Analysis
-
max time kernel
171s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 05:23
Static task
static1
Behavioral task
behavioral1
Sample
a1d6be93ea1f7051e19504af5388665ecf5862be51cdb1df4895ab196defbf74.exe
Resource
win7-20230831-en
General
-
Target
a1d6be93ea1f7051e19504af5388665ecf5862be51cdb1df4895ab196defbf74.exe
-
Size
1.1MB
-
MD5
1ff470ae4b3f8ee1d4b2d7f65932a039
-
SHA1
c4b0207ad5f5f7eaa48fe613f2b246d4cb405cb0
-
SHA256
a1d6be93ea1f7051e19504af5388665ecf5862be51cdb1df4895ab196defbf74
-
SHA512
cb167a7cebb137e21ff67f6d902971630ad11a1e2ec983285284f9b86fa291d5661c43378f31902e8c5d4802c95f59cf6836f261f875c3a32768fbee7f526c5a
-
SSDEEP
24576:zydja0Du8udg9EXNFsrHKrXN4A044gP+eu:GVAg9EdaGr9EngP+e
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2948-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2948-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2948-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2948-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3676-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
u4698181.exelegota.exet2151305.exeexplothe.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation u4698181.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation t2151305.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explothe.exe -
Executes dropped EXE 18 IoCs
Processes:
z4061281.exez4932031.exez7996688.exez4353747.exeq0544509.exer6194319.exes1705427.exet2151305.exeexplothe.exeu4698181.exelegota.exew0332540.exeexplothe.exelegota.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 2568 z4061281.exe 1780 z4932031.exe 412 z7996688.exe 3220 z4353747.exe 1052 q0544509.exe 1760 r6194319.exe 440 s1705427.exe 4180 t2151305.exe 4756 explothe.exe 4696 u4698181.exe 1936 legota.exe 2768 w0332540.exe 3692 explothe.exe 3856 legota.exe 2196 explothe.exe 4492 legota.exe 4776 explothe.exe 1700 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1600 rundll32.exe 3008 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z4353747.exea1d6be93ea1f7051e19504af5388665ecf5862be51cdb1df4895ab196defbf74.exez4061281.exez4932031.exez7996688.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4353747.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1d6be93ea1f7051e19504af5388665ecf5862be51cdb1df4895ab196defbf74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4061281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4932031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7996688.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q0544509.exer6194319.exes1705427.exedescription pid process target process PID 1052 set thread context of 3676 1052 q0544509.exe AppLaunch.exe PID 1760 set thread context of 2948 1760 r6194319.exe AppLaunch.exe PID 440 set thread context of 1664 440 s1705427.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1848 1052 WerFault.exe q0544509.exe 4308 1760 WerFault.exe r6194319.exe 4564 2948 WerFault.exe AppLaunch.exe 4900 440 WerFault.exe s1705427.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2252 schtasks.exe 3556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 3676 AppLaunch.exe 3676 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3676 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a1d6be93ea1f7051e19504af5388665ecf5862be51cdb1df4895ab196defbf74.exez4061281.exez4932031.exez7996688.exez4353747.exeq0544509.exer6194319.exes1705427.exet2151305.exeexplothe.exedescription pid process target process PID 404 wrote to memory of 2568 404 a1d6be93ea1f7051e19504af5388665ecf5862be51cdb1df4895ab196defbf74.exe z4061281.exe PID 404 wrote to memory of 2568 404 a1d6be93ea1f7051e19504af5388665ecf5862be51cdb1df4895ab196defbf74.exe z4061281.exe PID 404 wrote to memory of 2568 404 a1d6be93ea1f7051e19504af5388665ecf5862be51cdb1df4895ab196defbf74.exe z4061281.exe PID 2568 wrote to memory of 1780 2568 z4061281.exe z4932031.exe PID 2568 wrote to memory of 1780 2568 z4061281.exe z4932031.exe PID 2568 wrote to memory of 1780 2568 z4061281.exe z4932031.exe PID 1780 wrote to memory of 412 1780 z4932031.exe z7996688.exe PID 1780 wrote to memory of 412 1780 z4932031.exe z7996688.exe PID 1780 wrote to memory of 412 1780 z4932031.exe z7996688.exe PID 412 wrote to memory of 3220 412 z7996688.exe z4353747.exe PID 412 wrote to memory of 3220 412 z7996688.exe z4353747.exe PID 412 wrote to memory of 3220 412 z7996688.exe z4353747.exe PID 3220 wrote to memory of 1052 3220 z4353747.exe q0544509.exe PID 3220 wrote to memory of 1052 3220 z4353747.exe q0544509.exe PID 3220 wrote to memory of 1052 3220 z4353747.exe q0544509.exe PID 1052 wrote to memory of 3676 1052 q0544509.exe AppLaunch.exe PID 1052 wrote to memory of 3676 1052 q0544509.exe AppLaunch.exe PID 1052 wrote to memory of 3676 1052 q0544509.exe AppLaunch.exe PID 1052 wrote to memory of 3676 1052 q0544509.exe AppLaunch.exe PID 1052 wrote to memory of 3676 1052 q0544509.exe AppLaunch.exe PID 1052 wrote to memory of 3676 1052 q0544509.exe AppLaunch.exe PID 1052 wrote to memory of 3676 1052 q0544509.exe AppLaunch.exe PID 1052 wrote to memory of 3676 1052 q0544509.exe AppLaunch.exe PID 3220 wrote to memory of 1760 3220 z4353747.exe r6194319.exe PID 3220 wrote to memory of 1760 3220 z4353747.exe r6194319.exe PID 3220 wrote to memory of 1760 3220 z4353747.exe r6194319.exe PID 1760 wrote to memory of 4100 1760 r6194319.exe AppLaunch.exe PID 1760 wrote to memory of 4100 1760 r6194319.exe AppLaunch.exe PID 1760 wrote to memory of 4100 1760 r6194319.exe AppLaunch.exe PID 1760 wrote to memory of 2948 1760 r6194319.exe AppLaunch.exe PID 1760 wrote to memory of 2948 1760 r6194319.exe AppLaunch.exe PID 1760 wrote to memory of 2948 1760 r6194319.exe AppLaunch.exe PID 1760 wrote to memory of 2948 1760 r6194319.exe AppLaunch.exe PID 1760 wrote to memory of 2948 1760 r6194319.exe AppLaunch.exe PID 1760 wrote to memory of 2948 1760 r6194319.exe AppLaunch.exe PID 1760 wrote to memory of 2948 1760 r6194319.exe AppLaunch.exe PID 1760 wrote to memory of 2948 1760 r6194319.exe AppLaunch.exe PID 1760 wrote to memory of 2948 1760 r6194319.exe AppLaunch.exe PID 1760 wrote to memory of 2948 1760 r6194319.exe AppLaunch.exe PID 412 wrote to memory of 440 412 z7996688.exe s1705427.exe PID 412 wrote to memory of 440 412 z7996688.exe s1705427.exe PID 412 wrote to memory of 440 412 z7996688.exe s1705427.exe PID 440 wrote to memory of 1664 440 s1705427.exe AppLaunch.exe PID 440 wrote to memory of 1664 440 s1705427.exe AppLaunch.exe PID 440 wrote to memory of 1664 440 s1705427.exe AppLaunch.exe PID 440 wrote to memory of 1664 440 s1705427.exe AppLaunch.exe PID 440 wrote to memory of 1664 440 s1705427.exe AppLaunch.exe PID 440 wrote to memory of 1664 440 s1705427.exe AppLaunch.exe PID 440 wrote to memory of 1664 440 s1705427.exe AppLaunch.exe PID 440 wrote to memory of 1664 440 s1705427.exe AppLaunch.exe PID 1780 wrote to memory of 4180 1780 z4932031.exe t2151305.exe PID 1780 wrote to memory of 4180 1780 z4932031.exe t2151305.exe PID 1780 wrote to memory of 4180 1780 z4932031.exe t2151305.exe PID 4180 wrote to memory of 4756 4180 t2151305.exe explothe.exe PID 4180 wrote to memory of 4756 4180 t2151305.exe explothe.exe PID 4180 wrote to memory of 4756 4180 t2151305.exe explothe.exe PID 2568 wrote to memory of 4696 2568 z4061281.exe u4698181.exe PID 2568 wrote to memory of 4696 2568 z4061281.exe u4698181.exe PID 2568 wrote to memory of 4696 2568 z4061281.exe u4698181.exe PID 4756 wrote to memory of 2252 4756 explothe.exe schtasks.exe PID 4756 wrote to memory of 2252 4756 explothe.exe schtasks.exe PID 4756 wrote to memory of 2252 4756 explothe.exe schtasks.exe PID 4756 wrote to memory of 1084 4756 explothe.exe cmd.exe PID 4756 wrote to memory of 1084 4756 explothe.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1d6be93ea1f7051e19504af5388665ecf5862be51cdb1df4895ab196defbf74.exe"C:\Users\Admin\AppData\Local\Temp\a1d6be93ea1f7051e19504af5388665ecf5862be51cdb1df4895ab196defbf74.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4061281.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4061281.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4932031.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4932031.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7996688.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7996688.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4353747.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4353747.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0544509.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0544509.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 1407⤵
- Program crash
PID:1848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6194319.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6194319.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4100
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 5408⤵
- Program crash
PID:4564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 1407⤵
- Program crash
PID:4308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1705427.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1705427.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 440 -s 5966⤵
- Program crash
PID:4900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2151305.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2151305.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:2252
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:1084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:2344
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:4348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:3688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3364
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4698181.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4698181.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3556
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1848
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:1180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:1280
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:1244
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3008
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0332540.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0332540.exe2⤵
- Executes dropped EXE
PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1052 -ip 10521⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1760 -ip 17601⤵PID:4024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2948 -ip 29481⤵PID:4288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 440 -ip 4401⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3692
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3856
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2196
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4492
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4776
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1700
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD52907c7bb74b518c1bc81a5381725cb37
SHA156675cc6288c879acbaae39fcc9bf5e270578f89
SHA2568aeb7c804f0e78df850a52f63dac8e7ef94235cff090ebe00e9d304302da313e
SHA51263d0abba9596166249151c78d874b91be9add6a14626a6b88910690dc4ae51cf9096221933e12d3bdb6a575dfb8d4df7c3ba53da70c1c84ea61117dea1dff41a
-
Filesize
23KB
MD52907c7bb74b518c1bc81a5381725cb37
SHA156675cc6288c879acbaae39fcc9bf5e270578f89
SHA2568aeb7c804f0e78df850a52f63dac8e7ef94235cff090ebe00e9d304302da313e
SHA51263d0abba9596166249151c78d874b91be9add6a14626a6b88910690dc4ae51cf9096221933e12d3bdb6a575dfb8d4df7c3ba53da70c1c84ea61117dea1dff41a
-
Filesize
982KB
MD569b0f73977ce3442a83d162278133b1b
SHA16438f9515be1cc7b9721c7bd072710ce62314c0d
SHA256d932de6099ee34b2ba24b1957c52b18d2c3cd85069307d8803a52066f60f77ee
SHA512b39518f93fd0781ef8caa187a0afdf13a4f926ebea53cc9ecc90887539139b54134560d54106d361aa7c50c38ac43b5ebbd9e3e417fb141d45dd2f9115cc4c7f
-
Filesize
982KB
MD569b0f73977ce3442a83d162278133b1b
SHA16438f9515be1cc7b9721c7bd072710ce62314c0d
SHA256d932de6099ee34b2ba24b1957c52b18d2c3cd85069307d8803a52066f60f77ee
SHA512b39518f93fd0781ef8caa187a0afdf13a4f926ebea53cc9ecc90887539139b54134560d54106d361aa7c50c38ac43b5ebbd9e3e417fb141d45dd2f9115cc4c7f
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
798KB
MD5c14c6ce0a5c4c051b1ca704482e683e3
SHA104f558aa5193f96787b098e25d8ef055ad6dcaf2
SHA256c018300d18069cc12be145694d3e4b6ac22f7dba4da433500642a43179b2a54f
SHA5126c32dbceb146684cacf180f68b6ba9918fbf08c08989d8263f2f114e99a7f8c2a228e9a872b8d82516a9dd6251c5fa56fb3815f035bfc4bd0782d3c4a1e84116
-
Filesize
798KB
MD5c14c6ce0a5c4c051b1ca704482e683e3
SHA104f558aa5193f96787b098e25d8ef055ad6dcaf2
SHA256c018300d18069cc12be145694d3e4b6ac22f7dba4da433500642a43179b2a54f
SHA5126c32dbceb146684cacf180f68b6ba9918fbf08c08989d8263f2f114e99a7f8c2a228e9a872b8d82516a9dd6251c5fa56fb3815f035bfc4bd0782d3c4a1e84116
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
617KB
MD548e77e52f4aad2d83282c119d19eeeb2
SHA1877b720ec0775e3c425afe883bc942f41a53f376
SHA2566fa341344e790b303d3e3720104fe759d28f5abd307b3791d698ff0e0d09a4dc
SHA512b552e1e3dc1f860a11b376d66d3ea643c70a7ed03d8880f1d88706d782e4feb0a0979c63e86ba822fd146fedf738d32505be14a173ea3687b2c3c956fb6006c1
-
Filesize
617KB
MD548e77e52f4aad2d83282c119d19eeeb2
SHA1877b720ec0775e3c425afe883bc942f41a53f376
SHA2566fa341344e790b303d3e3720104fe759d28f5abd307b3791d698ff0e0d09a4dc
SHA512b552e1e3dc1f860a11b376d66d3ea643c70a7ed03d8880f1d88706d782e4feb0a0979c63e86ba822fd146fedf738d32505be14a173ea3687b2c3c956fb6006c1
-
Filesize
390KB
MD58ef46a1dc0c114b61c60c2fa7932500e
SHA1494a7788ea695be3833bf3433b370d645ee7615e
SHA25618129d294146a508d8ef685d75d8ab9fe4038870543646ff0914efb9bad7e541
SHA5122ffbddb8b421cdb6887d739f98c952e9d2467fe1469c4b2b7c1a05b16614ecff94edede10478be2bd7efea07e65ca8fe5b824f50a5eb4fb5a0c034009475669a
-
Filesize
390KB
MD58ef46a1dc0c114b61c60c2fa7932500e
SHA1494a7788ea695be3833bf3433b370d645ee7615e
SHA25618129d294146a508d8ef685d75d8ab9fe4038870543646ff0914efb9bad7e541
SHA5122ffbddb8b421cdb6887d739f98c952e9d2467fe1469c4b2b7c1a05b16614ecff94edede10478be2bd7efea07e65ca8fe5b824f50a5eb4fb5a0c034009475669a
-
Filesize
346KB
MD5876183941777b9921ffeb907d76e4c9e
SHA13d719b6a0295122de14c0864153daf26b9705179
SHA256d79d9667ac3f2e2ce29cc34379f0d80f8ec0828c1805d4e182709cd2db07b126
SHA5122a9e9ff0a9e5398495fb9838c31ac0f41605dc9e9bc8461902ee4ffd6bf001b874bc63613ff1c975f53c166de611c86991e4cc68dd125914c3722fac39be423a
-
Filesize
346KB
MD5876183941777b9921ffeb907d76e4c9e
SHA13d719b6a0295122de14c0864153daf26b9705179
SHA256d79d9667ac3f2e2ce29cc34379f0d80f8ec0828c1805d4e182709cd2db07b126
SHA5122a9e9ff0a9e5398495fb9838c31ac0f41605dc9e9bc8461902ee4ffd6bf001b874bc63613ff1c975f53c166de611c86991e4cc68dd125914c3722fac39be423a
-
Filesize
227KB
MD5b543b0f8e93840a921dbf1056cf814dd
SHA147a4c9b9cdc2b1076496e19d76b9521f2fa338a8
SHA256acced14b2229431b82e44868777e017aab09c925ad7fef84b23f2b7043df53fa
SHA512a1fb64f116591250c54f443cb7db9858dc9aba2654adc73fa3fefb8a5df2f5075985eddcce27a49da51afff44b23f865931142baa8237c3cc1a01d3ea3272e73
-
Filesize
227KB
MD5b543b0f8e93840a921dbf1056cf814dd
SHA147a4c9b9cdc2b1076496e19d76b9521f2fa338a8
SHA256acced14b2229431b82e44868777e017aab09c925ad7fef84b23f2b7043df53fa
SHA512a1fb64f116591250c54f443cb7db9858dc9aba2654adc73fa3fefb8a5df2f5075985eddcce27a49da51afff44b23f865931142baa8237c3cc1a01d3ea3272e73
-
Filesize
356KB
MD566be89638ff6af71b0944f0e79c99401
SHA1e915550aace367fa23f407bb84a514a6d00cc88e
SHA256c33808ecf4fda77e835badc373d822f64e29f57f41e070b8848d57f4d1beba8d
SHA51283a85f6ae0832863b352707e4bf44678258b593865e13be4e6217fe5c942636160594eec49bad0a54b0c59254110c0ebe7a01efd304a144da32042249eddf56a
-
Filesize
356KB
MD566be89638ff6af71b0944f0e79c99401
SHA1e915550aace367fa23f407bb84a514a6d00cc88e
SHA256c33808ecf4fda77e835badc373d822f64e29f57f41e070b8848d57f4d1beba8d
SHA51283a85f6ae0832863b352707e4bf44678258b593865e13be4e6217fe5c942636160594eec49bad0a54b0c59254110c0ebe7a01efd304a144da32042249eddf56a
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0