Analysis
-
max time kernel
125s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 20:21
Static task
static1
Behavioral task
behavioral1
Sample
6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe
Resource
win7-20230831-en
General
-
Target
6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe
-
Size
994KB
-
MD5
e83e7d33de9abd0dacace48f73f9af4f
-
SHA1
63cf0238e8d6c2e3c729b215fa1e0479e25fe527
-
SHA256
6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9
-
SHA512
5470a98b9801f9e07e2690fc5ee08c11b03423455e72f90baa81bfed999a3f400322def1ec832d32f088172e7a9bf9f18b4d3f2b196f72bfe2b2896dffd8d07c
-
SSDEEP
24576:3yVQV+tg7MQ+AouGMV3+Cq9CBA4SCcVuq+:C2UmMNuOtcA4T
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1044-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1044-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1044-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1044-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0974317.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0974317.exe healer behavioral2/memory/3044-35-0x0000000000150000-0x000000000015A000-memory.dmp healer -
Processes:
q0974317.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q0974317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q0974317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q0974317.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q0974317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q0974317.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q0974317.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t1867194.exeexplothe.exeu3034390.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation t1867194.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation u3034390.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z1413441.exez0061231.exez0550209.exez4836988.exeq0974317.exer5175735.exes4836612.exet1867194.exeexplothe.exeu3034390.exelegota.exew2792161.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4036 z1413441.exe 260 z0061231.exe 2588 z0550209.exe 4268 z4836988.exe 3044 q0974317.exe 2652 r5175735.exe 3368 s4836612.exe 1980 t1867194.exe 1516 explothe.exe 2300 u3034390.exe 4560 legota.exe 4136 w2792161.exe 3480 explothe.exe 800 legota.exe 2244 explothe.exe 4236 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2052 rundll32.exe 2516 rundll32.exe -
Processes:
q0974317.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q0974317.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exez1413441.exez0061231.exez0550209.exez4836988.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1413441.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0061231.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z0550209.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4836988.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r5175735.exes4836612.exedescription pid process target process PID 2652 set thread context of 1044 2652 r5175735.exe AppLaunch.exe PID 3368 set thread context of 3780 3368 s4836612.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4996 2652 WerFault.exe r5175735.exe 2196 1044 WerFault.exe AppLaunch.exe 1472 3368 WerFault.exe s4836612.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 536 schtasks.exe 2512 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q0974317.exepid process 3044 q0974317.exe 3044 q0974317.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q0974317.exedescription pid process Token: SeDebugPrivilege 3044 q0974317.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exez1413441.exez0061231.exez0550209.exez4836988.exer5175735.exes4836612.exet1867194.exeexplothe.exeu3034390.execmd.exelegota.exedescription pid process target process PID 4500 wrote to memory of 4036 4500 6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe z1413441.exe PID 4500 wrote to memory of 4036 4500 6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe z1413441.exe PID 4500 wrote to memory of 4036 4500 6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe z1413441.exe PID 4036 wrote to memory of 260 4036 z1413441.exe z0061231.exe PID 4036 wrote to memory of 260 4036 z1413441.exe z0061231.exe PID 4036 wrote to memory of 260 4036 z1413441.exe z0061231.exe PID 260 wrote to memory of 2588 260 z0061231.exe z0550209.exe PID 260 wrote to memory of 2588 260 z0061231.exe z0550209.exe PID 260 wrote to memory of 2588 260 z0061231.exe z0550209.exe PID 2588 wrote to memory of 4268 2588 z0550209.exe z4836988.exe PID 2588 wrote to memory of 4268 2588 z0550209.exe z4836988.exe PID 2588 wrote to memory of 4268 2588 z0550209.exe z4836988.exe PID 4268 wrote to memory of 3044 4268 z4836988.exe q0974317.exe PID 4268 wrote to memory of 3044 4268 z4836988.exe q0974317.exe PID 4268 wrote to memory of 2652 4268 z4836988.exe r5175735.exe PID 4268 wrote to memory of 2652 4268 z4836988.exe r5175735.exe PID 4268 wrote to memory of 2652 4268 z4836988.exe r5175735.exe PID 2652 wrote to memory of 1044 2652 r5175735.exe AppLaunch.exe PID 2652 wrote to memory of 1044 2652 r5175735.exe AppLaunch.exe PID 2652 wrote to memory of 1044 2652 r5175735.exe AppLaunch.exe PID 2652 wrote to memory of 1044 2652 r5175735.exe AppLaunch.exe PID 2652 wrote to memory of 1044 2652 r5175735.exe AppLaunch.exe PID 2652 wrote to memory of 1044 2652 r5175735.exe AppLaunch.exe PID 2652 wrote to memory of 1044 2652 r5175735.exe AppLaunch.exe PID 2652 wrote to memory of 1044 2652 r5175735.exe AppLaunch.exe PID 2652 wrote to memory of 1044 2652 r5175735.exe AppLaunch.exe PID 2652 wrote to memory of 1044 2652 r5175735.exe AppLaunch.exe PID 2588 wrote to memory of 3368 2588 z0550209.exe s4836612.exe PID 2588 wrote to memory of 3368 2588 z0550209.exe s4836612.exe PID 2588 wrote to memory of 3368 2588 z0550209.exe s4836612.exe PID 3368 wrote to memory of 3780 3368 s4836612.exe AppLaunch.exe PID 3368 wrote to memory of 3780 3368 s4836612.exe AppLaunch.exe PID 3368 wrote to memory of 3780 3368 s4836612.exe AppLaunch.exe PID 3368 wrote to memory of 3780 3368 s4836612.exe AppLaunch.exe PID 3368 wrote to memory of 3780 3368 s4836612.exe AppLaunch.exe PID 3368 wrote to memory of 3780 3368 s4836612.exe AppLaunch.exe PID 3368 wrote to memory of 3780 3368 s4836612.exe AppLaunch.exe PID 3368 wrote to memory of 3780 3368 s4836612.exe AppLaunch.exe PID 260 wrote to memory of 1980 260 z0061231.exe t1867194.exe PID 260 wrote to memory of 1980 260 z0061231.exe t1867194.exe PID 260 wrote to memory of 1980 260 z0061231.exe t1867194.exe PID 1980 wrote to memory of 1516 1980 t1867194.exe explothe.exe PID 1980 wrote to memory of 1516 1980 t1867194.exe explothe.exe PID 1980 wrote to memory of 1516 1980 t1867194.exe explothe.exe PID 4036 wrote to memory of 2300 4036 z1413441.exe u3034390.exe PID 4036 wrote to memory of 2300 4036 z1413441.exe u3034390.exe PID 4036 wrote to memory of 2300 4036 z1413441.exe u3034390.exe PID 1516 wrote to memory of 536 1516 explothe.exe schtasks.exe PID 1516 wrote to memory of 536 1516 explothe.exe schtasks.exe PID 1516 wrote to memory of 536 1516 explothe.exe schtasks.exe PID 2300 wrote to memory of 4560 2300 u3034390.exe legota.exe PID 2300 wrote to memory of 4560 2300 u3034390.exe legota.exe PID 2300 wrote to memory of 4560 2300 u3034390.exe legota.exe PID 1516 wrote to memory of 4244 1516 explothe.exe cmd.exe PID 1516 wrote to memory of 4244 1516 explothe.exe cmd.exe PID 1516 wrote to memory of 4244 1516 explothe.exe cmd.exe PID 4500 wrote to memory of 4136 4500 6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe w2792161.exe PID 4500 wrote to memory of 4136 4500 6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe w2792161.exe PID 4500 wrote to memory of 4136 4500 6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe w2792161.exe PID 4244 wrote to memory of 2216 4244 cmd.exe cmd.exe PID 4244 wrote to memory of 2216 4244 cmd.exe cmd.exe PID 4244 wrote to memory of 2216 4244 cmd.exe cmd.exe PID 4560 wrote to memory of 2512 4560 legota.exe schtasks.exe PID 4560 wrote to memory of 2512 4560 legota.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe"C:\Users\Admin\AppData\Local\Temp\6cced2d0864c147675f604a6472c03cb1a94651e04162e4ab34b8b4346cab0d9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1413441.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1413441.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0061231.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0061231.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:260 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0550209.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0550209.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4836988.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4836988.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0974317.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0974317.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175735.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 5408⤵
- Program crash
PID:2196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 1527⤵
- Program crash
PID:4996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4836612.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4836612.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3368 -s 1566⤵
- Program crash
PID:1472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1867194.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1867194.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:2536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2248
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:2072
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2516
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3034390.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3034390.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:2512
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3044
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:2968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3476
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:3144
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2052
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2792161.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2792161.exe2⤵
- Executes dropped EXE
PID:4136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1044 -ip 10441⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2652 -ip 26521⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3368 -ip 33681⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3480
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:800
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2244
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4236
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD578e149e9bf92103bb27b7d5ce5b02181
SHA1b2f93a9d353ca8129eac9737b258e92eb768ba72
SHA256bb1088ac837cd88d4a049aa5c2cb5128d80f53b4ed729e8c6e1ff3a51d310c83
SHA51275b99cb4a6def4f763237c34a37e3c8678e3fd38bcc1cf9ff43e3c1cef5d966c69e454ec6b6e689ebe7321a1e4c37b5299542603b37311d934ab502e7b829db4
-
Filesize
23KB
MD578e149e9bf92103bb27b7d5ce5b02181
SHA1b2f93a9d353ca8129eac9737b258e92eb768ba72
SHA256bb1088ac837cd88d4a049aa5c2cb5128d80f53b4ed729e8c6e1ff3a51d310c83
SHA51275b99cb4a6def4f763237c34a37e3c8678e3fd38bcc1cf9ff43e3c1cef5d966c69e454ec6b6e689ebe7321a1e4c37b5299542603b37311d934ab502e7b829db4
-
Filesize
892KB
MD522581ca7f2b8b6e53bc77817e7d41ecb
SHA16b733672c038e8b190b9ef3198453884d3dbd894
SHA256da34664226ba6d1b9ab0d8988a39d9d6f5ea09010c0a61716c481d9fa723ad57
SHA512ac7429d52043c29f62a160a4f3008195185405b1bf0cf2ddcda97c79b0c4d07fa36b83758957d74c97e9f79d4260290bcb266b5a39e957866c188c184e2f03b8
-
Filesize
892KB
MD522581ca7f2b8b6e53bc77817e7d41ecb
SHA16b733672c038e8b190b9ef3198453884d3dbd894
SHA256da34664226ba6d1b9ab0d8988a39d9d6f5ea09010c0a61716c481d9fa723ad57
SHA512ac7429d52043c29f62a160a4f3008195185405b1bf0cf2ddcda97c79b0c4d07fa36b83758957d74c97e9f79d4260290bcb266b5a39e957866c188c184e2f03b8
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
710KB
MD597dadd9195fd8cb5247d60825bcaf47b
SHA1fe74aae6f95c5d5a2b2830c5710ec2a172f73447
SHA256b1d16c09a226686051aec64e7904411baa85a6cc8db23e3978de3ec87b394e95
SHA512eff1c9fa4af4458d27a03dbe68d4f9d18470fe21c5664f7604a15721d4c71c0b2a1fb3cacac3e54cc847100052c23ba640307b2448d449163875f5cf75603d9e
-
Filesize
710KB
MD597dadd9195fd8cb5247d60825bcaf47b
SHA1fe74aae6f95c5d5a2b2830c5710ec2a172f73447
SHA256b1d16c09a226686051aec64e7904411baa85a6cc8db23e3978de3ec87b394e95
SHA512eff1c9fa4af4458d27a03dbe68d4f9d18470fe21c5664f7604a15721d4c71c0b2a1fb3cacac3e54cc847100052c23ba640307b2448d449163875f5cf75603d9e
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD5fe6b00397a69789dace341553ab5b7dc
SHA1ac42567e851d22c3766a85d83f6a2cb59d4d364a
SHA2562294b60339f4879233d918368c8939d510ba6cf250e2477ec30dc59a20d8232e
SHA512d33e7cef04ff54cbcb949fca20c07a46cfc1e09a39a01d18da1034ccac08cf2afd7e0799f7dfb201063cac7c2e54aea12dccbc834a1d14472c8b4d4fea94eb70
-
Filesize
527KB
MD5fe6b00397a69789dace341553ab5b7dc
SHA1ac42567e851d22c3766a85d83f6a2cb59d4d364a
SHA2562294b60339f4879233d918368c8939d510ba6cf250e2477ec30dc59a20d8232e
SHA512d33e7cef04ff54cbcb949fca20c07a46cfc1e09a39a01d18da1034ccac08cf2afd7e0799f7dfb201063cac7c2e54aea12dccbc834a1d14472c8b4d4fea94eb70
-
Filesize
310KB
MD5e45fe91e278bc458780590e92e48b946
SHA1cc403560084a954abf1e2baa809ed238bf151e40
SHA256ebc3b453a3e692409dd422a396f72860c9d8a85634ed90aa300dd84fed932b86
SHA512dfa9f4306f34e85580b6c196783e1971e7f14763afa13ff2d1ef2c76685f814e601869d4cca26cc86bbaf1234ebd9e08ff3baaf104dde4f87aa3906853d7058e
-
Filesize
310KB
MD5e45fe91e278bc458780590e92e48b946
SHA1cc403560084a954abf1e2baa809ed238bf151e40
SHA256ebc3b453a3e692409dd422a396f72860c9d8a85634ed90aa300dd84fed932b86
SHA512dfa9f4306f34e85580b6c196783e1971e7f14763afa13ff2d1ef2c76685f814e601869d4cca26cc86bbaf1234ebd9e08ff3baaf104dde4f87aa3906853d7058e
-
Filesize
296KB
MD5c2958eafbd1df34e363aac64872d3767
SHA1c38ed42ec3e481b61f93148701ec1cf15b1e2ead
SHA25676f8cfab37c732615ae71a4f9c1ddf1092f2545ab426819a71cfb558b09c7827
SHA51242657f261fd0de09d273beb6b595e77f70fda71d1ad53c3d5f0fe2ecc74fd3dbbc6616552e26a7e2cb39158d1f0ebd3b04f960a2250c597abd4cbb54dc8e1798
-
Filesize
296KB
MD5c2958eafbd1df34e363aac64872d3767
SHA1c38ed42ec3e481b61f93148701ec1cf15b1e2ead
SHA25676f8cfab37c732615ae71a4f9c1ddf1092f2545ab426819a71cfb558b09c7827
SHA51242657f261fd0de09d273beb6b595e77f70fda71d1ad53c3d5f0fe2ecc74fd3dbbc6616552e26a7e2cb39158d1f0ebd3b04f960a2250c597abd4cbb54dc8e1798
-
Filesize
11KB
MD523f943f98b2eef1d8427ba90111c34e2
SHA147be76d126057e63dd8c9be3f7eac252a86a9b53
SHA25676ee34b15e8f7d1a38ba5d8221ac5144bc624a7253195afee8e83d93c68de6d5
SHA51232ea29df413fdc8f630212957a8e4fd91575a9431da4750758b156ec013f6c5c700feca8271aee81fb5dc6ef12ea4578f107781149563be2988a28a2feb9d811
-
Filesize
11KB
MD523f943f98b2eef1d8427ba90111c34e2
SHA147be76d126057e63dd8c9be3f7eac252a86a9b53
SHA25676ee34b15e8f7d1a38ba5d8221ac5144bc624a7253195afee8e83d93c68de6d5
SHA51232ea29df413fdc8f630212957a8e4fd91575a9431da4750758b156ec013f6c5c700feca8271aee81fb5dc6ef12ea4578f107781149563be2988a28a2feb9d811
-
Filesize
276KB
MD590974946e2cc83f25f5dc34cf2c6c691
SHA1fe7fb4d0a45d95b4e94d5c08f07a076dfbfa9568
SHA25672d81c4490446b01bdee7fae368a4ba893821430ee0541ed545171b9de7f2267
SHA51244993865b3d708d36d7c688c09ded36bdec03148a8476601357fe29af9cac9be6c028aedc887d8bd31a3f4103b8745a86dfe341e6c5ee5a7b8737ea3d64b8cfb
-
Filesize
276KB
MD590974946e2cc83f25f5dc34cf2c6c691
SHA1fe7fb4d0a45d95b4e94d5c08f07a076dfbfa9568
SHA25672d81c4490446b01bdee7fae368a4ba893821430ee0541ed545171b9de7f2267
SHA51244993865b3d708d36d7c688c09ded36bdec03148a8476601357fe29af9cac9be6c028aedc887d8bd31a3f4103b8745a86dfe341e6c5ee5a7b8737ea3d64b8cfb
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0