Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 20:38
Static task
static1
Behavioral task
behavioral1
Sample
bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe
-
Size
1.0MB
-
MD5
f1308333597455d0be4f1823bb1d6dde
-
SHA1
94885cd6a83c21a0a371f0b94cf36f37d6e51663
-
SHA256
bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec
-
SHA512
77245c72fc287b1e768472f5cfa13db2e824ae86a2f8ce23b3b0dff399469549fedf2d88c9a8e29ccacfcec6fe540d133683df736234179f80df43c203ec8c47
-
SSDEEP
24576:qyPCtoTy6WRMxO4HMZrAb7P0AykurlIdq90fIga:xPgoTy64h4HMdO0IdqY
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4526543.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4526543.exe healer behavioral2/memory/3892-35-0x0000000000240000-0x000000000024A000-memory.dmp healer -
Processes:
q4526543.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q4526543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q4526543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q4526543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q4526543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q4526543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q4526543.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t7668695.exeexplothe.exeu9341205.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation t7668695.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation u9341205.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z4368756.exez9589471.exez9518577.exez4320457.exeq4526543.exer0778071.exes0516126.exet7668695.exeexplothe.exeu9341205.exelegota.exew3303886.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4932 z4368756.exe 1600 z9589471.exe 3016 z9518577.exe 5044 z4320457.exe 3892 q4526543.exe 3356 r0778071.exe 1328 s0516126.exe 3672 t7668695.exe 1656 explothe.exe 3048 u9341205.exe 404 legota.exe 5000 w3303886.exe 2352 explothe.exe 2616 legota.exe 4064 explothe.exe 3756 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3016 rundll32.exe 2960 rundll32.exe -
Processes:
q4526543.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q4526543.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z9518577.exez4320457.exebebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exez4368756.exez9589471.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z9518577.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4320457.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4368756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9589471.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r0778071.exes0516126.exedescription pid process target process PID 3356 set thread context of 3668 3356 r0778071.exe AppLaunch.exe PID 1328 set thread context of 728 1328 s0516126.exe AppLaunch.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1460 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2096 3356 WerFault.exe r0778071.exe 1992 3668 WerFault.exe AppLaunch.exe 2984 1328 WerFault.exe s0516126.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 368 schtasks.exe 3640 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q4526543.exepid process 3892 q4526543.exe 3892 q4526543.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q4526543.exedescription pid process Token: SeDebugPrivilege 3892 q4526543.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exez4368756.exez9589471.exez9518577.exez4320457.exer0778071.exes0516126.exet7668695.exeexplothe.exeu9341205.execmd.exedescription pid process target process PID 4292 wrote to memory of 4932 4292 bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe z4368756.exe PID 4292 wrote to memory of 4932 4292 bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe z4368756.exe PID 4292 wrote to memory of 4932 4292 bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe z4368756.exe PID 4932 wrote to memory of 1600 4932 z4368756.exe z9589471.exe PID 4932 wrote to memory of 1600 4932 z4368756.exe z9589471.exe PID 4932 wrote to memory of 1600 4932 z4368756.exe z9589471.exe PID 1600 wrote to memory of 3016 1600 z9589471.exe z9518577.exe PID 1600 wrote to memory of 3016 1600 z9589471.exe z9518577.exe PID 1600 wrote to memory of 3016 1600 z9589471.exe z9518577.exe PID 3016 wrote to memory of 5044 3016 z9518577.exe z4320457.exe PID 3016 wrote to memory of 5044 3016 z9518577.exe z4320457.exe PID 3016 wrote to memory of 5044 3016 z9518577.exe z4320457.exe PID 5044 wrote to memory of 3892 5044 z4320457.exe q4526543.exe PID 5044 wrote to memory of 3892 5044 z4320457.exe q4526543.exe PID 5044 wrote to memory of 3356 5044 z4320457.exe r0778071.exe PID 5044 wrote to memory of 3356 5044 z4320457.exe r0778071.exe PID 5044 wrote to memory of 3356 5044 z4320457.exe r0778071.exe PID 3356 wrote to memory of 3668 3356 r0778071.exe AppLaunch.exe PID 3356 wrote to memory of 3668 3356 r0778071.exe AppLaunch.exe PID 3356 wrote to memory of 3668 3356 r0778071.exe AppLaunch.exe PID 3356 wrote to memory of 3668 3356 r0778071.exe AppLaunch.exe PID 3356 wrote to memory of 3668 3356 r0778071.exe AppLaunch.exe PID 3356 wrote to memory of 3668 3356 r0778071.exe AppLaunch.exe PID 3356 wrote to memory of 3668 3356 r0778071.exe AppLaunch.exe PID 3356 wrote to memory of 3668 3356 r0778071.exe AppLaunch.exe PID 3356 wrote to memory of 3668 3356 r0778071.exe AppLaunch.exe PID 3356 wrote to memory of 3668 3356 r0778071.exe AppLaunch.exe PID 3016 wrote to memory of 1328 3016 z9518577.exe s0516126.exe PID 3016 wrote to memory of 1328 3016 z9518577.exe s0516126.exe PID 3016 wrote to memory of 1328 3016 z9518577.exe s0516126.exe PID 1328 wrote to memory of 728 1328 s0516126.exe AppLaunch.exe PID 1328 wrote to memory of 728 1328 s0516126.exe AppLaunch.exe PID 1328 wrote to memory of 728 1328 s0516126.exe AppLaunch.exe PID 1328 wrote to memory of 728 1328 s0516126.exe AppLaunch.exe PID 1328 wrote to memory of 728 1328 s0516126.exe AppLaunch.exe PID 1328 wrote to memory of 728 1328 s0516126.exe AppLaunch.exe PID 1328 wrote to memory of 728 1328 s0516126.exe AppLaunch.exe PID 1328 wrote to memory of 728 1328 s0516126.exe AppLaunch.exe PID 1600 wrote to memory of 3672 1600 z9589471.exe t7668695.exe PID 1600 wrote to memory of 3672 1600 z9589471.exe t7668695.exe PID 1600 wrote to memory of 3672 1600 z9589471.exe t7668695.exe PID 3672 wrote to memory of 1656 3672 t7668695.exe explothe.exe PID 3672 wrote to memory of 1656 3672 t7668695.exe explothe.exe PID 3672 wrote to memory of 1656 3672 t7668695.exe explothe.exe PID 4932 wrote to memory of 3048 4932 z4368756.exe u9341205.exe PID 4932 wrote to memory of 3048 4932 z4368756.exe u9341205.exe PID 4932 wrote to memory of 3048 4932 z4368756.exe u9341205.exe PID 1656 wrote to memory of 368 1656 explothe.exe schtasks.exe PID 1656 wrote to memory of 368 1656 explothe.exe schtasks.exe PID 1656 wrote to memory of 368 1656 explothe.exe schtasks.exe PID 1656 wrote to memory of 2504 1656 explothe.exe cmd.exe PID 1656 wrote to memory of 2504 1656 explothe.exe cmd.exe PID 1656 wrote to memory of 2504 1656 explothe.exe cmd.exe PID 3048 wrote to memory of 404 3048 u9341205.exe legota.exe PID 3048 wrote to memory of 404 3048 u9341205.exe legota.exe PID 3048 wrote to memory of 404 3048 u9341205.exe legota.exe PID 4292 wrote to memory of 5000 4292 bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe w3303886.exe PID 4292 wrote to memory of 5000 4292 bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe w3303886.exe PID 4292 wrote to memory of 5000 4292 bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe w3303886.exe PID 2504 wrote to memory of 3776 2504 cmd.exe cmd.exe PID 2504 wrote to memory of 3776 2504 cmd.exe cmd.exe PID 2504 wrote to memory of 3776 2504 cmd.exe cmd.exe PID 2504 wrote to memory of 4108 2504 cmd.exe cacls.exe PID 2504 wrote to memory of 4108 2504 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe"C:\Users\Admin\AppData\Local\Temp\bebf0e0bbd5722c3b9e0e511eabb7e9055a321272b0f90b0bd38197b800b60ec_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4368756.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4368756.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9589471.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9589471.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9518577.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9518577.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4320457.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4320457.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4526543.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4526543.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0778071.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 1968⤵
- Program crash
PID:1992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 5847⤵
- Program crash
PID:2096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0516126.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0516126.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 1366⤵
- Program crash
PID:2984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7668695.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7668695.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:368
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:1252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4092
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:1760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:2900
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3016
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9341205.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9341205.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:404 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3640
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4340
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:2508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4288
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4708
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:1660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3664
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:1344
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2960
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w3303886.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w3303886.exe2⤵
- Executes dropped EXE
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3356 -ip 33561⤵PID:4212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3668 -ip 36681⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1328 -ip 13281⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2352
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2616
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4064
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3756
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1460
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5e13110ccf5aae4def760da2ebebb6e6f
SHA19d74e4f41c020aae5fa8ee4465c9fe6f5bf3c7c9
SHA2565f600bbb486872e2cc04f4db7c46123bbd98f4e70129f7b52fa7bcbf0490440a
SHA512b78bcc157a98d3290a65c82e100d40e1122a91b5e10dde6b0cdc4388dcba68ff8301e88194f79f751ccacaa37afff066ad5bd6a346d4c1071878d75f74edf82d
-
Filesize
23KB
MD5e13110ccf5aae4def760da2ebebb6e6f
SHA19d74e4f41c020aae5fa8ee4465c9fe6f5bf3c7c9
SHA2565f600bbb486872e2cc04f4db7c46123bbd98f4e70129f7b52fa7bcbf0490440a
SHA512b78bcc157a98d3290a65c82e100d40e1122a91b5e10dde6b0cdc4388dcba68ff8301e88194f79f751ccacaa37afff066ad5bd6a346d4c1071878d75f74edf82d
-
Filesize
972KB
MD5afcdcd8d348edefefd7fb23eaeee7ac9
SHA16231f901bdfc1da60b7be7ef49d8eb2ad9a8d041
SHA25608ba40cd05a6cb4bcbee314e86531dea7bc1b97a3afb257d348bb78f1f34b614
SHA5128b5d45553ddd4830ec53b108a09074551366ed5aad371847b67a5fda976d22b3e1fe7217bad4f31cbda2bd35f4112202c02718635dd005318c984c5ea1630762
-
Filesize
972KB
MD5afcdcd8d348edefefd7fb23eaeee7ac9
SHA16231f901bdfc1da60b7be7ef49d8eb2ad9a8d041
SHA25608ba40cd05a6cb4bcbee314e86531dea7bc1b97a3afb257d348bb78f1f34b614
SHA5128b5d45553ddd4830ec53b108a09074551366ed5aad371847b67a5fda976d22b3e1fe7217bad4f31cbda2bd35f4112202c02718635dd005318c984c5ea1630762
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
789KB
MD55fd4cb87b1b8c2a77bcf1865871417b8
SHA1ba01834009cc187dc048dab71d06eb07b9b264cc
SHA25613e95dde5bace9d81a601b79fc49a55ac658131da2651dfe9e56b7773ba53524
SHA512ac7a0f6f2591356d54c9c566831a6226406ece2c9fdfc5293a1538a48905f07e12c66360594bead5df91eea4e1bcfc28e6464c63400d4c510f9fe34ab1f01db6
-
Filesize
789KB
MD55fd4cb87b1b8c2a77bcf1865871417b8
SHA1ba01834009cc187dc048dab71d06eb07b9b264cc
SHA25613e95dde5bace9d81a601b79fc49a55ac658131da2651dfe9e56b7773ba53524
SHA512ac7a0f6f2591356d54c9c566831a6226406ece2c9fdfc5293a1538a48905f07e12c66360594bead5df91eea4e1bcfc28e6464c63400d4c510f9fe34ab1f01db6
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
607KB
MD5378a7efe6795c965da78c0f9ebc10a2e
SHA1e54cd370f992cce18849d9f273cb7ec8adb5dd12
SHA256b1b2ee783b7fadb58c1928e97d89bf5e932df06610d2ed0e59dd59a92a812beb
SHA512f8bd9d40806f2cfec17d2bf6f52b497c5fd71b642e9f5e345aac3e3b2ae17c9381b22fe7272ec02c7abf5b3d850fda048847c93483c472bef085518e7b5695e2
-
Filesize
607KB
MD5378a7efe6795c965da78c0f9ebc10a2e
SHA1e54cd370f992cce18849d9f273cb7ec8adb5dd12
SHA256b1b2ee783b7fadb58c1928e97d89bf5e932df06610d2ed0e59dd59a92a812beb
SHA512f8bd9d40806f2cfec17d2bf6f52b497c5fd71b642e9f5e345aac3e3b2ae17c9381b22fe7272ec02c7abf5b3d850fda048847c93483c472bef085518e7b5695e2
-
Filesize
390KB
MD5c26c7c1323c51897d6fc1afd9668dd24
SHA1c464d369f322a92dadfbf46f887ef09adeb4855f
SHA2569ec3da5c05eb511b3e4c2554e9c469cd04e30d7ae6a0d69d60f0da34fb24cc6c
SHA5121b9733b83b1493993d1569f158c560de1b2d4fa389f2b0b0b61777edc7b7dc687dc50976cd0df4fc78ebc2bad3164f5d76e4699cff1e385f73f374e4b1eccd39
-
Filesize
390KB
MD5c26c7c1323c51897d6fc1afd9668dd24
SHA1c464d369f322a92dadfbf46f887ef09adeb4855f
SHA2569ec3da5c05eb511b3e4c2554e9c469cd04e30d7ae6a0d69d60f0da34fb24cc6c
SHA5121b9733b83b1493993d1569f158c560de1b2d4fa389f2b0b0b61777edc7b7dc687dc50976cd0df4fc78ebc2bad3164f5d76e4699cff1e385f73f374e4b1eccd39
-
Filesize
336KB
MD57e9cf2944c54e077a48cb807f88cacfe
SHA11f5487799bc363b67b8efd54300078ccd4584e8e
SHA256a259ab5520600d4eb8a6933255daa9e2d78e0de445f21e319c063c3d9f4c05b2
SHA512f7f87118dffecf06314d1745b3a556bc182a017e9b96ffeb336337dcaf29c7f6ea8d013efc3f55020fc83aa8f617f2a274c03b8d3db89b38223b178546868573
-
Filesize
336KB
MD57e9cf2944c54e077a48cb807f88cacfe
SHA11f5487799bc363b67b8efd54300078ccd4584e8e
SHA256a259ab5520600d4eb8a6933255daa9e2d78e0de445f21e319c063c3d9f4c05b2
SHA512f7f87118dffecf06314d1745b3a556bc182a017e9b96ffeb336337dcaf29c7f6ea8d013efc3f55020fc83aa8f617f2a274c03b8d3db89b38223b178546868573
-
Filesize
11KB
MD5882a67e5fd493f6bd53c1017fc83560b
SHA11ded2aad86cbbd08642c958dde824ae21064f045
SHA25654b69b90a598a0481908d727d34b90c87c93eca5ef74ad44afe09971e77fae00
SHA5125cbf8aeb1e6ce65397a24018a49a0c9c3b6863d11bfaf7d0ea432bc756995700cbc80ef13da3a8ceab818416dbca95da7721a69b55a1158ca5e04832cd2e7820
-
Filesize
11KB
MD5882a67e5fd493f6bd53c1017fc83560b
SHA11ded2aad86cbbd08642c958dde824ae21064f045
SHA25654b69b90a598a0481908d727d34b90c87c93eca5ef74ad44afe09971e77fae00
SHA5125cbf8aeb1e6ce65397a24018a49a0c9c3b6863d11bfaf7d0ea432bc756995700cbc80ef13da3a8ceab818416dbca95da7721a69b55a1158ca5e04832cd2e7820
-
Filesize
356KB
MD5140b456257560adc0238f0d66c63edbc
SHA1022ed1a8deb6edb27634317bc63102648aa1a916
SHA25643520c480793dd0ffccb2885c2ab5e82770ff586c422ce665ab748de56f25c0d
SHA5121a836139c8c7b1176b27bd3ad8dbfba3279f29934806dccb9775e6ea028b408787149c0e196bbe0b420dba8dda63841081f9a1390063078cb01a781ec192165b
-
Filesize
356KB
MD5140b456257560adc0238f0d66c63edbc
SHA1022ed1a8deb6edb27634317bc63102648aa1a916
SHA25643520c480793dd0ffccb2885c2ab5e82770ff586c422ce665ab748de56f25c0d
SHA5121a836139c8c7b1176b27bd3ad8dbfba3279f29934806dccb9775e6ea028b408787149c0e196bbe0b420dba8dda63841081f9a1390063078cb01a781ec192165b
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0