Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2023 01:56
Static task
static1
General
-
Target
f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe
-
Size
1.1MB
-
MD5
501ea9669676ed72ed19f9fa79738e0e
-
SHA1
5aea5bddb0fc0880a62d243e3d715b60fbe4e737
-
SHA256
f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc
-
SHA512
558d7d8d843379ad99c9691ad063fdfafd837ada2a0368ffa0c6a140eb6eebfec7441da51c4ebb9aa295a582c9b013fe831b2434c126590b0fe8cbdce6da3d8b
-
SSDEEP
24576:4yeivpfUpu0mqCS6JREqDYVVN4saG+F7G/F3Rn/vDAFZ:/ZpfUDvXy18VVTa7wLsF
Malware Config
Extracted
redline
luka
185.161.248.75:4132
-
auth_value
44560bcd37d6bf076da309730fdb519a
Extracted
redline
terra
185.161.248.75:4132
-
auth_value
60df3f535f8aa4e264f78041983592d2
Extracted
vjw0rm
http://vj5566.duckdns.org:5566
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o6558570.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o6558570.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x0006000000023170-274.dat family_wshrat behavioral1/files/0x0006000000023174-277.dat family_wshrat -
Blocklisted process makes network request 5 IoCs
flow pid Process 31 1860 wscript.exe 32 1860 wscript.exe 34 1648 wscript.exe 35 1648 wscript.exe 38 4080 WScript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation s3326468.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation legends.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation windows.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation wscript.exe -
Executes dropped EXE 21 IoCs
pid Process 832 z5870881.exe 4316 z6474909.exe 2316 o6558570.exe 1112 p3472451.exe 3468 r2996407.exe 3812 r2996407.exe 3460 s3326468.exe 1276 s3326468.exe 4680 s3326468.exe 3364 s3326468.exe 1652 legends.exe 4600 legends.exe 3272 windows.exe 340 legends.exe 3308 legends.exe 4196 legends.exe 4424 legends.exe 1128 legends.exe 2564 legends.exe 5020 legends.exe 3720 legends.exe -
Loads dropped DLL 1 IoCs
pid Process 676 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o6558570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o6558570.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6474909.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BXBCC2V24Z = "\"C:\\Users\\Admin\\AppData\\Roaming\\windows.js\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6474909.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5870881.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5870881.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3468 set thread context of 3812 3468 r2996407.exe 97 PID 3460 set thread context of 3364 3460 s3326468.exe 102 PID 1652 set thread context of 4600 1652 legends.exe 104 PID 340 set thread context of 3308 340 legends.exe 121 PID 4196 set thread context of 3720 4196 legends.exe 128 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3972 1112 WerFault.exe 93 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3708 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings wscript.exe -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 31 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 32 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 34 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 35 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2316 o6558570.exe 2316 o6558570.exe 3812 r2996407.exe 3812 r2996407.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2316 o6558570.exe Token: SeDebugPrivilege 3468 r2996407.exe Token: SeDebugPrivilege 3460 s3326468.exe Token: SeDebugPrivilege 3812 r2996407.exe Token: SeDebugPrivilege 1652 legends.exe Token: SeDebugPrivilege 340 legends.exe Token: SeDebugPrivilege 4196 legends.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3364 s3326468.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 832 3736 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 84 PID 3736 wrote to memory of 832 3736 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 84 PID 3736 wrote to memory of 832 3736 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 84 PID 832 wrote to memory of 4316 832 z5870881.exe 85 PID 832 wrote to memory of 4316 832 z5870881.exe 85 PID 832 wrote to memory of 4316 832 z5870881.exe 85 PID 4316 wrote to memory of 2316 4316 z6474909.exe 86 PID 4316 wrote to memory of 2316 4316 z6474909.exe 86 PID 4316 wrote to memory of 2316 4316 z6474909.exe 86 PID 4316 wrote to memory of 1112 4316 z6474909.exe 93 PID 4316 wrote to memory of 1112 4316 z6474909.exe 93 PID 4316 wrote to memory of 1112 4316 z6474909.exe 93 PID 832 wrote to memory of 3468 832 z5870881.exe 96 PID 832 wrote to memory of 3468 832 z5870881.exe 96 PID 832 wrote to memory of 3468 832 z5870881.exe 96 PID 3468 wrote to memory of 3812 3468 r2996407.exe 97 PID 3468 wrote to memory of 3812 3468 r2996407.exe 97 PID 3468 wrote to memory of 3812 3468 r2996407.exe 97 PID 3468 wrote to memory of 3812 3468 r2996407.exe 97 PID 3468 wrote to memory of 3812 3468 r2996407.exe 97 PID 3468 wrote to memory of 3812 3468 r2996407.exe 97 PID 3468 wrote to memory of 3812 3468 r2996407.exe 97 PID 3468 wrote to memory of 3812 3468 r2996407.exe 97 PID 3736 wrote to memory of 3460 3736 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 99 PID 3736 wrote to memory of 3460 3736 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 99 PID 3736 wrote to memory of 3460 3736 f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe 99 PID 3460 wrote to memory of 1276 3460 s3326468.exe 100 PID 3460 wrote to memory of 1276 3460 s3326468.exe 100 PID 3460 wrote to memory of 1276 3460 s3326468.exe 100 PID 3460 wrote to memory of 1276 3460 s3326468.exe 100 PID 3460 wrote to memory of 4680 3460 s3326468.exe 101 PID 3460 wrote to memory of 4680 3460 s3326468.exe 101 PID 3460 wrote to memory of 4680 3460 s3326468.exe 101 PID 3460 wrote to memory of 4680 3460 s3326468.exe 101 PID 3460 wrote to memory of 3364 3460 s3326468.exe 102 PID 3460 wrote to memory of 3364 3460 s3326468.exe 102 PID 3460 wrote to memory of 3364 3460 s3326468.exe 102 PID 3460 wrote to memory of 3364 3460 s3326468.exe 102 PID 3460 wrote to memory of 3364 3460 s3326468.exe 102 PID 3460 wrote to memory of 3364 3460 s3326468.exe 102 PID 3460 wrote to memory of 3364 3460 s3326468.exe 102 PID 3460 wrote to memory of 3364 3460 s3326468.exe 102 PID 3460 wrote to memory of 3364 3460 s3326468.exe 102 PID 3460 wrote to memory of 3364 3460 s3326468.exe 102 PID 3364 wrote to memory of 1652 3364 s3326468.exe 103 PID 3364 wrote to memory of 1652 3364 s3326468.exe 103 PID 3364 wrote to memory of 1652 3364 s3326468.exe 103 PID 1652 wrote to memory of 4600 1652 legends.exe 104 PID 1652 wrote to memory of 4600 1652 legends.exe 104 PID 1652 wrote to memory of 4600 1652 legends.exe 104 PID 1652 wrote to memory of 4600 1652 legends.exe 104 PID 1652 wrote to memory of 4600 1652 legends.exe 104 PID 1652 wrote to memory of 4600 1652 legends.exe 104 PID 1652 wrote to memory of 4600 1652 legends.exe 104 PID 1652 wrote to memory of 4600 1652 legends.exe 104 PID 1652 wrote to memory of 4600 1652 legends.exe 104 PID 1652 wrote to memory of 4600 1652 legends.exe 104 PID 4600 wrote to memory of 3708 4600 legends.exe 106 PID 4600 wrote to memory of 3708 4600 legends.exe 106 PID 4600 wrote to memory of 3708 4600 legends.exe 106 PID 4600 wrote to memory of 1268 4600 legends.exe 108 PID 4600 wrote to memory of 1268 4600 legends.exe 108 PID 4600 wrote to memory of 1268 4600 legends.exe 108 PID 1268 wrote to memory of 2432 1268 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe"C:\Users\Admin\AppData\Local\Temp\f2ce5991176a97cc5689dfb920c255b77de2e221d0f25ccecae5254a40a6d1fc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5870881.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5870881.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6474909.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6474909.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6558570.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6558570.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3472451.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3472451.exe4⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 9285⤵
- Program crash
PID:3972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2996407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2996407.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2996407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2996407.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3326468.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3326468.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3326468.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3326468.exe3⤵
- Executes dropped EXE
PID:1276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3326468.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3326468.exe3⤵
- Executes dropped EXE
PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3326468.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3326468.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F6⤵
- Creates scheduled task(s)
PID:3708
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2432
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"7⤵PID:4812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E7⤵PID:5024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1844
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"7⤵PID:3312
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E7⤵PID:4816
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000009001\windows.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\windows.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:3272 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\lRDdN.vbs"7⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
PID:1860 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\lRDdN.vbs"8⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:1648 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\windows.js"9⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:4080
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:676
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1112 -ip 11121⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:340 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:3308
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:3720
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
961KB
MD5548c9c8514f2395e59e7cca8589f75f2
SHA113b7a0ab4d815e5ec1ec25a4fea96754719e06e8
SHA2566fcedb5480727f1018f2186daf6cba71c2f8f063ba2415287b6457df2cf07f0b
SHA5127e65b466642172fd99733c7de8eaa35b50827a74b36f2a43ff90bbf7aee6cde7af37ee41e5fe3957ad4ea4b19b7f7c4c589f0d43e1eb090f9ea9363fd9e6d78b
-
Filesize
702KB
MD55378764133b66f45fb434bedee1a53a0
SHA106d76f15884bf5c4136c366780384188d91dfdb8
SHA2565beccf4fe809beed67380f839aecb43d87edd24e72c4ae2bd338de789e09f0f2
SHA5129aef7a372ef4ae511006d7d815d8a619904d3eb5fa26d8cd4e16d3a9ecdecc7bad2411aaca0d2902cae99ed8157a1eaacc9edc51858cd3378062977319c72a1f
-
Filesize
702KB
MD55378764133b66f45fb434bedee1a53a0
SHA106d76f15884bf5c4136c366780384188d91dfdb8
SHA2565beccf4fe809beed67380f839aecb43d87edd24e72c4ae2bd338de789e09f0f2
SHA5129aef7a372ef4ae511006d7d815d8a619904d3eb5fa26d8cd4e16d3a9ecdecc7bad2411aaca0d2902cae99ed8157a1eaacc9edc51858cd3378062977319c72a1f
-
Filesize
904KB
MD5b9971030c33d46559914db76f2c74237
SHA18f09954e4c8f74902950accdb78e8c0ed64f3cf6
SHA256e5f2629080f56f32c80daf4744486a16caa06d4f4cfea53647a21227930df523
SHA512bbdd009eaa6546f094fae74ac251534415097d5726971e9cdf8c954e5595aedfaf09a2b0674050e706e0e946cc72e2b044448ffb4bd4112b99adfa25b379ca0e
-
Filesize
904KB
MD5b9971030c33d46559914db76f2c74237
SHA18f09954e4c8f74902950accdb78e8c0ed64f3cf6
SHA256e5f2629080f56f32c80daf4744486a16caa06d4f4cfea53647a21227930df523
SHA512bbdd009eaa6546f094fae74ac251534415097d5726971e9cdf8c954e5595aedfaf09a2b0674050e706e0e946cc72e2b044448ffb4bd4112b99adfa25b379ca0e
-
Filesize
904KB
MD5b9971030c33d46559914db76f2c74237
SHA18f09954e4c8f74902950accdb78e8c0ed64f3cf6
SHA256e5f2629080f56f32c80daf4744486a16caa06d4f4cfea53647a21227930df523
SHA512bbdd009eaa6546f094fae74ac251534415097d5726971e9cdf8c954e5595aedfaf09a2b0674050e706e0e946cc72e2b044448ffb4bd4112b99adfa25b379ca0e
-
Filesize
306KB
MD58577097a3971b5468955bdbcc3eba0d3
SHA168073ce1091a8f35fb5246081031f97a02b27f38
SHA2564a4ba8405e6ceefbba9f5e865af0c3b2d7e39f8bba9c2a18364ab2635a9a2dff
SHA512f1f133eb66707c91153baff9c583e7969ffaf1e2330636e7c2151292296e84042ad17ac36b164fafdbcb330635af458d7308e6a6da7e99c1f76c1ad27df44685
-
Filesize
306KB
MD58577097a3971b5468955bdbcc3eba0d3
SHA168073ce1091a8f35fb5246081031f97a02b27f38
SHA2564a4ba8405e6ceefbba9f5e865af0c3b2d7e39f8bba9c2a18364ab2635a9a2dff
SHA512f1f133eb66707c91153baff9c583e7969ffaf1e2330636e7c2151292296e84042ad17ac36b164fafdbcb330635af458d7308e6a6da7e99c1f76c1ad27df44685
-
Filesize
185KB
MD5b536f7a6995726c9cebb3c3a079b54f7
SHA1c31b723d2116a517ebc47f6edbaedef0218f687d
SHA2560d7e9871bcdba06b4f921a260136fb7805950515d585f8443f798e0a711d0d89
SHA51270218a43f5120fa048ce42480c2a859642d7e86fefc1a8e9c15a3c75af0b3d1b57f9ad868f2e3e853ccb6bc40921b83c75339c9a5e5253295777bbced32bc660
-
Filesize
185KB
MD5b536f7a6995726c9cebb3c3a079b54f7
SHA1c31b723d2116a517ebc47f6edbaedef0218f687d
SHA2560d7e9871bcdba06b4f921a260136fb7805950515d585f8443f798e0a711d0d89
SHA51270218a43f5120fa048ce42480c2a859642d7e86fefc1a8e9c15a3c75af0b3d1b57f9ad868f2e3e853ccb6bc40921b83c75339c9a5e5253295777bbced32bc660
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d
-
Filesize
145KB
MD59fd4e53d8a023e9d99440f16d5da3736
SHA19c94d682d6156c534cbfd694e68f610ac7e46271
SHA2566d2dc3b0b15a0081d37074b4e5f3ec45ee5e0c80b19331b513a290da23f0df08
SHA512d8ecc8b7a0911b9afe09366e3f64ea22da6e8a0b475f70a37c9d91c5d8017700f65a2482146f5e101562331c550d77bd247fe141ce634e3f3842fc1c8decbb0d
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
185KB
MD543fca5129026c9b6b49ce26c27759df2
SHA146a4acdd5faae42e04ba753f69e6e777324ae8e9
SHA256a6772f8687d81d92138a6cfa10ead2b3c409a0884053a1600c640ae65eea517e
SHA512c465b24ebba4ce399e7e8605b8b93993e92916b653c42c470e9168a8a9573bfc42bb1dc730674e1fc7656453820fc3a19240514c1bd2b8acf32d87ffa09cf228
-
Filesize
185KB
MD543fca5129026c9b6b49ce26c27759df2
SHA146a4acdd5faae42e04ba753f69e6e777324ae8e9
SHA256a6772f8687d81d92138a6cfa10ead2b3c409a0884053a1600c640ae65eea517e
SHA512c465b24ebba4ce399e7e8605b8b93993e92916b653c42c470e9168a8a9573bfc42bb1dc730674e1fc7656453820fc3a19240514c1bd2b8acf32d87ffa09cf228
-
Filesize
3KB
MD514d1d9d3dc5e8d0eac04d5b78645a2ea
SHA1aa14b5a613919e41c4d97fef48ff1a24ff06fd2b
SHA25692d5609974d3d52dc028185e819111679f0ff052c1e3b951e2eee9b18e361f36
SHA512e13cc2ca8b4dc4564a2176e4bc06d2a3271a957918cb84589402462ea2fe33782eb92ab1575187ab07ac3e270e8301607bff6b7ccb1dd688666be940716f092c