Analysis
-
max time kernel
140s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 20:30
Static task
static1
Behavioral task
behavioral1
Sample
9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exe
Resource
win7-20230831-en
General
-
Target
9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exe
-
Size
994KB
-
MD5
119a485dfc1d68d6115a57ce496bacdc
-
SHA1
003a46d5dd31ceb102981e3db9065817b3720329
-
SHA256
9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef
-
SHA512
f4f47cd292f4440fc6407a3a35d00c5533353a31a3fe9edfedc26c07c62ced410bb0c4037e29df424a0a25b7b6e06c57ef75ae3cf30efd348bba136af8ba7638
-
SSDEEP
24576:eyzoe1z2De9r3FhZ9dObPbSx8T1ZPYNve94LClEIG:tzojDedVRQXSxyZYxY4L3I
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2848-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2848-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2848-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2848-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4293181.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4293181.exe healer behavioral2/memory/1588-35-0x0000000000E10000-0x0000000000E1A000-memory.dmp healer -
Processes:
q4293181.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q4293181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q4293181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q4293181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q4293181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q4293181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q4293181.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t8197520.exeexplothe.exeu8414823.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation t8197520.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation u8414823.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z2259105.exez1965502.exez6741345.exez2504765.exeq4293181.exer1639843.exes2033520.exet8197520.exeexplothe.exeu8414823.exelegota.exew7525347.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 3984 z2259105.exe 3400 z1965502.exe 3784 z6741345.exe 2448 z2504765.exe 1588 q4293181.exe 3120 r1639843.exe 3832 s2033520.exe 972 t8197520.exe 4580 explothe.exe 1284 u8414823.exe 4236 legota.exe 4352 w7525347.exe 448 explothe.exe 2316 legota.exe 648 explothe.exe 2104 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2544 rundll32.exe 2524 rundll32.exe -
Processes:
q4293181.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q4293181.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z2504765.exe9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exez2259105.exez1965502.exez6741345.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z2504765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2259105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1965502.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z6741345.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r1639843.exes2033520.exedescription pid process target process PID 3120 set thread context of 2848 3120 r1639843.exe AppLaunch.exe PID 3832 set thread context of 3668 3832 s2033520.exe AppLaunch.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2720 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1676 2848 WerFault.exe AppLaunch.exe 4956 3120 WerFault.exe r1639843.exe 4632 3832 WerFault.exe s2033520.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1152 schtasks.exe 1916 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q4293181.exepid process 1588 q4293181.exe 1588 q4293181.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q4293181.exedescription pid process Token: SeDebugPrivilege 1588 q4293181.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exez2259105.exez1965502.exez6741345.exez2504765.exer1639843.exes2033520.exet8197520.exeexplothe.exeu8414823.execmd.exedescription pid process target process PID 1044 wrote to memory of 3984 1044 9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exe z2259105.exe PID 1044 wrote to memory of 3984 1044 9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exe z2259105.exe PID 1044 wrote to memory of 3984 1044 9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exe z2259105.exe PID 3984 wrote to memory of 3400 3984 z2259105.exe z1965502.exe PID 3984 wrote to memory of 3400 3984 z2259105.exe z1965502.exe PID 3984 wrote to memory of 3400 3984 z2259105.exe z1965502.exe PID 3400 wrote to memory of 3784 3400 z1965502.exe z6741345.exe PID 3400 wrote to memory of 3784 3400 z1965502.exe z6741345.exe PID 3400 wrote to memory of 3784 3400 z1965502.exe z6741345.exe PID 3784 wrote to memory of 2448 3784 z6741345.exe z2504765.exe PID 3784 wrote to memory of 2448 3784 z6741345.exe z2504765.exe PID 3784 wrote to memory of 2448 3784 z6741345.exe z2504765.exe PID 2448 wrote to memory of 1588 2448 z2504765.exe q4293181.exe PID 2448 wrote to memory of 1588 2448 z2504765.exe q4293181.exe PID 2448 wrote to memory of 3120 2448 z2504765.exe r1639843.exe PID 2448 wrote to memory of 3120 2448 z2504765.exe r1639843.exe PID 2448 wrote to memory of 3120 2448 z2504765.exe r1639843.exe PID 3120 wrote to memory of 2848 3120 r1639843.exe AppLaunch.exe PID 3120 wrote to memory of 2848 3120 r1639843.exe AppLaunch.exe PID 3120 wrote to memory of 2848 3120 r1639843.exe AppLaunch.exe PID 3120 wrote to memory of 2848 3120 r1639843.exe AppLaunch.exe PID 3120 wrote to memory of 2848 3120 r1639843.exe AppLaunch.exe PID 3120 wrote to memory of 2848 3120 r1639843.exe AppLaunch.exe PID 3120 wrote to memory of 2848 3120 r1639843.exe AppLaunch.exe PID 3120 wrote to memory of 2848 3120 r1639843.exe AppLaunch.exe PID 3120 wrote to memory of 2848 3120 r1639843.exe AppLaunch.exe PID 3120 wrote to memory of 2848 3120 r1639843.exe AppLaunch.exe PID 3784 wrote to memory of 3832 3784 z6741345.exe s2033520.exe PID 3784 wrote to memory of 3832 3784 z6741345.exe s2033520.exe PID 3784 wrote to memory of 3832 3784 z6741345.exe s2033520.exe PID 3832 wrote to memory of 3668 3832 s2033520.exe AppLaunch.exe PID 3832 wrote to memory of 3668 3832 s2033520.exe AppLaunch.exe PID 3832 wrote to memory of 3668 3832 s2033520.exe AppLaunch.exe PID 3832 wrote to memory of 3668 3832 s2033520.exe AppLaunch.exe PID 3832 wrote to memory of 3668 3832 s2033520.exe AppLaunch.exe PID 3832 wrote to memory of 3668 3832 s2033520.exe AppLaunch.exe PID 3832 wrote to memory of 3668 3832 s2033520.exe AppLaunch.exe PID 3832 wrote to memory of 3668 3832 s2033520.exe AppLaunch.exe PID 3400 wrote to memory of 972 3400 z1965502.exe t8197520.exe PID 3400 wrote to memory of 972 3400 z1965502.exe t8197520.exe PID 3400 wrote to memory of 972 3400 z1965502.exe t8197520.exe PID 972 wrote to memory of 4580 972 t8197520.exe explothe.exe PID 972 wrote to memory of 4580 972 t8197520.exe explothe.exe PID 972 wrote to memory of 4580 972 t8197520.exe explothe.exe PID 3984 wrote to memory of 1284 3984 z2259105.exe u8414823.exe PID 3984 wrote to memory of 1284 3984 z2259105.exe u8414823.exe PID 3984 wrote to memory of 1284 3984 z2259105.exe u8414823.exe PID 4580 wrote to memory of 1152 4580 explothe.exe schtasks.exe PID 4580 wrote to memory of 1152 4580 explothe.exe schtasks.exe PID 4580 wrote to memory of 1152 4580 explothe.exe schtasks.exe PID 4580 wrote to memory of 4432 4580 explothe.exe cmd.exe PID 4580 wrote to memory of 4432 4580 explothe.exe cmd.exe PID 4580 wrote to memory of 4432 4580 explothe.exe cmd.exe PID 1284 wrote to memory of 4236 1284 u8414823.exe legota.exe PID 1284 wrote to memory of 4236 1284 u8414823.exe legota.exe PID 1284 wrote to memory of 4236 1284 u8414823.exe legota.exe PID 1044 wrote to memory of 4352 1044 9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exe w7525347.exe PID 1044 wrote to memory of 4352 1044 9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exe w7525347.exe PID 1044 wrote to memory of 4352 1044 9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exe w7525347.exe PID 4432 wrote to memory of 3460 4432 cmd.exe cmd.exe PID 4432 wrote to memory of 3460 4432 cmd.exe cmd.exe PID 4432 wrote to memory of 3460 4432 cmd.exe cmd.exe PID 4432 wrote to memory of 1332 4432 cmd.exe cacls.exe PID 4432 wrote to memory of 1332 4432 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exe"C:\Users\Admin\AppData\Local\Temp\9ff78ac20bae7384d58fb9f03c6bca8971d95f385c48306aacbc89cef8ff6cef.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2259105.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2259105.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1965502.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1965502.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6741345.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6741345.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2504765.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2504765.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4293181.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4293181.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1639843.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1639843.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 5408⤵
- Program crash
PID:1676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 1527⤵
- Program crash
PID:4956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2033520.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2033520.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 1606⤵
- Program crash
PID:4632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t8197520.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t8197520.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:1152
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3460
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:1332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4188
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4788
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2524
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8414823.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8414823.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4236 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:1916
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:2176
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:2536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1264
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:2044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:620
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:368
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:1160
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2544
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w7525347.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w7525347.exe2⤵
- Executes dropped EXE
PID:4352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3120 -ip 31201⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2848 -ip 28481⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3832 -ip 38321⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:448
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2316
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:648
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2104
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2720
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD53cc3f03d810bf47a90a7af6d6c83b710
SHA170b8b13d1efc738eff3c3aed82afb026475cd926
SHA256b11f3f11ef5c053b69e5a4453c4a568e8fc73a4c3fc9ada0273456c0e434e94d
SHA5128e9efd3a06740d8e6aaccf2a9c9e7ef31daa7989072b509d51e16e0e45b293656deaa6d8d2914feeeffaa102c94e5555dcdbfaa699693c6ed6672c74d2ecbe76
-
Filesize
23KB
MD53cc3f03d810bf47a90a7af6d6c83b710
SHA170b8b13d1efc738eff3c3aed82afb026475cd926
SHA256b11f3f11ef5c053b69e5a4453c4a568e8fc73a4c3fc9ada0273456c0e434e94d
SHA5128e9efd3a06740d8e6aaccf2a9c9e7ef31daa7989072b509d51e16e0e45b293656deaa6d8d2914feeeffaa102c94e5555dcdbfaa699693c6ed6672c74d2ecbe76
-
Filesize
892KB
MD5cf78bb859eb7402436773905e9c9ab64
SHA1ec0477f4bd6135d3adad579676d3da1352d08749
SHA256d65b24d3a7e8953676d95086b0c0fee8f14a9df5d59ad8c6753e8d37b69e27d7
SHA512713bc4f8b9102d6f07bcea537ce1c5f3b6e6c683972b024e537ac64533553b158b578b4179f6697ba2c8cde779e839761972a34f9c2957ec897607dd88dabaec
-
Filesize
892KB
MD5cf78bb859eb7402436773905e9c9ab64
SHA1ec0477f4bd6135d3adad579676d3da1352d08749
SHA256d65b24d3a7e8953676d95086b0c0fee8f14a9df5d59ad8c6753e8d37b69e27d7
SHA512713bc4f8b9102d6f07bcea537ce1c5f3b6e6c683972b024e537ac64533553b158b578b4179f6697ba2c8cde779e839761972a34f9c2957ec897607dd88dabaec
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
709KB
MD59c28d58e630fc7f0aeb0f86700f5b7a1
SHA1338d2e7fedc0fb5f00cda5cd21ed846c2a26ca32
SHA2568bff09352978ffa0641b51b68f0ffac686bf44de866a1fe418e161fce5481640
SHA5125053b850d654f3426e8a5e15c504e9cb8ad9391a3d0825bf58ff21c839cb0e0d66ef4b8c7fba29a4083963a2cfdcc5b558cdf2081f6de37aed5710f6fdda5fcb
-
Filesize
709KB
MD59c28d58e630fc7f0aeb0f86700f5b7a1
SHA1338d2e7fedc0fb5f00cda5cd21ed846c2a26ca32
SHA2568bff09352978ffa0641b51b68f0ffac686bf44de866a1fe418e161fce5481640
SHA5125053b850d654f3426e8a5e15c504e9cb8ad9391a3d0825bf58ff21c839cb0e0d66ef4b8c7fba29a4083963a2cfdcc5b558cdf2081f6de37aed5710f6fdda5fcb
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
526KB
MD51232e0a2893200a30d5a310ce5d6759b
SHA1843713a2c787072a2d151724f05fd41a9d96a682
SHA25672350dca79d591fe1b756f7b01b3064e3dc72075b5858a6e268b5c4ad6012a67
SHA512cb313653bda9e313c7fcc2a377e4321e2b4919bb2c2e366ad033a4d69a67ae2e0a810a5956a6d52d33579dcec8efb27f3610b2a9221e3a1174ff408519a35b67
-
Filesize
526KB
MD51232e0a2893200a30d5a310ce5d6759b
SHA1843713a2c787072a2d151724f05fd41a9d96a682
SHA25672350dca79d591fe1b756f7b01b3064e3dc72075b5858a6e268b5c4ad6012a67
SHA512cb313653bda9e313c7fcc2a377e4321e2b4919bb2c2e366ad033a4d69a67ae2e0a810a5956a6d52d33579dcec8efb27f3610b2a9221e3a1174ff408519a35b67
-
Filesize
310KB
MD5371eb0a52bcf34e7bbf4ad713b31676a
SHA19ca831670164246b04a7434d620d2c4f775a9679
SHA2562357554bdbde4112068149a0d467e58508e8896221add0bf4f4b720072afa8da
SHA5120f7dac7155ed8c06b5611a1b75df5926b54aee2a068ad37a2f529cbb4276cee2b88c2aa63c6f8cafba4a4c817fe0131eafdd9f1bc8a583368fad2e8678dcf899
-
Filesize
310KB
MD5371eb0a52bcf34e7bbf4ad713b31676a
SHA19ca831670164246b04a7434d620d2c4f775a9679
SHA2562357554bdbde4112068149a0d467e58508e8896221add0bf4f4b720072afa8da
SHA5120f7dac7155ed8c06b5611a1b75df5926b54aee2a068ad37a2f529cbb4276cee2b88c2aa63c6f8cafba4a4c817fe0131eafdd9f1bc8a583368fad2e8678dcf899
-
Filesize
296KB
MD5dbb19d6be338b03f010609faf9e6d951
SHA1eda9cf1504a028ba1bbd6b0460982c3d7489dc93
SHA256942d7e5ec8ea8c15050e32c36cf4f99f24ffaf951340185967f1ce9a62352c6c
SHA512205d486deaa24b7f7f4a93d7707c10259a3bc7eab99e4bb785a49d4f381673e9a5df3ec609685b373dcea44dca39549893941f8a8497c55ba2a9e173418f91a1
-
Filesize
296KB
MD5dbb19d6be338b03f010609faf9e6d951
SHA1eda9cf1504a028ba1bbd6b0460982c3d7489dc93
SHA256942d7e5ec8ea8c15050e32c36cf4f99f24ffaf951340185967f1ce9a62352c6c
SHA512205d486deaa24b7f7f4a93d7707c10259a3bc7eab99e4bb785a49d4f381673e9a5df3ec609685b373dcea44dca39549893941f8a8497c55ba2a9e173418f91a1
-
Filesize
11KB
MD502b15c1d5c917784ec62fc6425cadb21
SHA1c9030ad0a162972aeaa17ce1bcd8e6b072b8f9d6
SHA25615754831b61a26a12c804fb322bc80c8311502a50776d2b981da4ab3efb421cd
SHA5123af4881b2ed07f29a63a15fe9964d396c5b37424a93a0ee5b6e5a7673efe984f7b957dc6940958eae00f3e930fcfbe2c200be66d8e2f20574ecbc31b01b30e70
-
Filesize
11KB
MD502b15c1d5c917784ec62fc6425cadb21
SHA1c9030ad0a162972aeaa17ce1bcd8e6b072b8f9d6
SHA25615754831b61a26a12c804fb322bc80c8311502a50776d2b981da4ab3efb421cd
SHA5123af4881b2ed07f29a63a15fe9964d396c5b37424a93a0ee5b6e5a7673efe984f7b957dc6940958eae00f3e930fcfbe2c200be66d8e2f20574ecbc31b01b30e70
-
Filesize
276KB
MD541d4e7737cd2b21e5408f7a84ae105a0
SHA1a7f8142bf2572f427e7d8d4c092a90df5bc2202d
SHA256819e873408a4d2fb707152e25fdff515c6701062c990d9df25bd5f820ecb90d5
SHA512330c3a12b432dea9f891b698f7d465610b7e4e2b928ce3d79a89c446ce2588da9d5bfc84bf83b1c0f7bf213cbea63adc5f5e54cd51798271b4fb7dc75ffc3d6e
-
Filesize
276KB
MD541d4e7737cd2b21e5408f7a84ae105a0
SHA1a7f8142bf2572f427e7d8d4c092a90df5bc2202d
SHA256819e873408a4d2fb707152e25fdff515c6701062c990d9df25bd5f820ecb90d5
SHA512330c3a12b432dea9f891b698f7d465610b7e4e2b928ce3d79a89c446ce2588da9d5bfc84bf83b1c0f7bf213cbea63adc5f5e54cd51798271b4fb7dc75ffc3d6e
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0