Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2023, 01:28
Static task
static1
General
-
Target
e3e82c868b618e76a560f315097bf6fe9ba10c909abb1b51aad942a16a9c525b.exe
-
Size
1.1MB
-
MD5
2d660c8235be4c5446ddef429dd78eb9
-
SHA1
09a6c33d6f0da7d93c1b1ac7338d42d9e08a8ee6
-
SHA256
e3e82c868b618e76a560f315097bf6fe9ba10c909abb1b51aad942a16a9c525b
-
SHA512
2e26fe5d99d0770934878aed97f895bc1d002daa29a8d382d96d3fa52a1a5cf6c9abf8f87a209e8c9ab429b9a4829131daf2ab0400e0027ca4b838a03ae87a7a
-
SSDEEP
24576:Xy0JeiVujZUl8aGEoLjkHN7RraAyHQcoS85Zmu4dhDLPY:idiVoUbGBfkHNlradHT/850h
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Extracted
vjw0rm
http://vj5566.duckdns.org:5566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o1472584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o1472584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o1472584.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o1472584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o1472584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o1472584.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000200000001e6f7-273.dat family_wshrat behavioral1/files/0x000200000001e6fb-277.dat family_wshrat -
Blocklisted process makes network request 5 IoCs
flow pid Process 59 3332 wscript.exe 60 3332 wscript.exe 61 4896 wscript.exe 64 4896 wscript.exe 66 1224 WScript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation legends.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation windows.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation s7447220.exe -
Executes dropped EXE 15 IoCs
pid Process 4000 z7824152.exe 1236 z8916198.exe 1352 o1472584.exe 2532 p0096795.exe 3176 r7350647.exe 3308 r7350647.exe 2092 s7447220.exe 3756 s7447220.exe 4240 legends.exe 5056 legends.exe 3220 windows.exe 1204 legends.exe 1596 legends.exe 3696 legends.exe 4620 legends.exe -
Loads dropped DLL 1 IoCs
pid Process 2144 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o1472584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o1472584.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e3e82c868b618e76a560f315097bf6fe9ba10c909abb1b51aad942a16a9c525b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8916198.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BXBCC2V24Z = "\"C:\\Users\\Admin\\AppData\\Roaming\\windows.js\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e3e82c868b618e76a560f315097bf6fe9ba10c909abb1b51aad942a16a9c525b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8916198.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7824152.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7824152.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\software\microsoft\windows\currentversion\run wscript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3176 set thread context of 3308 3176 r7350647.exe 97 PID 2092 set thread context of 3756 2092 s7447220.exe 100 PID 4240 set thread context of 5056 4240 legends.exe 102 PID 1204 set thread context of 1596 1204 legends.exe 119 PID 3696 set thread context of 4620 3696 legends.exe 138 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3368 2532 WerFault.exe 92 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3288 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings wscript.exe -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 59 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 60 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 61 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 64 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1352 o1472584.exe 1352 o1472584.exe 3308 r7350647.exe 3308 r7350647.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1352 o1472584.exe Token: SeDebugPrivilege 3176 r7350647.exe Token: SeDebugPrivilege 2092 s7447220.exe Token: SeDebugPrivilege 4240 legends.exe Token: SeDebugPrivilege 3308 r7350647.exe Token: SeDebugPrivilege 1204 legends.exe Token: SeDebugPrivilege 3696 legends.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3756 s7447220.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3824 wrote to memory of 4000 3824 e3e82c868b618e76a560f315097bf6fe9ba10c909abb1b51aad942a16a9c525b.exe 83 PID 3824 wrote to memory of 4000 3824 e3e82c868b618e76a560f315097bf6fe9ba10c909abb1b51aad942a16a9c525b.exe 83 PID 3824 wrote to memory of 4000 3824 e3e82c868b618e76a560f315097bf6fe9ba10c909abb1b51aad942a16a9c525b.exe 83 PID 4000 wrote to memory of 1236 4000 z7824152.exe 84 PID 4000 wrote to memory of 1236 4000 z7824152.exe 84 PID 4000 wrote to memory of 1236 4000 z7824152.exe 84 PID 1236 wrote to memory of 1352 1236 z8916198.exe 85 PID 1236 wrote to memory of 1352 1236 z8916198.exe 85 PID 1236 wrote to memory of 1352 1236 z8916198.exe 85 PID 1236 wrote to memory of 2532 1236 z8916198.exe 92 PID 1236 wrote to memory of 2532 1236 z8916198.exe 92 PID 1236 wrote to memory of 2532 1236 z8916198.exe 92 PID 4000 wrote to memory of 3176 4000 z7824152.exe 96 PID 4000 wrote to memory of 3176 4000 z7824152.exe 96 PID 4000 wrote to memory of 3176 4000 z7824152.exe 96 PID 3176 wrote to memory of 3308 3176 r7350647.exe 97 PID 3176 wrote to memory of 3308 3176 r7350647.exe 97 PID 3176 wrote to memory of 3308 3176 r7350647.exe 97 PID 3176 wrote to memory of 3308 3176 r7350647.exe 97 PID 3176 wrote to memory of 3308 3176 r7350647.exe 97 PID 3176 wrote to memory of 3308 3176 r7350647.exe 97 PID 3176 wrote to memory of 3308 3176 r7350647.exe 97 PID 3176 wrote to memory of 3308 3176 r7350647.exe 97 PID 3824 wrote to memory of 2092 3824 e3e82c868b618e76a560f315097bf6fe9ba10c909abb1b51aad942a16a9c525b.exe 99 PID 3824 wrote to memory of 2092 3824 e3e82c868b618e76a560f315097bf6fe9ba10c909abb1b51aad942a16a9c525b.exe 99 PID 3824 wrote to memory of 2092 3824 e3e82c868b618e76a560f315097bf6fe9ba10c909abb1b51aad942a16a9c525b.exe 99 PID 2092 wrote to memory of 3756 2092 s7447220.exe 100 PID 2092 wrote to memory of 3756 2092 s7447220.exe 100 PID 2092 wrote to memory of 3756 2092 s7447220.exe 100 PID 2092 wrote to memory of 3756 2092 s7447220.exe 100 PID 2092 wrote to memory of 3756 2092 s7447220.exe 100 PID 2092 wrote to memory of 3756 2092 s7447220.exe 100 PID 2092 wrote to memory of 3756 2092 s7447220.exe 100 PID 2092 wrote to memory of 3756 2092 s7447220.exe 100 PID 2092 wrote to memory of 3756 2092 s7447220.exe 100 PID 2092 wrote to memory of 3756 2092 s7447220.exe 100 PID 3756 wrote to memory of 4240 3756 s7447220.exe 101 PID 3756 wrote to memory of 4240 3756 s7447220.exe 101 PID 3756 wrote to memory of 4240 3756 s7447220.exe 101 PID 4240 wrote to memory of 5056 4240 legends.exe 102 PID 4240 wrote to memory of 5056 4240 legends.exe 102 PID 4240 wrote to memory of 5056 4240 legends.exe 102 PID 4240 wrote to memory of 5056 4240 legends.exe 102 PID 4240 wrote to memory of 5056 4240 legends.exe 102 PID 4240 wrote to memory of 5056 4240 legends.exe 102 PID 4240 wrote to memory of 5056 4240 legends.exe 102 PID 4240 wrote to memory of 5056 4240 legends.exe 102 PID 4240 wrote to memory of 5056 4240 legends.exe 102 PID 4240 wrote to memory of 5056 4240 legends.exe 102 PID 5056 wrote to memory of 3288 5056 legends.exe 104 PID 5056 wrote to memory of 3288 5056 legends.exe 104 PID 5056 wrote to memory of 3288 5056 legends.exe 104 PID 5056 wrote to memory of 1160 5056 legends.exe 106 PID 5056 wrote to memory of 1160 5056 legends.exe 106 PID 5056 wrote to memory of 1160 5056 legends.exe 106 PID 1160 wrote to memory of 4008 1160 cmd.exe 108 PID 1160 wrote to memory of 4008 1160 cmd.exe 108 PID 1160 wrote to memory of 4008 1160 cmd.exe 108 PID 1160 wrote to memory of 2348 1160 cmd.exe 109 PID 1160 wrote to memory of 2348 1160 cmd.exe 109 PID 1160 wrote to memory of 2348 1160 cmd.exe 109 PID 1160 wrote to memory of 1516 1160 cmd.exe 110 PID 1160 wrote to memory of 1516 1160 cmd.exe 110 PID 1160 wrote to memory of 1516 1160 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3e82c868b618e76a560f315097bf6fe9ba10c909abb1b51aad942a16a9c525b.exe"C:\Users\Admin\AppData\Local\Temp\e3e82c868b618e76a560f315097bf6fe9ba10c909abb1b51aad942a16a9c525b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7824152.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7824152.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8916198.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8916198.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1472584.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1472584.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0096795.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0096795.exe4⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 9285⤵
- Program crash
PID:3368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7350647.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7350647.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7350647.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r7350647.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7447220.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7447220.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7447220.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7447220.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F6⤵
- Creates scheduled task(s)
PID:3288
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"7⤵PID:2348
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E7⤵PID:1516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"7⤵PID:644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E7⤵PID:744
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000009001\windows.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\windows.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:3220 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\lRDdN.vbs"7⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
PID:3332 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\lRDdN.vbs"8⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:4896 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\windows.js"9⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:1224
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2144
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2532 -ip 25321⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:4620
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
961KB
MD542ed8d4190534d8619d2f7606752a716
SHA16d6393c50b6fd7df531fcddb110c7d416211b1f4
SHA256704677cb4e85ae5d6d1450fba77ccb63f47cf25d6f71bfb07bd07b3a60358a4f
SHA512e0bbf04cb64e4ba57a36d16b14295e6a89ead1a591bb047a08ae1ed63c1891e8599aca041d451371c7c78590192d3dee858f8d8e1d488235d3740662ae78a73b
-
Filesize
961KB
MD542ed8d4190534d8619d2f7606752a716
SHA16d6393c50b6fd7df531fcddb110c7d416211b1f4
SHA256704677cb4e85ae5d6d1450fba77ccb63f47cf25d6f71bfb07bd07b3a60358a4f
SHA512e0bbf04cb64e4ba57a36d16b14295e6a89ead1a591bb047a08ae1ed63c1891e8599aca041d451371c7c78590192d3dee858f8d8e1d488235d3740662ae78a73b
-
Filesize
961KB
MD542ed8d4190534d8619d2f7606752a716
SHA16d6393c50b6fd7df531fcddb110c7d416211b1f4
SHA256704677cb4e85ae5d6d1450fba77ccb63f47cf25d6f71bfb07bd07b3a60358a4f
SHA512e0bbf04cb64e4ba57a36d16b14295e6a89ead1a591bb047a08ae1ed63c1891e8599aca041d451371c7c78590192d3dee858f8d8e1d488235d3740662ae78a73b
-
Filesize
961KB
MD542ed8d4190534d8619d2f7606752a716
SHA16d6393c50b6fd7df531fcddb110c7d416211b1f4
SHA256704677cb4e85ae5d6d1450fba77ccb63f47cf25d6f71bfb07bd07b3a60358a4f
SHA512e0bbf04cb64e4ba57a36d16b14295e6a89ead1a591bb047a08ae1ed63c1891e8599aca041d451371c7c78590192d3dee858f8d8e1d488235d3740662ae78a73b
-
Filesize
961KB
MD542ed8d4190534d8619d2f7606752a716
SHA16d6393c50b6fd7df531fcddb110c7d416211b1f4
SHA256704677cb4e85ae5d6d1450fba77ccb63f47cf25d6f71bfb07bd07b3a60358a4f
SHA512e0bbf04cb64e4ba57a36d16b14295e6a89ead1a591bb047a08ae1ed63c1891e8599aca041d451371c7c78590192d3dee858f8d8e1d488235d3740662ae78a73b
-
Filesize
961KB
MD542ed8d4190534d8619d2f7606752a716
SHA16d6393c50b6fd7df531fcddb110c7d416211b1f4
SHA256704677cb4e85ae5d6d1450fba77ccb63f47cf25d6f71bfb07bd07b3a60358a4f
SHA512e0bbf04cb64e4ba57a36d16b14295e6a89ead1a591bb047a08ae1ed63c1891e8599aca041d451371c7c78590192d3dee858f8d8e1d488235d3740662ae78a73b
-
Filesize
961KB
MD542ed8d4190534d8619d2f7606752a716
SHA16d6393c50b6fd7df531fcddb110c7d416211b1f4
SHA256704677cb4e85ae5d6d1450fba77ccb63f47cf25d6f71bfb07bd07b3a60358a4f
SHA512e0bbf04cb64e4ba57a36d16b14295e6a89ead1a591bb047a08ae1ed63c1891e8599aca041d451371c7c78590192d3dee858f8d8e1d488235d3740662ae78a73b
-
Filesize
961KB
MD542ed8d4190534d8619d2f7606752a716
SHA16d6393c50b6fd7df531fcddb110c7d416211b1f4
SHA256704677cb4e85ae5d6d1450fba77ccb63f47cf25d6f71bfb07bd07b3a60358a4f
SHA512e0bbf04cb64e4ba57a36d16b14295e6a89ead1a591bb047a08ae1ed63c1891e8599aca041d451371c7c78590192d3dee858f8d8e1d488235d3740662ae78a73b
-
Filesize
961KB
MD542ed8d4190534d8619d2f7606752a716
SHA16d6393c50b6fd7df531fcddb110c7d416211b1f4
SHA256704677cb4e85ae5d6d1450fba77ccb63f47cf25d6f71bfb07bd07b3a60358a4f
SHA512e0bbf04cb64e4ba57a36d16b14295e6a89ead1a591bb047a08ae1ed63c1891e8599aca041d451371c7c78590192d3dee858f8d8e1d488235d3740662ae78a73b
-
Filesize
961KB
MD542ed8d4190534d8619d2f7606752a716
SHA16d6393c50b6fd7df531fcddb110c7d416211b1f4
SHA256704677cb4e85ae5d6d1450fba77ccb63f47cf25d6f71bfb07bd07b3a60358a4f
SHA512e0bbf04cb64e4ba57a36d16b14295e6a89ead1a591bb047a08ae1ed63c1891e8599aca041d451371c7c78590192d3dee858f8d8e1d488235d3740662ae78a73b
-
Filesize
961KB
MD542ed8d4190534d8619d2f7606752a716
SHA16d6393c50b6fd7df531fcddb110c7d416211b1f4
SHA256704677cb4e85ae5d6d1450fba77ccb63f47cf25d6f71bfb07bd07b3a60358a4f
SHA512e0bbf04cb64e4ba57a36d16b14295e6a89ead1a591bb047a08ae1ed63c1891e8599aca041d451371c7c78590192d3dee858f8d8e1d488235d3740662ae78a73b
-
Filesize
702KB
MD58ea23d6c9548997901c7c58de54ae376
SHA1535b563730ca7da0bf0241faf80bfe9142d332b2
SHA25690d0fe15ca7874cec29b85bf574b1233c8fad297c2e2aa7b851caba1e3db293f
SHA512cff1462ab738cb675d2652f6d10282151ac19937df86c3e8ffd736de308a2e4f69f74f2ef83adf0bfc7de569a9f45b27ef2f03072089e20a03f943e4140e3701
-
Filesize
702KB
MD58ea23d6c9548997901c7c58de54ae376
SHA1535b563730ca7da0bf0241faf80bfe9142d332b2
SHA25690d0fe15ca7874cec29b85bf574b1233c8fad297c2e2aa7b851caba1e3db293f
SHA512cff1462ab738cb675d2652f6d10282151ac19937df86c3e8ffd736de308a2e4f69f74f2ef83adf0bfc7de569a9f45b27ef2f03072089e20a03f943e4140e3701
-
Filesize
904KB
MD50b1d02319cd94818ee6978922d6de31b
SHA11d26f627563284d71158cf48181bfc2992b35195
SHA2567f6ca56c27daf77e7a004e5ca7db0716d4291ab695e8061f911181cf48138d46
SHA512a325d91d78f8c650f3ed0ca2b00d213b4368ef16c0337d1adcd172462529371d6e68c12a2848f1575d567a74bcd2cf3d41c19ecd111af0a34821777df272c116
-
Filesize
904KB
MD50b1d02319cd94818ee6978922d6de31b
SHA11d26f627563284d71158cf48181bfc2992b35195
SHA2567f6ca56c27daf77e7a004e5ca7db0716d4291ab695e8061f911181cf48138d46
SHA512a325d91d78f8c650f3ed0ca2b00d213b4368ef16c0337d1adcd172462529371d6e68c12a2848f1575d567a74bcd2cf3d41c19ecd111af0a34821777df272c116
-
Filesize
904KB
MD50b1d02319cd94818ee6978922d6de31b
SHA11d26f627563284d71158cf48181bfc2992b35195
SHA2567f6ca56c27daf77e7a004e5ca7db0716d4291ab695e8061f911181cf48138d46
SHA512a325d91d78f8c650f3ed0ca2b00d213b4368ef16c0337d1adcd172462529371d6e68c12a2848f1575d567a74bcd2cf3d41c19ecd111af0a34821777df272c116
-
Filesize
306KB
MD56b019504fe23fe7c3d88609f5672c16d
SHA1b8ac213a14d8b769f03c4af982781d05704e6fed
SHA25611075344d1c8f0490fae6770c76983ff1314112fae4e1aff40b03f8834924243
SHA512ba06f24cdb8d7b3033a465842d4fdbe97e8e24142929134e21c6fb95f8c93370a4822f42090390c646b4f591cfb96467077de0bb5bbba832340f37bf5a9cb4d6
-
Filesize
306KB
MD56b019504fe23fe7c3d88609f5672c16d
SHA1b8ac213a14d8b769f03c4af982781d05704e6fed
SHA25611075344d1c8f0490fae6770c76983ff1314112fae4e1aff40b03f8834924243
SHA512ba06f24cdb8d7b3033a465842d4fdbe97e8e24142929134e21c6fb95f8c93370a4822f42090390c646b4f591cfb96467077de0bb5bbba832340f37bf5a9cb4d6
-
Filesize
185KB
MD5247e9ce207901f09e03138cebf723817
SHA1f2e6c6869a3f9c0cc1c3d5ccc7c5070a83c2ae55
SHA256c6bb33f7b075ae018650221e33a352a49c0b2f3f0388eed1009d889281aa89ce
SHA5124dc9b2805a29e7677b63957a5612e23669d8b28d52eb146d9a70c398344c09e0eb2af4215b6259625214ad1220f59a716deb3a1d3f766f0c3dd60930f8b3f780
-
Filesize
185KB
MD5247e9ce207901f09e03138cebf723817
SHA1f2e6c6869a3f9c0cc1c3d5ccc7c5070a83c2ae55
SHA256c6bb33f7b075ae018650221e33a352a49c0b2f3f0388eed1009d889281aa89ce
SHA5124dc9b2805a29e7677b63957a5612e23669d8b28d52eb146d9a70c398344c09e0eb2af4215b6259625214ad1220f59a716deb3a1d3f766f0c3dd60930f8b3f780
-
Filesize
145KB
MD5a36dec1c628327ba8d2106d2d6b01bc9
SHA1355c7c2367419494cfd48d7d11ef20cfc141c9ed
SHA2561e5949e960b64210cd2b0658d0c8a21063ff965ac68768296bce458e1ba52222
SHA5127cc9b9233a91726bf5efe65487a17e072c57b14364fecbc3e828140ffa29447c571424a8bb937f55e88ac489231696ab9f6a1cd23bd9321f6879f40411be4c3b
-
Filesize
145KB
MD5a36dec1c628327ba8d2106d2d6b01bc9
SHA1355c7c2367419494cfd48d7d11ef20cfc141c9ed
SHA2561e5949e960b64210cd2b0658d0c8a21063ff965ac68768296bce458e1ba52222
SHA5127cc9b9233a91726bf5efe65487a17e072c57b14364fecbc3e828140ffa29447c571424a8bb937f55e88ac489231696ab9f6a1cd23bd9321f6879f40411be4c3b
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
185KB
MD543fca5129026c9b6b49ce26c27759df2
SHA146a4acdd5faae42e04ba753f69e6e777324ae8e9
SHA256a6772f8687d81d92138a6cfa10ead2b3c409a0884053a1600c640ae65eea517e
SHA512c465b24ebba4ce399e7e8605b8b93993e92916b653c42c470e9168a8a9573bfc42bb1dc730674e1fc7656453820fc3a19240514c1bd2b8acf32d87ffa09cf228
-
Filesize
185KB
MD543fca5129026c9b6b49ce26c27759df2
SHA146a4acdd5faae42e04ba753f69e6e777324ae8e9
SHA256a6772f8687d81d92138a6cfa10ead2b3c409a0884053a1600c640ae65eea517e
SHA512c465b24ebba4ce399e7e8605b8b93993e92916b653c42c470e9168a8a9573bfc42bb1dc730674e1fc7656453820fc3a19240514c1bd2b8acf32d87ffa09cf228
-
Filesize
3KB
MD514d1d9d3dc5e8d0eac04d5b78645a2ea
SHA1aa14b5a613919e41c4d97fef48ff1a24ff06fd2b
SHA25692d5609974d3d52dc028185e819111679f0ff052c1e3b951e2eee9b18e361f36
SHA512e13cc2ca8b4dc4564a2176e4bc06d2a3271a957918cb84589402462ea2fe33782eb92ab1575187ab07ac3e270e8301607bff6b7ccb1dd688666be940716f092c