Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 10:43
Static task
static1
Behavioral task
behavioral1
Sample
77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a.exe
Resource
win10v2004-20230915-en
General
-
Target
77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a.exe
-
Size
995KB
-
MD5
52e90b5568839f9260a816a61af53297
-
SHA1
ede120f88ffda599a9a61f1ea9382f8cdd7dc699
-
SHA256
77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a
-
SHA512
3d4fb676b1b540d09c10b03f6104a4594c0fbea2856fe0ad3c04203fe94097be974ecef29c897d2de540e2d2c97e460f327121a2e6a11557446c7a8d93602423
-
SSDEEP
24576:CyzyVSIEec3O0LGEwES4bY9REFWoqk6mbG5u9JT2:pz+E6ERS4bYgEoqwKu9
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5224111.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5224111.exe healer behavioral1/memory/3544-35-0x0000000000740000-0x000000000074A000-memory.dmp healer -
Processes:
q5224111.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q5224111.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q5224111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q5224111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q5224111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q5224111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q5224111.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
legota.exet2019724.exeexplothe.exeu3407727.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation t2019724.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation u3407727.exe -
Executes dropped EXE 18 IoCs
Processes:
z8963240.exez2154968.exez2129112.exez7849069.exeq5224111.exer1394042.exes7918536.exet2019724.exeexplothe.exeu3407727.exelegota.exew6232049.exelegota.exeexplothe.exelegota.exeexplothe.exelegota.exeexplothe.exepid process 3548 z8963240.exe 680 z2154968.exe 2700 z2129112.exe 5080 z7849069.exe 3544 q5224111.exe 4260 r1394042.exe 1408 s7918536.exe 2132 t2019724.exe 1216 explothe.exe 1020 u3407727.exe 2684 legota.exe 804 w6232049.exe 4908 legota.exe 2032 explothe.exe 5004 legota.exe 3028 explothe.exe 3752 legota.exe 3880 explothe.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3164 rundll32.exe 4908 rundll32.exe -
Processes:
q5224111.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q5224111.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z2129112.exez7849069.exe77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a.exez8963240.exez2154968.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2129112.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z7849069.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8963240.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z2154968.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r1394042.exes7918536.exedescription pid process target process PID 4260 set thread context of 3384 4260 r1394042.exe AppLaunch.exe PID 1408 set thread context of 4432 1408 s7918536.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 904 4260 WerFault.exe r1394042.exe 3392 3384 WerFault.exe AppLaunch.exe 1112 1408 WerFault.exe s7918536.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2284 schtasks.exe 4088 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q5224111.exepid process 3544 q5224111.exe 3544 q5224111.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q5224111.exedescription pid process Token: SeDebugPrivilege 3544 q5224111.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a.exez8963240.exez2154968.exez2129112.exez7849069.exer1394042.exes7918536.exet2019724.exeexplothe.exeu3407727.execmd.exedescription pid process target process PID 2876 wrote to memory of 3548 2876 77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a.exe z8963240.exe PID 2876 wrote to memory of 3548 2876 77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a.exe z8963240.exe PID 2876 wrote to memory of 3548 2876 77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a.exe z8963240.exe PID 3548 wrote to memory of 680 3548 z8963240.exe z2154968.exe PID 3548 wrote to memory of 680 3548 z8963240.exe z2154968.exe PID 3548 wrote to memory of 680 3548 z8963240.exe z2154968.exe PID 680 wrote to memory of 2700 680 z2154968.exe z2129112.exe PID 680 wrote to memory of 2700 680 z2154968.exe z2129112.exe PID 680 wrote to memory of 2700 680 z2154968.exe z2129112.exe PID 2700 wrote to memory of 5080 2700 z2129112.exe z7849069.exe PID 2700 wrote to memory of 5080 2700 z2129112.exe z7849069.exe PID 2700 wrote to memory of 5080 2700 z2129112.exe z7849069.exe PID 5080 wrote to memory of 3544 5080 z7849069.exe q5224111.exe PID 5080 wrote to memory of 3544 5080 z7849069.exe q5224111.exe PID 5080 wrote to memory of 4260 5080 z7849069.exe r1394042.exe PID 5080 wrote to memory of 4260 5080 z7849069.exe r1394042.exe PID 5080 wrote to memory of 4260 5080 z7849069.exe r1394042.exe PID 4260 wrote to memory of 3384 4260 r1394042.exe AppLaunch.exe PID 4260 wrote to memory of 3384 4260 r1394042.exe AppLaunch.exe PID 4260 wrote to memory of 3384 4260 r1394042.exe AppLaunch.exe PID 4260 wrote to memory of 3384 4260 r1394042.exe AppLaunch.exe PID 4260 wrote to memory of 3384 4260 r1394042.exe AppLaunch.exe PID 4260 wrote to memory of 3384 4260 r1394042.exe AppLaunch.exe PID 4260 wrote to memory of 3384 4260 r1394042.exe AppLaunch.exe PID 4260 wrote to memory of 3384 4260 r1394042.exe AppLaunch.exe PID 4260 wrote to memory of 3384 4260 r1394042.exe AppLaunch.exe PID 4260 wrote to memory of 3384 4260 r1394042.exe AppLaunch.exe PID 2700 wrote to memory of 1408 2700 z2129112.exe s7918536.exe PID 2700 wrote to memory of 1408 2700 z2129112.exe s7918536.exe PID 2700 wrote to memory of 1408 2700 z2129112.exe s7918536.exe PID 1408 wrote to memory of 4432 1408 s7918536.exe AppLaunch.exe PID 1408 wrote to memory of 4432 1408 s7918536.exe AppLaunch.exe PID 1408 wrote to memory of 4432 1408 s7918536.exe AppLaunch.exe PID 1408 wrote to memory of 4432 1408 s7918536.exe AppLaunch.exe PID 1408 wrote to memory of 4432 1408 s7918536.exe AppLaunch.exe PID 1408 wrote to memory of 4432 1408 s7918536.exe AppLaunch.exe PID 1408 wrote to memory of 4432 1408 s7918536.exe AppLaunch.exe PID 1408 wrote to memory of 4432 1408 s7918536.exe AppLaunch.exe PID 680 wrote to memory of 2132 680 z2154968.exe t2019724.exe PID 680 wrote to memory of 2132 680 z2154968.exe t2019724.exe PID 680 wrote to memory of 2132 680 z2154968.exe t2019724.exe PID 2132 wrote to memory of 1216 2132 t2019724.exe explothe.exe PID 2132 wrote to memory of 1216 2132 t2019724.exe explothe.exe PID 2132 wrote to memory of 1216 2132 t2019724.exe explothe.exe PID 3548 wrote to memory of 1020 3548 z8963240.exe u3407727.exe PID 3548 wrote to memory of 1020 3548 z8963240.exe u3407727.exe PID 3548 wrote to memory of 1020 3548 z8963240.exe u3407727.exe PID 1216 wrote to memory of 2284 1216 explothe.exe schtasks.exe PID 1216 wrote to memory of 2284 1216 explothe.exe schtasks.exe PID 1216 wrote to memory of 2284 1216 explothe.exe schtasks.exe PID 1216 wrote to memory of 4608 1216 explothe.exe cmd.exe PID 1216 wrote to memory of 4608 1216 explothe.exe cmd.exe PID 1216 wrote to memory of 4608 1216 explothe.exe cmd.exe PID 1020 wrote to memory of 2684 1020 u3407727.exe legota.exe PID 1020 wrote to memory of 2684 1020 u3407727.exe legota.exe PID 1020 wrote to memory of 2684 1020 u3407727.exe legota.exe PID 4608 wrote to memory of 1964 4608 cmd.exe cmd.exe PID 4608 wrote to memory of 1964 4608 cmd.exe cmd.exe PID 4608 wrote to memory of 1964 4608 cmd.exe cmd.exe PID 4608 wrote to memory of 4524 4608 cmd.exe cacls.exe PID 4608 wrote to memory of 4524 4608 cmd.exe cacls.exe PID 4608 wrote to memory of 4524 4608 cmd.exe cacls.exe PID 2876 wrote to memory of 804 2876 77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a.exe w6232049.exe PID 2876 wrote to memory of 804 2876 77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a.exe w6232049.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a.exe"C:\Users\Admin\AppData\Local\Temp\77891c4d29a184969baa37b79272c646d3c44ace5593ab7a8844dceffa33cf8a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8963240.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8963240.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2154968.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2154968.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2129112.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2129112.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7849069.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7849069.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5224111.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5224111.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3544
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1394042.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1394042.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 1968⤵
- Program crash
PID:3392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 1527⤵
- Program crash
PID:904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7918536.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7918536.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 1566⤵
- Program crash
PID:1112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2019724.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2019724.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:2284
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:4704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3196
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3164
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3407727.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3407727.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:4088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:2516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4004
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:5052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:2664
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4908
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6232049.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6232049.exe2⤵
- Executes dropped EXE
PID:804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4260 -ip 42601⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3384 -ip 33841⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1408 -ip 14081⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4908
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2032
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:5004
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3028
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3752
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5fced32a8886a0ef2d76bbb41b33a8513
SHA1d6602594580866ea3d95f80aaf4738ab45f8ed6c
SHA2568924997e44f385624887718c9475e53674de6f4f19f83e2c9bec9f10f0386472
SHA5124311a992f8155ecc9a7d6c096a6a1b9a0116a83755e32b5db743088a4832a99e596ab68a62521585dceaa183f9e96124043555cdd7b210bc827b3bd37112b1aa
-
Filesize
24KB
MD5fced32a8886a0ef2d76bbb41b33a8513
SHA1d6602594580866ea3d95f80aaf4738ab45f8ed6c
SHA2568924997e44f385624887718c9475e53674de6f4f19f83e2c9bec9f10f0386472
SHA5124311a992f8155ecc9a7d6c096a6a1b9a0116a83755e32b5db743088a4832a99e596ab68a62521585dceaa183f9e96124043555cdd7b210bc827b3bd37112b1aa
-
Filesize
893KB
MD50e69ce064f643ec7b2c792c68ac13007
SHA1bf37acc8ca85fcc87d1721ca661d2d14e4ec2605
SHA25675e9c6425b85372c085438592d8cd318aaa374ee86f8c3245fd3fcdac6c752ce
SHA512ea90504d9f65d41fa25c32b6e79b83aa34782547bfbedded5640719552635d2f46df3e6ec157a6a32ca24b61147e06eea4000537d7b85605e0530d4ee87fe5ad
-
Filesize
893KB
MD50e69ce064f643ec7b2c792c68ac13007
SHA1bf37acc8ca85fcc87d1721ca661d2d14e4ec2605
SHA25675e9c6425b85372c085438592d8cd318aaa374ee86f8c3245fd3fcdac6c752ce
SHA512ea90504d9f65d41fa25c32b6e79b83aa34782547bfbedded5640719552635d2f46df3e6ec157a6a32ca24b61147e06eea4000537d7b85605e0530d4ee87fe5ad
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
710KB
MD5f96ecb6e799a50bd44d91dbabdf3f2fb
SHA146c1d491a14f1b68b2e374af5b18240ba95ab777
SHA2567616ad58650abe63b93fd2f1995798006b32034df3179e2f7bd0c0d281e8d628
SHA512ad1b32a27b4085fe0eb50adfc02e6a1b03b50f2e83b5ec38e9e879e0e7f0809c398cccc46b5fe1dbb83bfaf745898269c10e1ab59210bee71bbadd0d75b9a667
-
Filesize
710KB
MD5f96ecb6e799a50bd44d91dbabdf3f2fb
SHA146c1d491a14f1b68b2e374af5b18240ba95ab777
SHA2567616ad58650abe63b93fd2f1995798006b32034df3179e2f7bd0c0d281e8d628
SHA512ad1b32a27b4085fe0eb50adfc02e6a1b03b50f2e83b5ec38e9e879e0e7f0809c398cccc46b5fe1dbb83bfaf745898269c10e1ab59210bee71bbadd0d75b9a667
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD5c90e2ea305b42a3784c21060d5fc8e44
SHA1ba71c3769e39b05106756bcd2b3321fcfc1fa0c3
SHA2561be16f2dad9a5ac812e830174d00fc30f01f4969184953d9cd74c49b5bf2ac06
SHA5129f718eab100450445370de810495897905dec7d803765ce97df74db81119a2dd591557805cb6eceedca5269a75db9d54b16bf49978ccc361bb64639d1c76baf6
-
Filesize
527KB
MD5c90e2ea305b42a3784c21060d5fc8e44
SHA1ba71c3769e39b05106756bcd2b3321fcfc1fa0c3
SHA2561be16f2dad9a5ac812e830174d00fc30f01f4969184953d9cd74c49b5bf2ac06
SHA5129f718eab100450445370de810495897905dec7d803765ce97df74db81119a2dd591557805cb6eceedca5269a75db9d54b16bf49978ccc361bb64639d1c76baf6
-
Filesize
310KB
MD50baca398916666246c57c803d6a1a295
SHA1397867cf26524d5607756c0aa048705efacd2251
SHA2567d0e8b5eb3e24bc0f82cdd22ae2c7f30b607e917fcc9bf2634d20cac3deb4f58
SHA512a262db0a3faed2e90ab5ea25b286092216e10b4630246f2cd7df3c393e376ea469986bc1e2b882c3e6ccab88409c11d5a0d9c1f31143d0656f23770f5d0a31d4
-
Filesize
310KB
MD50baca398916666246c57c803d6a1a295
SHA1397867cf26524d5607756c0aa048705efacd2251
SHA2567d0e8b5eb3e24bc0f82cdd22ae2c7f30b607e917fcc9bf2634d20cac3deb4f58
SHA512a262db0a3faed2e90ab5ea25b286092216e10b4630246f2cd7df3c393e376ea469986bc1e2b882c3e6ccab88409c11d5a0d9c1f31143d0656f23770f5d0a31d4
-
Filesize
296KB
MD5ab51da66643ce30a842e1fd9180dd122
SHA182064b65e6b4e8cd0e14b6c48d09e057d66ec964
SHA2564a46d25f69b4810de9ac6010a785b13b2a54b9f06cd2f77fd62e79eefff5540a
SHA512f8a391266ee5c50b01560bb20bc2c6a4ab89169cd323150083d1fd78fa63a6878290d10b0faf84ad7e228344c6bf4f5461ab8c8a95fc3ee58e268271f03a3405
-
Filesize
296KB
MD5ab51da66643ce30a842e1fd9180dd122
SHA182064b65e6b4e8cd0e14b6c48d09e057d66ec964
SHA2564a46d25f69b4810de9ac6010a785b13b2a54b9f06cd2f77fd62e79eefff5540a
SHA512f8a391266ee5c50b01560bb20bc2c6a4ab89169cd323150083d1fd78fa63a6878290d10b0faf84ad7e228344c6bf4f5461ab8c8a95fc3ee58e268271f03a3405
-
Filesize
11KB
MD5b01c973d25fb6f06a62fbe4989e2dfe9
SHA1eb73051d6a04748343539bd3811315df479e834e
SHA256bbe6cc4d34e1d829f1858ed8f247b915c979b51adf891b306c7530d752898e6b
SHA5124060be8dc1e9e890fcf7fa99a4a2a3aeee76b65e06acd29313dfb5e3659dd3ae05dd685403d333ba196b12379b8618f5cd5f57b3d4e73edaa54baa6a297f22cb
-
Filesize
11KB
MD5b01c973d25fb6f06a62fbe4989e2dfe9
SHA1eb73051d6a04748343539bd3811315df479e834e
SHA256bbe6cc4d34e1d829f1858ed8f247b915c979b51adf891b306c7530d752898e6b
SHA5124060be8dc1e9e890fcf7fa99a4a2a3aeee76b65e06acd29313dfb5e3659dd3ae05dd685403d333ba196b12379b8618f5cd5f57b3d4e73edaa54baa6a297f22cb
-
Filesize
276KB
MD53ab9977d71d106a9ff8aa397b64339c1
SHA12f644cbb0196b260f5a30c3537952fb021cfe2f1
SHA256ff32bd53512db0078f85aef5e3fdb3450f1ee04219e875b5b0b9c5e21ecbd0af
SHA512cc1e2c62c3cbc091ff1d2fe105443a9f3fa452c4b9cfb0ce359ee52d1b1350a0da0d0a2813195223f0e82e5b097d9d074f9879d615a01a2688110878301300b2
-
Filesize
276KB
MD53ab9977d71d106a9ff8aa397b64339c1
SHA12f644cbb0196b260f5a30c3537952fb021cfe2f1
SHA256ff32bd53512db0078f85aef5e3fdb3450f1ee04219e875b5b0b9c5e21ecbd0af
SHA512cc1e2c62c3cbc091ff1d2fe105443a9f3fa452c4b9cfb0ce359ee52d1b1350a0da0d0a2813195223f0e82e5b097d9d074f9879d615a01a2688110878301300b2
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0