Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 10:16
Static task
static1
Behavioral task
behavioral1
Sample
a63ab28b96183dc3c8e56f19ef9d68f6c932a4e9ed78ea4517ab68b53e879349.exe
Resource
win10v2004-20230915-en
General
-
Target
a63ab28b96183dc3c8e56f19ef9d68f6c932a4e9ed78ea4517ab68b53e879349.exe
-
Size
994KB
-
MD5
23d47e120cd2bd18a7a9a4502e3f6cf0
-
SHA1
73dbeccabeae2c731d8afcf7db55ffb952990c59
-
SHA256
a63ab28b96183dc3c8e56f19ef9d68f6c932a4e9ed78ea4517ab68b53e879349
-
SHA512
7ce409da3551676ee16b1ec6b830e9598df251017a9c8f0e7b909ba247004d190e6abe245725ceb41adda7307eec1d7a826d6c6b04157ece863f2ae900ffa9db
-
SSDEEP
24576:YyBzu0j0Rly46uP8yeS8mfqT2dnhXwzDPd4UNCyJuT8baRFgA:fBzOly/88bS88xhX4DPdRC4X
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4622812.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4622812.exe healer behavioral1/memory/3944-35-0x0000000000B90000-0x0000000000B9A000-memory.dmp healer -
Processes:
q4622812.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q4622812.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q4622812.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q4622812.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q4622812.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q4622812.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q4622812.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t6011594.exeexplothe.exeu4225307.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation t6011594.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation u4225307.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 18 IoCs
Processes:
z0742487.exez6103176.exez0040638.exez0732199.exeq4622812.exer0390556.exes5972743.exet6011594.exeexplothe.exeu4225307.exelegota.exew8392851.exeexplothe.exelegota.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4536 z0742487.exe 5040 z6103176.exe 1828 z0040638.exe 4516 z0732199.exe 3944 q4622812.exe 2604 r0390556.exe 572 s5972743.exe 1688 t6011594.exe 412 explothe.exe 1484 u4225307.exe 4256 legota.exe 636 w8392851.exe 3724 explothe.exe 1420 legota.exe 5008 explothe.exe 4936 legota.exe 1828 explothe.exe 2532 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2092 rundll32.exe 216 rundll32.exe -
Processes:
q4622812.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q4622812.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
a63ab28b96183dc3c8e56f19ef9d68f6c932a4e9ed78ea4517ab68b53e879349.exez0742487.exez6103176.exez0040638.exez0732199.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a63ab28b96183dc3c8e56f19ef9d68f6c932a4e9ed78ea4517ab68b53e879349.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0742487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6103176.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z0040638.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z0732199.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r0390556.exes5972743.exedescription pid process target process PID 2604 set thread context of 1124 2604 r0390556.exe AppLaunch.exe PID 572 set thread context of 3212 572 s5972743.exe AppLaunch.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3176 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2332 2604 WerFault.exe r0390556.exe 2104 1124 WerFault.exe AppLaunch.exe 2724 572 WerFault.exe s5972743.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5008 schtasks.exe 2784 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q4622812.exepid process 3944 q4622812.exe 3944 q4622812.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q4622812.exedescription pid process Token: SeDebugPrivilege 3944 q4622812.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a63ab28b96183dc3c8e56f19ef9d68f6c932a4e9ed78ea4517ab68b53e879349.exez0742487.exez6103176.exez0040638.exez0732199.exer0390556.exes5972743.exet6011594.exeexplothe.exeu4225307.execmd.exedescription pid process target process PID 2908 wrote to memory of 4536 2908 a63ab28b96183dc3c8e56f19ef9d68f6c932a4e9ed78ea4517ab68b53e879349.exe z0742487.exe PID 2908 wrote to memory of 4536 2908 a63ab28b96183dc3c8e56f19ef9d68f6c932a4e9ed78ea4517ab68b53e879349.exe z0742487.exe PID 2908 wrote to memory of 4536 2908 a63ab28b96183dc3c8e56f19ef9d68f6c932a4e9ed78ea4517ab68b53e879349.exe z0742487.exe PID 4536 wrote to memory of 5040 4536 z0742487.exe z6103176.exe PID 4536 wrote to memory of 5040 4536 z0742487.exe z6103176.exe PID 4536 wrote to memory of 5040 4536 z0742487.exe z6103176.exe PID 5040 wrote to memory of 1828 5040 z6103176.exe z0040638.exe PID 5040 wrote to memory of 1828 5040 z6103176.exe z0040638.exe PID 5040 wrote to memory of 1828 5040 z6103176.exe z0040638.exe PID 1828 wrote to memory of 4516 1828 z0040638.exe z0732199.exe PID 1828 wrote to memory of 4516 1828 z0040638.exe z0732199.exe PID 1828 wrote to memory of 4516 1828 z0040638.exe z0732199.exe PID 4516 wrote to memory of 3944 4516 z0732199.exe q4622812.exe PID 4516 wrote to memory of 3944 4516 z0732199.exe q4622812.exe PID 4516 wrote to memory of 2604 4516 z0732199.exe r0390556.exe PID 4516 wrote to memory of 2604 4516 z0732199.exe r0390556.exe PID 4516 wrote to memory of 2604 4516 z0732199.exe r0390556.exe PID 2604 wrote to memory of 932 2604 r0390556.exe AppLaunch.exe PID 2604 wrote to memory of 932 2604 r0390556.exe AppLaunch.exe PID 2604 wrote to memory of 932 2604 r0390556.exe AppLaunch.exe PID 2604 wrote to memory of 1124 2604 r0390556.exe AppLaunch.exe PID 2604 wrote to memory of 1124 2604 r0390556.exe AppLaunch.exe PID 2604 wrote to memory of 1124 2604 r0390556.exe AppLaunch.exe PID 2604 wrote to memory of 1124 2604 r0390556.exe AppLaunch.exe PID 2604 wrote to memory of 1124 2604 r0390556.exe AppLaunch.exe PID 2604 wrote to memory of 1124 2604 r0390556.exe AppLaunch.exe PID 2604 wrote to memory of 1124 2604 r0390556.exe AppLaunch.exe PID 2604 wrote to memory of 1124 2604 r0390556.exe AppLaunch.exe PID 2604 wrote to memory of 1124 2604 r0390556.exe AppLaunch.exe PID 2604 wrote to memory of 1124 2604 r0390556.exe AppLaunch.exe PID 1828 wrote to memory of 572 1828 z0040638.exe s5972743.exe PID 1828 wrote to memory of 572 1828 z0040638.exe s5972743.exe PID 1828 wrote to memory of 572 1828 z0040638.exe s5972743.exe PID 572 wrote to memory of 2548 572 s5972743.exe AppLaunch.exe PID 572 wrote to memory of 2548 572 s5972743.exe AppLaunch.exe PID 572 wrote to memory of 2548 572 s5972743.exe AppLaunch.exe PID 572 wrote to memory of 3212 572 s5972743.exe AppLaunch.exe PID 572 wrote to memory of 3212 572 s5972743.exe AppLaunch.exe PID 572 wrote to memory of 3212 572 s5972743.exe AppLaunch.exe PID 572 wrote to memory of 3212 572 s5972743.exe AppLaunch.exe PID 572 wrote to memory of 3212 572 s5972743.exe AppLaunch.exe PID 572 wrote to memory of 3212 572 s5972743.exe AppLaunch.exe PID 572 wrote to memory of 3212 572 s5972743.exe AppLaunch.exe PID 572 wrote to memory of 3212 572 s5972743.exe AppLaunch.exe PID 5040 wrote to memory of 1688 5040 z6103176.exe t6011594.exe PID 5040 wrote to memory of 1688 5040 z6103176.exe t6011594.exe PID 5040 wrote to memory of 1688 5040 z6103176.exe t6011594.exe PID 1688 wrote to memory of 412 1688 t6011594.exe explothe.exe PID 1688 wrote to memory of 412 1688 t6011594.exe explothe.exe PID 1688 wrote to memory of 412 1688 t6011594.exe explothe.exe PID 4536 wrote to memory of 1484 4536 z0742487.exe u4225307.exe PID 4536 wrote to memory of 1484 4536 z0742487.exe u4225307.exe PID 4536 wrote to memory of 1484 4536 z0742487.exe u4225307.exe PID 412 wrote to memory of 5008 412 explothe.exe schtasks.exe PID 412 wrote to memory of 5008 412 explothe.exe schtasks.exe PID 412 wrote to memory of 5008 412 explothe.exe schtasks.exe PID 412 wrote to memory of 4056 412 explothe.exe cmd.exe PID 412 wrote to memory of 4056 412 explothe.exe cmd.exe PID 412 wrote to memory of 4056 412 explothe.exe cmd.exe PID 1484 wrote to memory of 4256 1484 u4225307.exe legota.exe PID 1484 wrote to memory of 4256 1484 u4225307.exe legota.exe PID 1484 wrote to memory of 4256 1484 u4225307.exe legota.exe PID 4056 wrote to memory of 5088 4056 cmd.exe cmd.exe PID 4056 wrote to memory of 5088 4056 cmd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a63ab28b96183dc3c8e56f19ef9d68f6c932a4e9ed78ea4517ab68b53e879349.exe"C:\Users\Admin\AppData\Local\Temp\a63ab28b96183dc3c8e56f19ef9d68f6c932a4e9ed78ea4517ab68b53e879349.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0742487.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0742487.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6103176.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6103176.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0040638.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0040638.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0732199.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0732199.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4622812.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4622812.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0390556.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0390556.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:932
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 5408⤵
- Program crash
PID:2104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 1487⤵
- Program crash
PID:2332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5972743.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5972743.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 2526⤵
- Program crash
PID:2724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6011594.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6011594.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:5008
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5088
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:3532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:2844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1612
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4016
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4225307.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4225307.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4256 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:2784
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4720
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8392851.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8392851.exe2⤵
- Executes dropped EXE
PID:636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2604 -ip 26041⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1124 -ip 11241⤵PID:1796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 572 -ip 5721⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3724
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1420
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5008
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4936
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1828
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2532
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3176
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5160eb1b937b105b27b412fd0e3d0389e
SHA1710673c68dc2bbd9867156031fb58c6e549a0324
SHA25655a86d134ea8ec9866cd45d3daddf01b883192ad0f197ae718b213c961004e35
SHA51222140cde78bd2753e43b56f612e77efbff45554088106061ade0349d76ec52c690f941daa60832434cd1d2fa95546dce891331d4a25d6232a7d1ddd29f323ca2
-
Filesize
24KB
MD5160eb1b937b105b27b412fd0e3d0389e
SHA1710673c68dc2bbd9867156031fb58c6e549a0324
SHA25655a86d134ea8ec9866cd45d3daddf01b883192ad0f197ae718b213c961004e35
SHA51222140cde78bd2753e43b56f612e77efbff45554088106061ade0349d76ec52c690f941daa60832434cd1d2fa95546dce891331d4a25d6232a7d1ddd29f323ca2
-
Filesize
892KB
MD5d2702db67256dbf884f26c67a2dd00eb
SHA1f3794cb629a3f097327a30743901240adc27af85
SHA256fc095cbfd0c06216972643952113c07a362655c774b4a08a6cf4d47f4928756f
SHA512289e0b2325896b2c59fca88145d96d1d4ec8ef815e7ac2c641e428ce29ea2e14a0e28224c19105fcec8ef65059c96bed9890006c205fd6ab3f09d6db3273a02b
-
Filesize
892KB
MD5d2702db67256dbf884f26c67a2dd00eb
SHA1f3794cb629a3f097327a30743901240adc27af85
SHA256fc095cbfd0c06216972643952113c07a362655c774b4a08a6cf4d47f4928756f
SHA512289e0b2325896b2c59fca88145d96d1d4ec8ef815e7ac2c641e428ce29ea2e14a0e28224c19105fcec8ef65059c96bed9890006c205fd6ab3f09d6db3273a02b
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
710KB
MD5ceb56290611b4ce994d2f16748e6550e
SHA12f927ee56726fdafad437a60d39703f31877209e
SHA256677e90a13e724805eac9401520fc12fd4fea5dd474aa2c7b7305913e284a1cf2
SHA5128e9fe3165f2f4c7f581c0b9084bee08814bb486da4ee939dcd44a90995405a6f2fea1080cfa3c77d7facdf5c4d7a529f193502e6f5cc62a95e94526c24ba1560
-
Filesize
710KB
MD5ceb56290611b4ce994d2f16748e6550e
SHA12f927ee56726fdafad437a60d39703f31877209e
SHA256677e90a13e724805eac9401520fc12fd4fea5dd474aa2c7b7305913e284a1cf2
SHA5128e9fe3165f2f4c7f581c0b9084bee08814bb486da4ee939dcd44a90995405a6f2fea1080cfa3c77d7facdf5c4d7a529f193502e6f5cc62a95e94526c24ba1560
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD5702f1404f5d193400d50cef927c4bb46
SHA1de5ffaad6896d858fc14275707300f353fb5510e
SHA256fddd92abb9d35850b5fb69fc39e66f36076964de42254deec85341f21c70008f
SHA512bd94720218819facc7d2a85c214d7eb3218e8d76047437387ddd530fdc27a083bbfe70e220089ca7b8dcc7366be36645e8aa2a6c54496a325ba9472b04241a7d
-
Filesize
527KB
MD5702f1404f5d193400d50cef927c4bb46
SHA1de5ffaad6896d858fc14275707300f353fb5510e
SHA256fddd92abb9d35850b5fb69fc39e66f36076964de42254deec85341f21c70008f
SHA512bd94720218819facc7d2a85c214d7eb3218e8d76047437387ddd530fdc27a083bbfe70e220089ca7b8dcc7366be36645e8aa2a6c54496a325ba9472b04241a7d
-
Filesize
310KB
MD5f656d2de18dd4056194c086083605d9f
SHA1dcc2aedc638f5c7e35e124a58a56681667b5eceb
SHA2563a88b18fd05f417220662193b0e13a397fd729d6b82c637fbaefaf49297b8b26
SHA5123ec6c4a28ad666ea027e5ab868695943a1437a7cad240a6cca014e3d38fa36c5ad04768999d5f1180b5c13892734496ae13ec2d968b2e9ae92c5e6e505184d1b
-
Filesize
310KB
MD5f656d2de18dd4056194c086083605d9f
SHA1dcc2aedc638f5c7e35e124a58a56681667b5eceb
SHA2563a88b18fd05f417220662193b0e13a397fd729d6b82c637fbaefaf49297b8b26
SHA5123ec6c4a28ad666ea027e5ab868695943a1437a7cad240a6cca014e3d38fa36c5ad04768999d5f1180b5c13892734496ae13ec2d968b2e9ae92c5e6e505184d1b
-
Filesize
296KB
MD5a3017dc2e242f9c3a7238cf64ec5bc9d
SHA1c88901d6d6bab1e40d51abbd8ed83f72e5823f64
SHA256a60417a39c572d419823e5a4b2aca0859e12421d0b4917e3705ec94421085e89
SHA512bde861b8b8f6232f1568fb7092f97fe98a4c7e7aaaf14dda468d5e0af9a19eb136aafbd754a1c4ff8e137dc239ee24a2cc35ade433a71b8627bf8c454b477cd1
-
Filesize
296KB
MD5a3017dc2e242f9c3a7238cf64ec5bc9d
SHA1c88901d6d6bab1e40d51abbd8ed83f72e5823f64
SHA256a60417a39c572d419823e5a4b2aca0859e12421d0b4917e3705ec94421085e89
SHA512bde861b8b8f6232f1568fb7092f97fe98a4c7e7aaaf14dda468d5e0af9a19eb136aafbd754a1c4ff8e137dc239ee24a2cc35ade433a71b8627bf8c454b477cd1
-
Filesize
11KB
MD5f8d557296e361a362f1af30233876edb
SHA162aacf0cd3ba0d2e812b286a5c882faadddb5bfb
SHA256d809283aca6fa29821f7b922d17b632a6edb47ce2ccacf6022bd350386501948
SHA5126165de473c29c219420d612db8b4a1e704b2fe8d3c0f704628fa8892d6f9fd1df66f3797ce8091fb22b314ef21ca1270e098c41c29f93d8fc1bbf74260381872
-
Filesize
11KB
MD5f8d557296e361a362f1af30233876edb
SHA162aacf0cd3ba0d2e812b286a5c882faadddb5bfb
SHA256d809283aca6fa29821f7b922d17b632a6edb47ce2ccacf6022bd350386501948
SHA5126165de473c29c219420d612db8b4a1e704b2fe8d3c0f704628fa8892d6f9fd1df66f3797ce8091fb22b314ef21ca1270e098c41c29f93d8fc1bbf74260381872
-
Filesize
276KB
MD5ba8f55f2ac9ecf58663b2b2545f5386c
SHA1788b87221544f04e7a7789a569b18263526b12db
SHA25647d2132fcdad4cb1f1c2e0d154db70a18587c7f8e6b1a92a2d67d414fb935853
SHA5122bb94320bc3f894683bf61c3fdecdf3c3a84d77508079006f1397dc8d998a2e3dea0e64f0970d85d838e72f1888207b7a70ae7a34b815a2959177b6983cbc211
-
Filesize
276KB
MD5ba8f55f2ac9ecf58663b2b2545f5386c
SHA1788b87221544f04e7a7789a569b18263526b12db
SHA25647d2132fcdad4cb1f1c2e0d154db70a18587c7f8e6b1a92a2d67d414fb935853
SHA5122bb94320bc3f894683bf61c3fdecdf3c3a84d77508079006f1397dc8d998a2e3dea0e64f0970d85d838e72f1888207b7a70ae7a34b815a2959177b6983cbc211
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0