Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 06:56
Static task
static1
Behavioral task
behavioral1
Sample
77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c.exe
Resource
win10v2004-20230915-en
General
-
Target
77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c.exe
-
Size
983KB
-
MD5
46f1d158e0aecbf22b6c54e2499d9dd9
-
SHA1
c1e0ecce974c523ed624fe22d899e69ea45d52bf
-
SHA256
77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c
-
SHA512
b96a988c5b7496393d0ba132ccf004baa0f69b38f128aeeca158ea83798c2de37addef2dc5e591f00b662f4d9e1ca21b8171f044d55c61f8e0063075ebd95eb0
-
SSDEEP
24576:fyZBmLZYVrYfNQfbQ1smmFcP/TeyZzQlS1kxtwS:qqCE1N1Txkxt
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3264844.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3264844.exe healer behavioral1/memory/3404-35-0x0000000000960000-0x000000000096A000-memory.dmp healer -
Processes:
q3264844.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q3264844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q3264844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q3264844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q3264844.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q3264844.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q3264844.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
u2544397.exelegota.exet9067456.exeexplothe.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation u2544397.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation t9067456.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation explothe.exe -
Executes dropped EXE 18 IoCs
Processes:
z5846785.exez2974982.exez1240483.exez8427476.exeq3264844.exer4139065.exes3130775.exet9067456.exeexplothe.exeu2544397.exelegota.exew7047231.exeexplothe.exelegota.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 2420 z5846785.exe 988 z2974982.exe 2988 z1240483.exe 3568 z8427476.exe 3404 q3264844.exe 4356 r4139065.exe 484 s3130775.exe 5016 t9067456.exe 4500 explothe.exe 3448 u2544397.exe 2924 legota.exe 4824 w7047231.exe 3120 explothe.exe 3988 legota.exe 4676 explothe.exe 4016 legota.exe 1800 explothe.exe 1352 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4460 rundll32.exe 4820 rundll32.exe -
Processes:
q3264844.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q3264844.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z2974982.exez1240483.exez8427476.exe77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c.exez5846785.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z2974982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z1240483.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z8427476.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5846785.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r4139065.exes3130775.exedescription pid process target process PID 4356 set thread context of 2868 4356 r4139065.exe AppLaunch.exe PID 484 set thread context of 4064 484 s3130775.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2384 2868 WerFault.exe AppLaunch.exe 1960 4356 WerFault.exe r4139065.exe 3916 484 WerFault.exe s3130775.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4952 schtasks.exe 4072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q3264844.exepid process 3404 q3264844.exe 3404 q3264844.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q3264844.exedescription pid process Token: SeDebugPrivilege 3404 q3264844.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c.exez5846785.exez2974982.exez1240483.exez8427476.exer4139065.exes3130775.exet9067456.exeexplothe.execmd.exeu2544397.exedescription pid process target process PID 2680 wrote to memory of 2420 2680 77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c.exe z5846785.exe PID 2680 wrote to memory of 2420 2680 77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c.exe z5846785.exe PID 2680 wrote to memory of 2420 2680 77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c.exe z5846785.exe PID 2420 wrote to memory of 988 2420 z5846785.exe z2974982.exe PID 2420 wrote to memory of 988 2420 z5846785.exe z2974982.exe PID 2420 wrote to memory of 988 2420 z5846785.exe z2974982.exe PID 988 wrote to memory of 2988 988 z2974982.exe z1240483.exe PID 988 wrote to memory of 2988 988 z2974982.exe z1240483.exe PID 988 wrote to memory of 2988 988 z2974982.exe z1240483.exe PID 2988 wrote to memory of 3568 2988 z1240483.exe z8427476.exe PID 2988 wrote to memory of 3568 2988 z1240483.exe z8427476.exe PID 2988 wrote to memory of 3568 2988 z1240483.exe z8427476.exe PID 3568 wrote to memory of 3404 3568 z8427476.exe q3264844.exe PID 3568 wrote to memory of 3404 3568 z8427476.exe q3264844.exe PID 3568 wrote to memory of 4356 3568 z8427476.exe r4139065.exe PID 3568 wrote to memory of 4356 3568 z8427476.exe r4139065.exe PID 3568 wrote to memory of 4356 3568 z8427476.exe r4139065.exe PID 4356 wrote to memory of 2868 4356 r4139065.exe AppLaunch.exe PID 4356 wrote to memory of 2868 4356 r4139065.exe AppLaunch.exe PID 4356 wrote to memory of 2868 4356 r4139065.exe AppLaunch.exe PID 4356 wrote to memory of 2868 4356 r4139065.exe AppLaunch.exe PID 4356 wrote to memory of 2868 4356 r4139065.exe AppLaunch.exe PID 4356 wrote to memory of 2868 4356 r4139065.exe AppLaunch.exe PID 4356 wrote to memory of 2868 4356 r4139065.exe AppLaunch.exe PID 4356 wrote to memory of 2868 4356 r4139065.exe AppLaunch.exe PID 4356 wrote to memory of 2868 4356 r4139065.exe AppLaunch.exe PID 4356 wrote to memory of 2868 4356 r4139065.exe AppLaunch.exe PID 2988 wrote to memory of 484 2988 z1240483.exe s3130775.exe PID 2988 wrote to memory of 484 2988 z1240483.exe s3130775.exe PID 2988 wrote to memory of 484 2988 z1240483.exe s3130775.exe PID 484 wrote to memory of 4064 484 s3130775.exe AppLaunch.exe PID 484 wrote to memory of 4064 484 s3130775.exe AppLaunch.exe PID 484 wrote to memory of 4064 484 s3130775.exe AppLaunch.exe PID 484 wrote to memory of 4064 484 s3130775.exe AppLaunch.exe PID 484 wrote to memory of 4064 484 s3130775.exe AppLaunch.exe PID 484 wrote to memory of 4064 484 s3130775.exe AppLaunch.exe PID 484 wrote to memory of 4064 484 s3130775.exe AppLaunch.exe PID 484 wrote to memory of 4064 484 s3130775.exe AppLaunch.exe PID 988 wrote to memory of 5016 988 z2974982.exe t9067456.exe PID 988 wrote to memory of 5016 988 z2974982.exe t9067456.exe PID 988 wrote to memory of 5016 988 z2974982.exe t9067456.exe PID 5016 wrote to memory of 4500 5016 t9067456.exe explothe.exe PID 5016 wrote to memory of 4500 5016 t9067456.exe explothe.exe PID 5016 wrote to memory of 4500 5016 t9067456.exe explothe.exe PID 2420 wrote to memory of 3448 2420 z5846785.exe u2544397.exe PID 2420 wrote to memory of 3448 2420 z5846785.exe u2544397.exe PID 2420 wrote to memory of 3448 2420 z5846785.exe u2544397.exe PID 4500 wrote to memory of 4952 4500 explothe.exe schtasks.exe PID 4500 wrote to memory of 4952 4500 explothe.exe schtasks.exe PID 4500 wrote to memory of 4952 4500 explothe.exe schtasks.exe PID 4500 wrote to memory of 4760 4500 explothe.exe cmd.exe PID 4500 wrote to memory of 4760 4500 explothe.exe cmd.exe PID 4500 wrote to memory of 4760 4500 explothe.exe cmd.exe PID 4760 wrote to memory of 3284 4760 cmd.exe cmd.exe PID 4760 wrote to memory of 3284 4760 cmd.exe cmd.exe PID 4760 wrote to memory of 3284 4760 cmd.exe cmd.exe PID 4760 wrote to memory of 1792 4760 cmd.exe cacls.exe PID 4760 wrote to memory of 1792 4760 cmd.exe cacls.exe PID 4760 wrote to memory of 1792 4760 cmd.exe cacls.exe PID 3448 wrote to memory of 2924 3448 u2544397.exe legota.exe PID 3448 wrote to memory of 2924 3448 u2544397.exe legota.exe PID 3448 wrote to memory of 2924 3448 u2544397.exe legota.exe PID 2680 wrote to memory of 4824 2680 77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c.exe w7047231.exe PID 2680 wrote to memory of 4824 2680 77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c.exe w7047231.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c.exe"C:\Users\Admin\AppData\Local\Temp\77392ef18f442477c6c2a2014fe0718c4c71a6749ec935d11618bbb54ea6fb0c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5846785.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5846785.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2974982.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2974982.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1240483.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1240483.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8427476.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8427476.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3264844.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3264844.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4139065.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4139065.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 2048⤵
- Program crash
PID:2384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 1527⤵
- Program crash
PID:1960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3130775.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3130775.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 484 -s 1566⤵
- Program crash
PID:3916
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9067456.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9067456.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:4952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:1792
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:1260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:3052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:2424
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u2544397.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u2544397.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:2924 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:4072
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4668
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3696
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4224
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:1456
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4820
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w7047231.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w7047231.exe2⤵
- Executes dropped EXE
PID:4824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4356 -ip 43561⤵PID:744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2868 -ip 28681⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 484 -ip 4841⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3120
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3988
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4676
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4016
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1800
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1352
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD58ac3a23eb3328b2bb3e5cfc0792b1df2
SHA1a14e71bbef5b9073d5944d6863d7b8795eded2f5
SHA2566541420a26aeeb56a3d1ecb5ab74666fbb97de94847801092be66ef1727f7644
SHA5125271a03a932a14f5a8f3cb762da6b500d6c85026035e318e20941ae6c93c309806bff27c732384e5a7e32a8f62ca55b0be67f32963aeed8585c8714e649ca293
-
Filesize
24KB
MD565226333076dcbdd5e3ffb46a41f23b4
SHA1d8576dc56bc345d2769d6d885f36df029d1cb230
SHA25603cb21d24089403050ff9ba8216b58223340c8f44e652f4e3319153a9d58992a
SHA512afaff91c5e9722f204ea842c118b1a0d50868fc74f2f0c5f5557c809309da52438df7a58c9514eb9b1a5b99446bac22d7ead67147b8146361b2a252f745b4916
-
Filesize
24KB
MD565226333076dcbdd5e3ffb46a41f23b4
SHA1d8576dc56bc345d2769d6d885f36df029d1cb230
SHA25603cb21d24089403050ff9ba8216b58223340c8f44e652f4e3319153a9d58992a
SHA512afaff91c5e9722f204ea842c118b1a0d50868fc74f2f0c5f5557c809309da52438df7a58c9514eb9b1a5b99446bac22d7ead67147b8146361b2a252f745b4916
-
Filesize
893KB
MD55e2642f37e8a8f9a76d17dbc4687eada
SHA153d5578aba1c1989b9ba437a0c70b087775774de
SHA2562212591b2bea6a4d05aa94236c034f15c2c7a15d135d648c8d0c1b2acde7cf73
SHA5127be2e7242bea8973e9bf8f4e2bd8ed1e47531139383432b435b4e57b2ce84584088942608c7460bc4d5e6c28f04c5528cd4f88e26bb7873f1e7abb50966b9e39
-
Filesize
893KB
MD55e2642f37e8a8f9a76d17dbc4687eada
SHA153d5578aba1c1989b9ba437a0c70b087775774de
SHA2562212591b2bea6a4d05aa94236c034f15c2c7a15d135d648c8d0c1b2acde7cf73
SHA5127be2e7242bea8973e9bf8f4e2bd8ed1e47531139383432b435b4e57b2ce84584088942608c7460bc4d5e6c28f04c5528cd4f88e26bb7873f1e7abb50966b9e39
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
710KB
MD5565839e8ec87f86734ab09442ceadfa0
SHA1b0092e08a4c0107d0fbce8a573519556a52a2986
SHA25622cefcbcbd3180e795c7e23035959a23a90cf0ee842e6d66f9fd6123aef2fcb0
SHA512b3852803348356e83182e5ac326fb4b37d3266eb426b83ce313442eec241af2a2a8aeecc46b4a29df17c59a2a48ee2ed2457801b14ee4ce7d2e4852d4f5c7b18
-
Filesize
710KB
MD5565839e8ec87f86734ab09442ceadfa0
SHA1b0092e08a4c0107d0fbce8a573519556a52a2986
SHA25622cefcbcbd3180e795c7e23035959a23a90cf0ee842e6d66f9fd6123aef2fcb0
SHA512b3852803348356e83182e5ac326fb4b37d3266eb426b83ce313442eec241af2a2a8aeecc46b4a29df17c59a2a48ee2ed2457801b14ee4ce7d2e4852d4f5c7b18
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
528KB
MD5ac64601d832af00c8ce3d17db6ff34fd
SHA135dbcddd59c21d6ab702e5c726f8e620a92cee67
SHA25656f63c50dc37f1e0ef8dc050532d56d95bab77e10d9e525127ee557afdf4dcf2
SHA5128235db11709395c77ffd21e5d6493720d0194f45a08326fca7d9090bc96fb3a0f9ae58de8cce64b6a10c02fc9beb6c65269c3b70801a7ae3cde938e081b73703
-
Filesize
528KB
MD5ac64601d832af00c8ce3d17db6ff34fd
SHA135dbcddd59c21d6ab702e5c726f8e620a92cee67
SHA25656f63c50dc37f1e0ef8dc050532d56d95bab77e10d9e525127ee557afdf4dcf2
SHA5128235db11709395c77ffd21e5d6493720d0194f45a08326fca7d9090bc96fb3a0f9ae58de8cce64b6a10c02fc9beb6c65269c3b70801a7ae3cde938e081b73703
-
Filesize
310KB
MD5f7b93eb20a5c2367af4652acbb0119b9
SHA158c66673bbe0c245966d48ae873e406d79a808fc
SHA25626d8e24888d10227cfb07edb724d4a43a9464ed379e9d67557136c86bea83f2d
SHA5124382c7dbedf00472476a3e3d391c2f0541cc7dad332876b08b77f581304e807fe0176f298dd7c0761c6f673d75bb1216637b6cf67f78d77a8726422f594e011d
-
Filesize
310KB
MD5f7b93eb20a5c2367af4652acbb0119b9
SHA158c66673bbe0c245966d48ae873e406d79a808fc
SHA25626d8e24888d10227cfb07edb724d4a43a9464ed379e9d67557136c86bea83f2d
SHA5124382c7dbedf00472476a3e3d391c2f0541cc7dad332876b08b77f581304e807fe0176f298dd7c0761c6f673d75bb1216637b6cf67f78d77a8726422f594e011d
-
Filesize
296KB
MD52d4ca0907030be72793180d6f6a9c9aa
SHA16dd4aafe09e3aa83574754b53a56d41f165e3878
SHA2561df99f7c520b785a5cc5fdad0f6d70719067fa7b36f1325f38d69a2fd0f9d84f
SHA51233e726ca707f82a645bac37c14c673103308cc3067316d8c9a872f1e42826bc1db0965dfd76c49d9b9cdffe1512806bea106b4882c1a948a4db91b14b0228f66
-
Filesize
296KB
MD52d4ca0907030be72793180d6f6a9c9aa
SHA16dd4aafe09e3aa83574754b53a56d41f165e3878
SHA2561df99f7c520b785a5cc5fdad0f6d70719067fa7b36f1325f38d69a2fd0f9d84f
SHA51233e726ca707f82a645bac37c14c673103308cc3067316d8c9a872f1e42826bc1db0965dfd76c49d9b9cdffe1512806bea106b4882c1a948a4db91b14b0228f66
-
Filesize
11KB
MD505173c78a7759b442ee18f9b5fa2cc40
SHA1bda498a8c506fc23e376abf5a7bec1386f7a9141
SHA25625e4bc2997a86a66c308f33ee13fbc9c12661be6f5a68574876d664b43c181aa
SHA512364e9b07620cb8f41078a16dcf7b3aefe139da952e484af601507d9252e9f01f986649cb13868edd0d6f8830f4850d74dddeb2f9b647ff291801b26cc415fbea
-
Filesize
11KB
MD505173c78a7759b442ee18f9b5fa2cc40
SHA1bda498a8c506fc23e376abf5a7bec1386f7a9141
SHA25625e4bc2997a86a66c308f33ee13fbc9c12661be6f5a68574876d664b43c181aa
SHA512364e9b07620cb8f41078a16dcf7b3aefe139da952e484af601507d9252e9f01f986649cb13868edd0d6f8830f4850d74dddeb2f9b647ff291801b26cc415fbea
-
Filesize
276KB
MD586109261e9e0572915fad41668d29d5b
SHA17181246ff9e7b09135139d80286aca6b09951441
SHA256e3b888d934248d68d3c95bb46d1bdba3cd26b91b66e33348c7826ecaa9cba85c
SHA512ef2542ca8f290a7c15e7959e3e2a60c41832183cbf30d2ef2c04a61372a143a6be76bca972ffdd8b9d0c74af626295eb3705a9c01cd52b6fbbca2f83505dedfe
-
Filesize
276KB
MD586109261e9e0572915fad41668d29d5b
SHA17181246ff9e7b09135139d80286aca6b09951441
SHA256e3b888d934248d68d3c95bb46d1bdba3cd26b91b66e33348c7826ecaa9cba85c
SHA512ef2542ca8f290a7c15e7959e3e2a60c41832183cbf30d2ef2c04a61372a143a6be76bca972ffdd8b9d0c74af626295eb3705a9c01cd52b6fbbca2f83505dedfe
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0