Analysis
-
max time kernel
127s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
23-05-2023 16:11
Static task
static1
General
-
Target
143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3.exe
-
Size
1020KB
-
MD5
4646cc639134afda050003e7f05c5377
-
SHA1
b49ac1579df9c95343f8b00e2a70cf22d0ff5318
-
SHA256
143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3
-
SHA512
7ce656ef8e2f77dcd163bfca39bb9f576281e13d582292f510edc33a7cfccda209336c2e8259627347b85c6c705427f2bf4593d7bac7ba869bae2aa68fa72339
-
SSDEEP
24576:+y6XZgtwmbnplSvySoJ2ntlcCcXSzxpIQrrkac3q2A+:N6XGymzpvSoJ2nTcCrxlll
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o7819199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o7819199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o7819199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o7819199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o7819199.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/4448-195-0x00000000020B0000-0x00000000020F4000-memory.dmp family_redline behavioral1/memory/4448-196-0x0000000004ED0000-0x0000000004F10000-memory.dmp family_redline behavioral1/memory/4448-197-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-198-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-200-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-202-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-204-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-206-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-208-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-210-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-212-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-214-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-216-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-218-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-221-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-225-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-227-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-229-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-231-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-233-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-235-0x0000000004ED0000-0x0000000004F0C000-memory.dmp family_redline behavioral1/memory/4448-1110-0x0000000004980000-0x0000000004990000-memory.dmp family_redline -
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/2636-1173-0x0000000000400000-0x00000000007FE000-memory.dmp loaderbot -
XMRig Miner payload 4 IoCs
resource yara_rule behavioral1/memory/2696-1184-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2696-1189-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2696-1219-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/4636-1225-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
pid Process 4352 z9765811.exe 4868 z8997369.exe 2112 o7819199.exe 3132 p8386143.exe 4448 r1754542.exe 5048 s8672799.exe 4404 s8672799.exe 3228 legends.exe 4872 legends.exe 1984 full_min_cr.exe 2636 full_min_cr.exe 168 legends.exe 2696 Driver.exe 196 legends.exe 4636 Driver.exe -
Loads dropped DLL 1 IoCs
pid Process 2108 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o7819199.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o7819199.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9765811.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8997369.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8997369.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9765811.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 5048 set thread context of 4404 5048 s8672799.exe 73 PID 3228 set thread context of 4872 3228 legends.exe 75 PID 1984 set thread context of 2636 1984 full_min_cr.exe 87 PID 168 set thread context of 196 168 legends.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2464 2696 WerFault.exe 90 2740 4636 WerFault.exe 95 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2112 o7819199.exe 2112 o7819199.exe 3132 p8386143.exe 3132 p8386143.exe 4448 r1754542.exe 4448 r1754542.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe 2636 full_min_cr.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 644 Process not Found 644 Process not Found -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2112 o7819199.exe Token: SeDebugPrivilege 3132 p8386143.exe Token: SeDebugPrivilege 4448 r1754542.exe Token: SeDebugPrivilege 5048 s8672799.exe Token: SeDebugPrivilege 3228 legends.exe Token: SeDebugPrivilege 2636 full_min_cr.exe Token: SeDebugPrivilege 168 legends.exe Token: SeLockMemoryPrivilege 2696 Driver.exe Token: SeLockMemoryPrivilege 2696 Driver.exe Token: SeLockMemoryPrivilege 4636 Driver.exe Token: SeLockMemoryPrivilege 4636 Driver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4404 s8672799.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2292 wrote to memory of 4352 2292 143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3.exe 66 PID 2292 wrote to memory of 4352 2292 143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3.exe 66 PID 2292 wrote to memory of 4352 2292 143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3.exe 66 PID 4352 wrote to memory of 4868 4352 z9765811.exe 67 PID 4352 wrote to memory of 4868 4352 z9765811.exe 67 PID 4352 wrote to memory of 4868 4352 z9765811.exe 67 PID 4868 wrote to memory of 2112 4868 z8997369.exe 68 PID 4868 wrote to memory of 2112 4868 z8997369.exe 68 PID 4868 wrote to memory of 2112 4868 z8997369.exe 68 PID 4868 wrote to memory of 3132 4868 z8997369.exe 69 PID 4868 wrote to memory of 3132 4868 z8997369.exe 69 PID 4868 wrote to memory of 3132 4868 z8997369.exe 69 PID 4352 wrote to memory of 4448 4352 z9765811.exe 71 PID 4352 wrote to memory of 4448 4352 z9765811.exe 71 PID 4352 wrote to memory of 4448 4352 z9765811.exe 71 PID 2292 wrote to memory of 5048 2292 143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3.exe 72 PID 2292 wrote to memory of 5048 2292 143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3.exe 72 PID 2292 wrote to memory of 5048 2292 143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3.exe 72 PID 5048 wrote to memory of 4404 5048 s8672799.exe 73 PID 5048 wrote to memory of 4404 5048 s8672799.exe 73 PID 5048 wrote to memory of 4404 5048 s8672799.exe 73 PID 5048 wrote to memory of 4404 5048 s8672799.exe 73 PID 5048 wrote to memory of 4404 5048 s8672799.exe 73 PID 5048 wrote to memory of 4404 5048 s8672799.exe 73 PID 5048 wrote to memory of 4404 5048 s8672799.exe 73 PID 5048 wrote to memory of 4404 5048 s8672799.exe 73 PID 5048 wrote to memory of 4404 5048 s8672799.exe 73 PID 5048 wrote to memory of 4404 5048 s8672799.exe 73 PID 4404 wrote to memory of 3228 4404 s8672799.exe 74 PID 4404 wrote to memory of 3228 4404 s8672799.exe 74 PID 4404 wrote to memory of 3228 4404 s8672799.exe 74 PID 3228 wrote to memory of 4872 3228 legends.exe 75 PID 3228 wrote to memory of 4872 3228 legends.exe 75 PID 3228 wrote to memory of 4872 3228 legends.exe 75 PID 3228 wrote to memory of 4872 3228 legends.exe 75 PID 3228 wrote to memory of 4872 3228 legends.exe 75 PID 3228 wrote to memory of 4872 3228 legends.exe 75 PID 3228 wrote to memory of 4872 3228 legends.exe 75 PID 3228 wrote to memory of 4872 3228 legends.exe 75 PID 3228 wrote to memory of 4872 3228 legends.exe 75 PID 3228 wrote to memory of 4872 3228 legends.exe 75 PID 4872 wrote to memory of 836 4872 legends.exe 76 PID 4872 wrote to memory of 836 4872 legends.exe 76 PID 4872 wrote to memory of 836 4872 legends.exe 76 PID 4872 wrote to memory of 436 4872 legends.exe 78 PID 4872 wrote to memory of 436 4872 legends.exe 78 PID 4872 wrote to memory of 436 4872 legends.exe 78 PID 436 wrote to memory of 4260 436 cmd.exe 80 PID 436 wrote to memory of 4260 436 cmd.exe 80 PID 436 wrote to memory of 4260 436 cmd.exe 80 PID 436 wrote to memory of 3360 436 cmd.exe 81 PID 436 wrote to memory of 3360 436 cmd.exe 81 PID 436 wrote to memory of 3360 436 cmd.exe 81 PID 436 wrote to memory of 668 436 cmd.exe 82 PID 436 wrote to memory of 668 436 cmd.exe 82 PID 436 wrote to memory of 668 436 cmd.exe 82 PID 436 wrote to memory of 1744 436 cmd.exe 83 PID 436 wrote to memory of 1744 436 cmd.exe 83 PID 436 wrote to memory of 1744 436 cmd.exe 83 PID 436 wrote to memory of 1132 436 cmd.exe 84 PID 436 wrote to memory of 1132 436 cmd.exe 84 PID 436 wrote to memory of 1132 436 cmd.exe 84 PID 436 wrote to memory of 728 436 cmd.exe 85 PID 436 wrote to memory of 728 436 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3.exe"C:\Users\Admin\AppData\Local\Temp\143096149accb915abd83b92b94da619386a64e6c4ae6dedb6065a1d69a818d3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9765811.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9765811.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8997369.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8997369.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o7819199.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o7819199.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8386143.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8386143.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1754542.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1754542.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8672799.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8672799.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8672799.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8672799.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F6⤵
- Creates scheduled task(s)
PID:836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"7⤵PID:3360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E7⤵PID:668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"7⤵PID:1132
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E7⤵PID:728
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"{path}"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2696 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2696 -s 8689⤵
- Program crash
PID:2464
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4636 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4636 -s 9369⤵
- Program crash
PID:2740
-
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 28⤵PID:1112
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2108
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:168 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:196
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵PID:4416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD590acfd72f14a512712b1a7380c0faf60
SHA140ba4accb8faa75887e84fb8e38d598dc8cf0f12
SHA25620806822f0c130b340504132c1461b589261fbbc518e468f4f90733ab514cb86
SHA51229dbf85e14e60868574cb4dc9bda83d3c229fb956733d8d2557f2475ee0e690ac9c2e72f31e02284996da6906ba2dbfa382a29b04c15a2406571d8ee19ad16b9
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
963KB
MD55fda3cf5b5369997fbc45726f2a87c05
SHA146858c931028fb92ee0b1ff0d07654fb61e9def1
SHA256d770edb89453645f494c3c730493a846160a0edfc4a03ccbd17d9ea5aeee0ba8
SHA512cc2d8d6ee33816b168af325a73d632d3b94e1958d9ae1a066e0a67f5a78f8afd7145a368d155457bed20a76b1e395ac2ede5b2f76d13dcdf14a1274afdd056a2
-
Filesize
963KB
MD55fda3cf5b5369997fbc45726f2a87c05
SHA146858c931028fb92ee0b1ff0d07654fb61e9def1
SHA256d770edb89453645f494c3c730493a846160a0edfc4a03ccbd17d9ea5aeee0ba8
SHA512cc2d8d6ee33816b168af325a73d632d3b94e1958d9ae1a066e0a67f5a78f8afd7145a368d155457bed20a76b1e395ac2ede5b2f76d13dcdf14a1274afdd056a2
-
Filesize
963KB
MD55fda3cf5b5369997fbc45726f2a87c05
SHA146858c931028fb92ee0b1ff0d07654fb61e9def1
SHA256d770edb89453645f494c3c730493a846160a0edfc4a03ccbd17d9ea5aeee0ba8
SHA512cc2d8d6ee33816b168af325a73d632d3b94e1958d9ae1a066e0a67f5a78f8afd7145a368d155457bed20a76b1e395ac2ede5b2f76d13dcdf14a1274afdd056a2
-
Filesize
963KB
MD55fda3cf5b5369997fbc45726f2a87c05
SHA146858c931028fb92ee0b1ff0d07654fb61e9def1
SHA256d770edb89453645f494c3c730493a846160a0edfc4a03ccbd17d9ea5aeee0ba8
SHA512cc2d8d6ee33816b168af325a73d632d3b94e1958d9ae1a066e0a67f5a78f8afd7145a368d155457bed20a76b1e395ac2ede5b2f76d13dcdf14a1274afdd056a2
-
Filesize
963KB
MD55fda3cf5b5369997fbc45726f2a87c05
SHA146858c931028fb92ee0b1ff0d07654fb61e9def1
SHA256d770edb89453645f494c3c730493a846160a0edfc4a03ccbd17d9ea5aeee0ba8
SHA512cc2d8d6ee33816b168af325a73d632d3b94e1958d9ae1a066e0a67f5a78f8afd7145a368d155457bed20a76b1e395ac2ede5b2f76d13dcdf14a1274afdd056a2
-
Filesize
963KB
MD55fda3cf5b5369997fbc45726f2a87c05
SHA146858c931028fb92ee0b1ff0d07654fb61e9def1
SHA256d770edb89453645f494c3c730493a846160a0edfc4a03ccbd17d9ea5aeee0ba8
SHA512cc2d8d6ee33816b168af325a73d632d3b94e1958d9ae1a066e0a67f5a78f8afd7145a368d155457bed20a76b1e395ac2ede5b2f76d13dcdf14a1274afdd056a2
-
Filesize
963KB
MD55fda3cf5b5369997fbc45726f2a87c05
SHA146858c931028fb92ee0b1ff0d07654fb61e9def1
SHA256d770edb89453645f494c3c730493a846160a0edfc4a03ccbd17d9ea5aeee0ba8
SHA512cc2d8d6ee33816b168af325a73d632d3b94e1958d9ae1a066e0a67f5a78f8afd7145a368d155457bed20a76b1e395ac2ede5b2f76d13dcdf14a1274afdd056a2
-
Filesize
963KB
MD55fda3cf5b5369997fbc45726f2a87c05
SHA146858c931028fb92ee0b1ff0d07654fb61e9def1
SHA256d770edb89453645f494c3c730493a846160a0edfc4a03ccbd17d9ea5aeee0ba8
SHA512cc2d8d6ee33816b168af325a73d632d3b94e1958d9ae1a066e0a67f5a78f8afd7145a368d155457bed20a76b1e395ac2ede5b2f76d13dcdf14a1274afdd056a2
-
Filesize
963KB
MD55fda3cf5b5369997fbc45726f2a87c05
SHA146858c931028fb92ee0b1ff0d07654fb61e9def1
SHA256d770edb89453645f494c3c730493a846160a0edfc4a03ccbd17d9ea5aeee0ba8
SHA512cc2d8d6ee33816b168af325a73d632d3b94e1958d9ae1a066e0a67f5a78f8afd7145a368d155457bed20a76b1e395ac2ede5b2f76d13dcdf14a1274afdd056a2
-
Filesize
963KB
MD55fda3cf5b5369997fbc45726f2a87c05
SHA146858c931028fb92ee0b1ff0d07654fb61e9def1
SHA256d770edb89453645f494c3c730493a846160a0edfc4a03ccbd17d9ea5aeee0ba8
SHA512cc2d8d6ee33816b168af325a73d632d3b94e1958d9ae1a066e0a67f5a78f8afd7145a368d155457bed20a76b1e395ac2ede5b2f76d13dcdf14a1274afdd056a2
-
Filesize
575KB
MD54e671e8b68042f5688ef3d71b1b13b35
SHA1a4f6b125ca2f9687c523ed2319b23571598b8680
SHA25658f5120bfc85fae6f5c544f0817a0b7fb205c93ece15f53ee566b3f79bae0655
SHA512bdb6982f88bc1cce042f6c4f0cdbd7867499f79a72925f5f35896b9f4f7b2ab6456b8163099ca20b4d5e63acad2ce98cd6f67afe77ed197d8e43458834fcf618
-
Filesize
575KB
MD54e671e8b68042f5688ef3d71b1b13b35
SHA1a4f6b125ca2f9687c523ed2319b23571598b8680
SHA25658f5120bfc85fae6f5c544f0817a0b7fb205c93ece15f53ee566b3f79bae0655
SHA512bdb6982f88bc1cce042f6c4f0cdbd7867499f79a72925f5f35896b9f4f7b2ab6456b8163099ca20b4d5e63acad2ce98cd6f67afe77ed197d8e43458834fcf618
-
Filesize
284KB
MD54f1e67224e2b8b41ff5be0412771d90d
SHA1785f44ae2ef383049af8b74a16ac7b3e5a39a270
SHA2562daa4792bdd65da1b35841fa3ee4e0bb110dd09d777ea7291d65cce2687a3c00
SHA51295b49dadd49fc30db2ce0014d2c0b15a95c47925db57c8143dbdccc1f38540e438da91f4c3cdff01a150ce7197a2754b30e4fa4be85f1ce53fe7586388dd0098
-
Filesize
284KB
MD54f1e67224e2b8b41ff5be0412771d90d
SHA1785f44ae2ef383049af8b74a16ac7b3e5a39a270
SHA2562daa4792bdd65da1b35841fa3ee4e0bb110dd09d777ea7291d65cce2687a3c00
SHA51295b49dadd49fc30db2ce0014d2c0b15a95c47925db57c8143dbdccc1f38540e438da91f4c3cdff01a150ce7197a2754b30e4fa4be85f1ce53fe7586388dd0098
-
Filesize
304KB
MD585525bb0c47275e6d35ccc4aa50f8b5e
SHA18b563670ef3f3c70406184e5c8602f5ae4e59acd
SHA256f0816c674dec5037cc14d24c1960b976971ebcdaffdac050917a675c7a3aa16d
SHA51285c60a14a8f416039572cddb68d2680f3320f215fb55b7fd85f4932f9e1866a1adec2fb08e5c2a81c81c8bbd1b5ba4761555f861c1f0dd5390ffc926127f9420
-
Filesize
304KB
MD585525bb0c47275e6d35ccc4aa50f8b5e
SHA18b563670ef3f3c70406184e5c8602f5ae4e59acd
SHA256f0816c674dec5037cc14d24c1960b976971ebcdaffdac050917a675c7a3aa16d
SHA51285c60a14a8f416039572cddb68d2680f3320f215fb55b7fd85f4932f9e1866a1adec2fb08e5c2a81c81c8bbd1b5ba4761555f861c1f0dd5390ffc926127f9420
-
Filesize
185KB
MD5ed3e68f532ccd85a773a73e87a52581d
SHA1a5cd4f9bd7c8dbb1569c9688fb780e2d3d172b93
SHA25695abd8cc904f91d473816cc10c2272e49218910fc6959adcea9d7394f3557264
SHA51265009e3edc4528b6930da7eabc1b3d04e0344d78be2dc57f33838da6cf92718580b2b271da53699d4fc6bdadcea4dbe1a658b0d8a6e853c399bb224a6cc17807
-
Filesize
185KB
MD5ed3e68f532ccd85a773a73e87a52581d
SHA1a5cd4f9bd7c8dbb1569c9688fb780e2d3d172b93
SHA25695abd8cc904f91d473816cc10c2272e49218910fc6959adcea9d7394f3557264
SHA51265009e3edc4528b6930da7eabc1b3d04e0344d78be2dc57f33838da6cf92718580b2b271da53699d4fc6bdadcea4dbe1a658b0d8a6e853c399bb224a6cc17807
-
Filesize
145KB
MD5774033fd3e1616c15fa164592b7e173b
SHA11882a154c5a6f5c7bbdff66c9ad68fb324b1b454
SHA256f2c9018f1644f907ff477bd3643629d76b8e4c8f0a11b9cd927eea56506e569b
SHA51245b23536db8d9ae86acee35e73cc7a3e214a0683143072703118ebc526140b158be496ff7b7ee6f46a1b18f01c66340b872d4e4c1d412644244c5fc6d0f56b15
-
Filesize
145KB
MD5774033fd3e1616c15fa164592b7e173b
SHA11882a154c5a6f5c7bbdff66c9ad68fb324b1b454
SHA256f2c9018f1644f907ff477bd3643629d76b8e4c8f0a11b9cd927eea56506e569b
SHA51245b23536db8d9ae86acee35e73cc7a3e214a0683143072703118ebc526140b158be496ff7b7ee6f46a1b18f01c66340b872d4e4c1d412644244c5fc6d0f56b15
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643