Analysis
-
max time kernel
190s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 20:20
Static task
static1
Behavioral task
behavioral1
Sample
94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exe
-
Size
1.0MB
-
MD5
7fbdc4f3c11882c870ffdcc3728a8bcd
-
SHA1
d5b606440d18b3a44250a540af1fa4c5dd7c78e5
-
SHA256
94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b
-
SHA512
4548b69029c3620752f4816ab575c028a2ce5e8930e5a39b7e713625dcceeecfcf97196b3e9276ce247cbb51429bd789cecef02dd5b15c8a860bc1339b054c3a
-
SSDEEP
24576:+yNKUepPKZSkq1yoJR5l7vz0bsZ3REHnAsYdq+UW9q9:NePMqgUR5l7vusVREgsAq+i
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5261009.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5261009.exe healer behavioral2/memory/2736-35-0x0000000000320000-0x000000000032A000-memory.dmp healer -
Processes:
q5261009.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q5261009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q5261009.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q5261009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q5261009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q5261009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q5261009.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t3566493.exeexplothe.exeu6218231.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation t3566493.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation u6218231.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z5987111.exez7956165.exez9094111.exez8817199.exeq5261009.exer1716953.exes7305344.exet3566493.exeexplothe.exeu6218231.exelegota.exew5735894.exelegota.exeexplothe.exelegota.exeexplothe.exepid process 1188 z5987111.exe 5064 z7956165.exe 1324 z9094111.exe 712 z8817199.exe 2736 q5261009.exe 404 r1716953.exe 3596 s7305344.exe 4292 t3566493.exe 1120 explothe.exe 3676 u6218231.exe 412 legota.exe 456 w5735894.exe 2940 legota.exe 2820 explothe.exe 3032 legota.exe 3672 explothe.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4488 rundll32.exe 4740 rundll32.exe -
Processes:
q5261009.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q5261009.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exez5987111.exez7956165.exez9094111.exez8817199.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5987111.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7956165.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z9094111.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z8817199.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r1716953.exes7305344.exedescription pid process target process PID 404 set thread context of 4488 404 r1716953.exe AppLaunch.exe PID 3596 set thread context of 4216 3596 s7305344.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3216 404 WerFault.exe r1716953.exe 1288 4488 WerFault.exe AppLaunch.exe 3244 3596 WerFault.exe s7305344.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3824 schtasks.exe 3692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q5261009.exepid process 2736 q5261009.exe 2736 q5261009.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q5261009.exedescription pid process Token: SeDebugPrivilege 2736 q5261009.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exez5987111.exez7956165.exez9094111.exez8817199.exer1716953.exes7305344.exet3566493.exeexplothe.exeu6218231.execmd.exedescription pid process target process PID 4308 wrote to memory of 1188 4308 94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exe z5987111.exe PID 4308 wrote to memory of 1188 4308 94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exe z5987111.exe PID 4308 wrote to memory of 1188 4308 94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exe z5987111.exe PID 1188 wrote to memory of 5064 1188 z5987111.exe z7956165.exe PID 1188 wrote to memory of 5064 1188 z5987111.exe z7956165.exe PID 1188 wrote to memory of 5064 1188 z5987111.exe z7956165.exe PID 5064 wrote to memory of 1324 5064 z7956165.exe z9094111.exe PID 5064 wrote to memory of 1324 5064 z7956165.exe z9094111.exe PID 5064 wrote to memory of 1324 5064 z7956165.exe z9094111.exe PID 1324 wrote to memory of 712 1324 z9094111.exe z8817199.exe PID 1324 wrote to memory of 712 1324 z9094111.exe z8817199.exe PID 1324 wrote to memory of 712 1324 z9094111.exe z8817199.exe PID 712 wrote to memory of 2736 712 z8817199.exe q5261009.exe PID 712 wrote to memory of 2736 712 z8817199.exe q5261009.exe PID 712 wrote to memory of 404 712 z8817199.exe r1716953.exe PID 712 wrote to memory of 404 712 z8817199.exe r1716953.exe PID 712 wrote to memory of 404 712 z8817199.exe r1716953.exe PID 404 wrote to memory of 4488 404 r1716953.exe AppLaunch.exe PID 404 wrote to memory of 4488 404 r1716953.exe AppLaunch.exe PID 404 wrote to memory of 4488 404 r1716953.exe AppLaunch.exe PID 404 wrote to memory of 4488 404 r1716953.exe AppLaunch.exe PID 404 wrote to memory of 4488 404 r1716953.exe AppLaunch.exe PID 404 wrote to memory of 4488 404 r1716953.exe AppLaunch.exe PID 404 wrote to memory of 4488 404 r1716953.exe AppLaunch.exe PID 404 wrote to memory of 4488 404 r1716953.exe AppLaunch.exe PID 404 wrote to memory of 4488 404 r1716953.exe AppLaunch.exe PID 404 wrote to memory of 4488 404 r1716953.exe AppLaunch.exe PID 1324 wrote to memory of 3596 1324 z9094111.exe s7305344.exe PID 1324 wrote to memory of 3596 1324 z9094111.exe s7305344.exe PID 1324 wrote to memory of 3596 1324 z9094111.exe s7305344.exe PID 3596 wrote to memory of 4216 3596 s7305344.exe AppLaunch.exe PID 3596 wrote to memory of 4216 3596 s7305344.exe AppLaunch.exe PID 3596 wrote to memory of 4216 3596 s7305344.exe AppLaunch.exe PID 3596 wrote to memory of 4216 3596 s7305344.exe AppLaunch.exe PID 3596 wrote to memory of 4216 3596 s7305344.exe AppLaunch.exe PID 3596 wrote to memory of 4216 3596 s7305344.exe AppLaunch.exe PID 3596 wrote to memory of 4216 3596 s7305344.exe AppLaunch.exe PID 3596 wrote to memory of 4216 3596 s7305344.exe AppLaunch.exe PID 5064 wrote to memory of 4292 5064 z7956165.exe t3566493.exe PID 5064 wrote to memory of 4292 5064 z7956165.exe t3566493.exe PID 5064 wrote to memory of 4292 5064 z7956165.exe t3566493.exe PID 4292 wrote to memory of 1120 4292 t3566493.exe explothe.exe PID 4292 wrote to memory of 1120 4292 t3566493.exe explothe.exe PID 4292 wrote to memory of 1120 4292 t3566493.exe explothe.exe PID 1188 wrote to memory of 3676 1188 z5987111.exe u6218231.exe PID 1188 wrote to memory of 3676 1188 z5987111.exe u6218231.exe PID 1188 wrote to memory of 3676 1188 z5987111.exe u6218231.exe PID 1120 wrote to memory of 3824 1120 explothe.exe schtasks.exe PID 1120 wrote to memory of 3824 1120 explothe.exe schtasks.exe PID 1120 wrote to memory of 3824 1120 explothe.exe schtasks.exe PID 1120 wrote to memory of 420 1120 explothe.exe cmd.exe PID 1120 wrote to memory of 420 1120 explothe.exe cmd.exe PID 1120 wrote to memory of 420 1120 explothe.exe cmd.exe PID 3676 wrote to memory of 412 3676 u6218231.exe legota.exe PID 3676 wrote to memory of 412 3676 u6218231.exe legota.exe PID 3676 wrote to memory of 412 3676 u6218231.exe legota.exe PID 4308 wrote to memory of 456 4308 94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exe w5735894.exe PID 4308 wrote to memory of 456 4308 94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exe w5735894.exe PID 4308 wrote to memory of 456 4308 94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exe w5735894.exe PID 420 wrote to memory of 1472 420 cmd.exe cmd.exe PID 420 wrote to memory of 1472 420 cmd.exe cmd.exe PID 420 wrote to memory of 1472 420 cmd.exe cmd.exe PID 420 wrote to memory of 4408 420 cmd.exe cacls.exe PID 420 wrote to memory of 4408 420 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exe"C:\Users\Admin\AppData\Local\Temp\94b29c4cc909788208d4d8c814db94327e906b688aeb691172d5ca56b39be88b_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5987111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5987111.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7956165.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7956165.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9094111.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9094111.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8817199.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8817199.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5261009.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5261009.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1716953.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1716953.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 5408⤵
- Program crash
PID:1288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 1487⤵
- Program crash
PID:3216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7305344.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7305344.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3596 -s 1526⤵
- Program crash
PID:3244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3566493.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3566493.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:3824
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4408
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:1496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3960
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4488
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6218231.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6218231.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:412 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3692
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:692
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:2116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4556
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4740
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5735894.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5735894.exe2⤵
- Executes dropped EXE
PID:456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 404 -ip 4041⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4488 -ip 44881⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3596 -ip 35961⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2940
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2820
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3032
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5e991518472ddb8cf3f36c4e553450d5b
SHA16b621f9d8bfd46e33c8f0473e70c693df43f6198
SHA256e4f5b1f38996d02a65e42a934920c3331602a90616d3fab390af05ab47e9a276
SHA5123151111066709be62d950f2f836f7a99a2322e97f86ef8c8004cb17081f72d4cc57d1177e41407ffba85feff4da413bdc5d63eac68dd8ad435df7b30e6563b6d
-
Filesize
23KB
MD5e991518472ddb8cf3f36c4e553450d5b
SHA16b621f9d8bfd46e33c8f0473e70c693df43f6198
SHA256e4f5b1f38996d02a65e42a934920c3331602a90616d3fab390af05ab47e9a276
SHA5123151111066709be62d950f2f836f7a99a2322e97f86ef8c8004cb17081f72d4cc57d1177e41407ffba85feff4da413bdc5d63eac68dd8ad435df7b30e6563b6d
-
Filesize
969KB
MD52956ac53308b2ab122da6c0f6cd94677
SHA156d306dc41fd82e1686167ec90a087fc908ee99d
SHA25616c4146bd86f3a529c7e0246922e8a03a5fd7193aeb682f5fc4ac2fc603b243b
SHA5127c5877b0fb72039c2b7e6e6b680c039a9a0c1e90da2ceb236672df6cb7e2af58c2d6642de199b588461bfedcb81f4965958d263397bd1bb58c9155b85a4b838e
-
Filesize
969KB
MD52956ac53308b2ab122da6c0f6cd94677
SHA156d306dc41fd82e1686167ec90a087fc908ee99d
SHA25616c4146bd86f3a529c7e0246922e8a03a5fd7193aeb682f5fc4ac2fc603b243b
SHA5127c5877b0fb72039c2b7e6e6b680c039a9a0c1e90da2ceb236672df6cb7e2af58c2d6642de199b588461bfedcb81f4965958d263397bd1bb58c9155b85a4b838e
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
790KB
MD56a33931fb6697d07442f1c8302c90d6b
SHA1fd0875fd08be83a5a5c55ff5304f5f631b6f135c
SHA25693ae6aefc7799b6d7c8803ee9d213b8cc7b46a2ece866f2b08189b5c36477efc
SHA51236baed284f898ab774f14fe6442041c9f7d0d3d4bfebbf8e7b09309d0222c46486dece143a2b64ad10bd82731ee89d445d58f970b35380571a2125c0433a2969
-
Filesize
790KB
MD56a33931fb6697d07442f1c8302c90d6b
SHA1fd0875fd08be83a5a5c55ff5304f5f631b6f135c
SHA25693ae6aefc7799b6d7c8803ee9d213b8cc7b46a2ece866f2b08189b5c36477efc
SHA51236baed284f898ab774f14fe6442041c9f7d0d3d4bfebbf8e7b09309d0222c46486dece143a2b64ad10bd82731ee89d445d58f970b35380571a2125c0433a2969
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
607KB
MD55af399bb3ca0ec2f71457aaa3bd62e5b
SHA1770d760cce4637053fdb62eac0b9466db55eb103
SHA2562fa3849c908ac8dcbba8a69ad315e75864651eed23b0f8740f3b13f6bc827e18
SHA512f4e4b2729cb284eb153b08590299bb7ec70af5fe280ea4e18898e7967c045ed6a665bf1f0cdb8c3ca46b659258d32806add7098be1ce1a6ffb8e49e9f577dcb3
-
Filesize
607KB
MD55af399bb3ca0ec2f71457aaa3bd62e5b
SHA1770d760cce4637053fdb62eac0b9466db55eb103
SHA2562fa3849c908ac8dcbba8a69ad315e75864651eed23b0f8740f3b13f6bc827e18
SHA512f4e4b2729cb284eb153b08590299bb7ec70af5fe280ea4e18898e7967c045ed6a665bf1f0cdb8c3ca46b659258d32806add7098be1ce1a6ffb8e49e9f577dcb3
-
Filesize
390KB
MD5d60da026ba6d645cba52b213620b16e6
SHA1cf481ff00c6cb09059c4056ac10d91ab56c80361
SHA256efe0fefbbe187dd0b119ae132767c373c9b9200af1c72772d1293e2592a4b0a6
SHA512632a984c11121678704a1f271feb1b75d7b97c8cf652bc13025ae7da78509867d5667d4bf09252a0b83922abd3a5ee1bcb2417495448a4f62e9daf0e41401375
-
Filesize
390KB
MD5d60da026ba6d645cba52b213620b16e6
SHA1cf481ff00c6cb09059c4056ac10d91ab56c80361
SHA256efe0fefbbe187dd0b119ae132767c373c9b9200af1c72772d1293e2592a4b0a6
SHA512632a984c11121678704a1f271feb1b75d7b97c8cf652bc13025ae7da78509867d5667d4bf09252a0b83922abd3a5ee1bcb2417495448a4f62e9daf0e41401375
-
Filesize
336KB
MD5f8781366be3cdfea6f8372abaee448ef
SHA1d2e18325d1a034e46400ab7c865d655828e950eb
SHA256905bd1d45d4f063e0afe349b42d90b5c1a31c7a42eec0c4aaf7778acbaa1774d
SHA512b4c8c95da0682f0ea5de0de575dbb1d97869a491767dc8f9ec3a298a1156752875c27059a5f388b934655b69a6e68ad954b0e88da9f57b3a5859dc91a9e07139
-
Filesize
336KB
MD5f8781366be3cdfea6f8372abaee448ef
SHA1d2e18325d1a034e46400ab7c865d655828e950eb
SHA256905bd1d45d4f063e0afe349b42d90b5c1a31c7a42eec0c4aaf7778acbaa1774d
SHA512b4c8c95da0682f0ea5de0de575dbb1d97869a491767dc8f9ec3a298a1156752875c27059a5f388b934655b69a6e68ad954b0e88da9f57b3a5859dc91a9e07139
-
Filesize
11KB
MD547d5c86e75767f13480f9baf67b522d4
SHA1073fcc4f1ebedd251981c2d2f9643984701fb186
SHA256105235b53041f057a0304f1b4f4973ce8259b289e47bd6e727cd2580b10ca7c2
SHA5127f74a1387eaa283cd8c85e68a2e49f422da5a350b5bb74eff1339912071e05a280b648a3431948aac6534c686f1f8ea1b07913c4ebdb697484f35b2d7fbf5fbe
-
Filesize
11KB
MD547d5c86e75767f13480f9baf67b522d4
SHA1073fcc4f1ebedd251981c2d2f9643984701fb186
SHA256105235b53041f057a0304f1b4f4973ce8259b289e47bd6e727cd2580b10ca7c2
SHA5127f74a1387eaa283cd8c85e68a2e49f422da5a350b5bb74eff1339912071e05a280b648a3431948aac6534c686f1f8ea1b07913c4ebdb697484f35b2d7fbf5fbe
-
Filesize
356KB
MD51f9f6be3b415cf79980258c44bede602
SHA16605b79a31ab9b2a1aa189ac278e97289867ce51
SHA256e9279e34bd1e6369b8d030d71bab0d3b2822cb3c3760de7fed7862c0d4f9d7cf
SHA512049323db0790d1791a519e4ae5e6a1324528282bad36728c5bcf1e9bde7f80fc6dab0c4b43a1ad1c6d97e285f8c367a89b93b803d410e22b78d004061701bdb6
-
Filesize
356KB
MD51f9f6be3b415cf79980258c44bede602
SHA16605b79a31ab9b2a1aa189ac278e97289867ce51
SHA256e9279e34bd1e6369b8d030d71bab0d3b2822cb3c3760de7fed7862c0d4f9d7cf
SHA512049323db0790d1791a519e4ae5e6a1324528282bad36728c5bcf1e9bde7f80fc6dab0c4b43a1ad1c6d97e285f8c367a89b93b803d410e22b78d004061701bdb6
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0