Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 22:51
Static task
static1
Behavioral task
behavioral1
Sample
3d494f1267b7a2635dcd88157caa0864.exe
Resource
win7-20230831-en
General
-
Target
3d494f1267b7a2635dcd88157caa0864.exe
-
Size
1.1MB
-
MD5
3d494f1267b7a2635dcd88157caa0864
-
SHA1
2906ecae62870e7b435c6bff1d431e3e268115d9
-
SHA256
ba72dd23776813767bf4ba2a34da6a8093cc84e9e72dbfc6bcdaa0e10448549f
-
SHA512
9b6bda28ebbdc36f7edeb380aa7d9ea48f25022f5fcfa5200c0eb7da9ed28b70378cbf749b78b8ac5e892b06e8bbcdcaa9ac43d856cbb94ae6873a7a96674dca
-
SSDEEP
24576:byhSj8AKhB4JjluLNPCiVlQnhmB/vZ3NpxF:OhSjLEB4JjoLN6iVCkRvZ3Nb
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4712-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4712-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4712-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4712-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1880-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t6699828.exeexplothe.exeu5135472.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation t6699828.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation u5135472.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z2369736.exez6038175.exez8579371.exez6343484.exeq8292645.exer1361455.exes7510666.exet6699828.exeexplothe.exeu5135472.exelegota.exew1923015.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 856 z2369736.exe 3380 z6038175.exe 4064 z8579371.exe 4588 z6343484.exe 3868 q8292645.exe 464 r1361455.exe 4540 s7510666.exe 3452 t6699828.exe 2384 explothe.exe 2156 u5135472.exe 3520 legota.exe 5020 w1923015.exe 376 explothe.exe 2732 legota.exe 1932 explothe.exe 4388 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1800 rundll32.exe 3536 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z2369736.exez6038175.exez8579371.exez6343484.exe3d494f1267b7a2635dcd88157caa0864.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2369736.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6038175.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z8579371.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z6343484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d494f1267b7a2635dcd88157caa0864.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q8292645.exer1361455.exes7510666.exedescription pid process target process PID 3868 set thread context of 1880 3868 q8292645.exe AppLaunch.exe PID 464 set thread context of 4712 464 r1361455.exe AppLaunch.exe PID 4540 set thread context of 5052 4540 s7510666.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4564 3868 WerFault.exe q8292645.exe 2124 464 WerFault.exe r1361455.exe 4692 4712 WerFault.exe AppLaunch.exe 3616 4540 WerFault.exe s7510666.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4360 schtasks.exe 1488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1880 AppLaunch.exe 1880 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1880 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3d494f1267b7a2635dcd88157caa0864.exez2369736.exez6038175.exez8579371.exez6343484.exeq8292645.exer1361455.exes7510666.exet6699828.exeexplothe.exedescription pid process target process PID 4072 wrote to memory of 856 4072 3d494f1267b7a2635dcd88157caa0864.exe z2369736.exe PID 4072 wrote to memory of 856 4072 3d494f1267b7a2635dcd88157caa0864.exe z2369736.exe PID 4072 wrote to memory of 856 4072 3d494f1267b7a2635dcd88157caa0864.exe z2369736.exe PID 856 wrote to memory of 3380 856 z2369736.exe z6038175.exe PID 856 wrote to memory of 3380 856 z2369736.exe z6038175.exe PID 856 wrote to memory of 3380 856 z2369736.exe z6038175.exe PID 3380 wrote to memory of 4064 3380 z6038175.exe z8579371.exe PID 3380 wrote to memory of 4064 3380 z6038175.exe z8579371.exe PID 3380 wrote to memory of 4064 3380 z6038175.exe z8579371.exe PID 4064 wrote to memory of 4588 4064 z8579371.exe z6343484.exe PID 4064 wrote to memory of 4588 4064 z8579371.exe z6343484.exe PID 4064 wrote to memory of 4588 4064 z8579371.exe z6343484.exe PID 4588 wrote to memory of 3868 4588 z6343484.exe q8292645.exe PID 4588 wrote to memory of 3868 4588 z6343484.exe q8292645.exe PID 4588 wrote to memory of 3868 4588 z6343484.exe q8292645.exe PID 3868 wrote to memory of 2732 3868 q8292645.exe AppLaunch.exe PID 3868 wrote to memory of 2732 3868 q8292645.exe AppLaunch.exe PID 3868 wrote to memory of 2732 3868 q8292645.exe AppLaunch.exe PID 3868 wrote to memory of 1880 3868 q8292645.exe AppLaunch.exe PID 3868 wrote to memory of 1880 3868 q8292645.exe AppLaunch.exe PID 3868 wrote to memory of 1880 3868 q8292645.exe AppLaunch.exe PID 3868 wrote to memory of 1880 3868 q8292645.exe AppLaunch.exe PID 3868 wrote to memory of 1880 3868 q8292645.exe AppLaunch.exe PID 3868 wrote to memory of 1880 3868 q8292645.exe AppLaunch.exe PID 3868 wrote to memory of 1880 3868 q8292645.exe AppLaunch.exe PID 3868 wrote to memory of 1880 3868 q8292645.exe AppLaunch.exe PID 4588 wrote to memory of 464 4588 z6343484.exe r1361455.exe PID 4588 wrote to memory of 464 4588 z6343484.exe r1361455.exe PID 4588 wrote to memory of 464 4588 z6343484.exe r1361455.exe PID 464 wrote to memory of 4712 464 r1361455.exe AppLaunch.exe PID 464 wrote to memory of 4712 464 r1361455.exe AppLaunch.exe PID 464 wrote to memory of 4712 464 r1361455.exe AppLaunch.exe PID 464 wrote to memory of 4712 464 r1361455.exe AppLaunch.exe PID 464 wrote to memory of 4712 464 r1361455.exe AppLaunch.exe PID 464 wrote to memory of 4712 464 r1361455.exe AppLaunch.exe PID 464 wrote to memory of 4712 464 r1361455.exe AppLaunch.exe PID 464 wrote to memory of 4712 464 r1361455.exe AppLaunch.exe PID 464 wrote to memory of 4712 464 r1361455.exe AppLaunch.exe PID 464 wrote to memory of 4712 464 r1361455.exe AppLaunch.exe PID 4064 wrote to memory of 4540 4064 z8579371.exe s7510666.exe PID 4064 wrote to memory of 4540 4064 z8579371.exe s7510666.exe PID 4064 wrote to memory of 4540 4064 z8579371.exe s7510666.exe PID 4540 wrote to memory of 5052 4540 s7510666.exe AppLaunch.exe PID 4540 wrote to memory of 5052 4540 s7510666.exe AppLaunch.exe PID 4540 wrote to memory of 5052 4540 s7510666.exe AppLaunch.exe PID 4540 wrote to memory of 5052 4540 s7510666.exe AppLaunch.exe PID 4540 wrote to memory of 5052 4540 s7510666.exe AppLaunch.exe PID 4540 wrote to memory of 5052 4540 s7510666.exe AppLaunch.exe PID 4540 wrote to memory of 5052 4540 s7510666.exe AppLaunch.exe PID 4540 wrote to memory of 5052 4540 s7510666.exe AppLaunch.exe PID 3380 wrote to memory of 3452 3380 z6038175.exe t6699828.exe PID 3380 wrote to memory of 3452 3380 z6038175.exe t6699828.exe PID 3380 wrote to memory of 3452 3380 z6038175.exe t6699828.exe PID 3452 wrote to memory of 2384 3452 t6699828.exe explothe.exe PID 3452 wrote to memory of 2384 3452 t6699828.exe explothe.exe PID 3452 wrote to memory of 2384 3452 t6699828.exe explothe.exe PID 856 wrote to memory of 2156 856 z2369736.exe u5135472.exe PID 856 wrote to memory of 2156 856 z2369736.exe u5135472.exe PID 856 wrote to memory of 2156 856 z2369736.exe u5135472.exe PID 2384 wrote to memory of 4360 2384 explothe.exe schtasks.exe PID 2384 wrote to memory of 4360 2384 explothe.exe schtasks.exe PID 2384 wrote to memory of 4360 2384 explothe.exe schtasks.exe PID 2384 wrote to memory of 4120 2384 explothe.exe cmd.exe PID 2384 wrote to memory of 4120 2384 explothe.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d494f1267b7a2635dcd88157caa0864.exe"C:\Users\Admin\AppData\Local\Temp\3d494f1267b7a2635dcd88157caa0864.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2369736.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2369736.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6038175.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6038175.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8579371.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8579371.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6343484.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6343484.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8292645.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8292645.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 6047⤵
- Program crash
PID:4564
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1361455.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1361455.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 5408⤵
- Program crash
PID:4692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 1607⤵
- Program crash
PID:2124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7510666.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7510666.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 1406⤵
- Program crash
PID:3616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6699828.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6699828.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:4360
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:1716
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3292
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4520
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3536
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u5135472.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u5135472.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:3520 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:1488
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1104
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:5096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:432
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1923015.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1923015.exe2⤵
- Executes dropped EXE
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3868 -ip 38681⤵PID:3388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 464 -ip 4641⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4712 -ip 47121⤵PID:1456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4540 -ip 45401⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:376
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2732
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1932
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4388
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
23KB
MD574e7881d6a302769814b8612eeebb7a1
SHA1ed168786798be53b82c69a1178479e06a33ffa83
SHA256ba5120aa0f5e63589ea5755009a3f65d66222f30dc5755019ca32eb4e20d10fd
SHA512ba15f05d30af108416448f84793dafb936dbbbf02c170eb2f56fcc21b6367c6b265ac8e2f92984f69979c4ec9315104843d52593a3e86c5dd64791baa96e1ffc
-
Filesize
23KB
MD574e7881d6a302769814b8612eeebb7a1
SHA1ed168786798be53b82c69a1178479e06a33ffa83
SHA256ba5120aa0f5e63589ea5755009a3f65d66222f30dc5755019ca32eb4e20d10fd
SHA512ba15f05d30af108416448f84793dafb936dbbbf02c170eb2f56fcc21b6367c6b265ac8e2f92984f69979c4ec9315104843d52593a3e86c5dd64791baa96e1ffc
-
Filesize
982KB
MD503586b615982144df265f92344b8e375
SHA195debdfbe04ad3a349a197bf5f0b8c5e37e39495
SHA256a315de4ea1f0deafe05b172376297ff149a6d0b8985e1244df7fb38fcfb67ac8
SHA5122f98841a524f9679e2361a109dd9e710f6e4eb9049fab943106a79e4e09d83f70f64407bfa5903d4533702c59a36e85e2cbac274cda1565878ea98db5c70cb2b
-
Filesize
982KB
MD503586b615982144df265f92344b8e375
SHA195debdfbe04ad3a349a197bf5f0b8c5e37e39495
SHA256a315de4ea1f0deafe05b172376297ff149a6d0b8985e1244df7fb38fcfb67ac8
SHA5122f98841a524f9679e2361a109dd9e710f6e4eb9049fab943106a79e4e09d83f70f64407bfa5903d4533702c59a36e85e2cbac274cda1565878ea98db5c70cb2b
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
799KB
MD5cf269ffe474df2ec293635e61ec55439
SHA172b5d98b27fd177e7f314d9518c8868a910e7462
SHA25620a2873ca6f427688a7259ba0d5bf30e26a1787bbc87f2b77f167647d2a4dce8
SHA5128731827c9cfa074271fa3d6d1e06fd7f09c1821e782c9d10bf7040226e5c23d8ec4341209687915f5142916c3ee7c502fd67046371f2877570cf5ec18ad2be4c
-
Filesize
799KB
MD5cf269ffe474df2ec293635e61ec55439
SHA172b5d98b27fd177e7f314d9518c8868a910e7462
SHA25620a2873ca6f427688a7259ba0d5bf30e26a1787bbc87f2b77f167647d2a4dce8
SHA5128731827c9cfa074271fa3d6d1e06fd7f09c1821e782c9d10bf7040226e5c23d8ec4341209687915f5142916c3ee7c502fd67046371f2877570cf5ec18ad2be4c
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
617KB
MD574c9cabd66a1b60fd7bca4ea219e94f3
SHA186c672059f44f5cc92521247dddf3d93e52bc4f5
SHA256ba2908cf1b78ab8a9b9b145e22289753876232747d67119e180bba711eff8818
SHA512e77392e1725484d325b335405e029ce9f98b859306df37cd6251eac019d675aa307667da76b547734fe2da79f59a8222751b2d7b684ddb79602d4609b696fa68
-
Filesize
617KB
MD574c9cabd66a1b60fd7bca4ea219e94f3
SHA186c672059f44f5cc92521247dddf3d93e52bc4f5
SHA256ba2908cf1b78ab8a9b9b145e22289753876232747d67119e180bba711eff8818
SHA512e77392e1725484d325b335405e029ce9f98b859306df37cd6251eac019d675aa307667da76b547734fe2da79f59a8222751b2d7b684ddb79602d4609b696fa68
-
Filesize
390KB
MD5d5be74c875f1516a47910299fc1eed37
SHA1bdbf9f516b5c13224e983fb518f4415d64ca0b53
SHA2561467e69d97b795890bb259ae8f742a0a51e2f4afe93ecb9973286105fb52cc23
SHA5121ff355c0aa663b539e97372f855170314d0e3e1cc75a525a79f8703067e523fabc34a15486c7e2e58e899bae68b140190e196f4fba5698b6cccdc3a28e2708f7
-
Filesize
390KB
MD5d5be74c875f1516a47910299fc1eed37
SHA1bdbf9f516b5c13224e983fb518f4415d64ca0b53
SHA2561467e69d97b795890bb259ae8f742a0a51e2f4afe93ecb9973286105fb52cc23
SHA5121ff355c0aa663b539e97372f855170314d0e3e1cc75a525a79f8703067e523fabc34a15486c7e2e58e899bae68b140190e196f4fba5698b6cccdc3a28e2708f7
-
Filesize
346KB
MD574e63895c3c5899aff6cbe13c1042c7a
SHA1454ab90bfe89218090e9654dd02376b64e34952f
SHA25617fbc64db3e08e023e25a30d1373747d49d0b930ab68f54650768b477ace42d3
SHA5122021093deaba5783f3a97da591e36eea03fc744b4cfe99d6cf8d5ce8e11fede6331ada8a6fb02ac0536b68e8d6ce7403803c9f78751a0f4428f0a6fc7e50177b
-
Filesize
346KB
MD574e63895c3c5899aff6cbe13c1042c7a
SHA1454ab90bfe89218090e9654dd02376b64e34952f
SHA25617fbc64db3e08e023e25a30d1373747d49d0b930ab68f54650768b477ace42d3
SHA5122021093deaba5783f3a97da591e36eea03fc744b4cfe99d6cf8d5ce8e11fede6331ada8a6fb02ac0536b68e8d6ce7403803c9f78751a0f4428f0a6fc7e50177b
-
Filesize
227KB
MD5cca6d2adb254d7e2135c8fa0bbe08654
SHA111977635b000ea441eb4074cab8c91966da7d257
SHA256889ea75958f783b7f07227f8e59c3c215590c1d296da96b40327137e3b8e00f6
SHA51229d02be04b862ddc599caa5fb5a64351224a7ec02fcbbdeef040aba77394729a79793afc6f7d3653e8085bafdf76875eb07cee6a9de3ed491bce454d8cd01c4b
-
Filesize
227KB
MD5cca6d2adb254d7e2135c8fa0bbe08654
SHA111977635b000ea441eb4074cab8c91966da7d257
SHA256889ea75958f783b7f07227f8e59c3c215590c1d296da96b40327137e3b8e00f6
SHA51229d02be04b862ddc599caa5fb5a64351224a7ec02fcbbdeef040aba77394729a79793afc6f7d3653e8085bafdf76875eb07cee6a9de3ed491bce454d8cd01c4b
-
Filesize
356KB
MD57c0e5a98bf5cfe59746c757306f12b46
SHA15a2bff69dc1d666e68ffc58ecfd27c343e72ad65
SHA2567dcf5d1686afcebfb18bdd19605d93cbf10380bd85d3b17c7cad20b7fc1b983e
SHA51215cd4bf2e4b8380b7a9129f9e15df0b68497d7e20c27f486d6395193e7b74aa18fe3440abd0f562592dceb5fd45bedde2183fc7145a535586beb858763defb74
-
Filesize
356KB
MD57c0e5a98bf5cfe59746c757306f12b46
SHA15a2bff69dc1d666e68ffc58ecfd27c343e72ad65
SHA2567dcf5d1686afcebfb18bdd19605d93cbf10380bd85d3b17c7cad20b7fc1b983e
SHA51215cd4bf2e4b8380b7a9129f9e15df0b68497d7e20c27f486d6395193e7b74aa18fe3440abd0f562592dceb5fd45bedde2183fc7145a535586beb858763defb74
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0