Analysis
-
max time kernel
153s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 20:47
Static task
static1
Behavioral task
behavioral1
Sample
3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exe
Resource
win7-20230831-en
General
-
Target
3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exe
-
Size
995KB
-
MD5
beb2fc2be7203f976a3cd9e910f7a629
-
SHA1
496dabd26e063267fb717b3a014ce86c3f487587
-
SHA256
3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18
-
SHA512
56be7a67e0dcc42469b80aa5d1e2ed382106eb17aacc3ff4d0abd48c45caf636d1a4a56940ddf61908083a1d793e5a3214fb897a6e436fc11d94aa4ed84383bf
-
SSDEEP
24576:LyViCGa4r3FNkC98JzyW2MNk38u3SOWF:+Vi5a4BnYNksj
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4172-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4172-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4172-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4172-46-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6063355.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6063355.exe healer behavioral2/memory/5012-35-0x0000000000890000-0x000000000089A000-memory.dmp healer -
Processes:
q6063355.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q6063355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q6063355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q6063355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q6063355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q6063355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q6063355.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t8398556.exeexplothe.exeu2502058.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation t8398556.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation u2502058.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z1917119.exez6648982.exez3328388.exez7789797.exeq6063355.exer5603770.exes7988811.exet8398556.exeexplothe.exeu2502058.exelegota.exew7345297.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4844 z1917119.exe 3860 z6648982.exe 4652 z3328388.exe 1644 z7789797.exe 5012 q6063355.exe 3688 r5603770.exe 3584 s7988811.exe 4440 t8398556.exe 4748 explothe.exe 3312 u2502058.exe 4288 legota.exe 3664 w7345297.exe 5100 explothe.exe 4132 legota.exe 2920 explothe.exe 3000 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3080 rundll32.exe 1220 rundll32.exe -
Processes:
q6063355.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q6063355.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z3328388.exez7789797.exe3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exez1917119.exez6648982.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z3328388.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z7789797.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1917119.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6648982.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r5603770.exes7988811.exedescription pid process target process PID 3688 set thread context of 4172 3688 r5603770.exe AppLaunch.exe PID 3584 set thread context of 2108 3584 s7988811.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3044 3688 WerFault.exe r5603770.exe 3212 4172 WerFault.exe AppLaunch.exe 4272 3584 WerFault.exe s7988811.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2888 schtasks.exe 3632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q6063355.exepid process 5012 q6063355.exe 5012 q6063355.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q6063355.exedescription pid process Token: SeDebugPrivilege 5012 q6063355.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exez1917119.exez6648982.exez3328388.exez7789797.exer5603770.exes7988811.exet8398556.exeexplothe.exeu2502058.execmd.exelegota.exedescription pid process target process PID 3260 wrote to memory of 4844 3260 3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exe z1917119.exe PID 3260 wrote to memory of 4844 3260 3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exe z1917119.exe PID 3260 wrote to memory of 4844 3260 3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exe z1917119.exe PID 4844 wrote to memory of 3860 4844 z1917119.exe z6648982.exe PID 4844 wrote to memory of 3860 4844 z1917119.exe z6648982.exe PID 4844 wrote to memory of 3860 4844 z1917119.exe z6648982.exe PID 3860 wrote to memory of 4652 3860 z6648982.exe z3328388.exe PID 3860 wrote to memory of 4652 3860 z6648982.exe z3328388.exe PID 3860 wrote to memory of 4652 3860 z6648982.exe z3328388.exe PID 4652 wrote to memory of 1644 4652 z3328388.exe z7789797.exe PID 4652 wrote to memory of 1644 4652 z3328388.exe z7789797.exe PID 4652 wrote to memory of 1644 4652 z3328388.exe z7789797.exe PID 1644 wrote to memory of 5012 1644 z7789797.exe q6063355.exe PID 1644 wrote to memory of 5012 1644 z7789797.exe q6063355.exe PID 1644 wrote to memory of 3688 1644 z7789797.exe r5603770.exe PID 1644 wrote to memory of 3688 1644 z7789797.exe r5603770.exe PID 1644 wrote to memory of 3688 1644 z7789797.exe r5603770.exe PID 3688 wrote to memory of 4172 3688 r5603770.exe AppLaunch.exe PID 3688 wrote to memory of 4172 3688 r5603770.exe AppLaunch.exe PID 3688 wrote to memory of 4172 3688 r5603770.exe AppLaunch.exe PID 3688 wrote to memory of 4172 3688 r5603770.exe AppLaunch.exe PID 3688 wrote to memory of 4172 3688 r5603770.exe AppLaunch.exe PID 3688 wrote to memory of 4172 3688 r5603770.exe AppLaunch.exe PID 3688 wrote to memory of 4172 3688 r5603770.exe AppLaunch.exe PID 3688 wrote to memory of 4172 3688 r5603770.exe AppLaunch.exe PID 3688 wrote to memory of 4172 3688 r5603770.exe AppLaunch.exe PID 3688 wrote to memory of 4172 3688 r5603770.exe AppLaunch.exe PID 4652 wrote to memory of 3584 4652 z3328388.exe s7988811.exe PID 4652 wrote to memory of 3584 4652 z3328388.exe s7988811.exe PID 4652 wrote to memory of 3584 4652 z3328388.exe s7988811.exe PID 3584 wrote to memory of 2108 3584 s7988811.exe AppLaunch.exe PID 3584 wrote to memory of 2108 3584 s7988811.exe AppLaunch.exe PID 3584 wrote to memory of 2108 3584 s7988811.exe AppLaunch.exe PID 3584 wrote to memory of 2108 3584 s7988811.exe AppLaunch.exe PID 3584 wrote to memory of 2108 3584 s7988811.exe AppLaunch.exe PID 3584 wrote to memory of 2108 3584 s7988811.exe AppLaunch.exe PID 3584 wrote to memory of 2108 3584 s7988811.exe AppLaunch.exe PID 3584 wrote to memory of 2108 3584 s7988811.exe AppLaunch.exe PID 3860 wrote to memory of 4440 3860 z6648982.exe t8398556.exe PID 3860 wrote to memory of 4440 3860 z6648982.exe t8398556.exe PID 3860 wrote to memory of 4440 3860 z6648982.exe t8398556.exe PID 4440 wrote to memory of 4748 4440 t8398556.exe explothe.exe PID 4440 wrote to memory of 4748 4440 t8398556.exe explothe.exe PID 4440 wrote to memory of 4748 4440 t8398556.exe explothe.exe PID 4844 wrote to memory of 3312 4844 z1917119.exe u2502058.exe PID 4844 wrote to memory of 3312 4844 z1917119.exe u2502058.exe PID 4844 wrote to memory of 3312 4844 z1917119.exe u2502058.exe PID 4748 wrote to memory of 2888 4748 explothe.exe schtasks.exe PID 4748 wrote to memory of 2888 4748 explothe.exe schtasks.exe PID 4748 wrote to memory of 2888 4748 explothe.exe schtasks.exe PID 4748 wrote to memory of 4144 4748 explothe.exe cmd.exe PID 4748 wrote to memory of 4144 4748 explothe.exe cmd.exe PID 4748 wrote to memory of 4144 4748 explothe.exe cmd.exe PID 3312 wrote to memory of 4288 3312 u2502058.exe legota.exe PID 3312 wrote to memory of 4288 3312 u2502058.exe legota.exe PID 3312 wrote to memory of 4288 3312 u2502058.exe legota.exe PID 3260 wrote to memory of 3664 3260 3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exe w7345297.exe PID 3260 wrote to memory of 3664 3260 3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exe w7345297.exe PID 3260 wrote to memory of 3664 3260 3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exe w7345297.exe PID 4144 wrote to memory of 3840 4144 cmd.exe cmd.exe PID 4144 wrote to memory of 3840 4144 cmd.exe cmd.exe PID 4144 wrote to memory of 3840 4144 cmd.exe cmd.exe PID 4288 wrote to memory of 3632 4288 legota.exe schtasks.exe PID 4288 wrote to memory of 3632 4288 legota.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exe"C:\Users\Admin\AppData\Local\Temp\3d12fbf585a0733ca8693b5655849f93fc149728456c3d32736d79241b5f0c18.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1917119.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1917119.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6648982.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6648982.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3328388.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3328388.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7789797.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7789797.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6063355.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6063355.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5603770.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5603770.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 2008⤵
- Program crash
PID:3212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 1487⤵
- Program crash
PID:3044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7988811.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7988811.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 1606⤵
- Program crash
PID:4272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t8398556.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t8398556.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:2888
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3840
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:1248
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:2976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2464
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3252
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4376
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3080
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u2502058.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u2502058.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:2892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:2408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4320
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:2668
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:316
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w7345297.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w7345297.exe2⤵
- Executes dropped EXE
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3688 -ip 36881⤵PID:1492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4172 -ip 41721⤵PID:3604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3584 -ip 35841⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5100
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4132
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2920
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3000
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD55c576ffcd9f2ec0e6145ad977b7e85ed
SHA171f051b3e348b2e857c997cca362fe73a65c0396
SHA2566373ee78e3a8aab766facf57519c10d96a41815e19687d8b7a97b4bf5d537858
SHA5122fe629e2cd2de8e4db517cd8c1af1781632a1eeb98b0dc296aa9f8d6036c96d6351c7221400cf8c28908213b8eb844977c9466b4e32c5d47cb775c9e7ce74996
-
Filesize
23KB
MD55c576ffcd9f2ec0e6145ad977b7e85ed
SHA171f051b3e348b2e857c997cca362fe73a65c0396
SHA2566373ee78e3a8aab766facf57519c10d96a41815e19687d8b7a97b4bf5d537858
SHA5122fe629e2cd2de8e4db517cd8c1af1781632a1eeb98b0dc296aa9f8d6036c96d6351c7221400cf8c28908213b8eb844977c9466b4e32c5d47cb775c9e7ce74996
-
Filesize
892KB
MD5041414c5a1d119fcf4923e8c130d85b6
SHA14ea3345e617316511d160e8f845239e878e56437
SHA256c0eb10eb530df227c0a26d5f6ae464915516bad54a9f2fd3adad7935b9645043
SHA512aba6beb5799121eaa5e6c7dd9e847cc17913b04a62eebc81264b8acd50b063566c3c1b0adb128843029ef7278bf7e7e5ed8d1198d8376d4f0137398dec78e0e8
-
Filesize
892KB
MD5041414c5a1d119fcf4923e8c130d85b6
SHA14ea3345e617316511d160e8f845239e878e56437
SHA256c0eb10eb530df227c0a26d5f6ae464915516bad54a9f2fd3adad7935b9645043
SHA512aba6beb5799121eaa5e6c7dd9e847cc17913b04a62eebc81264b8acd50b063566c3c1b0adb128843029ef7278bf7e7e5ed8d1198d8376d4f0137398dec78e0e8
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
709KB
MD5c178919274cba2e13b16aa35030d3386
SHA13b650fa54d57bd565ddff45ae4a6e9af75b61d55
SHA2566804e4fa95daf6aa6bbd0cb79559bdc58e693772d3d22deba3b512a9b6b17bc0
SHA5129c9cb22e77f1548627b3b4a5c716a1805c63823f0966063ebcb9d4eb26bf88c2d20c337769c68c6ff06bd402d753a53868d6864e197dfe06319d98cce8187a85
-
Filesize
709KB
MD5c178919274cba2e13b16aa35030d3386
SHA13b650fa54d57bd565ddff45ae4a6e9af75b61d55
SHA2566804e4fa95daf6aa6bbd0cb79559bdc58e693772d3d22deba3b512a9b6b17bc0
SHA5129c9cb22e77f1548627b3b4a5c716a1805c63823f0966063ebcb9d4eb26bf88c2d20c337769c68c6ff06bd402d753a53868d6864e197dfe06319d98cce8187a85
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD54e4a59f3a0309818b954da4d101f65b3
SHA1a79a7f0e57a5ff63520d3fe4ea83e278db29e754
SHA2560198a93584a90e886b2f7fe7e78a3c323377f2d2301aecb0f81e39c261beba06
SHA5123795411ce169fecb761b09be8cf9a0192ee37f6c16dc9efdaf4d11485defda9073bf29f334ceb8218b2e4d6be00573d10997495246b431d489ee773268319b45
-
Filesize
527KB
MD54e4a59f3a0309818b954da4d101f65b3
SHA1a79a7f0e57a5ff63520d3fe4ea83e278db29e754
SHA2560198a93584a90e886b2f7fe7e78a3c323377f2d2301aecb0f81e39c261beba06
SHA5123795411ce169fecb761b09be8cf9a0192ee37f6c16dc9efdaf4d11485defda9073bf29f334ceb8218b2e4d6be00573d10997495246b431d489ee773268319b45
-
Filesize
310KB
MD5f07a001e273bc4a6ac2705fef1379215
SHA1d2a573e12b1899be78a84ce05e57123cf5305a2a
SHA2568560f23167753beae06d1a176d974b9787d9c22265c31fe511d1049e3cc2470d
SHA5123ce45469f064d6e02434afe1605c36cc08f8558c12d42c7d34761661a2af20f2f7bb5742ffef413a69a97480cf72a31135576c5477388d794af2ec4327d32001
-
Filesize
310KB
MD5f07a001e273bc4a6ac2705fef1379215
SHA1d2a573e12b1899be78a84ce05e57123cf5305a2a
SHA2568560f23167753beae06d1a176d974b9787d9c22265c31fe511d1049e3cc2470d
SHA5123ce45469f064d6e02434afe1605c36cc08f8558c12d42c7d34761661a2af20f2f7bb5742ffef413a69a97480cf72a31135576c5477388d794af2ec4327d32001
-
Filesize
296KB
MD5a92b532f9c444d0d61d1e9f3a9d536a0
SHA16457289fe5fba7df592945e2fbbc9154b3d50357
SHA256f211972348ed00db7365a9ee66449bc0df29164e9f131c285668af8885dc2247
SHA5124d33c91980f86f099417028f988fca63a9db3ebd4a7859bb8aaee8d98c5f7dc58976a16bfbc975e8073cd43c475dba20e898c5fb12d8ad4eb3c22944169dbb5b
-
Filesize
296KB
MD5a92b532f9c444d0d61d1e9f3a9d536a0
SHA16457289fe5fba7df592945e2fbbc9154b3d50357
SHA256f211972348ed00db7365a9ee66449bc0df29164e9f131c285668af8885dc2247
SHA5124d33c91980f86f099417028f988fca63a9db3ebd4a7859bb8aaee8d98c5f7dc58976a16bfbc975e8073cd43c475dba20e898c5fb12d8ad4eb3c22944169dbb5b
-
Filesize
11KB
MD5adc51bb9b178c25216e01ed35840bf99
SHA1336fb3779557295abf6b1129f8793336f332f025
SHA25661af37e580dd9c43f4231f5d0e4d2f28999d92cbe00e17bbfb5df088dd94436f
SHA5120a1e079e1a9ccc83221482f939b34083b918e6777fb4eb02187f1e8765cf304a382d38e0072f448d25c493bbe1889895aad5fc1c2f479fcc7a26bd43d55ddbbf
-
Filesize
11KB
MD5adc51bb9b178c25216e01ed35840bf99
SHA1336fb3779557295abf6b1129f8793336f332f025
SHA25661af37e580dd9c43f4231f5d0e4d2f28999d92cbe00e17bbfb5df088dd94436f
SHA5120a1e079e1a9ccc83221482f939b34083b918e6777fb4eb02187f1e8765cf304a382d38e0072f448d25c493bbe1889895aad5fc1c2f479fcc7a26bd43d55ddbbf
-
Filesize
276KB
MD51f5389cbc762971a2cc5515cea35ed72
SHA1db5f3e38f36eaa96740d8f8da33f112f4cf38e56
SHA2569d44e5ea813f630fedd3a604baa51c4faf276eb5d0ea9d0e96f76ba7f0955641
SHA512c5b1642ec6c5784e1753de05b8805a84d78c4cb495fbd76ad98cca93921cfc1c0c24c6c04fc94f3125335a1df895823779814e63c58d20832f498735410073b7
-
Filesize
276KB
MD51f5389cbc762971a2cc5515cea35ed72
SHA1db5f3e38f36eaa96740d8f8da33f112f4cf38e56
SHA2569d44e5ea813f630fedd3a604baa51c4faf276eb5d0ea9d0e96f76ba7f0955641
SHA512c5b1642ec6c5784e1753de05b8805a84d78c4cb495fbd76ad98cca93921cfc1c0c24c6c04fc94f3125335a1df895823779814e63c58d20832f498735410073b7
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0