4d5e615302f6c6c8d6a6007b6dbe866a
SHA25621deda5d1a9099ee6c24463244f21dd27f347cd3cb946da3b7fbbac68935eadd
SHA5129fac9dce57c7f233e9d7f4e86b9d6b5a568c5864456c0da461b563a58dfddf1065cced6c7191d87edd30a59275852ca0fa04ac192f97a8fd3a5501d149df9b26
-
Filesize
185KB
MD5c0ddcdf784609e62ffe60e32380a8f9c
SHA1328983db4d5e615302f6c6c8d6a6007b6dbe866a
SHA25621deda5d1a9099ee6c24463244f21dd27f347cd3cb946da3b7fbbac68935eadd
SHA5129fac9dce57c7f233e9d7f4e86b9d6b5a568c5864456c0da461b563a58dfddf1065cced6c7191d87edd30a59275852ca0fa04ac192f97a8fd3a5501d149df9b26
-
Filesize
145KB
MD5d2c70eb5e7e1e075ca96d07997a4c7bb
SHA1550f9174bb33f2a5e2a6cbf15e139f85cfc855af
SHA256c2bfb0e1de0a34e3930fec211d63d51a9618a36471c8cb2b0fbd203119e152d4
SHA512fdb90e8da8e53da1eebfeecb8d3f68d72601bbc18cfc54eb56ce22246b1d9969c4912b08b1bf9204c8a4c8e889ed0a34195e8f438ebc06b334aeba14f80e0249
-
Filesize
145KB
MD5d2c70eb5e7e1e075ca96d07997a4c7bb
SHA1550f9174bb33f2a5e2a6cbf15e139f85cfc855af
SHA256c2bfb0e1de0a34e3930fec211d63d51a9618a36471c8cb2b0fbd203119e152d4
SHA512fdb90e8da8e53da1eebfeecb8d3f68d72601bbc18cfc54eb56ce22246b1d9969c4912b08b1bf9204c8a4c8e889ed0a34195e8f438ebc06b334aeba14f80e0249
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
185KB
MD543fca5129026c9b6b49ce26c27759df2
SHA146a4acdd5faae42e04ba753f69e6e777324ae8e9
SHA256a6772f8687d81d92138a6cfa10ead2b3c409a0884053a1600c640ae65eea517e
SHA512c465b24ebba4ce399e7e8605b8b93993e92916b653c42c470e9168a8a9573bfc42bb1dc730674e1fc7656453820fc3a19240514c1bd2b8acf32d87ffa09cf228
-
Filesize
185KB
MD543fca5129026c9b6b49ce26c27759df2
SHA146a4acdd5faae42e04ba753f69e6e777324ae8e9
SHA256a6772f8687d81d92138a6cfa10ead2b3c409a0884053a1600c640ae65eea517e
SHA512c465b24ebba4ce399e7e8605b8b93993e92916b653c42c470e9168a8a9573bfc42bb1dc730674e1fc7656453820fc3a19240514c1bd2b8acf32d87ffa09cf228
-
Filesize
3KB
MD514d1d9d3dc5e8d0eac04d5b78645a2ea
SHA1aa14b5a613919e41c4d97fef48ff1a24ff06fd2b
SHA25692d5609974d3d52dc028185e819111679f0ff052c1e3b951e2eee9b18e361f36
SHA512e13cc2ca8b4dc4564a2176e4bc06d2a3271a957918cb84589402462ea2fe33782eb92ab1575187ab07ac3e270e8301607bff6b7ccb1dd688666be940716f092c