Analysis
-
max time kernel
163s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 20:40
Static task
static1
Behavioral task
behavioral1
Sample
13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe
Resource
win7-20230831-en
General
-
Target
13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe
-
Size
994KB
-
MD5
34ef23c18f8dad13ed7cfd023f5f29d4
-
SHA1
be19fd0f3452cec270a74be2bb7d7f4632d9ac5c
-
SHA256
13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484
-
SHA512
b1916c400525a82bbcd2cb01e36be9ad3fc391bf19ab954b7ae7d68ff32e6850aa76493d314086647a0faad0baaaa3607e94bab98b0f473e14f050922e93f3b9
-
SSDEEP
12288:3Mrgy90XfNF4s3hbXW0FclsuQbPDENDRJZaiiznv9heykaPsYFUbLR+bEc2N:7yQfNaMDFEsugPDeRJZa9lPsYgMq
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2204-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2204-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2204-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2204-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5569338.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5569338.exe healer behavioral2/memory/428-35-0x0000000000310000-0x000000000031A000-memory.dmp healer -
Processes:
q5569338.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q5569338.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q5569338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q5569338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q5569338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q5569338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q5569338.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t9277018.exeu1795224.exeexplothe.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation t9277018.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation u1795224.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z7485974.exez3813204.exez4696145.exez4585205.exeq5569338.exer5444812.exes3420873.exet9277018.exeexplothe.exeu1795224.exelegota.exew8742120.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4412 z7485974.exe 2552 z3813204.exe 460 z4696145.exe 404 z4585205.exe 428 q5569338.exe 1612 r5444812.exe 3032 s3420873.exe 4640 t9277018.exe 4556 explothe.exe 1388 u1795224.exe 1428 legota.exe 4204 w8742120.exe 3324 explothe.exe 3040 legota.exe 2916 explothe.exe 4548 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2952 rundll32.exe 1536 rundll32.exe -
Processes:
q5569338.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q5569338.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exez7485974.exez3813204.exez4696145.exez4585205.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7485974.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3813204.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z4696145.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4585205.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r5444812.exes3420873.exedescription pid process target process PID 1612 set thread context of 2204 1612 r5444812.exe AppLaunch.exe PID 3032 set thread context of 2176 3032 s3420873.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4028 1612 WerFault.exe r5444812.exe 1564 2204 WerFault.exe AppLaunch.exe 1032 3032 WerFault.exe s3420873.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 32 schtasks.exe 1064 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q5569338.exepid process 428 q5569338.exe 428 q5569338.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q5569338.exedescription pid process Token: SeDebugPrivilege 428 q5569338.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exez7485974.exez3813204.exez4696145.exez4585205.exer5444812.exes3420873.exet9277018.exeu1795224.exeexplothe.exelegota.exedescription pid process target process PID 4492 wrote to memory of 4412 4492 13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe z7485974.exe PID 4492 wrote to memory of 4412 4492 13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe z7485974.exe PID 4492 wrote to memory of 4412 4492 13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe z7485974.exe PID 4412 wrote to memory of 2552 4412 z7485974.exe z3813204.exe PID 4412 wrote to memory of 2552 4412 z7485974.exe z3813204.exe PID 4412 wrote to memory of 2552 4412 z7485974.exe z3813204.exe PID 2552 wrote to memory of 460 2552 z3813204.exe z4696145.exe PID 2552 wrote to memory of 460 2552 z3813204.exe z4696145.exe PID 2552 wrote to memory of 460 2552 z3813204.exe z4696145.exe PID 460 wrote to memory of 404 460 z4696145.exe z4585205.exe PID 460 wrote to memory of 404 460 z4696145.exe z4585205.exe PID 460 wrote to memory of 404 460 z4696145.exe z4585205.exe PID 404 wrote to memory of 428 404 z4585205.exe q5569338.exe PID 404 wrote to memory of 428 404 z4585205.exe q5569338.exe PID 404 wrote to memory of 1612 404 z4585205.exe r5444812.exe PID 404 wrote to memory of 1612 404 z4585205.exe r5444812.exe PID 404 wrote to memory of 1612 404 z4585205.exe r5444812.exe PID 1612 wrote to memory of 2204 1612 r5444812.exe AppLaunch.exe PID 1612 wrote to memory of 2204 1612 r5444812.exe AppLaunch.exe PID 1612 wrote to memory of 2204 1612 r5444812.exe AppLaunch.exe PID 1612 wrote to memory of 2204 1612 r5444812.exe AppLaunch.exe PID 1612 wrote to memory of 2204 1612 r5444812.exe AppLaunch.exe PID 1612 wrote to memory of 2204 1612 r5444812.exe AppLaunch.exe PID 1612 wrote to memory of 2204 1612 r5444812.exe AppLaunch.exe PID 1612 wrote to memory of 2204 1612 r5444812.exe AppLaunch.exe PID 1612 wrote to memory of 2204 1612 r5444812.exe AppLaunch.exe PID 1612 wrote to memory of 2204 1612 r5444812.exe AppLaunch.exe PID 460 wrote to memory of 3032 460 z4696145.exe s3420873.exe PID 460 wrote to memory of 3032 460 z4696145.exe s3420873.exe PID 460 wrote to memory of 3032 460 z4696145.exe s3420873.exe PID 3032 wrote to memory of 2176 3032 s3420873.exe AppLaunch.exe PID 3032 wrote to memory of 2176 3032 s3420873.exe AppLaunch.exe PID 3032 wrote to memory of 2176 3032 s3420873.exe AppLaunch.exe PID 3032 wrote to memory of 2176 3032 s3420873.exe AppLaunch.exe PID 3032 wrote to memory of 2176 3032 s3420873.exe AppLaunch.exe PID 3032 wrote to memory of 2176 3032 s3420873.exe AppLaunch.exe PID 3032 wrote to memory of 2176 3032 s3420873.exe AppLaunch.exe PID 3032 wrote to memory of 2176 3032 s3420873.exe AppLaunch.exe PID 2552 wrote to memory of 4640 2552 z3813204.exe t9277018.exe PID 2552 wrote to memory of 4640 2552 z3813204.exe t9277018.exe PID 2552 wrote to memory of 4640 2552 z3813204.exe t9277018.exe PID 4640 wrote to memory of 4556 4640 t9277018.exe explothe.exe PID 4640 wrote to memory of 4556 4640 t9277018.exe explothe.exe PID 4640 wrote to memory of 4556 4640 t9277018.exe explothe.exe PID 4412 wrote to memory of 1388 4412 z7485974.exe u1795224.exe PID 4412 wrote to memory of 1388 4412 z7485974.exe u1795224.exe PID 4412 wrote to memory of 1388 4412 z7485974.exe u1795224.exe PID 1388 wrote to memory of 1428 1388 u1795224.exe legota.exe PID 1388 wrote to memory of 1428 1388 u1795224.exe legota.exe PID 1388 wrote to memory of 1428 1388 u1795224.exe legota.exe PID 4492 wrote to memory of 4204 4492 13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe w8742120.exe PID 4492 wrote to memory of 4204 4492 13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe w8742120.exe PID 4492 wrote to memory of 4204 4492 13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe w8742120.exe PID 4556 wrote to memory of 1064 4556 explothe.exe schtasks.exe PID 4556 wrote to memory of 1064 4556 explothe.exe schtasks.exe PID 1428 wrote to memory of 32 1428 legota.exe schtasks.exe PID 4556 wrote to memory of 1064 4556 explothe.exe schtasks.exe PID 1428 wrote to memory of 32 1428 legota.exe schtasks.exe PID 1428 wrote to memory of 32 1428 legota.exe schtasks.exe PID 1428 wrote to memory of 1236 1428 legota.exe cmd.exe PID 1428 wrote to memory of 1236 1428 legota.exe cmd.exe PID 1428 wrote to memory of 1236 1428 legota.exe cmd.exe PID 4556 wrote to memory of 400 4556 explothe.exe cmd.exe PID 4556 wrote to memory of 400 4556 explothe.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe"C:\Users\Admin\AppData\Local\Temp\13469795222a9d5a4f2d4b7a60bd60ccfec9c969c5567365c25533b82be64484.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7485974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7485974.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3813204.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3813204.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4696145.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4696145.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4585205.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4585205.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5569338.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5569338.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5444812.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5444812.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 1928⤵
- Program crash
PID:1564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 1407⤵
- Program crash
PID:4028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3420873.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3420873.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 1566⤵
- Program crash
PID:1032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9277018.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9277018.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:1064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3184
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:3292
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:3952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:408
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4484
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1536
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1795224.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1795224.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:32
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:1840
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:848
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:944
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8742120.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8742120.exe2⤵
- Executes dropped EXE
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1612 -ip 16121⤵PID:1808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2204 -ip 22041⤵PID:1436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3032 -ip 30321⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3324
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3040
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2916
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD540b36eb95908c251033e2cd9b4166152
SHA1be3615273faa802946753f429910a9053cfaf559
SHA256798f629ccd0472f70c7e92dcfed3587c08b21435ae4dfacdbd8b46751a4d2cdf
SHA512fb831cf501e82e7db3744b9cea8218374665625e2c38194285f10c2c49cb5dc3737733e3fdcec3579f6cdd9877a4e09d45b039a36ae7501e931719381453e887
-
Filesize
23KB
MD540b36eb95908c251033e2cd9b4166152
SHA1be3615273faa802946753f429910a9053cfaf559
SHA256798f629ccd0472f70c7e92dcfed3587c08b21435ae4dfacdbd8b46751a4d2cdf
SHA512fb831cf501e82e7db3744b9cea8218374665625e2c38194285f10c2c49cb5dc3737733e3fdcec3579f6cdd9877a4e09d45b039a36ae7501e931719381453e887
-
Filesize
892KB
MD5a984915e88bde85e9dbc9fbca4fd6a19
SHA181a6cbddbdb662071c1d419b9a93d13e49e1a9b1
SHA2562d74a8c8a87f12566e36ad65a899f98673b763e6f6bd305f0bec2fd70f69f5ba
SHA5124c839743dde5c07fe00231fac432396c173656f46ea4d9022740cdd79e1077f53c49e4360a5ba322e1262c32e4f524a3751187bc149e9c34c1ddcdcf91815ee3
-
Filesize
892KB
MD5a984915e88bde85e9dbc9fbca4fd6a19
SHA181a6cbddbdb662071c1d419b9a93d13e49e1a9b1
SHA2562d74a8c8a87f12566e36ad65a899f98673b763e6f6bd305f0bec2fd70f69f5ba
SHA5124c839743dde5c07fe00231fac432396c173656f46ea4d9022740cdd79e1077f53c49e4360a5ba322e1262c32e4f524a3751187bc149e9c34c1ddcdcf91815ee3
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
709KB
MD53a310e1b67a1bca891462bcf9902d2be
SHA13b2ebcc85d458fad57ea8d44c2ec857fcebe3c3d
SHA25637928abb0aa708362f1e304dd9db4ed8a2776653af701fb535d64fc126640522
SHA512ba1d313c601f553c9281852260610ddac18e3d7be92f48efc99655e5255567ed4353d0a0816bbb944472e5c575ecf586ed1bd2319b1dd1662e82aa6b40a168ba
-
Filesize
709KB
MD53a310e1b67a1bca891462bcf9902d2be
SHA13b2ebcc85d458fad57ea8d44c2ec857fcebe3c3d
SHA25637928abb0aa708362f1e304dd9db4ed8a2776653af701fb535d64fc126640522
SHA512ba1d313c601f553c9281852260610ddac18e3d7be92f48efc99655e5255567ed4353d0a0816bbb944472e5c575ecf586ed1bd2319b1dd1662e82aa6b40a168ba
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD52d92010b8fda72ec3fa8c6959d08cf42
SHA1e40e19d084348cb2fa0cd4a6986ac16823167190
SHA25697ae64c4d24454f100c7664a89454adecec50f83eadbce6c991d9efb89b00844
SHA5126f7e90ceb872fc3ff48c21588d9ab0f298884e08047aba3621e16b97889bfbe706e694def77580f5393c57ccb63c98b791365e706f753bbe669f2caad28e79ee
-
Filesize
527KB
MD52d92010b8fda72ec3fa8c6959d08cf42
SHA1e40e19d084348cb2fa0cd4a6986ac16823167190
SHA25697ae64c4d24454f100c7664a89454adecec50f83eadbce6c991d9efb89b00844
SHA5126f7e90ceb872fc3ff48c21588d9ab0f298884e08047aba3621e16b97889bfbe706e694def77580f5393c57ccb63c98b791365e706f753bbe669f2caad28e79ee
-
Filesize
310KB
MD5c1aeccf479607a94e83f40f8daf272c8
SHA1e25e52a53e397c6b1649bb9b28c2b2165ab8d109
SHA2560822451affe5fb1aa41fd323128158dbe9190f7059541963925a4184b3e56e3b
SHA512766a70da6fbb9b0223619e2369137241d41f8bc704ceaca9736a58df18fec3d84a3c67643975dae605c97090d5b66b65f915cb6e43e34b48338b542051ab7757
-
Filesize
310KB
MD5c1aeccf479607a94e83f40f8daf272c8
SHA1e25e52a53e397c6b1649bb9b28c2b2165ab8d109
SHA2560822451affe5fb1aa41fd323128158dbe9190f7059541963925a4184b3e56e3b
SHA512766a70da6fbb9b0223619e2369137241d41f8bc704ceaca9736a58df18fec3d84a3c67643975dae605c97090d5b66b65f915cb6e43e34b48338b542051ab7757
-
Filesize
296KB
MD52e5cdedd303f1e7e3fa07c916771154f
SHA1891b2102c6f572636a4768d77f08cd3bc8cad23f
SHA2564f768f8e34322cd9dcf6b5ab0ab55b8b437fa53e4321b3b528c2d55af602d9fa
SHA512b74c6937f0082322acc29bfc883322ccc601734f502aa0117ec8f5467618dda34f6e8dde64b42359a7a7b9dad8e5840f6947e11372f832d19d851d39e10fc41a
-
Filesize
296KB
MD52e5cdedd303f1e7e3fa07c916771154f
SHA1891b2102c6f572636a4768d77f08cd3bc8cad23f
SHA2564f768f8e34322cd9dcf6b5ab0ab55b8b437fa53e4321b3b528c2d55af602d9fa
SHA512b74c6937f0082322acc29bfc883322ccc601734f502aa0117ec8f5467618dda34f6e8dde64b42359a7a7b9dad8e5840f6947e11372f832d19d851d39e10fc41a
-
Filesize
11KB
MD53f801188b87b3efd69c51f1c93f62561
SHA194364c72a405693364c2ee1af3ab50a0ad735886
SHA256343fd64400facd46b29f171733ea51d2353aa998de205735d098ffca3d141b9a
SHA5127dad5bb07fc165910c8c43705c8f6cebe82ebece16d25913409c254ba43bbdff4892627534591088cc98d8ec1094d78d9dd3cd48598844fa277d5cf72db8778c
-
Filesize
11KB
MD53f801188b87b3efd69c51f1c93f62561
SHA194364c72a405693364c2ee1af3ab50a0ad735886
SHA256343fd64400facd46b29f171733ea51d2353aa998de205735d098ffca3d141b9a
SHA5127dad5bb07fc165910c8c43705c8f6cebe82ebece16d25913409c254ba43bbdff4892627534591088cc98d8ec1094d78d9dd3cd48598844fa277d5cf72db8778c
-
Filesize
276KB
MD556521a0f333ba20257a34abe918bc1de
SHA1759a684b0c08487504d2fb56dba71be75532194a
SHA256a38410123170c8c50284782861bf188b832b1468f1c068c61e90f241a17b565a
SHA51233d83f2ca92abf5f283647e5424dc31b7c54a5fd65f4d8109b6f707ede8e7e95266d32719411203054938d44b8c26ac4740c9ecff4f71f2e9729c0b0d65817a3
-
Filesize
276KB
MD556521a0f333ba20257a34abe918bc1de
SHA1759a684b0c08487504d2fb56dba71be75532194a
SHA256a38410123170c8c50284782861bf188b832b1468f1c068c61e90f241a17b565a
SHA51233d83f2ca92abf5f283647e5424dc31b7c54a5fd65f4d8109b6f707ede8e7e95266d32719411203054938d44b8c26ac4740c9ecff4f71f2e9729c0b0d65817a3
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0