Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 20:26
Static task
static1
Behavioral task
behavioral1
Sample
0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe
Resource
win7-20230831-en
General
-
Target
0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe
-
Size
989KB
-
MD5
221e84447fbd0b1f06b59dac88d063c9
-
SHA1
e87126e77ce0eb2fca682985c157746b7b73e5cd
-
SHA256
0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9
-
SHA512
60818b6001e82d5aef6fc4395b2f886acce60a5cb156c85a1ec3a95bcf71b0076bd8706bc1b12c26fc042b1099a49efbfc55871c3d9d8f76d42fc92a548f10b2
-
SSDEEP
24576:ayyy5n++lhWbZfidM42S7Oc+1f+78EiAMJRw/edQItF:ht5nrhqUqGj7FdI
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4508-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4508-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4508-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4508-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8696735.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8696735.exe healer behavioral2/memory/4680-35-0x0000000000500000-0x000000000050A000-memory.dmp healer -
Processes:
q8696735.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q8696735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q8696735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q8696735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q8696735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q8696735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q8696735.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explothe.exelegota.exet5340575.exeu5768499.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation t5340575.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation u5768499.exe -
Executes dropped EXE 16 IoCs
Processes:
z2673335.exez2451699.exez5779253.exez2385855.exeq8696735.exer4925822.exes9582120.exet5340575.exeexplothe.exeu5768499.exelegota.exew3065965.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 744 z2673335.exe 1760 z2451699.exe 4504 z5779253.exe 4744 z2385855.exe 4680 q8696735.exe 4516 r4925822.exe 4976 s9582120.exe 4900 t5340575.exe 2612 explothe.exe 3444 u5768499.exe 840 legota.exe 1724 w3065965.exe 4304 explothe.exe 3848 legota.exe 4848 explothe.exe 4180 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 944 rundll32.exe 3840 rundll32.exe -
Processes:
q8696735.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q8696735.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exez2673335.exez2451699.exez5779253.exez2385855.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2673335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z2451699.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z5779253.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z2385855.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r4925822.exes9582120.exedescription pid process target process PID 4516 set thread context of 4508 4516 r4925822.exe AppLaunch.exe PID 4976 set thread context of 4684 4976 s9582120.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2840 4516 WerFault.exe r4925822.exe 1700 4508 WerFault.exe AppLaunch.exe 4784 4976 WerFault.exe s9582120.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3628 schtasks.exe 3472 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q8696735.exepid process 4680 q8696735.exe 4680 q8696735.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q8696735.exedescription pid process Token: SeDebugPrivilege 4680 q8696735.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exez2673335.exez2451699.exez5779253.exez2385855.exer4925822.exes9582120.exet5340575.exeu5768499.exeexplothe.exelegota.exedescription pid process target process PID 384 wrote to memory of 744 384 0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe z2673335.exe PID 384 wrote to memory of 744 384 0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe z2673335.exe PID 384 wrote to memory of 744 384 0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe z2673335.exe PID 744 wrote to memory of 1760 744 z2673335.exe z2451699.exe PID 744 wrote to memory of 1760 744 z2673335.exe z2451699.exe PID 744 wrote to memory of 1760 744 z2673335.exe z2451699.exe PID 1760 wrote to memory of 4504 1760 z2451699.exe z5779253.exe PID 1760 wrote to memory of 4504 1760 z2451699.exe z5779253.exe PID 1760 wrote to memory of 4504 1760 z2451699.exe z5779253.exe PID 4504 wrote to memory of 4744 4504 z5779253.exe z2385855.exe PID 4504 wrote to memory of 4744 4504 z5779253.exe z2385855.exe PID 4504 wrote to memory of 4744 4504 z5779253.exe z2385855.exe PID 4744 wrote to memory of 4680 4744 z2385855.exe q8696735.exe PID 4744 wrote to memory of 4680 4744 z2385855.exe q8696735.exe PID 4744 wrote to memory of 4516 4744 z2385855.exe r4925822.exe PID 4744 wrote to memory of 4516 4744 z2385855.exe r4925822.exe PID 4744 wrote to memory of 4516 4744 z2385855.exe r4925822.exe PID 4516 wrote to memory of 4508 4516 r4925822.exe AppLaunch.exe PID 4516 wrote to memory of 4508 4516 r4925822.exe AppLaunch.exe PID 4516 wrote to memory of 4508 4516 r4925822.exe AppLaunch.exe PID 4516 wrote to memory of 4508 4516 r4925822.exe AppLaunch.exe PID 4516 wrote to memory of 4508 4516 r4925822.exe AppLaunch.exe PID 4516 wrote to memory of 4508 4516 r4925822.exe AppLaunch.exe PID 4516 wrote to memory of 4508 4516 r4925822.exe AppLaunch.exe PID 4516 wrote to memory of 4508 4516 r4925822.exe AppLaunch.exe PID 4516 wrote to memory of 4508 4516 r4925822.exe AppLaunch.exe PID 4516 wrote to memory of 4508 4516 r4925822.exe AppLaunch.exe PID 4504 wrote to memory of 4976 4504 z5779253.exe s9582120.exe PID 4504 wrote to memory of 4976 4504 z5779253.exe s9582120.exe PID 4504 wrote to memory of 4976 4504 z5779253.exe s9582120.exe PID 4976 wrote to memory of 1336 4976 s9582120.exe AppLaunch.exe PID 4976 wrote to memory of 1336 4976 s9582120.exe AppLaunch.exe PID 4976 wrote to memory of 1336 4976 s9582120.exe AppLaunch.exe PID 4976 wrote to memory of 4684 4976 s9582120.exe AppLaunch.exe PID 4976 wrote to memory of 4684 4976 s9582120.exe AppLaunch.exe PID 4976 wrote to memory of 4684 4976 s9582120.exe AppLaunch.exe PID 4976 wrote to memory of 4684 4976 s9582120.exe AppLaunch.exe PID 4976 wrote to memory of 4684 4976 s9582120.exe AppLaunch.exe PID 4976 wrote to memory of 4684 4976 s9582120.exe AppLaunch.exe PID 4976 wrote to memory of 4684 4976 s9582120.exe AppLaunch.exe PID 4976 wrote to memory of 4684 4976 s9582120.exe AppLaunch.exe PID 1760 wrote to memory of 4900 1760 z2451699.exe t5340575.exe PID 1760 wrote to memory of 4900 1760 z2451699.exe t5340575.exe PID 1760 wrote to memory of 4900 1760 z2451699.exe t5340575.exe PID 4900 wrote to memory of 2612 4900 t5340575.exe explothe.exe PID 4900 wrote to memory of 2612 4900 t5340575.exe explothe.exe PID 4900 wrote to memory of 2612 4900 t5340575.exe explothe.exe PID 744 wrote to memory of 3444 744 z2673335.exe u5768499.exe PID 744 wrote to memory of 3444 744 z2673335.exe u5768499.exe PID 744 wrote to memory of 3444 744 z2673335.exe u5768499.exe PID 3444 wrote to memory of 840 3444 u5768499.exe legota.exe PID 3444 wrote to memory of 840 3444 u5768499.exe legota.exe PID 3444 wrote to memory of 840 3444 u5768499.exe legota.exe PID 2612 wrote to memory of 3628 2612 explothe.exe schtasks.exe PID 2612 wrote to memory of 3628 2612 explothe.exe schtasks.exe PID 2612 wrote to memory of 3628 2612 explothe.exe schtasks.exe PID 2612 wrote to memory of 1276 2612 explothe.exe cmd.exe PID 2612 wrote to memory of 1276 2612 explothe.exe cmd.exe PID 2612 wrote to memory of 1276 2612 explothe.exe cmd.exe PID 384 wrote to memory of 1724 384 0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe w3065965.exe PID 384 wrote to memory of 1724 384 0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe w3065965.exe PID 384 wrote to memory of 1724 384 0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe w3065965.exe PID 840 wrote to memory of 3472 840 legota.exe schtasks.exe PID 840 wrote to memory of 3472 840 legota.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe"C:\Users\Admin\AppData\Local\Temp\0690efd356ed29c86279ff4a0f431bc973d07314cbf666a1804cfb1018221be9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2673335.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2673335.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2451699.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2451699.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5779253.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5779253.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2385855.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2385855.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8696735.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8696735.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4925822.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4508 -s 5408⤵
- Program crash
PID:1700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 1527⤵
- Program crash
PID:2840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9582120.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9582120.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1336
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 1566⤵
- Program crash
PID:4784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5340575.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5340575.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:3628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:1276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:4572
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4332
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2908
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3992
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3840
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u5768499.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u5768499.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1516
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:3588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4320
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4792
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4252
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:944
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w3065965.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w3065965.exe2⤵
- Executes dropped EXE
PID:1724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4516 -ip 45161⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4508 -ip 45081⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4976 -ip 49761⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4304
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3848
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4848
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4180
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5380e666168476a8907c3b9f5975a3573
SHA123416122bb95356b4c16e23c2ae231830661fcfc
SHA2565e50f6ba2aa86ce7cf40dfd071c46f971f962ebd2de277b73e1c748a206b0729
SHA512f00e4e7254101b19415b3f9e80f1a39250a4d87ed9b636403c78ec615a58c01a3a0590309c05d9f70e7730549d9edb6a7a29ea55817f49acfaad936b0d19d99b
-
Filesize
23KB
MD5380e666168476a8907c3b9f5975a3573
SHA123416122bb95356b4c16e23c2ae231830661fcfc
SHA2565e50f6ba2aa86ce7cf40dfd071c46f971f962ebd2de277b73e1c748a206b0729
SHA512f00e4e7254101b19415b3f9e80f1a39250a4d87ed9b636403c78ec615a58c01a3a0590309c05d9f70e7730549d9edb6a7a29ea55817f49acfaad936b0d19d99b
-
Filesize
893KB
MD56b5e45e36d7a23e1f6f88ea7abaeb74b
SHA17c07487968639236d186c5ab6b87a4425f609cd7
SHA256e5355f0283c3f78b0724a5cd0997ee9e18ca54942afada4e8a313656727ccec8
SHA512ee02ff4d5fabd19ec119353e2dee531ea14d981a728e9a064d472767cb416363a10b4cdf751628af09692c541110d9547a046d02e2966379788a6235f6d507b6
-
Filesize
893KB
MD56b5e45e36d7a23e1f6f88ea7abaeb74b
SHA17c07487968639236d186c5ab6b87a4425f609cd7
SHA256e5355f0283c3f78b0724a5cd0997ee9e18ca54942afada4e8a313656727ccec8
SHA512ee02ff4d5fabd19ec119353e2dee531ea14d981a728e9a064d472767cb416363a10b4cdf751628af09692c541110d9547a046d02e2966379788a6235f6d507b6
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
709KB
MD555ff2c875715c445c30733d7908202ee
SHA1916f04161821c22c845417e5b49de924e9aa0737
SHA256a86b0e334ce856e9df76a201f6181c4deff64d2eafd69ba1962bc6050b4b9ebc
SHA512b672d52ac718326bf130df6d26741c4b5a6154a15fffa089dd9ea6804515ac3613635fa10bcbb9dbe8e36b82b34183a4e0322e89a51edff26f05b4167c041eb8
-
Filesize
709KB
MD555ff2c875715c445c30733d7908202ee
SHA1916f04161821c22c845417e5b49de924e9aa0737
SHA256a86b0e334ce856e9df76a201f6181c4deff64d2eafd69ba1962bc6050b4b9ebc
SHA512b672d52ac718326bf130df6d26741c4b5a6154a15fffa089dd9ea6804515ac3613635fa10bcbb9dbe8e36b82b34183a4e0322e89a51edff26f05b4167c041eb8
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD5498f70984ebd7edc3c6471a4b8fde35f
SHA18c98593aa95b807bcaadcb19cd5242ef274d26f2
SHA2568919bfd15fa90e06a492b5964b36551bac794f676e46b9b1463db27cc43d9fa3
SHA512106e8f7f9dba7488855d88840c20a69ae602f4837b6b66176e6179ab143f39d71fa60f8c654a693aa195ef4d6b5836db0acc2160f520f45d4fd3e1fe5e7d00c7
-
Filesize
527KB
MD5498f70984ebd7edc3c6471a4b8fde35f
SHA18c98593aa95b807bcaadcb19cd5242ef274d26f2
SHA2568919bfd15fa90e06a492b5964b36551bac794f676e46b9b1463db27cc43d9fa3
SHA512106e8f7f9dba7488855d88840c20a69ae602f4837b6b66176e6179ab143f39d71fa60f8c654a693aa195ef4d6b5836db0acc2160f520f45d4fd3e1fe5e7d00c7
-
Filesize
310KB
MD535d93c4255b10f763fb5775dbc0704c8
SHA1010f8f1a7aff837386b341df17a12681f5808959
SHA256f30327b64ce6b643092e29ffc2d532dc27112e8058969fe3525b9a5733c9d7c3
SHA51255a2ac778cce5cb0fe0ca4b864c9f5b49f0bc7397a25228fbe30ebae7a72e95ee6158d21452203704e4b90fd47e5afe0c694f6a7113ae3526e831cde4c8e6e40
-
Filesize
310KB
MD535d93c4255b10f763fb5775dbc0704c8
SHA1010f8f1a7aff837386b341df17a12681f5808959
SHA256f30327b64ce6b643092e29ffc2d532dc27112e8058969fe3525b9a5733c9d7c3
SHA51255a2ac778cce5cb0fe0ca4b864c9f5b49f0bc7397a25228fbe30ebae7a72e95ee6158d21452203704e4b90fd47e5afe0c694f6a7113ae3526e831cde4c8e6e40
-
Filesize
296KB
MD5c208e414fd53d8ee7fca66008c5334b7
SHA1d364cb597e5f7b32df4af531075fe421c5c49b5b
SHA2566731e6088259d4025cd2a6fa7bc0ee472b6a35428f9caddc994fc27e569cd187
SHA512bfc9b8f79177715079ebbf7d974f0f1c2b4ced60303a2d623d7012a5ada01834b2ac87f55b17ea6a05fe16dfdf1c5f060ce63ff6d99feedf0fa670b6bb8107af
-
Filesize
296KB
MD5c208e414fd53d8ee7fca66008c5334b7
SHA1d364cb597e5f7b32df4af531075fe421c5c49b5b
SHA2566731e6088259d4025cd2a6fa7bc0ee472b6a35428f9caddc994fc27e569cd187
SHA512bfc9b8f79177715079ebbf7d974f0f1c2b4ced60303a2d623d7012a5ada01834b2ac87f55b17ea6a05fe16dfdf1c5f060ce63ff6d99feedf0fa670b6bb8107af
-
Filesize
11KB
MD58d065a934aa14e7a4c566aa07a9552f5
SHA1437e9f21c8c4494a592dc69156d6cfbc0ddac274
SHA256c6bd73b444713d5dad1a46526140c5043a7ec234336a9b34c67c38e84f5b8a8b
SHA5120454b9aee685bd730b7730fa151cf36434897779f3be758b45fbc772449cdac0bb882ac14a6dd57a2b09dc812023e80a5a7422c7ce346b0a468f9222f6c260e0
-
Filesize
11KB
MD58d065a934aa14e7a4c566aa07a9552f5
SHA1437e9f21c8c4494a592dc69156d6cfbc0ddac274
SHA256c6bd73b444713d5dad1a46526140c5043a7ec234336a9b34c67c38e84f5b8a8b
SHA5120454b9aee685bd730b7730fa151cf36434897779f3be758b45fbc772449cdac0bb882ac14a6dd57a2b09dc812023e80a5a7422c7ce346b0a468f9222f6c260e0
-
Filesize
276KB
MD5555a5900572bcc7f90ba500db7bd1820
SHA1c89897ce52b7c4b2cda8544f5c3680387e01faba
SHA2564cb940f2e77a195b74b29f40128ed22fe4c95c16390422bff367597066bab5cb
SHA512498cc65144efa2167245b529c40639f91fc63fa1bbaec628110efff776570f6d1c93012f0bcd1084e93f9a430ed608b31f81788c87e81f2bf6a162d04188ee8d
-
Filesize
276KB
MD5555a5900572bcc7f90ba500db7bd1820
SHA1c89897ce52b7c4b2cda8544f5c3680387e01faba
SHA2564cb940f2e77a195b74b29f40128ed22fe4c95c16390422bff367597066bab5cb
SHA512498cc65144efa2167245b529c40639f91fc63fa1bbaec628110efff776570f6d1c93012f0bcd1084e93f9a430ed608b31f81788c87e81f2bf6a162d04188ee8d
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0