Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 09:53
Static task
static1
Behavioral task
behavioral1
Sample
2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exe
Resource
win10v2004-20230915-en
General
-
Target
2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exe
-
Size
993KB
-
MD5
dd38c786284cce64b10d7de6bbd1e4f0
-
SHA1
2dbb14fec32c197a092f1be05c7689642eff96a4
-
SHA256
2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52
-
SHA512
1bcb5cd492d4ffd0696b894d09aacf47968180313ffaf2cae66f79f98cbb143a79b62aac8080d1a5d3cb3d49a67bd5fb3915ffdb059130ff535de225dfe1e6c2
-
SSDEEP
24576:synYt+Yfuw18YN+cEZo1u35YtlxT/SYpGrXm0:bIbf1WG+9kugz/SxXm
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0140542.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0140542.exe healer behavioral1/memory/3920-35-0x0000000000750000-0x000000000075A000-memory.dmp healer -
Processes:
q0140542.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q0140542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q0140542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q0140542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q0140542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q0140542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q0140542.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t9245744.exeexplothe.exeu1787847.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation t9245744.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation u1787847.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z2235710.exez9048083.exez3095931.exez5986859.exeq0140542.exer4911328.exes3384981.exet9245744.exeexplothe.exeu1787847.exelegota.exew3563991.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4664 z2235710.exe 4040 z9048083.exe 4668 z3095931.exe 4552 z5986859.exe 3920 q0140542.exe 1540 r4911328.exe 1784 s3384981.exe 1388 t9245744.exe 1564 explothe.exe 2400 u1787847.exe 2912 legota.exe 5080 w3563991.exe 4380 explothe.exe 1548 legota.exe 2568 explothe.exe 2108 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1784 rundll32.exe 4436 rundll32.exe -
Processes:
q0140542.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q0140542.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exez2235710.exez9048083.exez3095931.exez5986859.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2235710.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9048083.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z3095931.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z5986859.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r4911328.exes3384981.exedescription pid process target process PID 1540 set thread context of 1748 1540 r4911328.exe AppLaunch.exe PID 1784 set thread context of 3760 1784 s3384981.exe AppLaunch.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1824 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5016 1748 WerFault.exe AppLaunch.exe 5028 1540 WerFault.exe r4911328.exe 1824 1784 WerFault.exe s3384981.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4836 schtasks.exe 1672 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q0140542.exepid process 3920 q0140542.exe 3920 q0140542.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q0140542.exedescription pid process Token: SeDebugPrivilege 3920 q0140542.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exez2235710.exez9048083.exez3095931.exez5986859.exer4911328.exes3384981.exet9245744.exeexplothe.exeu1787847.execmd.exelegota.exedescription pid process target process PID 676 wrote to memory of 4664 676 2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exe z2235710.exe PID 676 wrote to memory of 4664 676 2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exe z2235710.exe PID 676 wrote to memory of 4664 676 2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exe z2235710.exe PID 4664 wrote to memory of 4040 4664 z2235710.exe z9048083.exe PID 4664 wrote to memory of 4040 4664 z2235710.exe z9048083.exe PID 4664 wrote to memory of 4040 4664 z2235710.exe z9048083.exe PID 4040 wrote to memory of 4668 4040 z9048083.exe z3095931.exe PID 4040 wrote to memory of 4668 4040 z9048083.exe z3095931.exe PID 4040 wrote to memory of 4668 4040 z9048083.exe z3095931.exe PID 4668 wrote to memory of 4552 4668 z3095931.exe z5986859.exe PID 4668 wrote to memory of 4552 4668 z3095931.exe z5986859.exe PID 4668 wrote to memory of 4552 4668 z3095931.exe z5986859.exe PID 4552 wrote to memory of 3920 4552 z5986859.exe q0140542.exe PID 4552 wrote to memory of 3920 4552 z5986859.exe q0140542.exe PID 4552 wrote to memory of 1540 4552 z5986859.exe r4911328.exe PID 4552 wrote to memory of 1540 4552 z5986859.exe r4911328.exe PID 4552 wrote to memory of 1540 4552 z5986859.exe r4911328.exe PID 1540 wrote to memory of 1748 1540 r4911328.exe AppLaunch.exe PID 1540 wrote to memory of 1748 1540 r4911328.exe AppLaunch.exe PID 1540 wrote to memory of 1748 1540 r4911328.exe AppLaunch.exe PID 1540 wrote to memory of 1748 1540 r4911328.exe AppLaunch.exe PID 1540 wrote to memory of 1748 1540 r4911328.exe AppLaunch.exe PID 1540 wrote to memory of 1748 1540 r4911328.exe AppLaunch.exe PID 1540 wrote to memory of 1748 1540 r4911328.exe AppLaunch.exe PID 1540 wrote to memory of 1748 1540 r4911328.exe AppLaunch.exe PID 1540 wrote to memory of 1748 1540 r4911328.exe AppLaunch.exe PID 1540 wrote to memory of 1748 1540 r4911328.exe AppLaunch.exe PID 4668 wrote to memory of 1784 4668 z3095931.exe s3384981.exe PID 4668 wrote to memory of 1784 4668 z3095931.exe s3384981.exe PID 4668 wrote to memory of 1784 4668 z3095931.exe s3384981.exe PID 1784 wrote to memory of 3760 1784 s3384981.exe AppLaunch.exe PID 1784 wrote to memory of 3760 1784 s3384981.exe AppLaunch.exe PID 1784 wrote to memory of 3760 1784 s3384981.exe AppLaunch.exe PID 1784 wrote to memory of 3760 1784 s3384981.exe AppLaunch.exe PID 1784 wrote to memory of 3760 1784 s3384981.exe AppLaunch.exe PID 1784 wrote to memory of 3760 1784 s3384981.exe AppLaunch.exe PID 1784 wrote to memory of 3760 1784 s3384981.exe AppLaunch.exe PID 1784 wrote to memory of 3760 1784 s3384981.exe AppLaunch.exe PID 4040 wrote to memory of 1388 4040 z9048083.exe t9245744.exe PID 4040 wrote to memory of 1388 4040 z9048083.exe t9245744.exe PID 4040 wrote to memory of 1388 4040 z9048083.exe t9245744.exe PID 1388 wrote to memory of 1564 1388 t9245744.exe explothe.exe PID 1388 wrote to memory of 1564 1388 t9245744.exe explothe.exe PID 1388 wrote to memory of 1564 1388 t9245744.exe explothe.exe PID 4664 wrote to memory of 2400 4664 z2235710.exe u1787847.exe PID 4664 wrote to memory of 2400 4664 z2235710.exe u1787847.exe PID 4664 wrote to memory of 2400 4664 z2235710.exe u1787847.exe PID 1564 wrote to memory of 4836 1564 explothe.exe schtasks.exe PID 1564 wrote to memory of 4836 1564 explothe.exe schtasks.exe PID 1564 wrote to memory of 4836 1564 explothe.exe schtasks.exe PID 1564 wrote to memory of 1268 1564 explothe.exe cmd.exe PID 1564 wrote to memory of 1268 1564 explothe.exe cmd.exe PID 1564 wrote to memory of 1268 1564 explothe.exe cmd.exe PID 2400 wrote to memory of 2912 2400 u1787847.exe legota.exe PID 2400 wrote to memory of 2912 2400 u1787847.exe legota.exe PID 2400 wrote to memory of 2912 2400 u1787847.exe legota.exe PID 676 wrote to memory of 5080 676 2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exe w3563991.exe PID 676 wrote to memory of 5080 676 2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exe w3563991.exe PID 676 wrote to memory of 5080 676 2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exe w3563991.exe PID 1268 wrote to memory of 4248 1268 cmd.exe cmd.exe PID 1268 wrote to memory of 4248 1268 cmd.exe cmd.exe PID 1268 wrote to memory of 4248 1268 cmd.exe cmd.exe PID 2912 wrote to memory of 1672 2912 legota.exe schtasks.exe PID 2912 wrote to memory of 1672 2912 legota.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exe"C:\Users\Admin\AppData\Local\Temp\2dec0751eae16d514084c6c8aeaceb34eb83557a2519618ed1be08bf4a583e52.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2235710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2235710.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9048083.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9048083.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3095931.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3095931.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5986859.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5986859.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0140542.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0140542.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4911328.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4911328.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 5408⤵
- Program crash
PID:5016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 2167⤵
- Program crash
PID:5028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3384981.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3384981.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 1566⤵
- Program crash
PID:1824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9245744.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9245744.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:4836
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4248
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:4192
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:3364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:1184
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4436
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1787847.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1787847.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:3360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:2044
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3656
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:3284
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:1672
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1784
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w3563991.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w3563991.exe2⤵
- Executes dropped EXE
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1540 -ip 15401⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1748 -ip 17481⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1784 -ip 17841⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4380
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1548
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2568
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2108
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1824
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5739b3e61ee5f4a2e14826e0b659b9aed
SHA19a310364d0fe295f93f1593e621e863b182cd857
SHA2569fadc1e4fb49eee2c0c1224446bbe449a26697d34df935fa63157a69362132ce
SHA512973c5445f1c38a3751fbe1de71c0da8c39d99533c164de93234dad6e8e221012041d2539fa02597b00bb48cee206ac4b8fb19c26db1a631ad331d53ad4e8c192
-
Filesize
24KB
MD5739b3e61ee5f4a2e14826e0b659b9aed
SHA19a310364d0fe295f93f1593e621e863b182cd857
SHA2569fadc1e4fb49eee2c0c1224446bbe449a26697d34df935fa63157a69362132ce
SHA512973c5445f1c38a3751fbe1de71c0da8c39d99533c164de93234dad6e8e221012041d2539fa02597b00bb48cee206ac4b8fb19c26db1a631ad331d53ad4e8c192
-
Filesize
892KB
MD563e7d82796dfe0b6c153fac7e7cc04e6
SHA1fce2778b163a6d17abadd65bd94b9dd552407c5e
SHA256603c83c78ef6c0ea2b7234729913fca96a0b13d1f9f18ba5e740477e8d6f77eb
SHA5122b6df6d9c9b20a84bb838a7fe10102f253d34fbebbfb6a66b5a2946624c31d09351f6815aa317c4b86bceb2bd9e07163bf6826ccff0a80f5b0614cca89afeb6c
-
Filesize
892KB
MD563e7d82796dfe0b6c153fac7e7cc04e6
SHA1fce2778b163a6d17abadd65bd94b9dd552407c5e
SHA256603c83c78ef6c0ea2b7234729913fca96a0b13d1f9f18ba5e740477e8d6f77eb
SHA5122b6df6d9c9b20a84bb838a7fe10102f253d34fbebbfb6a66b5a2946624c31d09351f6815aa317c4b86bceb2bd9e07163bf6826ccff0a80f5b0614cca89afeb6c
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
709KB
MD580f2d37ee7ac7f519bfd7de989d37d40
SHA12cd078029e871e5028938e980167488e75ee966c
SHA2564d51203b2f6622b41a01f426abb7e0e618ae30a824507cf714cead5e667f51d2
SHA512ddc559f6aa80783a942aa7fd1b653ec5dc01054f107557c88f8e02bfdbf19e7ca6fae4f908f90a9daaab9c25c3202ec6d54c137db765ba3f74e43ce68b824b35
-
Filesize
709KB
MD580f2d37ee7ac7f519bfd7de989d37d40
SHA12cd078029e871e5028938e980167488e75ee966c
SHA2564d51203b2f6622b41a01f426abb7e0e618ae30a824507cf714cead5e667f51d2
SHA512ddc559f6aa80783a942aa7fd1b653ec5dc01054f107557c88f8e02bfdbf19e7ca6fae4f908f90a9daaab9c25c3202ec6d54c137db765ba3f74e43ce68b824b35
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD59446bd216898b190722dbdc83db2e8a6
SHA1b4d670589e452a8276649ff5d9823dc246079f15
SHA25689ceff70c475f7493ee53eb4ae297b97480fac8b10fa151cb483ef63eb11ec1d
SHA5121bcf18bc03b1988cde23119ea27c05804ff73f3164fee8b6eeba73d2abb5db2a4edc5a5881dbae93eb5c096fd6c1f08c66be5760b5e2a9970ed1f770c2c93cd2
-
Filesize
527KB
MD59446bd216898b190722dbdc83db2e8a6
SHA1b4d670589e452a8276649ff5d9823dc246079f15
SHA25689ceff70c475f7493ee53eb4ae297b97480fac8b10fa151cb483ef63eb11ec1d
SHA5121bcf18bc03b1988cde23119ea27c05804ff73f3164fee8b6eeba73d2abb5db2a4edc5a5881dbae93eb5c096fd6c1f08c66be5760b5e2a9970ed1f770c2c93cd2
-
Filesize
310KB
MD56c8e00ff9b5e36cb38360c781f5eb106
SHA130193a5c3c405e6693162a3bfa4fb581f7265750
SHA256c745e2e7102e62f87b4a648a42d909692c1e932fb105984df9a28bef89efcb25
SHA512951bc8954805a37484f15d271c1fd178ff8ba88f7a6ea5b4e02d86e247d5692a3d956359803bd71e482fcfdacdfb0013c79242059dd2e76d01e7df325be964e7
-
Filesize
310KB
MD56c8e00ff9b5e36cb38360c781f5eb106
SHA130193a5c3c405e6693162a3bfa4fb581f7265750
SHA256c745e2e7102e62f87b4a648a42d909692c1e932fb105984df9a28bef89efcb25
SHA512951bc8954805a37484f15d271c1fd178ff8ba88f7a6ea5b4e02d86e247d5692a3d956359803bd71e482fcfdacdfb0013c79242059dd2e76d01e7df325be964e7
-
Filesize
296KB
MD543ca9173c1a2317a4e1626086fdde924
SHA15ddec5cb71c5d2f578965d9c1889009dac4d0c81
SHA256bb230d80500987624afba3e202a4adc23984d0cacfa3719b7728ab175fe7b7ff
SHA512ae6161b2f1e0c586e34c82c80b81dceaf59a3a80915e235d9199cecaebad704118383d24fa47ab34bbf58cd7ff5f317ab570640b9182eee4634cbaf56b519eaf
-
Filesize
296KB
MD543ca9173c1a2317a4e1626086fdde924
SHA15ddec5cb71c5d2f578965d9c1889009dac4d0c81
SHA256bb230d80500987624afba3e202a4adc23984d0cacfa3719b7728ab175fe7b7ff
SHA512ae6161b2f1e0c586e34c82c80b81dceaf59a3a80915e235d9199cecaebad704118383d24fa47ab34bbf58cd7ff5f317ab570640b9182eee4634cbaf56b519eaf
-
Filesize
11KB
MD5f8a085f5b659f1c3325534ea862e56e1
SHA18f0365614652872557dcde46343eae18b784dfe2
SHA2565a8c2603cf8a7a5a869fece1331333c2fa6022e350d67b8157897215335206ac
SHA51247e289d5aebfdc9d680c52b8ad635cea97d0083c60f7909d9fd055b7e5803d69bd6b5643969511b7a04daa9abd32e4d17d585ff7dbafc56f2a69705a2739030f
-
Filesize
11KB
MD5f8a085f5b659f1c3325534ea862e56e1
SHA18f0365614652872557dcde46343eae18b784dfe2
SHA2565a8c2603cf8a7a5a869fece1331333c2fa6022e350d67b8157897215335206ac
SHA51247e289d5aebfdc9d680c52b8ad635cea97d0083c60f7909d9fd055b7e5803d69bd6b5643969511b7a04daa9abd32e4d17d585ff7dbafc56f2a69705a2739030f
-
Filesize
276KB
MD5805c5e31e9bf5dc7fdbcbcbf1429a025
SHA18384d02c46719bed6b951938bf34e51b42fa866d
SHA256c556002c1439f6eb741414d16f4f7ad6493b6a81cb6f33ef9d4cb32f867c9582
SHA512ea92af79e3abd6bd9ccde9a914e3914ce0f4c0bac5a53994d832a36f996b3f085794dc5d0de9897bab66b5aae88168c50997807c2892c16aaae785ef552dce07
-
Filesize
276KB
MD5805c5e31e9bf5dc7fdbcbcbf1429a025
SHA18384d02c46719bed6b951938bf34e51b42fa866d
SHA256c556002c1439f6eb741414d16f4f7ad6493b6a81cb6f33ef9d4cb32f867c9582
SHA512ea92af79e3abd6bd9ccde9a914e3914ce0f4c0bac5a53994d832a36f996b3f085794dc5d0de9897bab66b5aae88168c50997807c2892c16aaae785ef552dce07
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0