Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 04:58
Static task
static1
Behavioral task
behavioral1
Sample
5ed46e78f93bcca3b7d97f84a4743d647920bd953646e0ce03576801104905e3.exe
Resource
win10v2004-20230915-en
General
-
Target
5ed46e78f93bcca3b7d97f84a4743d647920bd953646e0ce03576801104905e3.exe
-
Size
994KB
-
MD5
c3f8befba63ad9b9b0f72bc5b0033bc9
-
SHA1
29896aee362718b7222c0f8be1cda8c477b59d8c
-
SHA256
5ed46e78f93bcca3b7d97f84a4743d647920bd953646e0ce03576801104905e3
-
SHA512
60701521bbafb8b3154a16014d79f92bcf2f1450d55c25a691c97cc0fb3775b6389495ccbaaff6575898d160f7a06b011e709e28fe6efdcc791fe44b0ab3300d
-
SSDEEP
24576:zyEShTFhcM9OBGMid+lm+QprSHAda6cKaOPkI3VgnCVcqoDWl:GEiFhcsWViklWl6AdeOtLcRS
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8064940.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8064940.exe healer behavioral1/memory/2820-35-0x0000000000290000-0x000000000029A000-memory.dmp healer -
Processes:
q8064940.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q8064940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q8064940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q8064940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q8064940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q8064940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q8064940.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
u5816463.exelegota.exet7047869.exeexplothe.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation u5816463.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation t7047869.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation explothe.exe -
Executes dropped EXE 16 IoCs
Processes:
z8868224.exez9160812.exez2323711.exez1564281.exeq8064940.exer7603396.exes3671798.exet7047869.exeexplothe.exeu5816463.exelegota.exew9874948.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4552 z8868224.exe 64 z9160812.exe 1808 z2323711.exe 3676 z1564281.exe 2820 q8064940.exe 2264 r7603396.exe 1804 s3671798.exe 4656 t7047869.exe 1928 explothe.exe 3848 u5816463.exe 3772 legota.exe 1464 w9874948.exe 3416 explothe.exe 2752 legota.exe 3848 explothe.exe 4148 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4192 rundll32.exe 944 rundll32.exe -
Processes:
q8064940.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q8064940.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
5ed46e78f93bcca3b7d97f84a4743d647920bd953646e0ce03576801104905e3.exez8868224.exez9160812.exez2323711.exez1564281.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5ed46e78f93bcca3b7d97f84a4743d647920bd953646e0ce03576801104905e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8868224.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9160812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2323711.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z1564281.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r7603396.exes3671798.exedescription pid process target process PID 2264 set thread context of 4348 2264 r7603396.exe AppLaunch.exe PID 1804 set thread context of 728 1804 s3671798.exe AppLaunch.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1848 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4888 4348 WerFault.exe AppLaunch.exe 1124 2264 WerFault.exe r7603396.exe 2968 1804 WerFault.exe s3671798.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1060 schtasks.exe 4028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q8064940.exepid process 2820 q8064940.exe 2820 q8064940.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q8064940.exedescription pid process Token: SeDebugPrivilege 2820 q8064940.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5ed46e78f93bcca3b7d97f84a4743d647920bd953646e0ce03576801104905e3.exez8868224.exez9160812.exez2323711.exez1564281.exer7603396.exes3671798.exet7047869.exeexplothe.exeu5816463.execmd.exedescription pid process target process PID 4236 wrote to memory of 4552 4236 5ed46e78f93bcca3b7d97f84a4743d647920bd953646e0ce03576801104905e3.exe z8868224.exe PID 4236 wrote to memory of 4552 4236 5ed46e78f93bcca3b7d97f84a4743d647920bd953646e0ce03576801104905e3.exe z8868224.exe PID 4236 wrote to memory of 4552 4236 5ed46e78f93bcca3b7d97f84a4743d647920bd953646e0ce03576801104905e3.exe z8868224.exe PID 4552 wrote to memory of 64 4552 z8868224.exe z9160812.exe PID 4552 wrote to memory of 64 4552 z8868224.exe z9160812.exe PID 4552 wrote to memory of 64 4552 z8868224.exe z9160812.exe PID 64 wrote to memory of 1808 64 z9160812.exe z2323711.exe PID 64 wrote to memory of 1808 64 z9160812.exe z2323711.exe PID 64 wrote to memory of 1808 64 z9160812.exe z2323711.exe PID 1808 wrote to memory of 3676 1808 z2323711.exe z1564281.exe PID 1808 wrote to memory of 3676 1808 z2323711.exe z1564281.exe PID 1808 wrote to memory of 3676 1808 z2323711.exe z1564281.exe PID 3676 wrote to memory of 2820 3676 z1564281.exe q8064940.exe PID 3676 wrote to memory of 2820 3676 z1564281.exe q8064940.exe PID 3676 wrote to memory of 2264 3676 z1564281.exe r7603396.exe PID 3676 wrote to memory of 2264 3676 z1564281.exe r7603396.exe PID 3676 wrote to memory of 2264 3676 z1564281.exe r7603396.exe PID 2264 wrote to memory of 4348 2264 r7603396.exe AppLaunch.exe PID 2264 wrote to memory of 4348 2264 r7603396.exe AppLaunch.exe PID 2264 wrote to memory of 4348 2264 r7603396.exe AppLaunch.exe PID 2264 wrote to memory of 4348 2264 r7603396.exe AppLaunch.exe PID 2264 wrote to memory of 4348 2264 r7603396.exe AppLaunch.exe PID 2264 wrote to memory of 4348 2264 r7603396.exe AppLaunch.exe PID 2264 wrote to memory of 4348 2264 r7603396.exe AppLaunch.exe PID 2264 wrote to memory of 4348 2264 r7603396.exe AppLaunch.exe PID 2264 wrote to memory of 4348 2264 r7603396.exe AppLaunch.exe PID 2264 wrote to memory of 4348 2264 r7603396.exe AppLaunch.exe PID 1808 wrote to memory of 1804 1808 z2323711.exe s3671798.exe PID 1808 wrote to memory of 1804 1808 z2323711.exe s3671798.exe PID 1808 wrote to memory of 1804 1808 z2323711.exe s3671798.exe PID 1804 wrote to memory of 2760 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 2760 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 2760 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 4744 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 4744 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 4744 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 728 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 728 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 728 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 728 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 728 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 728 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 728 1804 s3671798.exe AppLaunch.exe PID 1804 wrote to memory of 728 1804 s3671798.exe AppLaunch.exe PID 64 wrote to memory of 4656 64 z9160812.exe t7047869.exe PID 64 wrote to memory of 4656 64 z9160812.exe t7047869.exe PID 64 wrote to memory of 4656 64 z9160812.exe t7047869.exe PID 4656 wrote to memory of 1928 4656 t7047869.exe explothe.exe PID 4656 wrote to memory of 1928 4656 t7047869.exe explothe.exe PID 4656 wrote to memory of 1928 4656 t7047869.exe explothe.exe PID 4552 wrote to memory of 3848 4552 z8868224.exe u5816463.exe PID 4552 wrote to memory of 3848 4552 z8868224.exe u5816463.exe PID 4552 wrote to memory of 3848 4552 z8868224.exe u5816463.exe PID 1928 wrote to memory of 4028 1928 explothe.exe schtasks.exe PID 1928 wrote to memory of 4028 1928 explothe.exe schtasks.exe PID 1928 wrote to memory of 4028 1928 explothe.exe schtasks.exe PID 1928 wrote to memory of 1052 1928 explothe.exe cmd.exe PID 1928 wrote to memory of 1052 1928 explothe.exe cmd.exe PID 1928 wrote to memory of 1052 1928 explothe.exe cmd.exe PID 3848 wrote to memory of 3772 3848 u5816463.exe legota.exe PID 3848 wrote to memory of 3772 3848 u5816463.exe legota.exe PID 3848 wrote to memory of 3772 3848 u5816463.exe legota.exe PID 1052 wrote to memory of 3712 1052 cmd.exe cmd.exe PID 1052 wrote to memory of 3712 1052 cmd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ed46e78f93bcca3b7d97f84a4743d647920bd953646e0ce03576801104905e3.exe"C:\Users\Admin\AppData\Local\Temp\5ed46e78f93bcca3b7d97f84a4743d647920bd953646e0ce03576801104905e3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8868224.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8868224.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9160812.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9160812.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2323711.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2323711.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1564281.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1564281.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8064940.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8064940.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7603396.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7603396.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 5408⤵
- Program crash
PID:4888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 1527⤵
- Program crash
PID:1124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3671798.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3671798.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2760
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 5806⤵
- Program crash
PID:2968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7047869.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7047869.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:4028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:3048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4864
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3184
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4192
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u5816463.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u5816463.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:3772 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:1060
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:2164
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4980
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4392
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:944
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w9874948.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w9874948.exe2⤵
- Executes dropped EXE
PID:1464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2264 -ip 22641⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4348 -ip 43481⤵PID:388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1804 -ip 18041⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3416
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2752
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3848
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4148
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1848
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5ebaf8673e46ef68d0353c3a5cf204e08
SHA12bb283996f247843d5630f5a12d691ff43f4b84a
SHA256d13b0c4445dad74a11cbf0eec61bfd0409b9fdac9d1e7c6109bff4a8f9293752
SHA512d74aabcbee0f378adc4a21a8995d3e85dbd518f672acf5f1e44430dc6f2e85afe94abceef082bc9477a73285a05e84234d228660a72de830e868ff460b2b8159
-
Filesize
23KB
MD5ebaf8673e46ef68d0353c3a5cf204e08
SHA12bb283996f247843d5630f5a12d691ff43f4b84a
SHA256d13b0c4445dad74a11cbf0eec61bfd0409b9fdac9d1e7c6109bff4a8f9293752
SHA512d74aabcbee0f378adc4a21a8995d3e85dbd518f672acf5f1e44430dc6f2e85afe94abceef082bc9477a73285a05e84234d228660a72de830e868ff460b2b8159
-
Filesize
892KB
MD5cae5fad58768a1290f42440fc03e0ff8
SHA13a16bbc313e5b41617a1d53ca4fcf647243de7c2
SHA256a385aa67d3806f4fdebbc2ebe5241520ffd92c0c4462e40ab4614defcf319a8f
SHA51258589072d04907e5e933c0a278d1523d7e4505801c0b5e9daca1d8692280af4e4d4c13fdf948e7ef01e81a6bcc721fdfbd19c563dfd11f6a003e16bf512f940b
-
Filesize
892KB
MD5cae5fad58768a1290f42440fc03e0ff8
SHA13a16bbc313e5b41617a1d53ca4fcf647243de7c2
SHA256a385aa67d3806f4fdebbc2ebe5241520ffd92c0c4462e40ab4614defcf319a8f
SHA51258589072d04907e5e933c0a278d1523d7e4505801c0b5e9daca1d8692280af4e4d4c13fdf948e7ef01e81a6bcc721fdfbd19c563dfd11f6a003e16bf512f940b
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
710KB
MD541c1b824e4f5d6055d5901cb95ea152e
SHA1b47b4313df293ed96bd95a1130e681d6b3a0a671
SHA256c7bc4d379c78fb202f826224111404164ff73a4d176324700b6fe884f95a5875
SHA5125f1b020fb5d650232d03776468e5e0f74c52bdfb3df8e1a2aa918a04d914bf1d257cbb69008758bbeaeb52aa8ede6cb3e15de5c6511eb3aa27dc9fcb04d7f1b0
-
Filesize
710KB
MD541c1b824e4f5d6055d5901cb95ea152e
SHA1b47b4313df293ed96bd95a1130e681d6b3a0a671
SHA256c7bc4d379c78fb202f826224111404164ff73a4d176324700b6fe884f95a5875
SHA5125f1b020fb5d650232d03776468e5e0f74c52bdfb3df8e1a2aa918a04d914bf1d257cbb69008758bbeaeb52aa8ede6cb3e15de5c6511eb3aa27dc9fcb04d7f1b0
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD58be724a0df133ebccdc6a13c5672183d
SHA11b2fe9da34766265bdcd6c2d34186e3dba8c1fb7
SHA25617c2effcf329928f2d793a33ecc524d7748639ff49ea4e711b41bdda9bf34125
SHA512d864a98c06b0f4784dcb46bb38780547f1ac2fd615118ae814c3ab667116ebbc69a8db16253f9a33b1ce810ff0dd39f4a5aabde53653a852ec57dd3757027b2b
-
Filesize
527KB
MD58be724a0df133ebccdc6a13c5672183d
SHA11b2fe9da34766265bdcd6c2d34186e3dba8c1fb7
SHA25617c2effcf329928f2d793a33ecc524d7748639ff49ea4e711b41bdda9bf34125
SHA512d864a98c06b0f4784dcb46bb38780547f1ac2fd615118ae814c3ab667116ebbc69a8db16253f9a33b1ce810ff0dd39f4a5aabde53653a852ec57dd3757027b2b
-
Filesize
310KB
MD5f91ea332a04ecfa919e52aaef643b17f
SHA1bbe40dda2d4de9f2a04a31bb7b8a9edadb201685
SHA256b7143144aba716e39266cbe7e10ff2d9d3c52e1f5484251e9d5eea5344631b55
SHA5125149fa2968e37be9bed58b1e1a2f90f336029373a3f18a3a20e281b8c06472021530fe006a8746a950c6c422e25b66766e0251c8656b302473ac0520e9986bb1
-
Filesize
310KB
MD5f91ea332a04ecfa919e52aaef643b17f
SHA1bbe40dda2d4de9f2a04a31bb7b8a9edadb201685
SHA256b7143144aba716e39266cbe7e10ff2d9d3c52e1f5484251e9d5eea5344631b55
SHA5125149fa2968e37be9bed58b1e1a2f90f336029373a3f18a3a20e281b8c06472021530fe006a8746a950c6c422e25b66766e0251c8656b302473ac0520e9986bb1
-
Filesize
295KB
MD50674cb248061110040ef38157d7f6484
SHA1bcc815528625021e5d2571d475e267006529aabd
SHA25667bede7a227f3ef4d281ad5c1bf8afc84d3766c105179b851fb0f6c60770c1bb
SHA512c80d67f2c75340cf094be30812af6a5cef293138098cf744d417452703d21662cb4de50fe62e2f4a59da9a8394ae9ed1dc70cf0dbb1b1b23411b0a727a37759f
-
Filesize
295KB
MD50674cb248061110040ef38157d7f6484
SHA1bcc815528625021e5d2571d475e267006529aabd
SHA25667bede7a227f3ef4d281ad5c1bf8afc84d3766c105179b851fb0f6c60770c1bb
SHA512c80d67f2c75340cf094be30812af6a5cef293138098cf744d417452703d21662cb4de50fe62e2f4a59da9a8394ae9ed1dc70cf0dbb1b1b23411b0a727a37759f
-
Filesize
11KB
MD5d77cdbe802fa4c0b9802e69417e56a00
SHA1b3d806e546cebc873fa9c177f81c1d0f0f9806ba
SHA256011a958959079cfde2c4e7e61045820995e56c18f7d649682dac34906b5359bb
SHA51201028d605352694b50f3fc5702ba4bc8b5fb30eb24559d800e2206b87d21c86c7d1ca10c35e4d33a24d9c83aa792fc5acf0ae67d3f7dad35e0f165f67c2c048b
-
Filesize
11KB
MD5d77cdbe802fa4c0b9802e69417e56a00
SHA1b3d806e546cebc873fa9c177f81c1d0f0f9806ba
SHA256011a958959079cfde2c4e7e61045820995e56c18f7d649682dac34906b5359bb
SHA51201028d605352694b50f3fc5702ba4bc8b5fb30eb24559d800e2206b87d21c86c7d1ca10c35e4d33a24d9c83aa792fc5acf0ae67d3f7dad35e0f165f67c2c048b
-
Filesize
276KB
MD56991d86cdf087a84fd4274c42eac3243
SHA1bfba3154c9562d67e3ee9f247e3cb335beb7a60f
SHA256d8e04c862859a6413ab0ebb1e6429315feec65e665df28508209dcf73ee9a9da
SHA5121715641d9c39185aa82137e247f2d00a419cbd65f8938bca569f8679549d37b9873ebb78d2390628fdc87b7a8ff4d88240bda2b936ddf3e68620f75c4ed77975
-
Filesize
276KB
MD56991d86cdf087a84fd4274c42eac3243
SHA1bfba3154c9562d67e3ee9f247e3cb335beb7a60f
SHA256d8e04c862859a6413ab0ebb1e6429315feec65e665df28508209dcf73ee9a9da
SHA5121715641d9c39185aa82137e247f2d00a419cbd65f8938bca569f8679549d37b9873ebb78d2390628fdc87b7a8ff4d88240bda2b936ddf3e68620f75c4ed77975
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0