Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 08:24
Static task
static1
Behavioral task
behavioral1
Sample
b915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8.exe
Resource
win10v2004-20230915-en
General
-
Target
b915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8.exe
-
Size
993KB
-
MD5
713272184ea79d1a9f99b7eeb848d1a4
-
SHA1
115dfe141716b79cfd2b3521c6f832558e645ded
-
SHA256
b915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8
-
SHA512
f6b898070a9763582c097d894b6676913f7434d0fb7670aec1a6a178a6ddc4e3408c7a317a9199dba028c0a48efd7aaae39b58a3f3e5df549497e4b6783ddf51
-
SSDEEP
24576:vyL8N20tY1JwCVNB7JaaABfHCqkZmtzoRyOkVD:6n0N2FaauFzokOM
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6747183.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6747183.exe healer behavioral1/memory/4488-35-0x0000000000FA0000-0x0000000000FAA000-memory.dmp healer -
Processes:
q6747183.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q6747183.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q6747183.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q6747183.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q6747183.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q6747183.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q6747183.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explothe.exeu8297393.exelegota.exet6669282.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u8297393.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t6669282.exe -
Executes dropped EXE 18 IoCs
Processes:
z0196144.exez0788901.exez6237720.exez8337914.exeq6747183.exer9316007.exes5444971.exet6669282.exeexplothe.exeu8297393.exelegota.exew1483118.exeexplothe.exelegota.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 532 z0196144.exe 2528 z0788901.exe 1332 z6237720.exe 1280 z8337914.exe 4488 q6747183.exe 2128 r9316007.exe 1052 s5444971.exe 4568 t6669282.exe 4192 explothe.exe 4256 u8297393.exe 5072 legota.exe 4892 w1483118.exe 2460 explothe.exe 3320 legota.exe 3964 explothe.exe 1112 legota.exe 3768 explothe.exe 404 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3740 rundll32.exe 1672 rundll32.exe -
Processes:
q6747183.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q6747183.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z0788901.exez6237720.exez8337914.exeb915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8.exez0196144.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0788901.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z6237720.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z8337914.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0196144.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r9316007.exes5444971.exedescription pid process target process PID 2128 set thread context of 3276 2128 r9316007.exe AppLaunch.exe PID 1052 set thread context of 628 1052 s5444971.exe AppLaunch.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4452 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2876 3276 WerFault.exe AppLaunch.exe 2768 2128 WerFault.exe r9316007.exe 4840 1052 WerFault.exe s5444971.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1340 schtasks.exe 464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q6747183.exepid process 4488 q6747183.exe 4488 q6747183.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q6747183.exedescription pid process Token: SeDebugPrivilege 4488 q6747183.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8.exez0196144.exez0788901.exez6237720.exez8337914.exer9316007.exes5444971.exet6669282.exeexplothe.execmd.exeu8297393.exedescription pid process target process PID 1904 wrote to memory of 532 1904 b915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8.exe z0196144.exe PID 1904 wrote to memory of 532 1904 b915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8.exe z0196144.exe PID 1904 wrote to memory of 532 1904 b915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8.exe z0196144.exe PID 532 wrote to memory of 2528 532 z0196144.exe z0788901.exe PID 532 wrote to memory of 2528 532 z0196144.exe z0788901.exe PID 532 wrote to memory of 2528 532 z0196144.exe z0788901.exe PID 2528 wrote to memory of 1332 2528 z0788901.exe z6237720.exe PID 2528 wrote to memory of 1332 2528 z0788901.exe z6237720.exe PID 2528 wrote to memory of 1332 2528 z0788901.exe z6237720.exe PID 1332 wrote to memory of 1280 1332 z6237720.exe z8337914.exe PID 1332 wrote to memory of 1280 1332 z6237720.exe z8337914.exe PID 1332 wrote to memory of 1280 1332 z6237720.exe z8337914.exe PID 1280 wrote to memory of 4488 1280 z8337914.exe q6747183.exe PID 1280 wrote to memory of 4488 1280 z8337914.exe q6747183.exe PID 1280 wrote to memory of 2128 1280 z8337914.exe r9316007.exe PID 1280 wrote to memory of 2128 1280 z8337914.exe r9316007.exe PID 1280 wrote to memory of 2128 1280 z8337914.exe r9316007.exe PID 2128 wrote to memory of 3276 2128 r9316007.exe AppLaunch.exe PID 2128 wrote to memory of 3276 2128 r9316007.exe AppLaunch.exe PID 2128 wrote to memory of 3276 2128 r9316007.exe AppLaunch.exe PID 2128 wrote to memory of 3276 2128 r9316007.exe AppLaunch.exe PID 2128 wrote to memory of 3276 2128 r9316007.exe AppLaunch.exe PID 2128 wrote to memory of 3276 2128 r9316007.exe AppLaunch.exe PID 2128 wrote to memory of 3276 2128 r9316007.exe AppLaunch.exe PID 2128 wrote to memory of 3276 2128 r9316007.exe AppLaunch.exe PID 2128 wrote to memory of 3276 2128 r9316007.exe AppLaunch.exe PID 2128 wrote to memory of 3276 2128 r9316007.exe AppLaunch.exe PID 1332 wrote to memory of 1052 1332 z6237720.exe s5444971.exe PID 1332 wrote to memory of 1052 1332 z6237720.exe s5444971.exe PID 1332 wrote to memory of 1052 1332 z6237720.exe s5444971.exe PID 1052 wrote to memory of 628 1052 s5444971.exe AppLaunch.exe PID 1052 wrote to memory of 628 1052 s5444971.exe AppLaunch.exe PID 1052 wrote to memory of 628 1052 s5444971.exe AppLaunch.exe PID 1052 wrote to memory of 628 1052 s5444971.exe AppLaunch.exe PID 1052 wrote to memory of 628 1052 s5444971.exe AppLaunch.exe PID 1052 wrote to memory of 628 1052 s5444971.exe AppLaunch.exe PID 1052 wrote to memory of 628 1052 s5444971.exe AppLaunch.exe PID 1052 wrote to memory of 628 1052 s5444971.exe AppLaunch.exe PID 2528 wrote to memory of 4568 2528 z0788901.exe t6669282.exe PID 2528 wrote to memory of 4568 2528 z0788901.exe t6669282.exe PID 2528 wrote to memory of 4568 2528 z0788901.exe t6669282.exe PID 4568 wrote to memory of 4192 4568 t6669282.exe explothe.exe PID 4568 wrote to memory of 4192 4568 t6669282.exe explothe.exe PID 4568 wrote to memory of 4192 4568 t6669282.exe explothe.exe PID 532 wrote to memory of 4256 532 z0196144.exe u8297393.exe PID 532 wrote to memory of 4256 532 z0196144.exe u8297393.exe PID 532 wrote to memory of 4256 532 z0196144.exe u8297393.exe PID 4192 wrote to memory of 1340 4192 explothe.exe schtasks.exe PID 4192 wrote to memory of 1340 4192 explothe.exe schtasks.exe PID 4192 wrote to memory of 1340 4192 explothe.exe schtasks.exe PID 4192 wrote to memory of 4880 4192 explothe.exe cmd.exe PID 4192 wrote to memory of 4880 4192 explothe.exe cmd.exe PID 4192 wrote to memory of 4880 4192 explothe.exe cmd.exe PID 4880 wrote to memory of 5096 4880 cmd.exe cmd.exe PID 4880 wrote to memory of 5096 4880 cmd.exe cmd.exe PID 4880 wrote to memory of 5096 4880 cmd.exe cmd.exe PID 4256 wrote to memory of 5072 4256 u8297393.exe legota.exe PID 4256 wrote to memory of 5072 4256 u8297393.exe legota.exe PID 4256 wrote to memory of 5072 4256 u8297393.exe legota.exe PID 4880 wrote to memory of 3820 4880 cmd.exe cacls.exe PID 4880 wrote to memory of 3820 4880 cmd.exe cacls.exe PID 4880 wrote to memory of 3820 4880 cmd.exe cacls.exe PID 1904 wrote to memory of 4892 1904 b915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8.exe w1483118.exe PID 1904 wrote to memory of 4892 1904 b915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8.exe w1483118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8.exe"C:\Users\Admin\AppData\Local\Temp\b915e4bf95bf6f70933119c6144a0b780745525854c3937fe96303c90b8c5bc8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0196144.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0196144.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0788901.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0788901.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6237720.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6237720.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8337914.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8337914.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6747183.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6747183.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9316007.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9316007.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 5408⤵
- Program crash
PID:2876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 1487⤵
- Program crash
PID:2768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5444971.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5444971.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 1566⤵
- Program crash
PID:4840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6669282.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6669282.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:1340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:3820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:1628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:3288
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:1296
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3740
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8297393.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8297393.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:5072 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4552
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:3700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:816
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4172
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:2152
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1672
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1483118.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1483118.exe2⤵
- Executes dropped EXE
PID:4892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3276 -ip 32761⤵PID:928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2128 -ip 21281⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1052 -ip 10521⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2460
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3320
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3964
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1112
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4452
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3768
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD57327f80d4ad445203e9daa99e3ab9152
SHA1d9a89f5afae64c98f199b8f7167d093df698ce25
SHA2568ca0cab93b2b361275be8f2890a66779f2f0e2a5befc23f805fc28fb1b643dc6
SHA5129f163a2b9f6d15836ee7643650a1dc04b9b1e51ad8bf7b7f5462910ddc76162ae6eda359de5fc75e5ccd3a8da674bd997499101af624c20a2106205ae86c5277
-
Filesize
24KB
MD57327f80d4ad445203e9daa99e3ab9152
SHA1d9a89f5afae64c98f199b8f7167d093df698ce25
SHA2568ca0cab93b2b361275be8f2890a66779f2f0e2a5befc23f805fc28fb1b643dc6
SHA5129f163a2b9f6d15836ee7643650a1dc04b9b1e51ad8bf7b7f5462910ddc76162ae6eda359de5fc75e5ccd3a8da674bd997499101af624c20a2106205ae86c5277
-
Filesize
891KB
MD5a8aa121f1c0e902fd256faac2237db94
SHA19f5d3faa603eab7d432b4139d282679bcc666e13
SHA256affc5c9357834b476e956735467a915b927d60a6b933a524031819d921943b84
SHA5123eef9bd1e62e94d7fadc4bfd9e2013863ab09b26f1f961a6dc9b515009e93d87a6651d83760d8b6b9611c58621efb707619c5318c935ab5e968804f5b3e0ab85
-
Filesize
891KB
MD5a8aa121f1c0e902fd256faac2237db94
SHA19f5d3faa603eab7d432b4139d282679bcc666e13
SHA256affc5c9357834b476e956735467a915b927d60a6b933a524031819d921943b84
SHA5123eef9bd1e62e94d7fadc4bfd9e2013863ab09b26f1f961a6dc9b515009e93d87a6651d83760d8b6b9611c58621efb707619c5318c935ab5e968804f5b3e0ab85
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
709KB
MD5e3be507967db953c6553b9c5ee2da08d
SHA1218ad06ae22eda9f09db6784114fc216a6f013c6
SHA25661dd90e296c98d5643d13905d359e1201fad65fe280f5370670fbca5dc7e260f
SHA512c4f7e1778cbf431686b75dfaa19bdf85d73a0b80a3e548a7ae5760ddc5bb8d15441afe0f5319fd6f34b9397974e0111b4bdfd8f067f2df3dc28a0c5b73d10998
-
Filesize
709KB
MD5e3be507967db953c6553b9c5ee2da08d
SHA1218ad06ae22eda9f09db6784114fc216a6f013c6
SHA25661dd90e296c98d5643d13905d359e1201fad65fe280f5370670fbca5dc7e260f
SHA512c4f7e1778cbf431686b75dfaa19bdf85d73a0b80a3e548a7ae5760ddc5bb8d15441afe0f5319fd6f34b9397974e0111b4bdfd8f067f2df3dc28a0c5b73d10998
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD538a63b382ad78f8e4a583f560f73f9a6
SHA1eaa96dd4587ce59adbda8215a440bb11a11051f2
SHA256bdcc9b3335a97cb7917c2385d505d5dbbe020264727cc898548f118204c001f8
SHA512d97fb4bb2950882c1ed53f21655ea11798e7cdaad14914963f1abd5ed1ad736b9aa453cd2b29f6888cc226581a0d4ba74eaaf90437816bdbf6f9f164ff200bec
-
Filesize
527KB
MD538a63b382ad78f8e4a583f560f73f9a6
SHA1eaa96dd4587ce59adbda8215a440bb11a11051f2
SHA256bdcc9b3335a97cb7917c2385d505d5dbbe020264727cc898548f118204c001f8
SHA512d97fb4bb2950882c1ed53f21655ea11798e7cdaad14914963f1abd5ed1ad736b9aa453cd2b29f6888cc226581a0d4ba74eaaf90437816bdbf6f9f164ff200bec
-
Filesize
310KB
MD558d410adbb8a48df39b07f5f59119bc6
SHA14974cc70ff7ce95c35080fd1e0fc111fa1551e2b
SHA2569dbea93a4a9f6e8fdd6c594d87dbcff3e9eac29199c3983edcb3aa0b91d6930c
SHA512d1dfd2c392fe909d76cfa63754a14b20ffecc56190704c8598c6cac4f91ee06f8518068a540b2cd61bf0a289573933df2345f13b86183fa4d3bfaec6264fb108
-
Filesize
310KB
MD558d410adbb8a48df39b07f5f59119bc6
SHA14974cc70ff7ce95c35080fd1e0fc111fa1551e2b
SHA2569dbea93a4a9f6e8fdd6c594d87dbcff3e9eac29199c3983edcb3aa0b91d6930c
SHA512d1dfd2c392fe909d76cfa63754a14b20ffecc56190704c8598c6cac4f91ee06f8518068a540b2cd61bf0a289573933df2345f13b86183fa4d3bfaec6264fb108
-
Filesize
296KB
MD547a5dc07ee35a49968126beb1b3e5a7f
SHA1fd0f46874eba6ce90f789134d73bde49628dfd50
SHA25672f7a2bda6ce13688a7853adf38c5ef81b8c59504770b3fe994cd907facea815
SHA512ea2dfa1380076abfcec7a584cec296ec27b6a3927435298db7c3ac2bf39f6db1f6e6eb0baf94de215a877c5f1ae730a76906623263e466584467a068b47a0615
-
Filesize
296KB
MD547a5dc07ee35a49968126beb1b3e5a7f
SHA1fd0f46874eba6ce90f789134d73bde49628dfd50
SHA25672f7a2bda6ce13688a7853adf38c5ef81b8c59504770b3fe994cd907facea815
SHA512ea2dfa1380076abfcec7a584cec296ec27b6a3927435298db7c3ac2bf39f6db1f6e6eb0baf94de215a877c5f1ae730a76906623263e466584467a068b47a0615
-
Filesize
11KB
MD5b20f1c5967385d48d102a7c789d3fb1e
SHA1dbdf5929ebf66bf9e47656ed8e7ec99617566367
SHA2564850bcfed51955f70546c632472d780609ef01f15ffd164970fc14105c235503
SHA512b9708b343b90533c9eff85760fdeac31a7c5ea625264cebb0a7c58c706dad5272e3396e9d4129aca0101c57621f406e270bf7b5dc139e19c8672e6409a11022d
-
Filesize
11KB
MD5b20f1c5967385d48d102a7c789d3fb1e
SHA1dbdf5929ebf66bf9e47656ed8e7ec99617566367
SHA2564850bcfed51955f70546c632472d780609ef01f15ffd164970fc14105c235503
SHA512b9708b343b90533c9eff85760fdeac31a7c5ea625264cebb0a7c58c706dad5272e3396e9d4129aca0101c57621f406e270bf7b5dc139e19c8672e6409a11022d
-
Filesize
276KB
MD5c8680a1c07e7315c9852fcda3d21920a
SHA18ae0f924e95a6dd1660a1bd4f0735e9b08bdba90
SHA256b1a0d6e4166079a3b42530581a47ca7ab3566c03445c773ebb3578c6792903e9
SHA5126971ce12252dd41fb1b74f007d8aced7d77afe29deb922e68dfaec65abe6283d56201b38d9b640c70ef5474313dcf5dbd1e3dd0f38b509c5763bb47ec7236388
-
Filesize
276KB
MD5c8680a1c07e7315c9852fcda3d21920a
SHA18ae0f924e95a6dd1660a1bd4f0735e9b08bdba90
SHA256b1a0d6e4166079a3b42530581a47ca7ab3566c03445c773ebb3578c6792903e9
SHA5126971ce12252dd41fb1b74f007d8aced7d77afe29deb922e68dfaec65abe6283d56201b38d9b640c70ef5474313dcf5dbd1e3dd0f38b509c5763bb47ec7236388
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0