Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 19:48
Static task
static1
Behavioral task
behavioral1
Sample
3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exe
-
Size
995KB
-
MD5
ff03dafc39978d6af445d3de10a223b5
-
SHA1
93f2c294a3e4a6c693c716c1ff92c8ec42eb7774
-
SHA256
3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67
-
SHA512
cffc2a09e53ceb02eb8373baba7b5534d3c5d1070edec3433dc648c2fab54961565cdd6d5da7e4ab8dfedd08d28a90f6a499b966196b9d71982c1435d51d0686
-
SSDEEP
24576:1yjD25kINOYEIl0ark8IGvoghAU5F65fbtKo5E9v2hE/xoRM0:QjZIYKCarkSogCUGVYo5Mvf/xoG
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6411102.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6411102.exe healer behavioral2/memory/1304-35-0x0000000000280000-0x000000000028A000-memory.dmp healer -
Processes:
q6411102.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q6411102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q6411102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q6411102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q6411102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q6411102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q6411102.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explothe.exeu4063844.exelegota.exet3099799.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation u4063844.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation t3099799.exe -
Executes dropped EXE 16 IoCs
Processes:
z9457862.exez3224134.exez4788953.exez5885563.exeq6411102.exer8008631.exes6907647.exet3099799.exeexplothe.exeu4063844.exelegota.exew3679398.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4504 z9457862.exe 1396 z3224134.exe 3692 z4788953.exe 3048 z5885563.exe 1304 q6411102.exe 4516 r8008631.exe 4528 s6907647.exe 3276 t3099799.exe 1256 explothe.exe 4032 u4063844.exe 4332 legota.exe 208 w3679398.exe 2960 explothe.exe 4220 legota.exe 4524 explothe.exe 4140 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4528 rundll32.exe 4772 rundll32.exe -
Processes:
q6411102.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q6411102.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z5885563.exe3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exez9457862.exez3224134.exez4788953.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z5885563.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9457862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3224134.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z4788953.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r8008631.exes6907647.exedescription pid process target process PID 4516 set thread context of 3196 4516 r8008631.exe AppLaunch.exe PID 4528 set thread context of 4556 4528 s6907647.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3068 4516 WerFault.exe r8008631.exe 2996 3196 WerFault.exe AppLaunch.exe 4416 4528 WerFault.exe s6907647.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4940 schtasks.exe 3224 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q6411102.exepid process 1304 q6411102.exe 1304 q6411102.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q6411102.exedescription pid process Token: SeDebugPrivilege 1304 q6411102.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exez9457862.exez3224134.exez4788953.exez5885563.exer8008631.exes6907647.exet3099799.exeexplothe.exeu4063844.execmd.exedescription pid process target process PID 3728 wrote to memory of 4504 3728 3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exe z9457862.exe PID 3728 wrote to memory of 4504 3728 3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exe z9457862.exe PID 3728 wrote to memory of 4504 3728 3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exe z9457862.exe PID 4504 wrote to memory of 1396 4504 z9457862.exe z3224134.exe PID 4504 wrote to memory of 1396 4504 z9457862.exe z3224134.exe PID 4504 wrote to memory of 1396 4504 z9457862.exe z3224134.exe PID 1396 wrote to memory of 3692 1396 z3224134.exe z4788953.exe PID 1396 wrote to memory of 3692 1396 z3224134.exe z4788953.exe PID 1396 wrote to memory of 3692 1396 z3224134.exe z4788953.exe PID 3692 wrote to memory of 3048 3692 z4788953.exe z5885563.exe PID 3692 wrote to memory of 3048 3692 z4788953.exe z5885563.exe PID 3692 wrote to memory of 3048 3692 z4788953.exe z5885563.exe PID 3048 wrote to memory of 1304 3048 z5885563.exe q6411102.exe PID 3048 wrote to memory of 1304 3048 z5885563.exe q6411102.exe PID 3048 wrote to memory of 4516 3048 z5885563.exe r8008631.exe PID 3048 wrote to memory of 4516 3048 z5885563.exe r8008631.exe PID 3048 wrote to memory of 4516 3048 z5885563.exe r8008631.exe PID 4516 wrote to memory of 3196 4516 r8008631.exe AppLaunch.exe PID 4516 wrote to memory of 3196 4516 r8008631.exe AppLaunch.exe PID 4516 wrote to memory of 3196 4516 r8008631.exe AppLaunch.exe PID 4516 wrote to memory of 3196 4516 r8008631.exe AppLaunch.exe PID 4516 wrote to memory of 3196 4516 r8008631.exe AppLaunch.exe PID 4516 wrote to memory of 3196 4516 r8008631.exe AppLaunch.exe PID 4516 wrote to memory of 3196 4516 r8008631.exe AppLaunch.exe PID 4516 wrote to memory of 3196 4516 r8008631.exe AppLaunch.exe PID 4516 wrote to memory of 3196 4516 r8008631.exe AppLaunch.exe PID 4516 wrote to memory of 3196 4516 r8008631.exe AppLaunch.exe PID 3692 wrote to memory of 4528 3692 z4788953.exe s6907647.exe PID 3692 wrote to memory of 4528 3692 z4788953.exe s6907647.exe PID 3692 wrote to memory of 4528 3692 z4788953.exe s6907647.exe PID 4528 wrote to memory of 4556 4528 s6907647.exe AppLaunch.exe PID 4528 wrote to memory of 4556 4528 s6907647.exe AppLaunch.exe PID 4528 wrote to memory of 4556 4528 s6907647.exe AppLaunch.exe PID 4528 wrote to memory of 4556 4528 s6907647.exe AppLaunch.exe PID 4528 wrote to memory of 4556 4528 s6907647.exe AppLaunch.exe PID 4528 wrote to memory of 4556 4528 s6907647.exe AppLaunch.exe PID 4528 wrote to memory of 4556 4528 s6907647.exe AppLaunch.exe PID 4528 wrote to memory of 4556 4528 s6907647.exe AppLaunch.exe PID 1396 wrote to memory of 3276 1396 z3224134.exe t3099799.exe PID 1396 wrote to memory of 3276 1396 z3224134.exe t3099799.exe PID 1396 wrote to memory of 3276 1396 z3224134.exe t3099799.exe PID 3276 wrote to memory of 1256 3276 t3099799.exe explothe.exe PID 3276 wrote to memory of 1256 3276 t3099799.exe explothe.exe PID 3276 wrote to memory of 1256 3276 t3099799.exe explothe.exe PID 4504 wrote to memory of 4032 4504 z9457862.exe u4063844.exe PID 4504 wrote to memory of 4032 4504 z9457862.exe u4063844.exe PID 4504 wrote to memory of 4032 4504 z9457862.exe u4063844.exe PID 1256 wrote to memory of 4940 1256 explothe.exe schtasks.exe PID 1256 wrote to memory of 4940 1256 explothe.exe schtasks.exe PID 1256 wrote to memory of 4940 1256 explothe.exe schtasks.exe PID 1256 wrote to memory of 388 1256 explothe.exe cmd.exe PID 1256 wrote to memory of 388 1256 explothe.exe cmd.exe PID 1256 wrote to memory of 388 1256 explothe.exe cmd.exe PID 4032 wrote to memory of 4332 4032 u4063844.exe legota.exe PID 4032 wrote to memory of 4332 4032 u4063844.exe legota.exe PID 4032 wrote to memory of 4332 4032 u4063844.exe legota.exe PID 3728 wrote to memory of 208 3728 3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exe w3679398.exe PID 3728 wrote to memory of 208 3728 3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exe w3679398.exe PID 3728 wrote to memory of 208 3728 3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exe w3679398.exe PID 388 wrote to memory of 2024 388 cmd.exe cmd.exe PID 388 wrote to memory of 2024 388 cmd.exe cmd.exe PID 388 wrote to memory of 2024 388 cmd.exe cmd.exe PID 388 wrote to memory of 4272 388 cmd.exe cacls.exe PID 388 wrote to memory of 4272 388 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exe"C:\Users\Admin\AppData\Local\Temp\3c3eb7507299a6cc5be59bc180fcbd32cf72bd0759bca78269686c7f25d46c67_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9457862.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9457862.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3224134.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3224134.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4788953.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4788953.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5885563.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5885563.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6411102.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6411102.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8008631.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8008631.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 5488⤵
- Program crash
PID:2996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 1527⤵
- Program crash
PID:3068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6907647.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6907647.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 1526⤵
- Program crash
PID:4416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3099799.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3099799.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:4940
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4272
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:3608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:1812
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4528
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4063844.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4063844.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4332 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3224
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3884
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:2500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3460
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4588
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w3679398.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w3679398.exe2⤵
- Executes dropped EXE
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4516 -ip 45161⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3196 -ip 31961⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4528 -ip 45281⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2960
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4220
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4524
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4140
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD561b56cc606139d0c870907a26faaa4e7
SHA137805fa5630c362ae420bb5aba910696b53fa29d
SHA2566d4e56424d62904b6660c95962a00d0da52fa1c659765d220d7083bee064ac1c
SHA512b1299a163039c2e25192d27007f52d8f97d2b98ed8215707b14045d45ad2f281eba65eb644014d3cab0f4d78a67d542f34f8c821abadb317b2705365c5fd0188
-
Filesize
23KB
MD561b56cc606139d0c870907a26faaa4e7
SHA137805fa5630c362ae420bb5aba910696b53fa29d
SHA2566d4e56424d62904b6660c95962a00d0da52fa1c659765d220d7083bee064ac1c
SHA512b1299a163039c2e25192d27007f52d8f97d2b98ed8215707b14045d45ad2f281eba65eb644014d3cab0f4d78a67d542f34f8c821abadb317b2705365c5fd0188
-
Filesize
892KB
MD592a0323f6b29cf4d4f70833ebff8d52b
SHA1cef5beedd2196d4e688ae18ca2e29e719efb525a
SHA256e2083a4415ac4f354adca8cc78aa1aebabb0779c0e8d59268b8e353d0077c051
SHA512226f82211c2de059468a5bae82330e43db1d852d7d5b42a35f1b98820abeef60c8bbc7c54e1c2a90f20034fef0fa935316cbac35180ef9c6c868ff55542d7659
-
Filesize
892KB
MD592a0323f6b29cf4d4f70833ebff8d52b
SHA1cef5beedd2196d4e688ae18ca2e29e719efb525a
SHA256e2083a4415ac4f354adca8cc78aa1aebabb0779c0e8d59268b8e353d0077c051
SHA512226f82211c2de059468a5bae82330e43db1d852d7d5b42a35f1b98820abeef60c8bbc7c54e1c2a90f20034fef0fa935316cbac35180ef9c6c868ff55542d7659
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
709KB
MD52ee9ec994a45c2fe350a4330a90e6d5e
SHA15abd800de5d750d69427fee1877ad8f89354a952
SHA2561f98f5b4570fa56bc0bf04bf9610cccf6613a4074f027aebc8cb4cc59e4d5a1d
SHA51260bc11a41bc836db0e22d6a98e200deb2a300d14bff764143203f55185efa475c6422c010b9a8a2c594cba8a87750a0f6d5d45f5169306eaef92450b17b7594c
-
Filesize
709KB
MD52ee9ec994a45c2fe350a4330a90e6d5e
SHA15abd800de5d750d69427fee1877ad8f89354a952
SHA2561f98f5b4570fa56bc0bf04bf9610cccf6613a4074f027aebc8cb4cc59e4d5a1d
SHA51260bc11a41bc836db0e22d6a98e200deb2a300d14bff764143203f55185efa475c6422c010b9a8a2c594cba8a87750a0f6d5d45f5169306eaef92450b17b7594c
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD5c2e000c0fc76ecd7736e1702bc2e6b88
SHA13a81dc8d3b81513ee7f4ecf6e447ac6cd44c3fb1
SHA2565eca17d886bfbc7759ec73c8828aa3886bb805d8b4bfd11577668a5ac7f422fc
SHA512592c2edd1b0c311a0dcaf8f331b0ef031f717823d1dc0f0dda4cb87e9876f09b1742c5fd6c800662eec3ecbb89ba49df5a4c1bdbc726a56e18385b6d0af6a1d6
-
Filesize
527KB
MD5c2e000c0fc76ecd7736e1702bc2e6b88
SHA13a81dc8d3b81513ee7f4ecf6e447ac6cd44c3fb1
SHA2565eca17d886bfbc7759ec73c8828aa3886bb805d8b4bfd11577668a5ac7f422fc
SHA512592c2edd1b0c311a0dcaf8f331b0ef031f717823d1dc0f0dda4cb87e9876f09b1742c5fd6c800662eec3ecbb89ba49df5a4c1bdbc726a56e18385b6d0af6a1d6
-
Filesize
310KB
MD54f706b978a7007c878900ca9a441fca8
SHA1aa164f289a5313b4f6d300fa793b1311f9bb2acc
SHA256b6d0f567a29066e1527f3ff10c23960048910610df07cf0a12e437366a49d27f
SHA512f68e128aa74554e1ed1e4cd82e5512f37e0cf46ae6e079561e2eaa5a2a7c751833dcfdbb30000bd72a7ee7b594d44c81ecee23698860a2b5e61bad9828fe2e5e
-
Filesize
310KB
MD54f706b978a7007c878900ca9a441fca8
SHA1aa164f289a5313b4f6d300fa793b1311f9bb2acc
SHA256b6d0f567a29066e1527f3ff10c23960048910610df07cf0a12e437366a49d27f
SHA512f68e128aa74554e1ed1e4cd82e5512f37e0cf46ae6e079561e2eaa5a2a7c751833dcfdbb30000bd72a7ee7b594d44c81ecee23698860a2b5e61bad9828fe2e5e
-
Filesize
296KB
MD5d8871acd8c5ea7995b91661d8270842a
SHA1380c3bf53df6a2b73e6f26ae4dc81d3b8162c72b
SHA256b67facc5ee32ab72397f3393d40930572c44bcb623cde028b2d8e2df5f08561f
SHA51205086dd6b8e39ea3a5837dafea9a824ab2a796b63a58fba8aa75e69df9d584a85f61832072132a95fcb8f2950f87d3d9c249dfa4b2f5b5da3effd2e9502f16b3
-
Filesize
296KB
MD5d8871acd8c5ea7995b91661d8270842a
SHA1380c3bf53df6a2b73e6f26ae4dc81d3b8162c72b
SHA256b67facc5ee32ab72397f3393d40930572c44bcb623cde028b2d8e2df5f08561f
SHA51205086dd6b8e39ea3a5837dafea9a824ab2a796b63a58fba8aa75e69df9d584a85f61832072132a95fcb8f2950f87d3d9c249dfa4b2f5b5da3effd2e9502f16b3
-
Filesize
11KB
MD5c0d906a1ffda7971fda2303da0cd76f9
SHA13fef2e6bcc3f8139771bcdfd2ea35fc1ae2bc1d2
SHA256c643df1b9191347f705af74edcc094e276b349467045b37fa9abd33d574ce6fa
SHA512349d16a5d0547d8917ebf7489fba4505abe607a53bc548a8e1e3feb2c26bd46f5e5d903c6cf4dae557ab5b8dd8d599640e350366531b0029463f36a5a17026e0
-
Filesize
11KB
MD5c0d906a1ffda7971fda2303da0cd76f9
SHA13fef2e6bcc3f8139771bcdfd2ea35fc1ae2bc1d2
SHA256c643df1b9191347f705af74edcc094e276b349467045b37fa9abd33d574ce6fa
SHA512349d16a5d0547d8917ebf7489fba4505abe607a53bc548a8e1e3feb2c26bd46f5e5d903c6cf4dae557ab5b8dd8d599640e350366531b0029463f36a5a17026e0
-
Filesize
276KB
MD5f69a47ba5ba20b3e4fb30ff587f9354e
SHA1fc7fab00b7ec467deeeff586b7f3155a202914c9
SHA25638e7b723f6e5cbcacb0b809a841d10e5dffc6b983178bc40995f415b41544782
SHA512da24bc1b445bf5d3622bf09e05271a847cb9c30a6d0778febc1b89c8552a1e51c93457268631b5c181609d3348d2163b357830527cb003f5aca3bb8d2e760f99
-
Filesize
276KB
MD5f69a47ba5ba20b3e4fb30ff587f9354e
SHA1fc7fab00b7ec467deeeff586b7f3155a202914c9
SHA25638e7b723f6e5cbcacb0b809a841d10e5dffc6b983178bc40995f415b41544782
SHA512da24bc1b445bf5d3622bf09e05271a847cb9c30a6d0778febc1b89c8552a1e51c93457268631b5c181609d3348d2163b357830527cb003f5aca3bb8d2e760f99
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0