Analysis
-
max time kernel
158s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 19:34
Static task
static1
Behavioral task
behavioral1
Sample
1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe
-
Size
1.0MB
-
MD5
eb326f653ba0d49d00e57dcece8b35bb
-
SHA1
6b4c8556eaf3e6344872ffd688c567163140f3fe
-
SHA256
1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863
-
SHA512
8d3ed6fcf1f072c14995fcec3ec685db8cca18122d37726fb2d18c6eea7c464a9511ffa3d28087cde43b4f0efa4530312e7d734cc23b1d3542a215588cc4ba1c
-
SSDEEP
24576:sy+GQ1nmLASp2WWG7XM/nw32+FcVTeNnU674ts/mN:b+GQ1nmLASVpXzNT+s
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6788692.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6788692.exe healer behavioral2/memory/4244-35-0x0000000000D50000-0x0000000000D5A000-memory.dmp healer -
Processes:
q6788692.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q6788692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q6788692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q6788692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q6788692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q6788692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q6788692.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t7552670.exeu0100166.exelegota.exeexplothe.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation t7552670.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation u0100166.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation explothe.exe -
Executes dropped EXE 14 IoCs
Processes:
z1148654.exez1269223.exez4922398.exez6782030.exeq6788692.exer4225931.exes0044377.exet7552670.exeexplothe.exeu0100166.exelegota.exew6021713.exelegota.exeexplothe.exepid process 1044 z1148654.exe 3472 z1269223.exe 3924 z4922398.exe 4516 z6782030.exe 4244 q6788692.exe 4912 r4225931.exe 4424 s0044377.exe 3108 t7552670.exe 4992 explothe.exe 3992 u0100166.exe 4032 legota.exe 2756 w6021713.exe 4176 legota.exe 4552 explothe.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3836 rundll32.exe 1876 rundll32.exe -
Processes:
q6788692.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q6788692.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exez1148654.exez1269223.exez4922398.exez6782030.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1148654.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1269223.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z4922398.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z6782030.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r4225931.exes0044377.exedescription pid process target process PID 4912 set thread context of 3804 4912 r4225931.exe AppLaunch.exe PID 4424 set thread context of 4372 4424 s0044377.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 772 4912 WerFault.exe r4225931.exe 2412 3804 WerFault.exe AppLaunch.exe 1896 4424 WerFault.exe s0044377.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2528 schtasks.exe 5004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q6788692.exepid process 4244 q6788692.exe 4244 q6788692.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q6788692.exedescription pid process Token: SeDebugPrivilege 4244 q6788692.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exez1148654.exez1269223.exez4922398.exez6782030.exer4225931.exes0044377.exet7552670.exeu0100166.exelegota.exeexplothe.exedescription pid process target process PID 380 wrote to memory of 1044 380 1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe z1148654.exe PID 380 wrote to memory of 1044 380 1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe z1148654.exe PID 380 wrote to memory of 1044 380 1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe z1148654.exe PID 1044 wrote to memory of 3472 1044 z1148654.exe z1269223.exe PID 1044 wrote to memory of 3472 1044 z1148654.exe z1269223.exe PID 1044 wrote to memory of 3472 1044 z1148654.exe z1269223.exe PID 3472 wrote to memory of 3924 3472 z1269223.exe z4922398.exe PID 3472 wrote to memory of 3924 3472 z1269223.exe z4922398.exe PID 3472 wrote to memory of 3924 3472 z1269223.exe z4922398.exe PID 3924 wrote to memory of 4516 3924 z4922398.exe z6782030.exe PID 3924 wrote to memory of 4516 3924 z4922398.exe z6782030.exe PID 3924 wrote to memory of 4516 3924 z4922398.exe z6782030.exe PID 4516 wrote to memory of 4244 4516 z6782030.exe q6788692.exe PID 4516 wrote to memory of 4244 4516 z6782030.exe q6788692.exe PID 4516 wrote to memory of 4912 4516 z6782030.exe r4225931.exe PID 4516 wrote to memory of 4912 4516 z6782030.exe r4225931.exe PID 4516 wrote to memory of 4912 4516 z6782030.exe r4225931.exe PID 4912 wrote to memory of 3804 4912 r4225931.exe AppLaunch.exe PID 4912 wrote to memory of 3804 4912 r4225931.exe AppLaunch.exe PID 4912 wrote to memory of 3804 4912 r4225931.exe AppLaunch.exe PID 4912 wrote to memory of 3804 4912 r4225931.exe AppLaunch.exe PID 4912 wrote to memory of 3804 4912 r4225931.exe AppLaunch.exe PID 4912 wrote to memory of 3804 4912 r4225931.exe AppLaunch.exe PID 4912 wrote to memory of 3804 4912 r4225931.exe AppLaunch.exe PID 4912 wrote to memory of 3804 4912 r4225931.exe AppLaunch.exe PID 4912 wrote to memory of 3804 4912 r4225931.exe AppLaunch.exe PID 4912 wrote to memory of 3804 4912 r4225931.exe AppLaunch.exe PID 3924 wrote to memory of 4424 3924 z4922398.exe s0044377.exe PID 3924 wrote to memory of 4424 3924 z4922398.exe s0044377.exe PID 3924 wrote to memory of 4424 3924 z4922398.exe s0044377.exe PID 4424 wrote to memory of 4372 4424 s0044377.exe AppLaunch.exe PID 4424 wrote to memory of 4372 4424 s0044377.exe AppLaunch.exe PID 4424 wrote to memory of 4372 4424 s0044377.exe AppLaunch.exe PID 4424 wrote to memory of 4372 4424 s0044377.exe AppLaunch.exe PID 4424 wrote to memory of 4372 4424 s0044377.exe AppLaunch.exe PID 4424 wrote to memory of 4372 4424 s0044377.exe AppLaunch.exe PID 4424 wrote to memory of 4372 4424 s0044377.exe AppLaunch.exe PID 4424 wrote to memory of 4372 4424 s0044377.exe AppLaunch.exe PID 3472 wrote to memory of 3108 3472 z1269223.exe t7552670.exe PID 3472 wrote to memory of 3108 3472 z1269223.exe t7552670.exe PID 3472 wrote to memory of 3108 3472 z1269223.exe t7552670.exe PID 3108 wrote to memory of 4992 3108 t7552670.exe explothe.exe PID 3108 wrote to memory of 4992 3108 t7552670.exe explothe.exe PID 3108 wrote to memory of 4992 3108 t7552670.exe explothe.exe PID 1044 wrote to memory of 3992 1044 z1148654.exe u0100166.exe PID 1044 wrote to memory of 3992 1044 z1148654.exe u0100166.exe PID 1044 wrote to memory of 3992 1044 z1148654.exe u0100166.exe PID 3992 wrote to memory of 4032 3992 u0100166.exe legota.exe PID 3992 wrote to memory of 4032 3992 u0100166.exe legota.exe PID 3992 wrote to memory of 4032 3992 u0100166.exe legota.exe PID 380 wrote to memory of 2756 380 1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe w6021713.exe PID 380 wrote to memory of 2756 380 1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe w6021713.exe PID 380 wrote to memory of 2756 380 1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe w6021713.exe PID 4032 wrote to memory of 5004 4032 legota.exe schtasks.exe PID 4032 wrote to memory of 5004 4032 legota.exe schtasks.exe PID 4032 wrote to memory of 5004 4032 legota.exe schtasks.exe PID 4992 wrote to memory of 2528 4992 explothe.exe schtasks.exe PID 4992 wrote to memory of 2528 4992 explothe.exe schtasks.exe PID 4992 wrote to memory of 2528 4992 explothe.exe schtasks.exe PID 4032 wrote to memory of 740 4032 legota.exe cmd.exe PID 4032 wrote to memory of 740 4032 legota.exe cmd.exe PID 4032 wrote to memory of 740 4032 legota.exe cmd.exe PID 4992 wrote to memory of 1392 4992 explothe.exe cmd.exe PID 4992 wrote to memory of 1392 4992 explothe.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe"C:\Users\Admin\AppData\Local\Temp\1a4df824b20e3ce9a552aaa98fad5a3235940b4f9631d37d084f4ebd67b88863_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1148654.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1148654.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1269223.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1269223.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4922398.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4922398.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6782030.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6782030.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6788692.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6788692.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4225931.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 5448⤵
- Program crash
PID:2412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 5767⤵
- Program crash
PID:772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0044377.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0044377.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 5806⤵
- Program crash
PID:1896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7552670.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7552670.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:2528
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:1392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:4732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:2840
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0100166.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0100166.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:5004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4028
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4980
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:2828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:2152
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1876
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6021713.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6021713.exe2⤵
- Executes dropped EXE
PID:2756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3804 -ip 38041⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4912 -ip 49121⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4424 -ip 44241⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4176
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4552
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD56bfb3e371ff27b4270f9e577c8d4d5e5
SHA171c68eb4fc627d6f36ee38c693d21ff1a446a752
SHA256bd030e63df8f8bd47fdda9ef1a86412a37275167713e657b1a9d92c8b1f8f2a1
SHA512e38306cb7eb2d31aa2a562a08a8d2e3cd3fdcbf591c94808b6dfefcebbefd7d2aa501ddaddba9f67bfb342a97b7f79cffd267ca9d0b4f016ce228bd484b295c5
-
Filesize
23KB
MD56bfb3e371ff27b4270f9e577c8d4d5e5
SHA171c68eb4fc627d6f36ee38c693d21ff1a446a752
SHA256bd030e63df8f8bd47fdda9ef1a86412a37275167713e657b1a9d92c8b1f8f2a1
SHA512e38306cb7eb2d31aa2a562a08a8d2e3cd3fdcbf591c94808b6dfefcebbefd7d2aa501ddaddba9f67bfb342a97b7f79cffd267ca9d0b4f016ce228bd484b295c5
-
Filesize
972KB
MD50a73a92f319f5ce0581f2b382382f0ef
SHA17001cc4d8aedeb5b32043f55da20707412fed1fd
SHA256770671752d43be0b094bc54562b4aeedd83c793ebf257e6e8d919daf37bc352e
SHA51279fb4f890107e717a5998be3976d8c9f7d40a122da9233218928eecb582b01c86582336312266d1f5bc8aedaccc54fdc08dd89d436fca710f371cc780cf9259e
-
Filesize
972KB
MD50a73a92f319f5ce0581f2b382382f0ef
SHA17001cc4d8aedeb5b32043f55da20707412fed1fd
SHA256770671752d43be0b094bc54562b4aeedd83c793ebf257e6e8d919daf37bc352e
SHA51279fb4f890107e717a5998be3976d8c9f7d40a122da9233218928eecb582b01c86582336312266d1f5bc8aedaccc54fdc08dd89d436fca710f371cc780cf9259e
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
789KB
MD52ce1945cfdc919b012532e8c38df5c6b
SHA1b93f567846e095591df75fad136fa33b63dc1777
SHA256bccce5d3bdaf616baaf1615f9047096efc80c238512b6e5b1ae1d05201c27693
SHA512208ef9c00ef602603e8be99550946bae8f6d4e02e8ca6f10c25212d16a03a525d82b52a060b80510cc530855649d2574bcf05d248cd1342f581c8f30c1e53474
-
Filesize
789KB
MD52ce1945cfdc919b012532e8c38df5c6b
SHA1b93f567846e095591df75fad136fa33b63dc1777
SHA256bccce5d3bdaf616baaf1615f9047096efc80c238512b6e5b1ae1d05201c27693
SHA512208ef9c00ef602603e8be99550946bae8f6d4e02e8ca6f10c25212d16a03a525d82b52a060b80510cc530855649d2574bcf05d248cd1342f581c8f30c1e53474
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
606KB
MD5d7935a466c03dc60983a893f753259ac
SHA1a672f5a14684729cd04f95e13d23da9839f7f689
SHA256c87d870a512068a10a79c79596c1ee642eb6491fb772bd6718c49fe44039938d
SHA5129bdb9b4b22ea5c583171c32035c257c96121ff818009912d921dc29e1e79ea984197a271fe1642a9b9d0c5ec070c3651817207bf0058419c21baf05e6371d6ba
-
Filesize
606KB
MD5d7935a466c03dc60983a893f753259ac
SHA1a672f5a14684729cd04f95e13d23da9839f7f689
SHA256c87d870a512068a10a79c79596c1ee642eb6491fb772bd6718c49fe44039938d
SHA5129bdb9b4b22ea5c583171c32035c257c96121ff818009912d921dc29e1e79ea984197a271fe1642a9b9d0c5ec070c3651817207bf0058419c21baf05e6371d6ba
-
Filesize
390KB
MD5dd384fd1a66e72c23f1a7bfbc5e55565
SHA1b5f1374cade00f482d92a9e158356a082c003e3b
SHA2564137d732de680ce463648c333f9ad904c14cc58f61a6852a7443253d5dc7144c
SHA512afb68519acbc7b0f7fc307381fdc4999efd6a2a926f1f3be8dbe99eb8c011775011cae862887f0efd2d62952ebdf1238b0f55ff8e4d37771ea89fce7e0c783ab
-
Filesize
390KB
MD5dd384fd1a66e72c23f1a7bfbc5e55565
SHA1b5f1374cade00f482d92a9e158356a082c003e3b
SHA2564137d732de680ce463648c333f9ad904c14cc58f61a6852a7443253d5dc7144c
SHA512afb68519acbc7b0f7fc307381fdc4999efd6a2a926f1f3be8dbe99eb8c011775011cae862887f0efd2d62952ebdf1238b0f55ff8e4d37771ea89fce7e0c783ab
-
Filesize
335KB
MD51cee9b769d7701af7a2d718d84e5f1cc
SHA1ee365c823346848ddff81e729fdaf785656803f1
SHA256b6f760405f6c705f864b4edd914bdfc7767e84d1238b88c8a626779ce312397b
SHA512ed6800c261016cdd0f7f2f279f3269fc15d22221686db6a90689b171e4b7572798a7e355435efef29ffc5c79061c9eb4c09f861dfa1a55566e6510b6a9c572cb
-
Filesize
335KB
MD51cee9b769d7701af7a2d718d84e5f1cc
SHA1ee365c823346848ddff81e729fdaf785656803f1
SHA256b6f760405f6c705f864b4edd914bdfc7767e84d1238b88c8a626779ce312397b
SHA512ed6800c261016cdd0f7f2f279f3269fc15d22221686db6a90689b171e4b7572798a7e355435efef29ffc5c79061c9eb4c09f861dfa1a55566e6510b6a9c572cb
-
Filesize
11KB
MD5f2ebf762262c6349dabbb635967a9f59
SHA18a389b38d9d3120e1d5121eee37c31a12dc51a78
SHA256660ab1ad0826b93c961bb19c56db2b908ba34ae001e6abaf0e3481c9a6ab9a45
SHA512fa5ca9247c8657146a5fc33581f0458c6f328737d695a46f0187727963141a577143ead0c42ebac3c87e221d8648dfb1bdfc32f07b5b365acd4b8677ef6481c8
-
Filesize
11KB
MD5f2ebf762262c6349dabbb635967a9f59
SHA18a389b38d9d3120e1d5121eee37c31a12dc51a78
SHA256660ab1ad0826b93c961bb19c56db2b908ba34ae001e6abaf0e3481c9a6ab9a45
SHA512fa5ca9247c8657146a5fc33581f0458c6f328737d695a46f0187727963141a577143ead0c42ebac3c87e221d8648dfb1bdfc32f07b5b365acd4b8677ef6481c8
-
Filesize
356KB
MD54b10f421dfc0c9165067ae187766655d
SHA17adb7c8e6ad927928c0ee839ef61fa6a7332b1c1
SHA2566b3819b53b6154344fab0948b35223eb578db07326f04c65d9489af42be250a1
SHA512a2842baa2642c49c74e371d74fa8431d24f41a3ad481ddf753d774cb7b292e7e54a74c58374a712fb1ba7e27e665fedc51a26a628ea89e7a2ebc7febab4cc1d8
-
Filesize
356KB
MD54b10f421dfc0c9165067ae187766655d
SHA17adb7c8e6ad927928c0ee839ef61fa6a7332b1c1
SHA2566b3819b53b6154344fab0948b35223eb578db07326f04c65d9489af42be250a1
SHA512a2842baa2642c49c74e371d74fa8431d24f41a3ad481ddf753d774cb7b292e7e54a74c58374a712fb1ba7e27e665fedc51a26a628ea89e7a2ebc7febab4cc1d8
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0