Analysis
-
max time kernel
167s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 20:39
Static task
static1
Behavioral task
behavioral1
Sample
30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb.exe
Resource
win7-20230831-en
General
-
Target
30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb.exe
-
Size
993KB
-
MD5
eaec0960d6167aa46ac2f4de1cccf429
-
SHA1
dd881de0ca396fd6343050ac41aebbed08fe73d9
-
SHA256
30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb
-
SHA512
29a0fb1bc5ef8df51a7739e7a87eb3d7653f6954f36bebeac32e4d733f030958844cadeae85e78f2ae1f010b3a0c59e4792e8ca7670fa416495887fdca80e6b3
-
SSDEEP
24576:UytUVY+YDoSzuZCyksP8LwJrkVSAovyGXLSxDvK:jtUe+3SiZTJP8LOWS9m
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3060-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3060-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3060-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3060-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7787435.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7787435.exe healer behavioral2/memory/1176-35-0x0000000000CA0000-0x0000000000CAA000-memory.dmp healer -
Processes:
q7787435.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q7787435.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q7787435.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q7787435.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q7787435.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q7787435.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q7787435.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t9299257.exeexplothe.exeu0993207.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation t9299257.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation u0993207.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z9148291.exez4972885.exez4041887.exez9051686.exeq7787435.exer6917036.exes0081795.exet9299257.exeexplothe.exeu0993207.exelegota.exew8096006.exelegota.exeexplothe.exelegota.exeexplothe.exepid process 3016 z9148291.exe 2096 z4972885.exe 2484 z4041887.exe 1420 z9051686.exe 1176 q7787435.exe 4052 r6917036.exe 4060 s0081795.exe 2436 t9299257.exe 2964 explothe.exe 4056 u0993207.exe 4796 legota.exe 4940 w8096006.exe 4576 legota.exe 4100 explothe.exe 3388 legota.exe 3348 explothe.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4364 rundll32.exe 3148 rundll32.exe -
Processes:
q7787435.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q7787435.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z9148291.exez4972885.exez4041887.exez9051686.exe30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9148291.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4972885.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z4041887.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z9051686.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r6917036.exes0081795.exedescription pid process target process PID 4052 set thread context of 3060 4052 r6917036.exe AppLaunch.exe PID 4060 set thread context of 3248 4060 s0081795.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4652 3060 WerFault.exe AppLaunch.exe 4800 4052 WerFault.exe r6917036.exe 1688 4060 WerFault.exe s0081795.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 696 schtasks.exe 3424 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q7787435.exepid process 1176 q7787435.exe 1176 q7787435.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q7787435.exedescription pid process Token: SeDebugPrivilege 1176 q7787435.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb.exez9148291.exez4972885.exez4041887.exez9051686.exer6917036.exes0081795.exet9299257.exeexplothe.exeu0993207.execmd.exedescription pid process target process PID 3372 wrote to memory of 3016 3372 30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb.exe z9148291.exe PID 3372 wrote to memory of 3016 3372 30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb.exe z9148291.exe PID 3372 wrote to memory of 3016 3372 30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb.exe z9148291.exe PID 3016 wrote to memory of 2096 3016 z9148291.exe z4972885.exe PID 3016 wrote to memory of 2096 3016 z9148291.exe z4972885.exe PID 3016 wrote to memory of 2096 3016 z9148291.exe z4972885.exe PID 2096 wrote to memory of 2484 2096 z4972885.exe z4041887.exe PID 2096 wrote to memory of 2484 2096 z4972885.exe z4041887.exe PID 2096 wrote to memory of 2484 2096 z4972885.exe z4041887.exe PID 2484 wrote to memory of 1420 2484 z4041887.exe z9051686.exe PID 2484 wrote to memory of 1420 2484 z4041887.exe z9051686.exe PID 2484 wrote to memory of 1420 2484 z4041887.exe z9051686.exe PID 1420 wrote to memory of 1176 1420 z9051686.exe q7787435.exe PID 1420 wrote to memory of 1176 1420 z9051686.exe q7787435.exe PID 1420 wrote to memory of 4052 1420 z9051686.exe r6917036.exe PID 1420 wrote to memory of 4052 1420 z9051686.exe r6917036.exe PID 1420 wrote to memory of 4052 1420 z9051686.exe r6917036.exe PID 4052 wrote to memory of 3060 4052 r6917036.exe AppLaunch.exe PID 4052 wrote to memory of 3060 4052 r6917036.exe AppLaunch.exe PID 4052 wrote to memory of 3060 4052 r6917036.exe AppLaunch.exe PID 4052 wrote to memory of 3060 4052 r6917036.exe AppLaunch.exe PID 4052 wrote to memory of 3060 4052 r6917036.exe AppLaunch.exe PID 4052 wrote to memory of 3060 4052 r6917036.exe AppLaunch.exe PID 4052 wrote to memory of 3060 4052 r6917036.exe AppLaunch.exe PID 4052 wrote to memory of 3060 4052 r6917036.exe AppLaunch.exe PID 4052 wrote to memory of 3060 4052 r6917036.exe AppLaunch.exe PID 4052 wrote to memory of 3060 4052 r6917036.exe AppLaunch.exe PID 2484 wrote to memory of 4060 2484 z4041887.exe s0081795.exe PID 2484 wrote to memory of 4060 2484 z4041887.exe s0081795.exe PID 2484 wrote to memory of 4060 2484 z4041887.exe s0081795.exe PID 4060 wrote to memory of 3248 4060 s0081795.exe AppLaunch.exe PID 4060 wrote to memory of 3248 4060 s0081795.exe AppLaunch.exe PID 4060 wrote to memory of 3248 4060 s0081795.exe AppLaunch.exe PID 4060 wrote to memory of 3248 4060 s0081795.exe AppLaunch.exe PID 4060 wrote to memory of 3248 4060 s0081795.exe AppLaunch.exe PID 4060 wrote to memory of 3248 4060 s0081795.exe AppLaunch.exe PID 4060 wrote to memory of 3248 4060 s0081795.exe AppLaunch.exe PID 4060 wrote to memory of 3248 4060 s0081795.exe AppLaunch.exe PID 2096 wrote to memory of 2436 2096 z4972885.exe t9299257.exe PID 2096 wrote to memory of 2436 2096 z4972885.exe t9299257.exe PID 2096 wrote to memory of 2436 2096 z4972885.exe t9299257.exe PID 2436 wrote to memory of 2964 2436 t9299257.exe explothe.exe PID 2436 wrote to memory of 2964 2436 t9299257.exe explothe.exe PID 2436 wrote to memory of 2964 2436 t9299257.exe explothe.exe PID 3016 wrote to memory of 4056 3016 z9148291.exe u0993207.exe PID 3016 wrote to memory of 4056 3016 z9148291.exe u0993207.exe PID 3016 wrote to memory of 4056 3016 z9148291.exe u0993207.exe PID 2964 wrote to memory of 696 2964 explothe.exe schtasks.exe PID 2964 wrote to memory of 696 2964 explothe.exe schtasks.exe PID 2964 wrote to memory of 696 2964 explothe.exe schtasks.exe PID 2964 wrote to memory of 1984 2964 explothe.exe cmd.exe PID 2964 wrote to memory of 1984 2964 explothe.exe cmd.exe PID 2964 wrote to memory of 1984 2964 explothe.exe cmd.exe PID 4056 wrote to memory of 4796 4056 u0993207.exe legota.exe PID 4056 wrote to memory of 4796 4056 u0993207.exe legota.exe PID 4056 wrote to memory of 4796 4056 u0993207.exe legota.exe PID 1984 wrote to memory of 4700 1984 cmd.exe cmd.exe PID 1984 wrote to memory of 4700 1984 cmd.exe cmd.exe PID 1984 wrote to memory of 4700 1984 cmd.exe cmd.exe PID 1984 wrote to memory of 884 1984 cmd.exe cacls.exe PID 1984 wrote to memory of 884 1984 cmd.exe cacls.exe PID 1984 wrote to memory of 884 1984 cmd.exe cacls.exe PID 3372 wrote to memory of 4940 3372 30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb.exe w8096006.exe PID 3372 wrote to memory of 4940 3372 30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb.exe w8096006.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb.exe"C:\Users\Admin\AppData\Local\Temp\30e97175b73dfa9fc7f7bfc860ad611497f68282985eb156dc05abdbed29e5fb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9148291.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9148291.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4972885.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4972885.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4041887.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4041887.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9051686.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9051686.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7787435.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7787435.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6917036.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6917036.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 5488⤵
- Program crash
PID:4652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 1487⤵
- Program crash
PID:4800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0081795.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0081795.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 1566⤵
- Program crash
PID:1688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9299257.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9299257.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:696
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4700
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:884
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:1124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1928
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:2492
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4364
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0993207.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0993207.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4796 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3424
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:2168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4500
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:3136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4480
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4560
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3148
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8096006.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8096006.exe2⤵
- Executes dropped EXE
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4052 -ip 40521⤵PID:2104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3060 -ip 30601⤵PID:3108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4060 -ip 40601⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4576
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4100
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3388
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3348
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5b86d2d6c7c7a0c148881fe6a2a2d83e7
SHA1739ef02d7d6faf771a51c99ad3cd6b9270839a33
SHA2568719067d2c3ff5bed3f708c745ab4e97d15765c985720e5b02fec41950cd7d43
SHA512cf3668db2370dfee685709f65b0f832813c5054f1b914069c4cc1e8bb254715fba292860567d7f46814442ad317a9da5ae2497244edadbca93d7d3ebb1bf8e06
-
Filesize
23KB
MD5b86d2d6c7c7a0c148881fe6a2a2d83e7
SHA1739ef02d7d6faf771a51c99ad3cd6b9270839a33
SHA2568719067d2c3ff5bed3f708c745ab4e97d15765c985720e5b02fec41950cd7d43
SHA512cf3668db2370dfee685709f65b0f832813c5054f1b914069c4cc1e8bb254715fba292860567d7f46814442ad317a9da5ae2497244edadbca93d7d3ebb1bf8e06
-
Filesize
892KB
MD582b4fe1f088b6e6cdd8b49d401b48fb8
SHA1d05c98139e0f05e3c7427161371db99fa327da38
SHA256a2b621b07d5760b49ab0de190deb3941c0b27ab9cb5467c378c3c2417559e0a3
SHA5124dcd75035255bd32b67a6259ab1204876fed482fb9cb91ff2a88536cc829867903898498d44acaa5a2800902cc1348d1c237e7027323045cdb4ccc37afaea786
-
Filesize
892KB
MD582b4fe1f088b6e6cdd8b49d401b48fb8
SHA1d05c98139e0f05e3c7427161371db99fa327da38
SHA256a2b621b07d5760b49ab0de190deb3941c0b27ab9cb5467c378c3c2417559e0a3
SHA5124dcd75035255bd32b67a6259ab1204876fed482fb9cb91ff2a88536cc829867903898498d44acaa5a2800902cc1348d1c237e7027323045cdb4ccc37afaea786
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
709KB
MD53dcf1e14d835ba935f3631c6df3f9db5
SHA11fd3050fb9aee9442751270e21300c29ede5491e
SHA256801ae89e10f3f68c1e75b25f17f55fc09c12149bd4b86da87b069c8a8e87e45c
SHA51250cd6bf00c04fc7bed7fee6e78294860ec46ca80ae33de167b4c19278c12ad312a0b4e863b3abaf0c0a7a63d231d1ab366ea6ea0bc8a797b028f5a80333f40ba
-
Filesize
709KB
MD53dcf1e14d835ba935f3631c6df3f9db5
SHA11fd3050fb9aee9442751270e21300c29ede5491e
SHA256801ae89e10f3f68c1e75b25f17f55fc09c12149bd4b86da87b069c8a8e87e45c
SHA51250cd6bf00c04fc7bed7fee6e78294860ec46ca80ae33de167b4c19278c12ad312a0b4e863b3abaf0c0a7a63d231d1ab366ea6ea0bc8a797b028f5a80333f40ba
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD5792555cf29e18157fd562a662d628058
SHA1d692d89cda193935d24725849ae10e1c63c6fa7e
SHA25628143958eb06b508c13a3bab913ba6aa2e4e5b88a4117439e106c344a3b6600f
SHA5122def2b3bbd3454a0ea51b84b7d724346043cc0701c84ba5a2969614ec6e75bc67c837886753c5147b1979d7c689dc7186b9d3d1d1b17814546e5ebfdfe2b52bc
-
Filesize
527KB
MD5792555cf29e18157fd562a662d628058
SHA1d692d89cda193935d24725849ae10e1c63c6fa7e
SHA25628143958eb06b508c13a3bab913ba6aa2e4e5b88a4117439e106c344a3b6600f
SHA5122def2b3bbd3454a0ea51b84b7d724346043cc0701c84ba5a2969614ec6e75bc67c837886753c5147b1979d7c689dc7186b9d3d1d1b17814546e5ebfdfe2b52bc
-
Filesize
310KB
MD5c3fa36db4880f3b70129aa6b813434ba
SHA1cf214706891f49e868834e16fdb9fb2cf4e3513e
SHA2563d38aa2051db11d5d2305f90695c87fdd5d7cdb73a8beb776cf4941040315789
SHA512aa8a27092f079c5f9970da195c1985f40cbfa71522d55fddd8949933d129a6454b5fdc3d81612a599d2f831f6256d61e38834df57c0066c2ab6d903f37d2c982
-
Filesize
310KB
MD5c3fa36db4880f3b70129aa6b813434ba
SHA1cf214706891f49e868834e16fdb9fb2cf4e3513e
SHA2563d38aa2051db11d5d2305f90695c87fdd5d7cdb73a8beb776cf4941040315789
SHA512aa8a27092f079c5f9970da195c1985f40cbfa71522d55fddd8949933d129a6454b5fdc3d81612a599d2f831f6256d61e38834df57c0066c2ab6d903f37d2c982
-
Filesize
296KB
MD50f45221e9f6d0f88070171f5c2bbac23
SHA1b41683564c45eb468151930b48b9c4cbacc54102
SHA2565dc1e01dd63185d7211f74c08873bf19a148d65b9643b71818ffbabfb7d26679
SHA51211df3ee8a3e19d7b206aeb3126cbddc2dbc5638999442ffbbcdd916303201298236365769a98ad4966c0e22d5f591e69f9c014f1e757269a94e5edac9422b6aa
-
Filesize
296KB
MD50f45221e9f6d0f88070171f5c2bbac23
SHA1b41683564c45eb468151930b48b9c4cbacc54102
SHA2565dc1e01dd63185d7211f74c08873bf19a148d65b9643b71818ffbabfb7d26679
SHA51211df3ee8a3e19d7b206aeb3126cbddc2dbc5638999442ffbbcdd916303201298236365769a98ad4966c0e22d5f591e69f9c014f1e757269a94e5edac9422b6aa
-
Filesize
11KB
MD54a52f5ac63c258eb43a31d19c1ef0f10
SHA1e234ac66b801fe1be51c144206a811809b2b53ef
SHA25645c201511196955b077ff6d298ab9d6f10cc394dfa6f91a746d10246db41ab00
SHA51215c2c18b9b19fdbd6744b81687f92263114a363b1cc32af2483676ab465c4a9f4eac35553212f331808744c7abb159b25b521556ec5a5b766b468f93d6fbcbc7
-
Filesize
11KB
MD54a52f5ac63c258eb43a31d19c1ef0f10
SHA1e234ac66b801fe1be51c144206a811809b2b53ef
SHA25645c201511196955b077ff6d298ab9d6f10cc394dfa6f91a746d10246db41ab00
SHA51215c2c18b9b19fdbd6744b81687f92263114a363b1cc32af2483676ab465c4a9f4eac35553212f331808744c7abb159b25b521556ec5a5b766b468f93d6fbcbc7
-
Filesize
276KB
MD508b24c76f4fe37ced6a6fce2447588a2
SHA1d7488908c169e4c39c09287a26331ba1dc0e6c94
SHA25633792e48ccc2e8ed71f0439029b7cd2b9b91899badb0953ef66f0b16d63b185f
SHA5124e38a08185bc6b72eca1a0b151e3cc6bb4f1b6fa6ef1f4e0754934ca382e2de9784fea7524a3578356f02fd67fffdba96005415e0954d4eecfce9045e667576a
-
Filesize
276KB
MD508b24c76f4fe37ced6a6fce2447588a2
SHA1d7488908c169e4c39c09287a26331ba1dc0e6c94
SHA25633792e48ccc2e8ed71f0439029b7cd2b9b91899badb0953ef66f0b16d63b185f
SHA5124e38a08185bc6b72eca1a0b151e3cc6bb4f1b6fa6ef1f4e0754934ca382e2de9784fea7524a3578356f02fd67fffdba96005415e0954d4eecfce9045e667576a
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0