Analysis
-
max time kernel
145s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 20:53
Static task
static1
Behavioral task
behavioral1
Sample
7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exe
Resource
win7-20230831-en
General
-
Target
7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exe
-
Size
995KB
-
MD5
71276c3281dfb6d3ecc3a25a1952d175
-
SHA1
b8e387859cf40dc13bc29c38810c616d25e3e0c5
-
SHA256
7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89
-
SHA512
00418722e70cb6ef76e237d16007686dbc3270a7d5270abcf41f9624d3eeb7646959e40e6f830a33d776c100d3a5b3ccdaef569467f7bf6b38186eb391b47b6c
-
SSDEEP
24576:QyizHF7B4sy0rjfI3F0Eibr4UOAeLukkCFcUW:XkF7lyB3+EC4UmvFc
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4348-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4348-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4348-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4348-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8993917.exe healer C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8993917.exe healer behavioral2/memory/1164-35-0x0000000000AE0000-0x0000000000AEA000-memory.dmp healer -
Processes:
q8993917.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q8993917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q8993917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q8993917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q8993917.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q8993917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q8993917.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t2476738.exeu0638390.exeexplothe.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation t2476738.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation u0638390.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z7649730.exez5172786.exez6795275.exez3878565.exeq8993917.exer6493273.exes5828675.exet2476738.exeexplothe.exeu0638390.exelegota.exew5778318.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4128 z7649730.exe 4820 z5172786.exe 3764 z6795275.exe 2200 z3878565.exe 1164 q8993917.exe 2360 r6493273.exe 5108 s5828675.exe 4940 t2476738.exe 2608 explothe.exe 4204 u0638390.exe 4052 legota.exe 876 w5778318.exe 4196 explothe.exe 1416 legota.exe 1896 explothe.exe 2360 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 5116 rundll32.exe 1276 rundll32.exe -
Processes:
q8993917.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q8993917.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exez7649730.exez5172786.exez6795275.exez3878565.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7649730.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z5172786.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z6795275.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z3878565.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r6493273.exes5828675.exedescription pid process target process PID 2360 set thread context of 4348 2360 r6493273.exe AppLaunch.exe PID 5108 set thread context of 2872 5108 s5828675.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1896 2360 WerFault.exe r6493273.exe 1648 4348 WerFault.exe AppLaunch.exe 5020 5108 WerFault.exe s5828675.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4344 schtasks.exe 4892 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q8993917.exepid process 1164 q8993917.exe 1164 q8993917.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q8993917.exedescription pid process Token: SeDebugPrivilege 1164 q8993917.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exez7649730.exez5172786.exez6795275.exez3878565.exer6493273.exes5828675.exet2476738.exeu0638390.exeexplothe.execmd.exedescription pid process target process PID 2696 wrote to memory of 4128 2696 7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exe z7649730.exe PID 2696 wrote to memory of 4128 2696 7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exe z7649730.exe PID 2696 wrote to memory of 4128 2696 7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exe z7649730.exe PID 4128 wrote to memory of 4820 4128 z7649730.exe z5172786.exe PID 4128 wrote to memory of 4820 4128 z7649730.exe z5172786.exe PID 4128 wrote to memory of 4820 4128 z7649730.exe z5172786.exe PID 4820 wrote to memory of 3764 4820 z5172786.exe z6795275.exe PID 4820 wrote to memory of 3764 4820 z5172786.exe z6795275.exe PID 4820 wrote to memory of 3764 4820 z5172786.exe z6795275.exe PID 3764 wrote to memory of 2200 3764 z6795275.exe z3878565.exe PID 3764 wrote to memory of 2200 3764 z6795275.exe z3878565.exe PID 3764 wrote to memory of 2200 3764 z6795275.exe z3878565.exe PID 2200 wrote to memory of 1164 2200 z3878565.exe q8993917.exe PID 2200 wrote to memory of 1164 2200 z3878565.exe q8993917.exe PID 2200 wrote to memory of 2360 2200 z3878565.exe r6493273.exe PID 2200 wrote to memory of 2360 2200 z3878565.exe r6493273.exe PID 2200 wrote to memory of 2360 2200 z3878565.exe r6493273.exe PID 2360 wrote to memory of 4348 2360 r6493273.exe AppLaunch.exe PID 2360 wrote to memory of 4348 2360 r6493273.exe AppLaunch.exe PID 2360 wrote to memory of 4348 2360 r6493273.exe AppLaunch.exe PID 2360 wrote to memory of 4348 2360 r6493273.exe AppLaunch.exe PID 2360 wrote to memory of 4348 2360 r6493273.exe AppLaunch.exe PID 2360 wrote to memory of 4348 2360 r6493273.exe AppLaunch.exe PID 2360 wrote to memory of 4348 2360 r6493273.exe AppLaunch.exe PID 2360 wrote to memory of 4348 2360 r6493273.exe AppLaunch.exe PID 2360 wrote to memory of 4348 2360 r6493273.exe AppLaunch.exe PID 2360 wrote to memory of 4348 2360 r6493273.exe AppLaunch.exe PID 3764 wrote to memory of 5108 3764 z6795275.exe s5828675.exe PID 3764 wrote to memory of 5108 3764 z6795275.exe s5828675.exe PID 3764 wrote to memory of 5108 3764 z6795275.exe s5828675.exe PID 5108 wrote to memory of 2872 5108 s5828675.exe AppLaunch.exe PID 5108 wrote to memory of 2872 5108 s5828675.exe AppLaunch.exe PID 5108 wrote to memory of 2872 5108 s5828675.exe AppLaunch.exe PID 5108 wrote to memory of 2872 5108 s5828675.exe AppLaunch.exe PID 5108 wrote to memory of 2872 5108 s5828675.exe AppLaunch.exe PID 5108 wrote to memory of 2872 5108 s5828675.exe AppLaunch.exe PID 5108 wrote to memory of 2872 5108 s5828675.exe AppLaunch.exe PID 5108 wrote to memory of 2872 5108 s5828675.exe AppLaunch.exe PID 4820 wrote to memory of 4940 4820 z5172786.exe t2476738.exe PID 4820 wrote to memory of 4940 4820 z5172786.exe t2476738.exe PID 4820 wrote to memory of 4940 4820 z5172786.exe t2476738.exe PID 4940 wrote to memory of 2608 4940 t2476738.exe explothe.exe PID 4940 wrote to memory of 2608 4940 t2476738.exe explothe.exe PID 4940 wrote to memory of 2608 4940 t2476738.exe explothe.exe PID 4128 wrote to memory of 4204 4128 z7649730.exe u0638390.exe PID 4128 wrote to memory of 4204 4128 z7649730.exe u0638390.exe PID 4128 wrote to memory of 4204 4128 z7649730.exe u0638390.exe PID 4204 wrote to memory of 4052 4204 u0638390.exe legota.exe PID 4204 wrote to memory of 4052 4204 u0638390.exe legota.exe PID 4204 wrote to memory of 4052 4204 u0638390.exe legota.exe PID 2608 wrote to memory of 4892 2608 explothe.exe schtasks.exe PID 2608 wrote to memory of 4892 2608 explothe.exe schtasks.exe PID 2608 wrote to memory of 4892 2608 explothe.exe schtasks.exe PID 2608 wrote to memory of 2316 2608 explothe.exe cmd.exe PID 2608 wrote to memory of 2316 2608 explothe.exe cmd.exe PID 2608 wrote to memory of 2316 2608 explothe.exe cmd.exe PID 2696 wrote to memory of 876 2696 7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exe w5778318.exe PID 2696 wrote to memory of 876 2696 7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exe w5778318.exe PID 2696 wrote to memory of 876 2696 7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exe w5778318.exe PID 2316 wrote to memory of 4176 2316 cmd.exe cmd.exe PID 2316 wrote to memory of 4176 2316 cmd.exe cmd.exe PID 2316 wrote to memory of 4176 2316 cmd.exe cmd.exe PID 2316 wrote to memory of 4948 2316 cmd.exe cacls.exe PID 2316 wrote to memory of 4948 2316 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exe"C:\Users\Admin\AppData\Local\Temp\7e11579cc2e33d281d43bfeeedc877b5b16d365be039e45900b6efe1325d0a89.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7649730.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7649730.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5172786.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5172786.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6795275.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6795275.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3878565.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3878565.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8993917.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8993917.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6493273.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6493273.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 5408⤵
- Program crash
PID:1648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 5847⤵
- Program crash
PID:1896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5828675.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5828675.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 5846⤵
- Program crash
PID:5020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2476738.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2476738.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:1588
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:3968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3944
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:2492
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:4892
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:5116
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0638390.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0638390.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4052 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:4344
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4252
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:1020
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4124
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1276
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5778318.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5778318.exe2⤵
- Executes dropped EXE
PID:876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2360 -ip 23601⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4348 -ip 43481⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5108 -ip 51081⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4196
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1416
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1896
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2360
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD53496af1cc9c90c9cad3dc71e8b443979
SHA15d9929c456f059c8e48bcc70f00bd7e46b3a06af
SHA25628e96f582e6a23d9e65dc1b7aa61dac24c98dfb2d876b4eeea9669af46c2f0eb
SHA5124344c16411b65c41d670bc976ac10fae7bb1903cd058566d41feb5b855e17238de04d154dea2656212cc3171baf62c7e1e842bc1a1e31826a2b53faad685f1cc
-
Filesize
23KB
MD53496af1cc9c90c9cad3dc71e8b443979
SHA15d9929c456f059c8e48bcc70f00bd7e46b3a06af
SHA25628e96f582e6a23d9e65dc1b7aa61dac24c98dfb2d876b4eeea9669af46c2f0eb
SHA5124344c16411b65c41d670bc976ac10fae7bb1903cd058566d41feb5b855e17238de04d154dea2656212cc3171baf62c7e1e842bc1a1e31826a2b53faad685f1cc
-
Filesize
893KB
MD542e96f718062386f73038715e5291da8
SHA10bb47bcfc08e46db80bad6923a6929a700d3265b
SHA2565dd8b9e3818e6956bc1ac4803031a732bba9fe4fe795c1f2f92c9e147ea53e90
SHA51262f4660dcb54e0abd233b4b3a93166c6c961381c613f0e19a63502ae1701d3b3e4a01a14982f9d40446637171a7068bb217694569e9411316db87ca31e25bde5
-
Filesize
893KB
MD542e96f718062386f73038715e5291da8
SHA10bb47bcfc08e46db80bad6923a6929a700d3265b
SHA2565dd8b9e3818e6956bc1ac4803031a732bba9fe4fe795c1f2f92c9e147ea53e90
SHA51262f4660dcb54e0abd233b4b3a93166c6c961381c613f0e19a63502ae1701d3b3e4a01a14982f9d40446637171a7068bb217694569e9411316db87ca31e25bde5
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
710KB
MD55d64b9828b62b85b75ffcbdc2eac4dd6
SHA1f73049de6a47909bc2182ed3c8df55a10fbfa77e
SHA2562d55207a74a61f1048c6715f202abd9386a12d66c51f363fd8588dd5ce1965f2
SHA512a33250ee56d7a88f055743a7a1f36969eb2d4f271c84c145f1ecf3529313b8dc887f1ff8de8566b9c924caa3d1fec32aaa82e0c55efb08802ff16008a1877fe1
-
Filesize
710KB
MD55d64b9828b62b85b75ffcbdc2eac4dd6
SHA1f73049de6a47909bc2182ed3c8df55a10fbfa77e
SHA2562d55207a74a61f1048c6715f202abd9386a12d66c51f363fd8588dd5ce1965f2
SHA512a33250ee56d7a88f055743a7a1f36969eb2d4f271c84c145f1ecf3529313b8dc887f1ff8de8566b9c924caa3d1fec32aaa82e0c55efb08802ff16008a1877fe1
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
527KB
MD5d88d23213b041dd7f3bd87813bed39f0
SHA1254beb8a2c44b85f53da000c7f6888ed33d8ce22
SHA256c970758a5c8806bb55103cfc361edf10c96596caec25486dbd39d354abf5401e
SHA5129af1e8237475fd30942ecec6672782dc55b3ea130077ea2740ad8ddd465982802d30563436d6d367112a4702dc00c900cc273c32c87f82b5693b845032e97712
-
Filesize
527KB
MD5d88d23213b041dd7f3bd87813bed39f0
SHA1254beb8a2c44b85f53da000c7f6888ed33d8ce22
SHA256c970758a5c8806bb55103cfc361edf10c96596caec25486dbd39d354abf5401e
SHA5129af1e8237475fd30942ecec6672782dc55b3ea130077ea2740ad8ddd465982802d30563436d6d367112a4702dc00c900cc273c32c87f82b5693b845032e97712
-
Filesize
310KB
MD5c5d1db43703d6e1b28a0ef007ddb1f74
SHA1a67f650eee39a328b0e59506a1fce3fabac1a340
SHA2569e5f378322d660a40fe6273884c9aae422048aae8d4928754ba1836387d469e4
SHA512fe717abe3ea5f6d34a1343c4f6ed51ccde2c542763183dc9c8e992c6959ae6a31430c364bfd8cbe7aa0adcd4c39e551a8e57ce2825c1e2161609a0c8b902cd10
-
Filesize
310KB
MD5c5d1db43703d6e1b28a0ef007ddb1f74
SHA1a67f650eee39a328b0e59506a1fce3fabac1a340
SHA2569e5f378322d660a40fe6273884c9aae422048aae8d4928754ba1836387d469e4
SHA512fe717abe3ea5f6d34a1343c4f6ed51ccde2c542763183dc9c8e992c6959ae6a31430c364bfd8cbe7aa0adcd4c39e551a8e57ce2825c1e2161609a0c8b902cd10
-
Filesize
296KB
MD54d3603f6650a724dd8a37d2a25c9364b
SHA1825cf64534bd49848c0ae16fb256f2107a75d66f
SHA256d0a0ec01f7aca7b8dd9575c2fd0ff2851c8c47ff970fa713b50ace9ff62a042a
SHA5127f963d7ddbf1b2865ac58cc65eb69e22d1359d3518339657da0a20ae42b291e1a36632077013c8c580cf6e6bc9e4f77e026532bd41ffa4d7cb28e871d4051227
-
Filesize
296KB
MD54d3603f6650a724dd8a37d2a25c9364b
SHA1825cf64534bd49848c0ae16fb256f2107a75d66f
SHA256d0a0ec01f7aca7b8dd9575c2fd0ff2851c8c47ff970fa713b50ace9ff62a042a
SHA5127f963d7ddbf1b2865ac58cc65eb69e22d1359d3518339657da0a20ae42b291e1a36632077013c8c580cf6e6bc9e4f77e026532bd41ffa4d7cb28e871d4051227
-
Filesize
11KB
MD5b3bdcba2deb24557e8953fa1987a5d1c
SHA13fc4b37b5c8be4eb7ab2422f89272a826565df09
SHA256d0d0ef1c9a6d7289d633263f96ed2884cff533b253cc98940c007cfe3e8698df
SHA512cd9d4fc331d8e243479c74c5336d280daf7f110eba269a41ab6e2507ebaae5b12460cb98a9e43edfa0da51d43458fc2c7c67de9046bf3aa96417e3f7a302a901
-
Filesize
11KB
MD5b3bdcba2deb24557e8953fa1987a5d1c
SHA13fc4b37b5c8be4eb7ab2422f89272a826565df09
SHA256d0d0ef1c9a6d7289d633263f96ed2884cff533b253cc98940c007cfe3e8698df
SHA512cd9d4fc331d8e243479c74c5336d280daf7f110eba269a41ab6e2507ebaae5b12460cb98a9e43edfa0da51d43458fc2c7c67de9046bf3aa96417e3f7a302a901
-
Filesize
276KB
MD57f2e520b53fd0c6ed744db5ae3343312
SHA116fb67648270230c9b103924536954c5f8124161
SHA256160a3ca894ffc68e9f6e822f9be7e36a431c63d621b9923ae2b7845b54ffeba4
SHA512f38dd3a6037f58762e0315af63fb6fd149f730f8aad7028ea4d13bcaa14142655318c92ae69239797c13a4487916e2d2f86316b7e243444ac4dad018c85c5006
-
Filesize
276KB
MD57f2e520b53fd0c6ed744db5ae3343312
SHA116fb67648270230c9b103924536954c5f8124161
SHA256160a3ca894ffc68e9f6e822f9be7e36a431c63d621b9923ae2b7845b54ffeba4
SHA512f38dd3a6037f58762e0315af63fb6fd149f730f8aad7028ea4d13bcaa14142655318c92ae69239797c13a4487916e2d2f86316b7e243444ac4dad018c85c5006
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0