Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2023 17:15
Static task
static1
General
-
Target
b1e44b1f3158b92f6804a7b235c89a4ceac163c29817eaaf6b005699e309d5d1.exe
-
Size
1.1MB
-
MD5
0d6025fc7077a21e36f4c476abd4ef10
-
SHA1
d584321accde08b67ba389fee25303cab154a5ee
-
SHA256
b1e44b1f3158b92f6804a7b235c89a4ceac163c29817eaaf6b005699e309d5d1
-
SHA512
dc200b712a8157a8eaceba8af257a538981e27c8d319062f25801f96a7ac011ada28734f2618cc72552ddfa9b30170a264f51f699fec386c83e68251bb178781
-
SSDEEP
24576:UyhLNgm6MqfKPnUXkxpbtL62fkDkjo+7A6QlFyH/deP0I:j1N96XKPnUXkxH9MD0o3odeP
Malware Config
Extracted
redline
larry
185.161.248.75:4132
-
auth_value
9039557bb7a08f5f2f60e2b71e1dee0e
Extracted
redline
warum
185.161.248.75:4132
-
auth_value
0bdb2dda91dadc65f555dee088a6a2a4
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o6887127.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o6887127.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o6887127.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o6887127.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o6887127.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o6887127.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
WSHRAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000200000001e70d-279.dat family_wshrat behavioral1/files/0x000400000001e90e-282.dat family_wshrat -
Blocklisted process makes network request 8 IoCs
flow pid Process 29 2656 wscript.exe 30 2656 wscript.exe 31 3500 wscript.exe 32 3500 wscript.exe 37 5024 WScript.exe 46 5024 WScript.exe 49 5024 WScript.exe 51 5024 WScript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation windows.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation s4064015.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation legends.exe -
Executes dropped EXE 17 IoCs
pid Process 772 z8331698.exe 3336 z4941259.exe 1780 o6887127.exe 3180 p4574353.exe 5056 r5653775.exe 2176 r5653775.exe 2288 s4064015.exe 4432 s4064015.exe 1492 s4064015.exe 4612 legends.exe 3176 legends.exe 4388 legends.exe 1272 windows.exe 1464 legends.exe 4556 legends.exe 4156 legends.exe 3828 legends.exe -
Loads dropped DLL 1 IoCs
pid Process 1484 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o6887127.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o6887127.exe -
Adds Run key to start application 2 TTPs 16 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1e44b1f3158b92f6804a7b235c89a4ceac163c29817eaaf6b005699e309d5d1.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BXBCC2V24Z = "\"C:\\Users\\Admin\\AppData\\Roaming\\windows.js\"" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4941259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b1e44b1f3158b92f6804a7b235c89a4ceac163c29817eaaf6b005699e309d5d1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8331698.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4941259.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8331698.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lRDdN = "wscript.exe //B \"C:\\Users\\Admin\\lRDdN.vbs\"" wscript.exe Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\windows\currentversion\run wscript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 5056 set thread context of 2176 5056 r5653775.exe 94 PID 2288 set thread context of 1492 2288 s4064015.exe 98 PID 4612 set thread context of 4388 4612 legends.exe 104 PID 1464 set thread context of 4556 1464 legends.exe 121 PID 4156 set thread context of 3828 4156 legends.exe 124 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1800 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings wscript.exe -
Script User-Agent 4 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 29 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 30 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 31 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 32 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1780 o6887127.exe 1780 o6887127.exe 3180 p4574353.exe 3180 p4574353.exe 2176 r5653775.exe 2176 r5653775.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1780 o6887127.exe Token: SeDebugPrivilege 3180 p4574353.exe Token: SeDebugPrivilege 5056 r5653775.exe Token: SeDebugPrivilege 2288 s4064015.exe Token: SeDebugPrivilege 2176 r5653775.exe Token: SeDebugPrivilege 4612 legends.exe Token: SeDebugPrivilege 1464 legends.exe Token: SeDebugPrivilege 4156 legends.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1492 s4064015.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 772 2416 b1e44b1f3158b92f6804a7b235c89a4ceac163c29817eaaf6b005699e309d5d1.exe 86 PID 2416 wrote to memory of 772 2416 b1e44b1f3158b92f6804a7b235c89a4ceac163c29817eaaf6b005699e309d5d1.exe 86 PID 2416 wrote to memory of 772 2416 b1e44b1f3158b92f6804a7b235c89a4ceac163c29817eaaf6b005699e309d5d1.exe 86 PID 772 wrote to memory of 3336 772 z8331698.exe 87 PID 772 wrote to memory of 3336 772 z8331698.exe 87 PID 772 wrote to memory of 3336 772 z8331698.exe 87 PID 3336 wrote to memory of 1780 3336 z4941259.exe 88 PID 3336 wrote to memory of 1780 3336 z4941259.exe 88 PID 3336 wrote to memory of 1780 3336 z4941259.exe 88 PID 3336 wrote to memory of 3180 3336 z4941259.exe 92 PID 3336 wrote to memory of 3180 3336 z4941259.exe 92 PID 3336 wrote to memory of 3180 3336 z4941259.exe 92 PID 772 wrote to memory of 5056 772 z8331698.exe 93 PID 772 wrote to memory of 5056 772 z8331698.exe 93 PID 772 wrote to memory of 5056 772 z8331698.exe 93 PID 5056 wrote to memory of 2176 5056 r5653775.exe 94 PID 5056 wrote to memory of 2176 5056 r5653775.exe 94 PID 5056 wrote to memory of 2176 5056 r5653775.exe 94 PID 5056 wrote to memory of 2176 5056 r5653775.exe 94 PID 5056 wrote to memory of 2176 5056 r5653775.exe 94 PID 5056 wrote to memory of 2176 5056 r5653775.exe 94 PID 5056 wrote to memory of 2176 5056 r5653775.exe 94 PID 5056 wrote to memory of 2176 5056 r5653775.exe 94 PID 2416 wrote to memory of 2288 2416 b1e44b1f3158b92f6804a7b235c89a4ceac163c29817eaaf6b005699e309d5d1.exe 95 PID 2416 wrote to memory of 2288 2416 b1e44b1f3158b92f6804a7b235c89a4ceac163c29817eaaf6b005699e309d5d1.exe 95 PID 2416 wrote to memory of 2288 2416 b1e44b1f3158b92f6804a7b235c89a4ceac163c29817eaaf6b005699e309d5d1.exe 95 PID 2288 wrote to memory of 4432 2288 s4064015.exe 96 PID 2288 wrote to memory of 4432 2288 s4064015.exe 96 PID 2288 wrote to memory of 4432 2288 s4064015.exe 96 PID 2288 wrote to memory of 4432 2288 s4064015.exe 96 PID 2288 wrote to memory of 1492 2288 s4064015.exe 98 PID 2288 wrote to memory of 1492 2288 s4064015.exe 98 PID 2288 wrote to memory of 1492 2288 s4064015.exe 98 PID 2288 wrote to memory of 1492 2288 s4064015.exe 98 PID 2288 wrote to memory of 1492 2288 s4064015.exe 98 PID 2288 wrote to memory of 1492 2288 s4064015.exe 98 PID 2288 wrote to memory of 1492 2288 s4064015.exe 98 PID 2288 wrote to memory of 1492 2288 s4064015.exe 98 PID 2288 wrote to memory of 1492 2288 s4064015.exe 98 PID 2288 wrote to memory of 1492 2288 s4064015.exe 98 PID 1492 wrote to memory of 4612 1492 s4064015.exe 100 PID 1492 wrote to memory of 4612 1492 s4064015.exe 100 PID 1492 wrote to memory of 4612 1492 s4064015.exe 100 PID 4612 wrote to memory of 3176 4612 legends.exe 101 PID 4612 wrote to memory of 3176 4612 legends.exe 101 PID 4612 wrote to memory of 3176 4612 legends.exe 101 PID 4612 wrote to memory of 3176 4612 legends.exe 101 PID 4612 wrote to memory of 3176 4612 legends.exe 101 PID 4612 wrote to memory of 3176 4612 legends.exe 101 PID 4612 wrote to memory of 3176 4612 legends.exe 101 PID 4612 wrote to memory of 3176 4612 legends.exe 101 PID 4612 wrote to memory of 3176 4612 legends.exe 101 PID 4612 wrote to memory of 3176 4612 legends.exe 101 PID 4612 wrote to memory of 4388 4612 legends.exe 104 PID 4612 wrote to memory of 4388 4612 legends.exe 104 PID 4612 wrote to memory of 4388 4612 legends.exe 104 PID 4612 wrote to memory of 4388 4612 legends.exe 104 PID 4612 wrote to memory of 4388 4612 legends.exe 104 PID 4612 wrote to memory of 4388 4612 legends.exe 104 PID 4612 wrote to memory of 4388 4612 legends.exe 104 PID 4612 wrote to memory of 4388 4612 legends.exe 104 PID 4612 wrote to memory of 4388 4612 legends.exe 104 PID 4612 wrote to memory of 4388 4612 legends.exe 104 PID 4388 wrote to memory of 1800 4388 legends.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1e44b1f3158b92f6804a7b235c89a4ceac163c29817eaaf6b005699e309d5d1.exe"C:\Users\Admin\AppData\Local\Temp\b1e44b1f3158b92f6804a7b235c89a4ceac163c29817eaaf6b005699e309d5d1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8331698.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8331698.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4941259.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4941259.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6887127.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6887127.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4574353.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4574353.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5653775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5653775.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5653775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5653775.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4064015.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4064015.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4064015.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4064015.exe3⤵
- Executes dropped EXE
PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4064015.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s4064015.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Executes dropped EXE
PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F6⤵
- Creates scheduled task(s)
PID:1800
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit6⤵PID:1152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3128
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"7⤵PID:1332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E7⤵PID:4788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2348
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"7⤵PID:1536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E7⤵PID:3352
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000013001\windows.exe"C:\Users\Admin\AppData\Local\Temp\1000013001\windows.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:1272 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Roaming\lRDdN.vbs"7⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
PID:2656 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\lRDdN.vbs"8⤵
- Blocklisted process makes network request
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:3500 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\windows.js"9⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:5024
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1484
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:3828
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
541KB
MD5c159fc653a86ef3eab80e5d06b9cfa2c
SHA1f95b35bcd8528dafda2b8fd53bed2bab150676e3
SHA256b6e0c17a224fe0df6f58add122e0420aad76a697c1d7634aa0cfe2f5dc84dc2b
SHA51278ee8d1c957f21e6023f4c9096f63c9bc697620cfc7584bb937b4cffb792f312c8fd0cb586c0aa4f43ddf8e622042f2c85852f10018e0c5799d6dd02903ab9f2
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
962KB
MD5058d3b1ec95809cfb260b7f391a831ef
SHA13488bdd47b72eb4111dedbed24b42775db94a916
SHA256b572a2a5cc1280a4ac3d9d1dbffdcb78afb59a1b7e084c68b87dc3fd8f8fcb69
SHA5128553422a4c3c18c5a293cae912dd169c1e3c93d72ae529df23b852e1e6aed4ddc0fda2c5a9123c531ab1f0c268def51d98162c99044533e7796308b9140d6d99
-
Filesize
701KB
MD5d42e476e64fbf3aaced5f42e9312acdf
SHA17c352260a18d0c141bf416293e0b8cf53b920883
SHA2566dd19a535110c58d3a117674f940abb3cf5d6883fd58b6394c10d4368910fd49
SHA51259c8b6ea1b720699ea471b8337e6f9242884253f8545126534605e85677ab641e4eb33d834b7af9c5b424fd8090da6b4e475209a547423f114dc7258e49d10bf
-
Filesize
701KB
MD5d42e476e64fbf3aaced5f42e9312acdf
SHA17c352260a18d0c141bf416293e0b8cf53b920883
SHA2566dd19a535110c58d3a117674f940abb3cf5d6883fd58b6394c10d4368910fd49
SHA51259c8b6ea1b720699ea471b8337e6f9242884253f8545126534605e85677ab641e4eb33d834b7af9c5b424fd8090da6b4e475209a547423f114dc7258e49d10bf
-
Filesize
903KB
MD5130d4c656d708a8b3128a87e938d02fa
SHA1f6ccb845b8c242b9ff758a3f617e32c1a4cf7399
SHA256a2b47c7fb9dbc70e14abc859dff31cbf1d008f639ac2fb469ee22b59cc5d5596
SHA51211a3ec961a8853c8f1b357385727d0498a72509ca23e2da4dbc41348882cc50516654b97bb3f541660bf93f5d2c5131fad2deda2f85ead0590e8478e124c9c79
-
Filesize
903KB
MD5130d4c656d708a8b3128a87e938d02fa
SHA1f6ccb845b8c242b9ff758a3f617e32c1a4cf7399
SHA256a2b47c7fb9dbc70e14abc859dff31cbf1d008f639ac2fb469ee22b59cc5d5596
SHA51211a3ec961a8853c8f1b357385727d0498a72509ca23e2da4dbc41348882cc50516654b97bb3f541660bf93f5d2c5131fad2deda2f85ead0590e8478e124c9c79
-
Filesize
903KB
MD5130d4c656d708a8b3128a87e938d02fa
SHA1f6ccb845b8c242b9ff758a3f617e32c1a4cf7399
SHA256a2b47c7fb9dbc70e14abc859dff31cbf1d008f639ac2fb469ee22b59cc5d5596
SHA51211a3ec961a8853c8f1b357385727d0498a72509ca23e2da4dbc41348882cc50516654b97bb3f541660bf93f5d2c5131fad2deda2f85ead0590e8478e124c9c79
-
Filesize
305KB
MD5ec95eab51c1a86ad4f03bc013969ebca
SHA1cfc2c4077fbcb3685ca00a8699684760edfe6812
SHA25668f8c299216a67ca5563384c9b44b105a654f39823edf3d7f958abce0ab1609a
SHA512e1f785bbf6be8ad9d5c1e50861fb5c5c0d39bcbf5da12c1b7381c9101e845f23b1756b13e372bbac5b16460f9430079b7e0f2f1ccb5eebc20164ebd234519a2f
-
Filesize
305KB
MD5ec95eab51c1a86ad4f03bc013969ebca
SHA1cfc2c4077fbcb3685ca00a8699684760edfe6812
SHA25668f8c299216a67ca5563384c9b44b105a654f39823edf3d7f958abce0ab1609a
SHA512e1f785bbf6be8ad9d5c1e50861fb5c5c0d39bcbf5da12c1b7381c9101e845f23b1756b13e372bbac5b16460f9430079b7e0f2f1ccb5eebc20164ebd234519a2f
-
Filesize
184KB
MD527eba1b7234b1c605ad300d16d76c955
SHA1b32071a055321cba4ccec350f8d777ca6af3c241
SHA2564bfde259ef675d96e5e98a755c46e2c713bbd9f254c445be4018983e8f24e1e0
SHA512fda07299d7f1e242f7317fbd7917d57ce15be3c1e943836e5c17c75351b1d3ee29056b08936288a57119f8c0e5c72cfe673763beb0ffa6128f42c5a762750ab0
-
Filesize
184KB
MD527eba1b7234b1c605ad300d16d76c955
SHA1b32071a055321cba4ccec350f8d777ca6af3c241
SHA2564bfde259ef675d96e5e98a755c46e2c713bbd9f254c445be4018983e8f24e1e0
SHA512fda07299d7f1e242f7317fbd7917d57ce15be3c1e943836e5c17c75351b1d3ee29056b08936288a57119f8c0e5c72cfe673763beb0ffa6128f42c5a762750ab0
-
Filesize
145KB
MD58c6719a8c11e6ed9a1e610c6cec492eb
SHA1e28494adfca2563cf4d9e46c524d9f0c67257fac
SHA256ce1ed7133245c8305ac4eeb1761b8e1fcf94e8fcf01af118cafca88eb2878fe7
SHA5126d5b4e559aee1f882bc57747884e6fdb6454296d78643a0c6594c7976f949d6256aa3dc10a41c522e184aaf0f72d32725bde1ae1e3481b65664acc7f11c3982b
-
Filesize
145KB
MD58c6719a8c11e6ed9a1e610c6cec492eb
SHA1e28494adfca2563cf4d9e46c524d9f0c67257fac
SHA256ce1ed7133245c8305ac4eeb1761b8e1fcf94e8fcf01af118cafca88eb2878fe7
SHA5126d5b4e559aee1f882bc57747884e6fdb6454296d78643a0c6594c7976f949d6256aa3dc10a41c522e184aaf0f72d32725bde1ae1e3481b65664acc7f11c3982b
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
185KB
MD543fca5129026c9b6b49ce26c27759df2
SHA146a4acdd5faae42e04ba753f69e6e777324ae8e9
SHA256a6772f8687d81d92138a6cfa10ead2b3c409a0884053a1600c640ae65eea517e
SHA512c465b24ebba4ce399e7e8605b8b93993e92916b653c42c470e9168a8a9573bfc42bb1dc730674e1fc7656453820fc3a19240514c1bd2b8acf32d87ffa09cf228
-
Filesize
185KB
MD543fca5129026c9b6b49ce26c27759df2
SHA146a4acdd5faae42e04ba753f69e6e777324ae8e9
SHA256a6772f8687d81d92138a6cfa10ead2b3c409a0884053a1600c640ae65eea517e
SHA512c465b24ebba4ce399e7e8605b8b93993e92916b653c42c470e9168a8a9573bfc42bb1dc730674e1fc7656453820fc3a19240514c1bd2b8acf32d87ffa09cf228
-
Filesize
3KB
MD514d1d9d3dc5e8d0eac04d5b78645a2ea
SHA1aa14b5a613919e41c4d97fef48ff1a24ff06fd2b
SHA25692d5609974d3d52dc028185e819111679f0ff052c1e3b951e2eee9b18e361f36
SHA512e13cc2ca8b4dc4564a2176e4bc06d2a3271a957918cb84589402462ea2fe33782eb92ab1575187ab07ac3e270e8301607bff6b7ccb1dd688666be940716f092c