Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 20:14
Static task
static1
Behavioral task
behavioral1
Sample
7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exe
-
Size
994KB
-
MD5
e0826d1a39cb4f47ed518014dc698b69
-
SHA1
b80dd56eedb92a037c70fb14a88d69a26ab849e5
-
SHA256
7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72
-
SHA512
f71ea3fb04344c8e589103802cda0ab3bf8cac84b61cee2443a010e3f991f5399af21bd5eb98d7aa69c4e50e359f9433af1f7ea329301b9661c616d508e6f5c0
-
SSDEEP
24576:oBy8vVs/xaT2BN9a5ZkzmQOWsLVGz9ofCFcff:t8Vs/IT2BN895Gz9yMcf
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8112196.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8112196.exe healer behavioral2/memory/1248-35-0x0000000000A30000-0x0000000000A3A000-memory.dmp healer -
Processes:
q8112196.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q8112196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q8112196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q8112196.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q8112196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q8112196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q8112196.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t5059904.exeu9100876.exeexplothe.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation t5059904.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation u9100876.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z9343511.exez0532921.exez8879212.exez3732890.exeq8112196.exer0035227.exes5213553.exet5059904.exeexplothe.exeu9100876.exelegota.exew3134194.exelegota.exeexplothe.exelegota.exeexplothe.exepid process 3632 z9343511.exe 3396 z0532921.exe 436 z8879212.exe 4832 z3732890.exe 1248 q8112196.exe 212 r0035227.exe 4964 s5213553.exe 1684 t5059904.exe 3392 explothe.exe 644 u9100876.exe 748 legota.exe 1144 w3134194.exe 4188 legota.exe 3404 explothe.exe 4188 legota.exe 2732 explothe.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4520 rundll32.exe 4864 rundll32.exe -
Processes:
q8112196.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q8112196.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exez9343511.exez0532921.exez8879212.exez3732890.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9343511.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0532921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z8879212.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z3732890.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r0035227.exes5213553.exedescription pid process target process PID 212 set thread context of 2060 212 r0035227.exe AppLaunch.exe PID 4964 set thread context of 912 4964 s5213553.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3924 2060 WerFault.exe AppLaunch.exe 2236 212 WerFault.exe r0035227.exe 2132 4964 WerFault.exe s5213553.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 224 schtasks.exe 4172 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q8112196.exepid process 1248 q8112196.exe 1248 q8112196.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q8112196.exedescription pid process Token: SeDebugPrivilege 1248 q8112196.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exez9343511.exez0532921.exez8879212.exez3732890.exer0035227.exes5213553.exet5059904.exeu9100876.exeexplothe.exelegota.exedescription pid process target process PID 1924 wrote to memory of 3632 1924 7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exe z9343511.exe PID 1924 wrote to memory of 3632 1924 7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exe z9343511.exe PID 1924 wrote to memory of 3632 1924 7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exe z9343511.exe PID 3632 wrote to memory of 3396 3632 z9343511.exe z0532921.exe PID 3632 wrote to memory of 3396 3632 z9343511.exe z0532921.exe PID 3632 wrote to memory of 3396 3632 z9343511.exe z0532921.exe PID 3396 wrote to memory of 436 3396 z0532921.exe z8879212.exe PID 3396 wrote to memory of 436 3396 z0532921.exe z8879212.exe PID 3396 wrote to memory of 436 3396 z0532921.exe z8879212.exe PID 436 wrote to memory of 4832 436 z8879212.exe z3732890.exe PID 436 wrote to memory of 4832 436 z8879212.exe z3732890.exe PID 436 wrote to memory of 4832 436 z8879212.exe z3732890.exe PID 4832 wrote to memory of 1248 4832 z3732890.exe q8112196.exe PID 4832 wrote to memory of 1248 4832 z3732890.exe q8112196.exe PID 4832 wrote to memory of 212 4832 z3732890.exe r0035227.exe PID 4832 wrote to memory of 212 4832 z3732890.exe r0035227.exe PID 4832 wrote to memory of 212 4832 z3732890.exe r0035227.exe PID 212 wrote to memory of 2060 212 r0035227.exe AppLaunch.exe PID 212 wrote to memory of 2060 212 r0035227.exe AppLaunch.exe PID 212 wrote to memory of 2060 212 r0035227.exe AppLaunch.exe PID 212 wrote to memory of 2060 212 r0035227.exe AppLaunch.exe PID 212 wrote to memory of 2060 212 r0035227.exe AppLaunch.exe PID 212 wrote to memory of 2060 212 r0035227.exe AppLaunch.exe PID 212 wrote to memory of 2060 212 r0035227.exe AppLaunch.exe PID 212 wrote to memory of 2060 212 r0035227.exe AppLaunch.exe PID 212 wrote to memory of 2060 212 r0035227.exe AppLaunch.exe PID 212 wrote to memory of 2060 212 r0035227.exe AppLaunch.exe PID 436 wrote to memory of 4964 436 z8879212.exe s5213553.exe PID 436 wrote to memory of 4964 436 z8879212.exe s5213553.exe PID 436 wrote to memory of 4964 436 z8879212.exe s5213553.exe PID 4964 wrote to memory of 912 4964 s5213553.exe AppLaunch.exe PID 4964 wrote to memory of 912 4964 s5213553.exe AppLaunch.exe PID 4964 wrote to memory of 912 4964 s5213553.exe AppLaunch.exe PID 4964 wrote to memory of 912 4964 s5213553.exe AppLaunch.exe PID 4964 wrote to memory of 912 4964 s5213553.exe AppLaunch.exe PID 4964 wrote to memory of 912 4964 s5213553.exe AppLaunch.exe PID 4964 wrote to memory of 912 4964 s5213553.exe AppLaunch.exe PID 4964 wrote to memory of 912 4964 s5213553.exe AppLaunch.exe PID 3396 wrote to memory of 1684 3396 z0532921.exe t5059904.exe PID 3396 wrote to memory of 1684 3396 z0532921.exe t5059904.exe PID 3396 wrote to memory of 1684 3396 z0532921.exe t5059904.exe PID 1684 wrote to memory of 3392 1684 t5059904.exe explothe.exe PID 1684 wrote to memory of 3392 1684 t5059904.exe explothe.exe PID 1684 wrote to memory of 3392 1684 t5059904.exe explothe.exe PID 3632 wrote to memory of 644 3632 z9343511.exe u9100876.exe PID 3632 wrote to memory of 644 3632 z9343511.exe u9100876.exe PID 3632 wrote to memory of 644 3632 z9343511.exe u9100876.exe PID 644 wrote to memory of 748 644 u9100876.exe legota.exe PID 644 wrote to memory of 748 644 u9100876.exe legota.exe PID 644 wrote to memory of 748 644 u9100876.exe legota.exe PID 3392 wrote to memory of 224 3392 explothe.exe schtasks.exe PID 3392 wrote to memory of 224 3392 explothe.exe schtasks.exe PID 3392 wrote to memory of 224 3392 explothe.exe schtasks.exe PID 1924 wrote to memory of 1144 1924 7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exe w3134194.exe PID 1924 wrote to memory of 1144 1924 7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exe w3134194.exe PID 1924 wrote to memory of 1144 1924 7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exe w3134194.exe PID 3392 wrote to memory of 264 3392 explothe.exe cmd.exe PID 3392 wrote to memory of 264 3392 explothe.exe cmd.exe PID 3392 wrote to memory of 264 3392 explothe.exe cmd.exe PID 748 wrote to memory of 4172 748 legota.exe schtasks.exe PID 748 wrote to memory of 4172 748 legota.exe schtasks.exe PID 748 wrote to memory of 4172 748 legota.exe schtasks.exe PID 748 wrote to memory of 4028 748 legota.exe cmd.exe PID 748 wrote to memory of 4028 748 legota.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exe"C:\Users\Admin\AppData\Local\Temp\7cb01016999849441abca4e084af74755a5fae1bbbfdaf8bcb9203917b777a72_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9343511.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9343511.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0532921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0532921.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8879212.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8879212.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3732890.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3732890.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8112196.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8112196.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0035227.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 1928⤵
- Program crash
PID:3924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 1407⤵
- Program crash
PID:2236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5213553.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5213553.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 1526⤵
- Program crash
PID:2132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5059904.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5059904.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:3836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:2696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3460
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:3076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3672
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4864
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9100876.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9100876.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:4172
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3436
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:5016
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4496
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4520
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w3134194.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w3134194.exe2⤵
- Executes dropped EXE
PID:1144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 212 -ip 2121⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2060 -ip 20601⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4964 -ip 49641⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4188
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3404
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4188
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2732
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5737225784f86f31682603096b4181c99
SHA1bf1ac40e2d0e12cdd6b2a8662eaa957b258f3517
SHA256524e60405318fda44eb5c60f85571a276a27a6160824166fe45bb4429dc2c533
SHA512746bbabb301105455238eabd75ad65dc3f5d3671e9c658735a9de369fd644d78e159a79d3483783ad487991481b5f7fbeadeb4ac5df1828696d1d264ad83a94b
-
Filesize
23KB
MD5737225784f86f31682603096b4181c99
SHA1bf1ac40e2d0e12cdd6b2a8662eaa957b258f3517
SHA256524e60405318fda44eb5c60f85571a276a27a6160824166fe45bb4429dc2c533
SHA512746bbabb301105455238eabd75ad65dc3f5d3671e9c658735a9de369fd644d78e159a79d3483783ad487991481b5f7fbeadeb4ac5df1828696d1d264ad83a94b
-
Filesize
892KB
MD50fa37f642f0bbc710ccdc27f7900d338
SHA162cd5069486f31b34ebb8556887d71c3fc2541be
SHA25670f88710d42bb4cf853ee17858550bd933d7b5bd61b065e0aca990f8d2dbb007
SHA512534623322ad7d4c1aa2818e337356dff50ac9e22d21876b6ff25763e39465f15a1677c6d0b4d4da093863efe4a4589b87211a49b02b37b948d5881a16e005b9f
-
Filesize
892KB
MD50fa37f642f0bbc710ccdc27f7900d338
SHA162cd5069486f31b34ebb8556887d71c3fc2541be
SHA25670f88710d42bb4cf853ee17858550bd933d7b5bd61b065e0aca990f8d2dbb007
SHA512534623322ad7d4c1aa2818e337356dff50ac9e22d21876b6ff25763e39465f15a1677c6d0b4d4da093863efe4a4589b87211a49b02b37b948d5881a16e005b9f
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
709KB
MD5b80183b0abac9c955e5ee10ca26376ec
SHA14cd7d14ce493ab22881433d8060da534edb69bf2
SHA2564f51ab3cf5d83590978b4caaeab57bb871995e48e04ea219b00898f0da8eda0e
SHA512156f3bf3ee881d8f36eaf9a2f549aa079eba5c8f51c552f167a16bf360e03e45f209ee8acb5f42590fe34987dd9bdea8dc7d3b2bcd05c02d6079da805abe9e63
-
Filesize
709KB
MD5b80183b0abac9c955e5ee10ca26376ec
SHA14cd7d14ce493ab22881433d8060da534edb69bf2
SHA2564f51ab3cf5d83590978b4caaeab57bb871995e48e04ea219b00898f0da8eda0e
SHA512156f3bf3ee881d8f36eaf9a2f549aa079eba5c8f51c552f167a16bf360e03e45f209ee8acb5f42590fe34987dd9bdea8dc7d3b2bcd05c02d6079da805abe9e63
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
526KB
MD57ddd70edc09447e0e47cf7fd2763d50a
SHA11fafc49a2cd3fbae411fe47721ac3bcd8be39f1f
SHA2567cfe051c245923a8939bf9c57b2ef9cfd20f53a981399a9fe73e8d32b748a51c
SHA5123d117fe7cf80ddbeaf5e61a9d0ccdd4a2e6f8c1b22336f55a65de77ecd9f2310c22c53aa6eb0e214fe372f5a0f3e45a81ecc4a5c954eacbc7753cb2639338e35
-
Filesize
526KB
MD57ddd70edc09447e0e47cf7fd2763d50a
SHA11fafc49a2cd3fbae411fe47721ac3bcd8be39f1f
SHA2567cfe051c245923a8939bf9c57b2ef9cfd20f53a981399a9fe73e8d32b748a51c
SHA5123d117fe7cf80ddbeaf5e61a9d0ccdd4a2e6f8c1b22336f55a65de77ecd9f2310c22c53aa6eb0e214fe372f5a0f3e45a81ecc4a5c954eacbc7753cb2639338e35
-
Filesize
310KB
MD5e37a1b525a73fa6e54aeb04e0aab5b46
SHA12f37b2bc4db321376133c95b6405e674cc246d62
SHA2562d1c18724b8c5c4b48252dcf27b3bf0a3ca4f3082ae209e6ca7789b574312c39
SHA5124a243de84b04ced8a27ee23b29c2d75f6018baa993c904ec917fcf5c7b57d90933b228104deb8eccb6f5aea59522ef2602c63ab9966a7a2070b356ac87a8dcf8
-
Filesize
310KB
MD5e37a1b525a73fa6e54aeb04e0aab5b46
SHA12f37b2bc4db321376133c95b6405e674cc246d62
SHA2562d1c18724b8c5c4b48252dcf27b3bf0a3ca4f3082ae209e6ca7789b574312c39
SHA5124a243de84b04ced8a27ee23b29c2d75f6018baa993c904ec917fcf5c7b57d90933b228104deb8eccb6f5aea59522ef2602c63ab9966a7a2070b356ac87a8dcf8
-
Filesize
296KB
MD515b564a1c891ee619b83d4614d4dd520
SHA1f38e61fa2fc63d670c46b84f5e6d8e9a1ad36e97
SHA256f6fec41a567a0b89afadfa424fd58433f5eb0794ce2af4404286f03f822b3b50
SHA512f59aca73469403593691256d088f56de175f2a4406b6288040a41fd31ea4713653803150d29edab7c78ff3d8ca0979cd93a80775fdde75715bb5537149c2a703
-
Filesize
296KB
MD515b564a1c891ee619b83d4614d4dd520
SHA1f38e61fa2fc63d670c46b84f5e6d8e9a1ad36e97
SHA256f6fec41a567a0b89afadfa424fd58433f5eb0794ce2af4404286f03f822b3b50
SHA512f59aca73469403593691256d088f56de175f2a4406b6288040a41fd31ea4713653803150d29edab7c78ff3d8ca0979cd93a80775fdde75715bb5537149c2a703
-
Filesize
11KB
MD5f2beb8f47105e57c31af85fe1d119435
SHA19132afcff5bd9961507c5fb039de4bb5857e7ef5
SHA25628f71325b472ca6a592ae1876f50cc5319c6cf2029996af074b51dd72b12e918
SHA512616005cd7b8f8b5a1523f795fbfbb689d1bd0482e8ec3182298c0ceb0366913d2cffbddf61c06124beae211f8dcd26ab3e1885f060eaa8619dea518546c03b5d
-
Filesize
11KB
MD5f2beb8f47105e57c31af85fe1d119435
SHA19132afcff5bd9961507c5fb039de4bb5857e7ef5
SHA25628f71325b472ca6a592ae1876f50cc5319c6cf2029996af074b51dd72b12e918
SHA512616005cd7b8f8b5a1523f795fbfbb689d1bd0482e8ec3182298c0ceb0366913d2cffbddf61c06124beae211f8dcd26ab3e1885f060eaa8619dea518546c03b5d
-
Filesize
276KB
MD545097c0f58dced28b150b4c6c25d51b3
SHA1a0e97b97876c7a3120bfc9fd45643fff4b85e357
SHA256e5075747cc242093d3780dfe0eb8d38e1db5d3cbda1a7d772f84896ee1f285cc
SHA5120f4105b36d2d495931f0791d963e9193ea4c5f74bf1bf0f53d6529a30e4aeb89376b2103e95c9a9cdf65f5b5f0c2df5168be7fbe91da6527e4d3818faa366918
-
Filesize
276KB
MD545097c0f58dced28b150b4c6c25d51b3
SHA1a0e97b97876c7a3120bfc9fd45643fff4b85e357
SHA256e5075747cc242093d3780dfe0eb8d38e1db5d3cbda1a7d772f84896ee1f285cc
SHA5120f4105b36d2d495931f0791d963e9193ea4c5f74bf1bf0f53d6529a30e4aeb89376b2103e95c9a9cdf65f5b5f0c2df5168be7fbe91da6527e4d3818faa366918
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0