Analysis
-
max time kernel
215s -
max time network
256s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
05/07/2023, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433.exe
Resource
win10-20230703-en
General
-
Target
0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433.exe
-
Size
3.6MB
-
MD5
96aa619e703dd9c9af5df8373598a0d9
-
SHA1
d48c62a2d37fbe6395f5b75a83df68e2d4aea134
-
SHA256
0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433
-
SHA512
fd9dab7d4dcd795f4dc7ba24c948571496591746d772150ce0b931969ae9f37944bde7a145d731ab3213a23770004d8f8200d27d956dd5d07a4bafb8dbf43aa2
-
SSDEEP
49152:yxypntypmroj7XHFEoxHSL+YTKxQHFgnrkJVb4ksaJi97pHJ2AsdlhfL0P1JfPGo:jr5+YbVb9Ja6VhUPcHzILF
Malware Config
Extracted
redline
furod
77.91.68.70:19073
-
auth_value
d2386245fe11799b28b4521492a5879d
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 7 IoCs
resource yara_rule behavioral2/files/0x000700000001af6b-169.dat healer behavioral2/files/0x000700000001af6b-170.dat healer behavioral2/memory/3464-171-0x0000000000650000-0x000000000065A000-memory.dmp healer behavioral2/files/0x000600000001af78-194.dat healer behavioral2/memory/4692-257-0x00000000001D0000-0x00000000001DA000-memory.dmp healer behavioral2/files/0x000600000001af78-270.dat healer behavioral2/files/0x000600000001af78-271.dat healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" i6620984.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" i6620984.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1340022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1340022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" i8021818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1340022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" i8021818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" i8021818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" i6620984.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" i6620984.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1340022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1340022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" i8021818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" i8021818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" i6620984.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 18 IoCs
pid Process 4648 x3939564.exe 1480 f4359277.exe 4652 g4551072.exe 4952 rugen.exe 3464 i6620984.exe 4300 foto175.exe 5048 x1662342.exe 728 f0754644.exe 912 rugen.exe 412 fotod45.exe 3096 y8040865.exe 4692 k1340022.exe 4876 rama.exe 4132 g7631433.exe 4588 i8021818.exe 4992 l1500827.exe 2000 n2592917.exe 4708 rugen.exe -
Loads dropped DLL 2 IoCs
pid Process 4916 regsvr32.exe 3124 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" i6620984.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1340022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1340022.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" i8021818.exe -
Adds Run key to start application 2 TTPs 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fotod45.exe Set value (str) \REGISTRY\USER\S-1-5-21-4175128012-676912335-1083716439-1000\Software\Microsoft\Windows\CurrentVersion\Run\rama.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000025051\\rama.exe" rugen.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1662342.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fotod45.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3939564.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" foto175.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8040865.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y8040865.exe Set value (str) \REGISTRY\USER\S-1-5-21-4175128012-676912335-1083716439-1000\Software\Microsoft\Windows\CurrentVersion\Run\foto175.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000023051\\foto175.exe" rugen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1662342.exe Set value (str) \REGISTRY\USER\S-1-5-21-4175128012-676912335-1083716439-1000\Software\Microsoft\Windows\CurrentVersion\Run\fotod45.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000024051\\fotod45.exe" rugen.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3939564.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce foto175.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1480 f4359277.exe 1480 f4359277.exe 3464 i6620984.exe 3464 i6620984.exe 728 f0754644.exe 728 f0754644.exe 4692 k1340022.exe 4692 k1340022.exe 4588 i8021818.exe 4588 i8021818.exe 4992 l1500827.exe 4992 l1500827.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1480 f4359277.exe Token: SeDebugPrivilege 3464 i6620984.exe Token: SeDebugPrivilege 728 f0754644.exe Token: SeDebugPrivilege 4692 k1340022.exe Token: SeDebugPrivilege 4588 i8021818.exe Token: SeDebugPrivilege 4992 l1500827.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4652 g4551072.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 4648 4404 0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433.exe 71 PID 4404 wrote to memory of 4648 4404 0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433.exe 71 PID 4404 wrote to memory of 4648 4404 0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433.exe 71 PID 4648 wrote to memory of 1480 4648 x3939564.exe 72 PID 4648 wrote to memory of 1480 4648 x3939564.exe 72 PID 4648 wrote to memory of 1480 4648 x3939564.exe 72 PID 4648 wrote to memory of 4652 4648 x3939564.exe 75 PID 4648 wrote to memory of 4652 4648 x3939564.exe 75 PID 4648 wrote to memory of 4652 4648 x3939564.exe 75 PID 4652 wrote to memory of 4952 4652 g4551072.exe 76 PID 4652 wrote to memory of 4952 4652 g4551072.exe 76 PID 4652 wrote to memory of 4952 4652 g4551072.exe 76 PID 4404 wrote to memory of 3464 4404 0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433.exe 77 PID 4404 wrote to memory of 3464 4404 0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433.exe 77 PID 4952 wrote to memory of 1488 4952 rugen.exe 78 PID 4952 wrote to memory of 1488 4952 rugen.exe 78 PID 4952 wrote to memory of 1488 4952 rugen.exe 78 PID 4952 wrote to memory of 4720 4952 rugen.exe 80 PID 4952 wrote to memory of 4720 4952 rugen.exe 80 PID 4952 wrote to memory of 4720 4952 rugen.exe 80 PID 4720 wrote to memory of 812 4720 cmd.exe 82 PID 4720 wrote to memory of 812 4720 cmd.exe 82 PID 4720 wrote to memory of 812 4720 cmd.exe 82 PID 4720 wrote to memory of 4456 4720 cmd.exe 83 PID 4720 wrote to memory of 4456 4720 cmd.exe 83 PID 4720 wrote to memory of 4456 4720 cmd.exe 83 PID 4720 wrote to memory of 5040 4720 cmd.exe 84 PID 4720 wrote to memory of 5040 4720 cmd.exe 84 PID 4720 wrote to memory of 5040 4720 cmd.exe 84 PID 4720 wrote to memory of 1844 4720 cmd.exe 85 PID 4720 wrote to memory of 1844 4720 cmd.exe 85 PID 4720 wrote to memory of 1844 4720 cmd.exe 85 PID 4720 wrote to memory of 4396 4720 cmd.exe 86 PID 4720 wrote to memory of 4396 4720 cmd.exe 86 PID 4720 wrote to memory of 4396 4720 cmd.exe 86 PID 4720 wrote to memory of 5064 4720 cmd.exe 87 PID 4720 wrote to memory of 5064 4720 cmd.exe 87 PID 4720 wrote to memory of 5064 4720 cmd.exe 87 PID 4952 wrote to memory of 4300 4952 rugen.exe 88 PID 4952 wrote to memory of 4300 4952 rugen.exe 88 PID 4952 wrote to memory of 4300 4952 rugen.exe 88 PID 4300 wrote to memory of 5048 4300 foto175.exe 90 PID 4300 wrote to memory of 5048 4300 foto175.exe 90 PID 4300 wrote to memory of 5048 4300 foto175.exe 90 PID 5048 wrote to memory of 728 5048 x1662342.exe 91 PID 5048 wrote to memory of 728 5048 x1662342.exe 91 PID 5048 wrote to memory of 728 5048 x1662342.exe 91 PID 4952 wrote to memory of 412 4952 rugen.exe 94 PID 4952 wrote to memory of 412 4952 rugen.exe 94 PID 4952 wrote to memory of 412 4952 rugen.exe 94 PID 412 wrote to memory of 3096 412 fotod45.exe 96 PID 412 wrote to memory of 3096 412 fotod45.exe 96 PID 412 wrote to memory of 3096 412 fotod45.exe 96 PID 3096 wrote to memory of 4692 3096 y8040865.exe 97 PID 3096 wrote to memory of 4692 3096 y8040865.exe 97 PID 3096 wrote to memory of 4692 3096 y8040865.exe 97 PID 4952 wrote to memory of 4876 4952 rugen.exe 99 PID 4952 wrote to memory of 4876 4952 rugen.exe 99 PID 4952 wrote to memory of 4876 4952 rugen.exe 99 PID 5048 wrote to memory of 4132 5048 x1662342.exe 100 PID 5048 wrote to memory of 4132 5048 x1662342.exe 100 PID 5048 wrote to memory of 4132 5048 x1662342.exe 100 PID 4300 wrote to memory of 4588 4300 foto175.exe 101 PID 4300 wrote to memory of 4588 4300 foto175.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433.exe"C:\Users\Admin\AppData\Local\Temp\0175472e856de50c491001b63db73e37d4ade26b01b222b2db2c10844cef3433.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3939564.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3939564.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f4359277.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f4359277.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4551072.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4551072.exe3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F5⤵
- Creates scheduled task(s)
PID:1488
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"6⤵PID:4456
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E6⤵PID:5040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1844
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"6⤵PID:4396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E6⤵PID:5064
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000023051\foto175.exe"C:\Users\Admin\AppData\Local\Temp\1000023051\foto175.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1662342.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1662342.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0754644.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f0754644.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7631433.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7631433.exe7⤵
- Executes dropped EXE
PID:4132
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i8021818.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i8021818.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000024051\fotod45.exe"C:\Users\Admin\AppData\Local\Temp\1000024051\fotod45.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8040865.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8040865.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k1340022.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k1340022.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1500827.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l1500827.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2592917.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n2592917.exe6⤵
- Executes dropped EXE
PID:2000
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000025051\rama.exe"C:\Users\Admin\AppData\Local\Temp\1000025051\rama.exe"5⤵
- Executes dropped EXE
PID:4876 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -S JmnMmZGN.FT /u6⤵
- Loads dropped DLL
PID:4916
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3124
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6620984.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6620984.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:912
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe1⤵
- Executes dropped EXE
PID:4708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e49363be96a39de62876e4b1adcc0087
SHA1298c43845f3ede76589c47495e2e7a2918ccc684
SHA256ec17de230ef7dd522a828d76352ac9d2b98d9fb01122c0b19386e0ebd2e2459f
SHA512869ad2034367c3bd7d096a1163950d29acd68a76769e56d5aaf4113005335e034d1cf1db3f27c75f960559629df58833104921a3afb885c92ce684e14af90b92
-
Filesize
3.6MB
MD5aa9e80416f6cdec303848136e91cb59c
SHA1de32eb7252ebe57cd43399212a9edb57ea563ddc
SHA2565fe4235b3baddacddba761414c601f3345ebac0b3d5e1d6211d1da552063f12c
SHA512c56a70630f8df24da7faa1d0cf3d4cf1217f9d1141b6acf16b51715fc7cfbda61118b6d9014f050b29a5bd7dadcbb11f05478300029f5ede1ddca7ba4f4642ea
-
Filesize
3.6MB
MD5aa9e80416f6cdec303848136e91cb59c
SHA1de32eb7252ebe57cd43399212a9edb57ea563ddc
SHA2565fe4235b3baddacddba761414c601f3345ebac0b3d5e1d6211d1da552063f12c
SHA512c56a70630f8df24da7faa1d0cf3d4cf1217f9d1141b6acf16b51715fc7cfbda61118b6d9014f050b29a5bd7dadcbb11f05478300029f5ede1ddca7ba4f4642ea
-
Filesize
3.6MB
MD5aa9e80416f6cdec303848136e91cb59c
SHA1de32eb7252ebe57cd43399212a9edb57ea563ddc
SHA2565fe4235b3baddacddba761414c601f3345ebac0b3d5e1d6211d1da552063f12c
SHA512c56a70630f8df24da7faa1d0cf3d4cf1217f9d1141b6acf16b51715fc7cfbda61118b6d9014f050b29a5bd7dadcbb11f05478300029f5ede1ddca7ba4f4642ea
-
Filesize
3.9MB
MD597ee2d781edd8f7f0962c4e0971e22f1
SHA176101d9fb77f2a982536f0f3cf861ef9cb5d7162
SHA256340b6e3ddd092332bc5ccf534cbed6908cd5d50b6fd5dced96d3bc1f153ecbb5
SHA512dcb2a1afc36c4c7f4063eb14c1aba4d467f184383df40fafd1b77572ee2126eecabb874fe4df83b3b4b23b3d076db9aedbf51e502f3ee574c9658a22ef24bc39
-
Filesize
3.9MB
MD597ee2d781edd8f7f0962c4e0971e22f1
SHA176101d9fb77f2a982536f0f3cf861ef9cb5d7162
SHA256340b6e3ddd092332bc5ccf534cbed6908cd5d50b6fd5dced96d3bc1f153ecbb5
SHA512dcb2a1afc36c4c7f4063eb14c1aba4d467f184383df40fafd1b77572ee2126eecabb874fe4df83b3b4b23b3d076db9aedbf51e502f3ee574c9658a22ef24bc39
-
Filesize
3.9MB
MD597ee2d781edd8f7f0962c4e0971e22f1
SHA176101d9fb77f2a982536f0f3cf861ef9cb5d7162
SHA256340b6e3ddd092332bc5ccf534cbed6908cd5d50b6fd5dced96d3bc1f153ecbb5
SHA512dcb2a1afc36c4c7f4063eb14c1aba4d467f184383df40fafd1b77572ee2126eecabb874fe4df83b3b4b23b3d076db9aedbf51e502f3ee574c9658a22ef24bc39
-
Filesize
1.9MB
MD52a6702d67e262c081caf1ba90e6cd9f9
SHA11e121bd7acd0ec1af7fb020e546faa9b26fd43b5
SHA256356a8c85148259231f7d2558b61b1b502678f7669ef2bb06973280cbd2de2f1f
SHA5120ec74758dfe048f854cb4bdf0d1cac8590dd37b4782514abb5cff0f667c359c29e6bc795320c7c5db81b6ba0d8430d8402d99d990a7118630a258d2e821ed9cc
-
Filesize
1.9MB
MD52a6702d67e262c081caf1ba90e6cd9f9
SHA11e121bd7acd0ec1af7fb020e546faa9b26fd43b5
SHA256356a8c85148259231f7d2558b61b1b502678f7669ef2bb06973280cbd2de2f1f
SHA5120ec74758dfe048f854cb4bdf0d1cac8590dd37b4782514abb5cff0f667c359c29e6bc795320c7c5db81b6ba0d8430d8402d99d990a7118630a258d2e821ed9cc
-
Filesize
1.9MB
MD52a6702d67e262c081caf1ba90e6cd9f9
SHA11e121bd7acd0ec1af7fb020e546faa9b26fd43b5
SHA256356a8c85148259231f7d2558b61b1b502678f7669ef2bb06973280cbd2de2f1f
SHA5120ec74758dfe048f854cb4bdf0d1cac8590dd37b4782514abb5cff0f667c359c29e6bc795320c7c5db81b6ba0d8430d8402d99d990a7118630a258d2e821ed9cc
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
437KB
MD50ff0a3f70bb0546adb6c5806b270de2a
SHA1f85165bed91c87b027522f04411da6767d07ddd5
SHA2569764df4d2d845d97b4debb1fc0fd9f4e383556061f1e275152a6d7788c7f5182
SHA5122cef1d12d4eaa432cffd258ff77b161f5549678fc7db8bbbda8874a0924fe68cb07a91ec91c4d4425c3658725ed8aba0ce4705d408f2d056220312bdea8a5249
-
Filesize
437KB
MD50ff0a3f70bb0546adb6c5806b270de2a
SHA1f85165bed91c87b027522f04411da6767d07ddd5
SHA2569764df4d2d845d97b4debb1fc0fd9f4e383556061f1e275152a6d7788c7f5182
SHA5122cef1d12d4eaa432cffd258ff77b161f5549678fc7db8bbbda8874a0924fe68cb07a91ec91c4d4425c3658725ed8aba0ce4705d408f2d056220312bdea8a5249
-
Filesize
402KB
MD5ea66ebb629dfdc5a17e9ba52c672d471
SHA1bc086e6b7f884e4b4b11c59cef6a1dd3dff0fbcd
SHA256813a18184d0e5c3af47d0b53d5038175f06325f361a854b7b8531f0b212888e3
SHA512cfee867f8de6130f0d8b65d7fad4dd386743107891a4de87b4fe6b9f5498f618a7b373f91556d2fecda5c3dbf41131555486dab817e3ba65da87813f9f5b043c
-
Filesize
402KB
MD5ea66ebb629dfdc5a17e9ba52c672d471
SHA1bc086e6b7f884e4b4b11c59cef6a1dd3dff0fbcd
SHA256813a18184d0e5c3af47d0b53d5038175f06325f361a854b7b8531f0b212888e3
SHA512cfee867f8de6130f0d8b65d7fad4dd386743107891a4de87b4fe6b9f5498f618a7b373f91556d2fecda5c3dbf41131555486dab817e3ba65da87813f9f5b043c
-
Filesize
1.3MB
MD51156db86a9550b2d8902fd11d33c19cd
SHA112b3b2c51615f1ceee65acb642019970d6bb916c
SHA25643c051dca42ad13797bdcc75026677ad2d8ca19647c3f90e44a18abd9c50dae2
SHA512bdd2dd4b6af37ecc0c3e393d2200f7e7273f9f39cdfecacfcebf6ca54c35aca2c19d41b290f5ca7620e15f4d07bf66e96bfcfad79d79c27f116f644b550e7ddc
-
Filesize
1.3MB
MD51156db86a9550b2d8902fd11d33c19cd
SHA112b3b2c51615f1ceee65acb642019970d6bb916c
SHA25643c051dca42ad13797bdcc75026677ad2d8ca19647c3f90e44a18abd9c50dae2
SHA512bdd2dd4b6af37ecc0c3e393d2200f7e7273f9f39cdfecacfcebf6ca54c35aca2c19d41b290f5ca7620e15f4d07bf66e96bfcfad79d79c27f116f644b550e7ddc
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
434KB
MD555efa4b0c4b99e273816423053800cf2
SHA14bb15254404a52d6483dbc2b2e283d060f0a10f6
SHA2565f013635a917fb13b80db1d1c83470a35ad4c9bcf7e0e73029b7f7156a0458b7
SHA512e870db9eee80ea0bab9617633c0d342928f34c56732a59f4980316a782717bbb48f53d1aea35b188efc1efbafa9e572394c00c457196b6d4d919857b0b4f44fa
-
Filesize
434KB
MD555efa4b0c4b99e273816423053800cf2
SHA14bb15254404a52d6483dbc2b2e283d060f0a10f6
SHA2565f013635a917fb13b80db1d1c83470a35ad4c9bcf7e0e73029b7f7156a0458b7
SHA512e870db9eee80ea0bab9617633c0d342928f34c56732a59f4980316a782717bbb48f53d1aea35b188efc1efbafa9e572394c00c457196b6d4d919857b0b4f44fa
-
Filesize
1.3MB
MD5372fbc343efb283746e8c11fbafd52e6
SHA190263ddc9236c057f1ffcf26cbc953beff3009cf
SHA256da588153b8900ecd46bb62b15f6c870c1eff2330e6bc8346ab7d3e5bfc8730e1
SHA512e26d6dc0a02d5b2a02eb79cd2f5890be1778d783a6ee159c11b9dd1f48a0a3621c7f23dac5b6762400863901dae26540de03db17287431a5a38c4ad1e2500e42
-
Filesize
1.3MB
MD5372fbc343efb283746e8c11fbafd52e6
SHA190263ddc9236c057f1ffcf26cbc953beff3009cf
SHA256da588153b8900ecd46bb62b15f6c870c1eff2330e6bc8346ab7d3e5bfc8730e1
SHA512e26d6dc0a02d5b2a02eb79cd2f5890be1778d783a6ee159c11b9dd1f48a0a3621c7f23dac5b6762400863901dae26540de03db17287431a5a38c4ad1e2500e42
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
185KB
MD5ca338b54586954a5dbe4bbe285836571
SHA1f4bd3bd2f47ad2f36b774abac3e2a378c4c53604
SHA256f5eefa3b9c8cc01a9ffaceb3583c45c2cb10dc9bcb584772533ada3b6a66ec6e
SHA51203419618bcfca461a7c95638819645263659485d8149330e08cb16c50e45cf397f2030d8f8bf5a5ec2ccdb2d6653dce1609570ce88d318d3dd4b4cf551bc3b10
-
Filesize
185KB
MD5ca338b54586954a5dbe4bbe285836571
SHA1f4bd3bd2f47ad2f36b774abac3e2a378c4c53604
SHA256f5eefa3b9c8cc01a9ffaceb3583c45c2cb10dc9bcb584772533ada3b6a66ec6e
SHA51203419618bcfca461a7c95638819645263659485d8149330e08cb16c50e45cf397f2030d8f8bf5a5ec2ccdb2d6653dce1609570ce88d318d3dd4b4cf551bc3b10
-
Filesize
1.3MB
MD57d7506f9a5e142b81b7acb3e3765585c
SHA1b8f388b4ae7f6c942302d17f0e746d1303b7c517
SHA256ac76c152af44b05618f45f5da3df3c9a999c8fc83ab39382cd5ca42c746305d1
SHA512385676d04b22cf0a106bc9ead2827eb4d0930d5c22a4f1d531c8bf9cf9525dfe1a3f6fe3227586abf5d56f18598898daa8da64b3a8ec1293506092f8c7dc9902
-
Filesize
1.3MB
MD57d7506f9a5e142b81b7acb3e3765585c
SHA1b8f388b4ae7f6c942302d17f0e746d1303b7c517
SHA256ac76c152af44b05618f45f5da3df3c9a999c8fc83ab39382cd5ca42c746305d1
SHA512385676d04b22cf0a106bc9ead2827eb4d0930d5c22a4f1d531c8bf9cf9525dfe1a3f6fe3227586abf5d56f18598898daa8da64b3a8ec1293506092f8c7dc9902
-
Filesize
1.3MB
MD57d7506f9a5e142b81b7acb3e3765585c
SHA1b8f388b4ae7f6c942302d17f0e746d1303b7c517
SHA256ac76c152af44b05618f45f5da3df3c9a999c8fc83ab39382cd5ca42c746305d1
SHA512385676d04b22cf0a106bc9ead2827eb4d0930d5c22a4f1d531c8bf9cf9525dfe1a3f6fe3227586abf5d56f18598898daa8da64b3a8ec1293506092f8c7dc9902
-
Filesize
1.2MB
MD5545df7b6cbfe3f94bb14aecd133308e5
SHA1d646e7caec660d802b374a8e3fce3aa4060887af
SHA2564796dc9e085e917a8212d355e3361222294f9bb9787e5e6b1d8ebaf45b62193f
SHA5124e19c7d02dd41aefb68fd620f31219cff239b128b977de47802770544270fea05065a442a530a6f212594e3e460fa89e0795abad22acb3287d1a90118a241d3c
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d
-
Filesize
1.2MB
MD5545df7b6cbfe3f94bb14aecd133308e5
SHA1d646e7caec660d802b374a8e3fce3aa4060887af
SHA2564796dc9e085e917a8212d355e3361222294f9bb9787e5e6b1d8ebaf45b62193f
SHA5124e19c7d02dd41aefb68fd620f31219cff239b128b977de47802770544270fea05065a442a530a6f212594e3e460fa89e0795abad22acb3287d1a90118a241d3c
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf