Analysis
-
max time kernel
165s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 22:47
Static task
static1
Behavioral task
behavioral1
Sample
6fe47cdf23978732c9edebe55a137fdc.exe
Resource
win7-20230831-en
General
-
Target
6fe47cdf23978732c9edebe55a137fdc.exe
-
Size
1.1MB
-
MD5
6fe47cdf23978732c9edebe55a137fdc
-
SHA1
2393ab0f73ee6c80d79a17675e77e11c11e12365
-
SHA256
3f5cb0eeac53c01f4258f91f34a7e84e27e3d6aa9d56be8bbe781dff8aff63f0
-
SHA512
1b84a5719892d3527e20481dcac97a70991d2b631938790fef0ef0bc714a80b03741b31a234b1b1416da9c794ea5be0293c4d14a2c6f6a854ff8e2af2fe1c8ad
-
SSDEEP
24576:NyeunRKftl42pw7uuzE0jCl+jG7Hz01ef1/CwNr6yP6/:ojnof342pw79EuCUjkI1AhCwNeyP6
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3952-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3952-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3952-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3952-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2692-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t4056196.exeexplothe.exeu9050615.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation t4056196.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation u9050615.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z4103137.exez2478712.exez2948128.exez9188688.exeq3304067.exer2460929.exes9586296.exet4056196.exeexplothe.exeu9050615.exelegota.exew1289599.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4980 z4103137.exe 4264 z2478712.exe 2800 z2948128.exe 2148 z9188688.exe 4572 q3304067.exe 2936 r2460929.exe 1096 s9586296.exe 4544 t4056196.exe 3140 explothe.exe 3608 u9050615.exe 1800 legota.exe 3616 w1289599.exe 3628 explothe.exe 3264 legota.exe 3272 explothe.exe 1488 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4448 rundll32.exe 1328 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
6fe47cdf23978732c9edebe55a137fdc.exez4103137.exez2478712.exez2948128.exez9188688.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6fe47cdf23978732c9edebe55a137fdc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4103137.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z2478712.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2948128.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z9188688.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q3304067.exer2460929.exes9586296.exedescription pid process target process PID 4572 set thread context of 2692 4572 q3304067.exe AppLaunch.exe PID 2936 set thread context of 3952 2936 r2460929.exe AppLaunch.exe PID 1096 set thread context of 4236 1096 s9586296.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4716 4572 WerFault.exe q3304067.exe 4692 2936 WerFault.exe r2460929.exe 3648 3952 WerFault.exe AppLaunch.exe 1920 1096 WerFault.exe s9586296.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4248 schtasks.exe 4888 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 2692 AppLaunch.exe 2692 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 2692 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6fe47cdf23978732c9edebe55a137fdc.exez4103137.exez2478712.exez2948128.exez9188688.exeq3304067.exer2460929.exes9586296.exet4056196.exedescription pid process target process PID 4884 wrote to memory of 4980 4884 6fe47cdf23978732c9edebe55a137fdc.exe z4103137.exe PID 4884 wrote to memory of 4980 4884 6fe47cdf23978732c9edebe55a137fdc.exe z4103137.exe PID 4884 wrote to memory of 4980 4884 6fe47cdf23978732c9edebe55a137fdc.exe z4103137.exe PID 4980 wrote to memory of 4264 4980 z4103137.exe z2478712.exe PID 4980 wrote to memory of 4264 4980 z4103137.exe z2478712.exe PID 4980 wrote to memory of 4264 4980 z4103137.exe z2478712.exe PID 4264 wrote to memory of 2800 4264 z2478712.exe z2948128.exe PID 4264 wrote to memory of 2800 4264 z2478712.exe z2948128.exe PID 4264 wrote to memory of 2800 4264 z2478712.exe z2948128.exe PID 2800 wrote to memory of 2148 2800 z2948128.exe z9188688.exe PID 2800 wrote to memory of 2148 2800 z2948128.exe z9188688.exe PID 2800 wrote to memory of 2148 2800 z2948128.exe z9188688.exe PID 2148 wrote to memory of 4572 2148 z9188688.exe q3304067.exe PID 2148 wrote to memory of 4572 2148 z9188688.exe q3304067.exe PID 2148 wrote to memory of 4572 2148 z9188688.exe q3304067.exe PID 4572 wrote to memory of 2692 4572 q3304067.exe AppLaunch.exe PID 4572 wrote to memory of 2692 4572 q3304067.exe AppLaunch.exe PID 4572 wrote to memory of 2692 4572 q3304067.exe AppLaunch.exe PID 4572 wrote to memory of 2692 4572 q3304067.exe AppLaunch.exe PID 4572 wrote to memory of 2692 4572 q3304067.exe AppLaunch.exe PID 4572 wrote to memory of 2692 4572 q3304067.exe AppLaunch.exe PID 4572 wrote to memory of 2692 4572 q3304067.exe AppLaunch.exe PID 4572 wrote to memory of 2692 4572 q3304067.exe AppLaunch.exe PID 2148 wrote to memory of 2936 2148 z9188688.exe r2460929.exe PID 2148 wrote to memory of 2936 2148 z9188688.exe r2460929.exe PID 2148 wrote to memory of 2936 2148 z9188688.exe r2460929.exe PID 2936 wrote to memory of 3952 2936 r2460929.exe AppLaunch.exe PID 2936 wrote to memory of 3952 2936 r2460929.exe AppLaunch.exe PID 2936 wrote to memory of 3952 2936 r2460929.exe AppLaunch.exe PID 2936 wrote to memory of 3952 2936 r2460929.exe AppLaunch.exe PID 2936 wrote to memory of 3952 2936 r2460929.exe AppLaunch.exe PID 2936 wrote to memory of 3952 2936 r2460929.exe AppLaunch.exe PID 2936 wrote to memory of 3952 2936 r2460929.exe AppLaunch.exe PID 2936 wrote to memory of 3952 2936 r2460929.exe AppLaunch.exe PID 2936 wrote to memory of 3952 2936 r2460929.exe AppLaunch.exe PID 2936 wrote to memory of 3952 2936 r2460929.exe AppLaunch.exe PID 2800 wrote to memory of 1096 2800 z2948128.exe s9586296.exe PID 2800 wrote to memory of 1096 2800 z2948128.exe s9586296.exe PID 2800 wrote to memory of 1096 2800 z2948128.exe s9586296.exe PID 1096 wrote to memory of 2064 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 2064 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 2064 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 4816 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 4816 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 4816 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 2696 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 2696 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 2696 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 4236 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 4236 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 4236 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 4236 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 4236 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 4236 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 4236 1096 s9586296.exe AppLaunch.exe PID 1096 wrote to memory of 4236 1096 s9586296.exe AppLaunch.exe PID 4264 wrote to memory of 4544 4264 z2478712.exe t4056196.exe PID 4264 wrote to memory of 4544 4264 z2478712.exe t4056196.exe PID 4264 wrote to memory of 4544 4264 z2478712.exe t4056196.exe PID 4544 wrote to memory of 3140 4544 t4056196.exe explothe.exe PID 4544 wrote to memory of 3140 4544 t4056196.exe explothe.exe PID 4544 wrote to memory of 3140 4544 t4056196.exe explothe.exe PID 4980 wrote to memory of 3608 4980 z4103137.exe u9050615.exe PID 4980 wrote to memory of 3608 4980 z4103137.exe u9050615.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fe47cdf23978732c9edebe55a137fdc.exe"C:\Users\Admin\AppData\Local\Temp\6fe47cdf23978732c9edebe55a137fdc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4103137.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4103137.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2478712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2478712.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2948128.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2948128.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9188688.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9188688.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3304067.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3304067.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 5887⤵
- Program crash
PID:4716
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2460929.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2460929.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 5408⤵
- Program crash
PID:3648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 87⤵
- Program crash
PID:4692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9586296.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9586296.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2696
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 1486⤵
- Program crash
PID:1920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4056196.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4056196.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:3140 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:4248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:1020
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2092
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:640
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4904
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4448
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9050615.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9050615.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:4888
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:5036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4696
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:1420
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:3104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3612
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:2132
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1328
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1289599.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1289599.exe2⤵
- Executes dropped EXE
PID:3616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4572 -ip 45721⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2936 -ip 29361⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3952 -ip 39521⤵PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1096 -ip 10961⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3628
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3264
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3272
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1488
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD526aacc2ce9aff7cfa368f856e24b2173
SHA1eb28f2471e4f78d74d3581fd319f426fe5be47ef
SHA256774b56febfc17a9f9d0c11a87b66ea190637f36bfe26390913bbb0b31209dbd5
SHA512d2da084d4756477b694610e759fa3ca5629defff582ce4e990f54fe1f86ffb9065427aa58ad0594d0de68bd105b3df18e0b806cc8caeef480e5abf388c59757d
-
Filesize
23KB
MD526aacc2ce9aff7cfa368f856e24b2173
SHA1eb28f2471e4f78d74d3581fd319f426fe5be47ef
SHA256774b56febfc17a9f9d0c11a87b66ea190637f36bfe26390913bbb0b31209dbd5
SHA512d2da084d4756477b694610e759fa3ca5629defff582ce4e990f54fe1f86ffb9065427aa58ad0594d0de68bd105b3df18e0b806cc8caeef480e5abf388c59757d
-
Filesize
983KB
MD5cb088bfae36547132cfd6cbd4f766ed0
SHA102b12c50a060a0dc452a6c3c27b0cfd3983d52e0
SHA256c7a48c9add10d606d5459f4eb7f3dfc80a7fa368c2a8b19fe27c158cf842e13c
SHA512339520b194bebb424f2ffd26e83dcee56c11f7cf21c5c9dbf2246de2fe3a9a825c45cda1928bebd3827ad52d764e7af705f22f72c523e0ca35903a605bdc627c
-
Filesize
983KB
MD5cb088bfae36547132cfd6cbd4f766ed0
SHA102b12c50a060a0dc452a6c3c27b0cfd3983d52e0
SHA256c7a48c9add10d606d5459f4eb7f3dfc80a7fa368c2a8b19fe27c158cf842e13c
SHA512339520b194bebb424f2ffd26e83dcee56c11f7cf21c5c9dbf2246de2fe3a9a825c45cda1928bebd3827ad52d764e7af705f22f72c523e0ca35903a605bdc627c
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
800KB
MD5c68e5dca1bb79060be344490b304eb52
SHA122c043bfc1436ac8f0cdcb5fc585b9dad88fa8a0
SHA25653ec63d8642dee463b3891343b490075b94f40c5e5c908d10f6d019e24fe11ce
SHA512d717fe845cbb85701442048d2188b086695af52a25a21ceec2ff334f09a8f65ea8f23e36b4d977acb4e87963cc18b8bbed1591cad79ee840636c280c9b587f9a
-
Filesize
800KB
MD5c68e5dca1bb79060be344490b304eb52
SHA122c043bfc1436ac8f0cdcb5fc585b9dad88fa8a0
SHA25653ec63d8642dee463b3891343b490075b94f40c5e5c908d10f6d019e24fe11ce
SHA512d717fe845cbb85701442048d2188b086695af52a25a21ceec2ff334f09a8f65ea8f23e36b4d977acb4e87963cc18b8bbed1591cad79ee840636c280c9b587f9a
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
617KB
MD59295c8ed09486582257dd5aac337d01a
SHA15205e92edf8c7be3eb1b9f6c201ef9cf8d152e35
SHA256d47a0e74439686157c5df59bebdca1191610cef8512a51b6cb7afd39378cdfa4
SHA5122cf36d98347dd98204143a484200199fe8d09df90084867532536c76e47d1b4a6b29bf6dba7c0611fff56e9a0c266480e83c7ae4b229f02e276a9ef6dbb1a535
-
Filesize
617KB
MD59295c8ed09486582257dd5aac337d01a
SHA15205e92edf8c7be3eb1b9f6c201ef9cf8d152e35
SHA256d47a0e74439686157c5df59bebdca1191610cef8512a51b6cb7afd39378cdfa4
SHA5122cf36d98347dd98204143a484200199fe8d09df90084867532536c76e47d1b4a6b29bf6dba7c0611fff56e9a0c266480e83c7ae4b229f02e276a9ef6dbb1a535
-
Filesize
390KB
MD528af052d723fefacae8f98cbd674458c
SHA17d14bc98eeb51581bd5f72bc9e7edcbde63346d6
SHA25653f91b04e626ad8402f63d76949bf3df0ae7b09314a52e24253b7417dd0fd58b
SHA512b78ebeaeacccdbdf23fbbb8fd1cc2ca06dfb9b3c17e2f30c07a14c667b8676ab35451a13b3d3774276a6191db6b5885bf819fc5ef6dfefa7e44e2054dad31d9c
-
Filesize
390KB
MD528af052d723fefacae8f98cbd674458c
SHA17d14bc98eeb51581bd5f72bc9e7edcbde63346d6
SHA25653f91b04e626ad8402f63d76949bf3df0ae7b09314a52e24253b7417dd0fd58b
SHA512b78ebeaeacccdbdf23fbbb8fd1cc2ca06dfb9b3c17e2f30c07a14c667b8676ab35451a13b3d3774276a6191db6b5885bf819fc5ef6dfefa7e44e2054dad31d9c
-
Filesize
346KB
MD5e57402ca1a3b3dbc7c0d4ec0ea58930a
SHA13029be79e59ad52ff5858ea533e6feb3738c3c6d
SHA256da0c644f3049b66316ac87bc3f30660ead507b4954c90ee85b1968a58a697cdb
SHA512a4d581c963ced67f8e2b2e7dafa58e6bb1b59b182c1c77ab33821246e492ea46e740e53ce6ea26e866dd45d912e86f64555bcfa8cf41ce690bbfad874ba9b668
-
Filesize
346KB
MD5e57402ca1a3b3dbc7c0d4ec0ea58930a
SHA13029be79e59ad52ff5858ea533e6feb3738c3c6d
SHA256da0c644f3049b66316ac87bc3f30660ead507b4954c90ee85b1968a58a697cdb
SHA512a4d581c963ced67f8e2b2e7dafa58e6bb1b59b182c1c77ab33821246e492ea46e740e53ce6ea26e866dd45d912e86f64555bcfa8cf41ce690bbfad874ba9b668
-
Filesize
227KB
MD586e2e2104afba03781eb15b8379a8a48
SHA13e4bfb4a537963be01cd535a286ad04d1a2cd371
SHA256fcfcb6c0392556a0c81d6436d29fc29d665f0417eb0a6b7c0c75d28a46a6a445
SHA512865633a3838d24fa61321eaf80557e75d21c7cdcf141572ecb10fd0b0689985b4687e4c20579b9fd69876fbe78b9b054d070386398127ce6314c08fde3bcbea4
-
Filesize
227KB
MD586e2e2104afba03781eb15b8379a8a48
SHA13e4bfb4a537963be01cd535a286ad04d1a2cd371
SHA256fcfcb6c0392556a0c81d6436d29fc29d665f0417eb0a6b7c0c75d28a46a6a445
SHA512865633a3838d24fa61321eaf80557e75d21c7cdcf141572ecb10fd0b0689985b4687e4c20579b9fd69876fbe78b9b054d070386398127ce6314c08fde3bcbea4
-
Filesize
356KB
MD5159d2aaa2f8cd92bd07392bd3206ca63
SHA1417d3fdf4c8871a2a25afaecef92a852c95fc0b6
SHA256b615b22fd4e0935f9e7244c43cf44e368fda2ea4ab694a36dad6b7469089a1a8
SHA5125260f93b692fb9de84e8e0ad0e4b539026c0000e2b14b5302ca778f766b2a31713855c9ec7939ab513bf0da57d116cf29b10923f473add72752d8b8076edecc0
-
Filesize
356KB
MD5159d2aaa2f8cd92bd07392bd3206ca63
SHA1417d3fdf4c8871a2a25afaecef92a852c95fc0b6
SHA256b615b22fd4e0935f9e7244c43cf44e368fda2ea4ab694a36dad6b7469089a1a8
SHA5125260f93b692fb9de84e8e0ad0e4b539026c0000e2b14b5302ca778f766b2a31713855c9ec7939ab513bf0da57d116cf29b10923f473add72752d8b8076edecc0
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0