Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 08:48
Static task
static1
Behavioral task
behavioral1
Sample
8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exe
Resource
win10v2004-20230915-en
General
-
Target
8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exe
-
Size
987KB
-
MD5
70d2daec0ae5699635b35ac46ec3107e
-
SHA1
9fb3afcfaaa4b1023088ae5c5c48dc0bab23cda3
-
SHA256
8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67
-
SHA512
09cd16ee21fe8ef986bc8fbde5a328e5c19a89078b7e972eaf854252ecd0ff67ade6037958bc01597f7c02886e83ea744fcb5fbb3a831aaf202a62232353e73a
-
SSDEEP
24576:oyHEwwbKMqZ3pPYFYt4VPpvrcrPNzj/B12:vrSKMq3pPF8ZrQh
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3834970.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3834970.exe healer behavioral1/memory/2204-35-0x0000000000E30000-0x0000000000E3A000-memory.dmp healer -
Processes:
q3834970.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q3834970.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q3834970.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q3834970.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q3834970.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q3834970.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q3834970.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t7334439.exeexplothe.exeu1290117.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation t7334439.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation u1290117.exe -
Executes dropped EXE 13 IoCs
Processes:
z6798749.exez4005412.exez1208626.exez9586766.exeq3834970.exer3870092.exes1516361.exet7334439.exeexplothe.exeu1290117.exew1275554.exeexplothe.exeexplothe.exepid process 1032 z6798749.exe 3624 z4005412.exe 2208 z1208626.exe 396 z9586766.exe 2204 q3834970.exe 2260 r3870092.exe 2164 s1516361.exe 2664 t7334439.exe 4568 explothe.exe 4072 u1290117.exe 3736 w1275554.exe 3200 explothe.exe 3580 explothe.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4992 rundll32.exe 2424 rundll32.exe -
Processes:
q3834970.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q3834970.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exez6798749.exez4005412.exez1208626.exez9586766.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6798749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4005412.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z1208626.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z9586766.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r3870092.exes1516361.exedescription pid process target process PID 2260 set thread context of 3448 2260 r3870092.exe AppLaunch.exe PID 2164 set thread context of 3916 2164 s1516361.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4912 2260 WerFault.exe r3870092.exe 1216 3448 WerFault.exe AppLaunch.exe 2108 2164 WerFault.exe s1516361.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3612 schtasks.exe 1920 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q3834970.exepid process 2204 q3834970.exe 2204 q3834970.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q3834970.exedescription pid process Token: SeDebugPrivilege 2204 q3834970.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exez6798749.exez4005412.exez1208626.exez9586766.exer3870092.exes1516361.exet7334439.exeexplothe.execmd.exedescription pid process target process PID 4440 wrote to memory of 1032 4440 8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exe z6798749.exe PID 4440 wrote to memory of 1032 4440 8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exe z6798749.exe PID 4440 wrote to memory of 1032 4440 8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exe z6798749.exe PID 1032 wrote to memory of 3624 1032 z6798749.exe z4005412.exe PID 1032 wrote to memory of 3624 1032 z6798749.exe z4005412.exe PID 1032 wrote to memory of 3624 1032 z6798749.exe z4005412.exe PID 3624 wrote to memory of 2208 3624 z4005412.exe z1208626.exe PID 3624 wrote to memory of 2208 3624 z4005412.exe z1208626.exe PID 3624 wrote to memory of 2208 3624 z4005412.exe z1208626.exe PID 2208 wrote to memory of 396 2208 z1208626.exe z9586766.exe PID 2208 wrote to memory of 396 2208 z1208626.exe z9586766.exe PID 2208 wrote to memory of 396 2208 z1208626.exe z9586766.exe PID 396 wrote to memory of 2204 396 z9586766.exe q3834970.exe PID 396 wrote to memory of 2204 396 z9586766.exe q3834970.exe PID 396 wrote to memory of 2260 396 z9586766.exe r3870092.exe PID 396 wrote to memory of 2260 396 z9586766.exe r3870092.exe PID 396 wrote to memory of 2260 396 z9586766.exe r3870092.exe PID 2260 wrote to memory of 3448 2260 r3870092.exe AppLaunch.exe PID 2260 wrote to memory of 3448 2260 r3870092.exe AppLaunch.exe PID 2260 wrote to memory of 3448 2260 r3870092.exe AppLaunch.exe PID 2260 wrote to memory of 3448 2260 r3870092.exe AppLaunch.exe PID 2260 wrote to memory of 3448 2260 r3870092.exe AppLaunch.exe PID 2260 wrote to memory of 3448 2260 r3870092.exe AppLaunch.exe PID 2260 wrote to memory of 3448 2260 r3870092.exe AppLaunch.exe PID 2260 wrote to memory of 3448 2260 r3870092.exe AppLaunch.exe PID 2260 wrote to memory of 3448 2260 r3870092.exe AppLaunch.exe PID 2260 wrote to memory of 3448 2260 r3870092.exe AppLaunch.exe PID 2208 wrote to memory of 2164 2208 z1208626.exe s1516361.exe PID 2208 wrote to memory of 2164 2208 z1208626.exe s1516361.exe PID 2208 wrote to memory of 2164 2208 z1208626.exe s1516361.exe PID 2164 wrote to memory of 4844 2164 s1516361.exe AppLaunch.exe PID 2164 wrote to memory of 4844 2164 s1516361.exe AppLaunch.exe PID 2164 wrote to memory of 4844 2164 s1516361.exe AppLaunch.exe PID 2164 wrote to memory of 3916 2164 s1516361.exe AppLaunch.exe PID 2164 wrote to memory of 3916 2164 s1516361.exe AppLaunch.exe PID 2164 wrote to memory of 3916 2164 s1516361.exe AppLaunch.exe PID 2164 wrote to memory of 3916 2164 s1516361.exe AppLaunch.exe PID 2164 wrote to memory of 3916 2164 s1516361.exe AppLaunch.exe PID 2164 wrote to memory of 3916 2164 s1516361.exe AppLaunch.exe PID 2164 wrote to memory of 3916 2164 s1516361.exe AppLaunch.exe PID 2164 wrote to memory of 3916 2164 s1516361.exe AppLaunch.exe PID 3624 wrote to memory of 2664 3624 z4005412.exe t7334439.exe PID 3624 wrote to memory of 2664 3624 z4005412.exe t7334439.exe PID 3624 wrote to memory of 2664 3624 z4005412.exe t7334439.exe PID 2664 wrote to memory of 4568 2664 t7334439.exe explothe.exe PID 2664 wrote to memory of 4568 2664 t7334439.exe explothe.exe PID 2664 wrote to memory of 4568 2664 t7334439.exe explothe.exe PID 1032 wrote to memory of 4072 1032 z6798749.exe u1290117.exe PID 1032 wrote to memory of 4072 1032 z6798749.exe u1290117.exe PID 1032 wrote to memory of 4072 1032 z6798749.exe u1290117.exe PID 4568 wrote to memory of 3612 4568 explothe.exe schtasks.exe PID 4568 wrote to memory of 3612 4568 explothe.exe schtasks.exe PID 4568 wrote to memory of 3612 4568 explothe.exe schtasks.exe PID 4568 wrote to memory of 3092 4568 explothe.exe cmd.exe PID 4568 wrote to memory of 3092 4568 explothe.exe cmd.exe PID 4568 wrote to memory of 3092 4568 explothe.exe cmd.exe PID 4440 wrote to memory of 3736 4440 8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exe w1275554.exe PID 4440 wrote to memory of 3736 4440 8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exe w1275554.exe PID 4440 wrote to memory of 3736 4440 8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exe w1275554.exe PID 3092 wrote to memory of 1464 3092 cmd.exe cmd.exe PID 3092 wrote to memory of 1464 3092 cmd.exe cmd.exe PID 3092 wrote to memory of 1464 3092 cmd.exe cmd.exe PID 3092 wrote to memory of 2812 3092 cmd.exe cacls.exe PID 3092 wrote to memory of 2812 3092 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exe"C:\Users\Admin\AppData\Local\Temp\8fbb9c7055a12c2242537d6e2c231e123ce4dad3837b188eaa0c7d3815badc67.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6798749.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6798749.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4005412.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4005412.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1208626.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1208626.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9586766.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9586766.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3834970.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3834970.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3870092.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3870092.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 5408⤵
- Program crash
PID:1216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 1487⤵
- Program crash
PID:4912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1516361.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1516361.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 5806⤵
- Program crash
PID:2108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7334439.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7334439.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:3612
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:2812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:4780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3484
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4992
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1290117.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1290117.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵PID:1952
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:1920
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4900
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:2788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1276
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:620
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4608
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2424
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1275554.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1275554.exe2⤵
- Executes dropped EXE
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2260 -ip 22601⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3448 -ip 34481⤵PID:3776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2164 -ip 21641⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3200
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD508c001ede892abc038b72f61eb31d251
SHA13dab7f0a2398714ff3fec55066ae0426951bd2ed
SHA256854c280edaa4540ef30793a3f5782127804ac81f0c624bb0a01e11451eb3994c
SHA5127d0d2da632fc652bd6d70a349ca981d2d218d68955b2f3daae8a9ff32459164e220cc9622ad0f14868ce551b7456d3347f96ef7a397ed919a0d1e9782d79938d
-
Filesize
24KB
MD508c001ede892abc038b72f61eb31d251
SHA13dab7f0a2398714ff3fec55066ae0426951bd2ed
SHA256854c280edaa4540ef30793a3f5782127804ac81f0c624bb0a01e11451eb3994c
SHA5127d0d2da632fc652bd6d70a349ca981d2d218d68955b2f3daae8a9ff32459164e220cc9622ad0f14868ce551b7456d3347f96ef7a397ed919a0d1e9782d79938d
-
Filesize
885KB
MD59937d8d0d9155d6d387fe7be253658ac
SHA187e884a02b6c60b749016a93fbb6574381884a90
SHA2567c8cc665c3f2ef333264e36617670f5a63be9338791305e700b1defe6028aa47
SHA512b91f9da8be6a47cd6f51bf5534f3937b850dc3bc383936055a5262bbe1941bac7f7a29b1c67bc49929d3c6317e79849bb0c060fe8da357e41d68ad864001ce30
-
Filesize
885KB
MD59937d8d0d9155d6d387fe7be253658ac
SHA187e884a02b6c60b749016a93fbb6574381884a90
SHA2567c8cc665c3f2ef333264e36617670f5a63be9338791305e700b1defe6028aa47
SHA512b91f9da8be6a47cd6f51bf5534f3937b850dc3bc383936055a5262bbe1941bac7f7a29b1c67bc49929d3c6317e79849bb0c060fe8da357e41d68ad864001ce30
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
709KB
MD5f0a7a37b5af9a801c9d2845c16fea6e3
SHA17b58a713167e77490c19675274260151f00dcbb6
SHA2563963b085653b99645341de773282711f13e625ec6a7af3a0a9f4e4a3158a3a1f
SHA51286e229ec5ea27d96550f2c831e3bdeb93ac801c18b2556543cba4d0b547d5f37ea3dea63a7aa64e647402f0c5d50a4a2614c17be14a7da2eed5f31c04088bef8
-
Filesize
709KB
MD5f0a7a37b5af9a801c9d2845c16fea6e3
SHA17b58a713167e77490c19675274260151f00dcbb6
SHA2563963b085653b99645341de773282711f13e625ec6a7af3a0a9f4e4a3158a3a1f
SHA51286e229ec5ea27d96550f2c831e3bdeb93ac801c18b2556543cba4d0b547d5f37ea3dea63a7aa64e647402f0c5d50a4a2614c17be14a7da2eed5f31c04088bef8
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD5c24d061d43d69e00a46297cdb93f75de
SHA15dd4c8a4fc60367747cd3a3f14cac2a01b82e6fa
SHA2561b10b64baa57b53aab0f0c98f26462dc42e8a123de80d400de734ff4d44a222b
SHA5129fe525ee8cf7e884c2f34768558c3d86a930084fbc443a4f47158a51a1eeb76394c637f32c467b39b22123d0aa0b8ffa6f68756b952396b35487952b627ffb29
-
Filesize
527KB
MD5c24d061d43d69e00a46297cdb93f75de
SHA15dd4c8a4fc60367747cd3a3f14cac2a01b82e6fa
SHA2561b10b64baa57b53aab0f0c98f26462dc42e8a123de80d400de734ff4d44a222b
SHA5129fe525ee8cf7e884c2f34768558c3d86a930084fbc443a4f47158a51a1eeb76394c637f32c467b39b22123d0aa0b8ffa6f68756b952396b35487952b627ffb29
-
Filesize
310KB
MD5aa2803374c69aa2f0f1244fd13cff0a4
SHA15804ca6f93f3b27e92fdc55e2e4a565afbac8190
SHA25611b7c49e29d7e2a416d40e3bf604f1060897ff34efdd0ba1c936875c4f904611
SHA512dd30d4fb3a1424293e60fb0bbf0357dd6a5ba43dea13db9f0062c319fdbfc14629910e3fc2fd3b6e92d2b7a5596ab1d6b4755ec0fd5cb5788ea19fde02584251
-
Filesize
310KB
MD5aa2803374c69aa2f0f1244fd13cff0a4
SHA15804ca6f93f3b27e92fdc55e2e4a565afbac8190
SHA25611b7c49e29d7e2a416d40e3bf604f1060897ff34efdd0ba1c936875c4f904611
SHA512dd30d4fb3a1424293e60fb0bbf0357dd6a5ba43dea13db9f0062c319fdbfc14629910e3fc2fd3b6e92d2b7a5596ab1d6b4755ec0fd5cb5788ea19fde02584251
-
Filesize
296KB
MD543c99cb5392495047760a89fb6583c16
SHA174a30fce5102d91462bc04db65658ab4138b517b
SHA256f648e6fea1ee965b5669229bbe2740c5fc30953665c6824d1f881542a0d0f2cc
SHA5127151994be02b87d0d62a75786ab96ece5a38522112a0ee10918eaf8a04a08c9ba6f542da97eeed72cacde3aa53fc6bade7c7d0ea0b368627a8d5fa4e90170c93
-
Filesize
296KB
MD543c99cb5392495047760a89fb6583c16
SHA174a30fce5102d91462bc04db65658ab4138b517b
SHA256f648e6fea1ee965b5669229bbe2740c5fc30953665c6824d1f881542a0d0f2cc
SHA5127151994be02b87d0d62a75786ab96ece5a38522112a0ee10918eaf8a04a08c9ba6f542da97eeed72cacde3aa53fc6bade7c7d0ea0b368627a8d5fa4e90170c93
-
Filesize
11KB
MD5d957bd267865b23ba487220f01a0e7c0
SHA1adf97cf31d60e60d8080a50e1d7e62e024118601
SHA2565715b987c86582faaa664b54ac35b2287d1709e01c9c4524392e3e2e04121288
SHA5129b4cbe28df2957798d37ab42adfcb721d2f518d05343cc346694f23cfab40d94edcac7b37d98dd60395c0d8c4fae105a3b6d895a7837a4289276ba77936fb678
-
Filesize
11KB
MD5d957bd267865b23ba487220f01a0e7c0
SHA1adf97cf31d60e60d8080a50e1d7e62e024118601
SHA2565715b987c86582faaa664b54ac35b2287d1709e01c9c4524392e3e2e04121288
SHA5129b4cbe28df2957798d37ab42adfcb721d2f518d05343cc346694f23cfab40d94edcac7b37d98dd60395c0d8c4fae105a3b6d895a7837a4289276ba77936fb678
-
Filesize
276KB
MD53034b303bf022e86542b5a905c2b1d6c
SHA17060fceca5fac6228c6e1b7b27f685b964b4c55b
SHA256a0d4589c7e5cbadd9d2b5bc6846df86127f1db5b67bd8fd5f0ef86883ff3430e
SHA512e0eefed3142a560d379beeb31586017412548cad5b748310531d5002e468609ea4432000ab34671df4beebe94befeae4c44ff17d526afd88a4cf0d10c678cc9a
-
Filesize
276KB
MD53034b303bf022e86542b5a905c2b1d6c
SHA17060fceca5fac6228c6e1b7b27f685b964b4c55b
SHA256a0d4589c7e5cbadd9d2b5bc6846df86127f1db5b67bd8fd5f0ef86883ff3430e
SHA512e0eefed3142a560d379beeb31586017412548cad5b748310531d5002e468609ea4432000ab34671df4beebe94befeae4c44ff17d526afd88a4cf0d10c678cc9a
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0