Analysis
-
max time kernel
139s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 05:30
Static task
static1
Behavioral task
behavioral1
Sample
231e5d06b59d9da06ebd417e1a78100df5b868ab57bf4452c872e5c68a428b21.exe
Resource
win7-20230831-en
General
-
Target
231e5d06b59d9da06ebd417e1a78100df5b868ab57bf4452c872e5c68a428b21.exe
-
Size
1.1MB
-
MD5
ed6628f12388ccb26508262d4ade5664
-
SHA1
ec368ae89c2d4d3cda160fa9d1a16871d3c457ff
-
SHA256
231e5d06b59d9da06ebd417e1a78100df5b868ab57bf4452c872e5c68a428b21
-
SHA512
d612caee236ea31d19271d0c17cd796dd76319ca0c1c4581f9cc74bb807638dc2d6154bc0eb8883cfa9cd6192fae944564dce0d422f661f96b36072d4aed9156
-
SSDEEP
12288:CMrNy90WW2lKB0vwhH1LEMvMrRcff6j8Dh0AY3G3zfpeqrLHwSh27jWjMc4OqEj/:/yHHK0UaJabIGDfph7hKjWj4wV+jAZ
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1840-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1840-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1840-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1840-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1424-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explothe.exeu8692610.exelegota.exet9527668.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation u8692610.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation t9527668.exe -
Executes dropped EXE 16 IoCs
Processes:
z2213400.exez7664267.exez9723267.exez3519223.exeq6283094.exer5824951.exes7999210.exet9527668.exeexplothe.exeu8692610.exelegota.exew6685940.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4444 z2213400.exe 2988 z7664267.exe 688 z9723267.exe 1292 z3519223.exe 1260 q6283094.exe 3536 r5824951.exe 1508 s7999210.exe 3504 t9527668.exe 404 explothe.exe 4988 u8692610.exe 4616 legota.exe 1020 w6685940.exe 1956 explothe.exe 4268 legota.exe 1312 explothe.exe 2920 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1208 rundll32.exe 3728 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
231e5d06b59d9da06ebd417e1a78100df5b868ab57bf4452c872e5c68a428b21.exez2213400.exez7664267.exez9723267.exez3519223.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 231e5d06b59d9da06ebd417e1a78100df5b868ab57bf4452c872e5c68a428b21.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2213400.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7664267.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z9723267.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z3519223.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q6283094.exer5824951.exes7999210.exedescription pid process target process PID 1260 set thread context of 1424 1260 q6283094.exe AppLaunch.exe PID 3536 set thread context of 1840 3536 r5824951.exe AppLaunch.exe PID 1508 set thread context of 864 1508 s7999210.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 568 1260 WerFault.exe q6283094.exe 3672 3536 WerFault.exe r5824951.exe 2344 1840 WerFault.exe AppLaunch.exe 1296 1508 WerFault.exe s7999210.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1496 schtasks.exe 5112 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1424 AppLaunch.exe 1424 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1424 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
231e5d06b59d9da06ebd417e1a78100df5b868ab57bf4452c872e5c68a428b21.exez2213400.exez7664267.exez9723267.exez3519223.exeq6283094.exer5824951.exes7999210.exet9527668.exeexplothe.exeu8692610.exedescription pid process target process PID 932 wrote to memory of 4444 932 231e5d06b59d9da06ebd417e1a78100df5b868ab57bf4452c872e5c68a428b21.exe z2213400.exe PID 932 wrote to memory of 4444 932 231e5d06b59d9da06ebd417e1a78100df5b868ab57bf4452c872e5c68a428b21.exe z2213400.exe PID 932 wrote to memory of 4444 932 231e5d06b59d9da06ebd417e1a78100df5b868ab57bf4452c872e5c68a428b21.exe z2213400.exe PID 4444 wrote to memory of 2988 4444 z2213400.exe z7664267.exe PID 4444 wrote to memory of 2988 4444 z2213400.exe z7664267.exe PID 4444 wrote to memory of 2988 4444 z2213400.exe z7664267.exe PID 2988 wrote to memory of 688 2988 z7664267.exe z9723267.exe PID 2988 wrote to memory of 688 2988 z7664267.exe z9723267.exe PID 2988 wrote to memory of 688 2988 z7664267.exe z9723267.exe PID 688 wrote to memory of 1292 688 z9723267.exe z3519223.exe PID 688 wrote to memory of 1292 688 z9723267.exe z3519223.exe PID 688 wrote to memory of 1292 688 z9723267.exe z3519223.exe PID 1292 wrote to memory of 1260 1292 z3519223.exe q6283094.exe PID 1292 wrote to memory of 1260 1292 z3519223.exe q6283094.exe PID 1292 wrote to memory of 1260 1292 z3519223.exe q6283094.exe PID 1260 wrote to memory of 1424 1260 q6283094.exe AppLaunch.exe PID 1260 wrote to memory of 1424 1260 q6283094.exe AppLaunch.exe PID 1260 wrote to memory of 1424 1260 q6283094.exe AppLaunch.exe PID 1260 wrote to memory of 1424 1260 q6283094.exe AppLaunch.exe PID 1260 wrote to memory of 1424 1260 q6283094.exe AppLaunch.exe PID 1260 wrote to memory of 1424 1260 q6283094.exe AppLaunch.exe PID 1260 wrote to memory of 1424 1260 q6283094.exe AppLaunch.exe PID 1260 wrote to memory of 1424 1260 q6283094.exe AppLaunch.exe PID 1292 wrote to memory of 3536 1292 z3519223.exe r5824951.exe PID 1292 wrote to memory of 3536 1292 z3519223.exe r5824951.exe PID 1292 wrote to memory of 3536 1292 z3519223.exe r5824951.exe PID 3536 wrote to memory of 1840 3536 r5824951.exe AppLaunch.exe PID 3536 wrote to memory of 1840 3536 r5824951.exe AppLaunch.exe PID 3536 wrote to memory of 1840 3536 r5824951.exe AppLaunch.exe PID 3536 wrote to memory of 1840 3536 r5824951.exe AppLaunch.exe PID 3536 wrote to memory of 1840 3536 r5824951.exe AppLaunch.exe PID 3536 wrote to memory of 1840 3536 r5824951.exe AppLaunch.exe PID 3536 wrote to memory of 1840 3536 r5824951.exe AppLaunch.exe PID 3536 wrote to memory of 1840 3536 r5824951.exe AppLaunch.exe PID 3536 wrote to memory of 1840 3536 r5824951.exe AppLaunch.exe PID 3536 wrote to memory of 1840 3536 r5824951.exe AppLaunch.exe PID 688 wrote to memory of 1508 688 z9723267.exe s7999210.exe PID 688 wrote to memory of 1508 688 z9723267.exe s7999210.exe PID 688 wrote to memory of 1508 688 z9723267.exe s7999210.exe PID 1508 wrote to memory of 864 1508 s7999210.exe AppLaunch.exe PID 1508 wrote to memory of 864 1508 s7999210.exe AppLaunch.exe PID 1508 wrote to memory of 864 1508 s7999210.exe AppLaunch.exe PID 1508 wrote to memory of 864 1508 s7999210.exe AppLaunch.exe PID 1508 wrote to memory of 864 1508 s7999210.exe AppLaunch.exe PID 1508 wrote to memory of 864 1508 s7999210.exe AppLaunch.exe PID 1508 wrote to memory of 864 1508 s7999210.exe AppLaunch.exe PID 1508 wrote to memory of 864 1508 s7999210.exe AppLaunch.exe PID 2988 wrote to memory of 3504 2988 z7664267.exe t9527668.exe PID 2988 wrote to memory of 3504 2988 z7664267.exe t9527668.exe PID 2988 wrote to memory of 3504 2988 z7664267.exe t9527668.exe PID 3504 wrote to memory of 404 3504 t9527668.exe explothe.exe PID 3504 wrote to memory of 404 3504 t9527668.exe explothe.exe PID 3504 wrote to memory of 404 3504 t9527668.exe explothe.exe PID 4444 wrote to memory of 4988 4444 z2213400.exe u8692610.exe PID 4444 wrote to memory of 4988 4444 z2213400.exe u8692610.exe PID 4444 wrote to memory of 4988 4444 z2213400.exe u8692610.exe PID 404 wrote to memory of 1496 404 explothe.exe schtasks.exe PID 404 wrote to memory of 1496 404 explothe.exe schtasks.exe PID 404 wrote to memory of 1496 404 explothe.exe schtasks.exe PID 404 wrote to memory of 4396 404 explothe.exe cmd.exe PID 404 wrote to memory of 4396 404 explothe.exe cmd.exe PID 404 wrote to memory of 4396 404 explothe.exe cmd.exe PID 4988 wrote to memory of 4616 4988 u8692610.exe legota.exe PID 4988 wrote to memory of 4616 4988 u8692610.exe legota.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\231e5d06b59d9da06ebd417e1a78100df5b868ab57bf4452c872e5c68a428b21.exe"C:\Users\Admin\AppData\Local\Temp\231e5d06b59d9da06ebd417e1a78100df5b868ab57bf4452c872e5c68a428b21.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2213400.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2213400.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7664267.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7664267.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9723267.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9723267.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3519223.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3519223.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6283094.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6283094.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1260 -s 5887⤵
- Program crash
PID:568
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5824951.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5824951.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 5408⤵
- Program crash
PID:2344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 1487⤵
- Program crash
PID:3672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7999210.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7999210.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 5966⤵
- Program crash
PID:1296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9527668.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9527668.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:1496
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:3272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4248
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:2680
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3728
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8692610.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8692610.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4616 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:5112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:2916
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:2728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1608
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4476
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6685940.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6685940.exe2⤵
- Executes dropped EXE
PID:1020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1260 -ip 12601⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3536 -ip 35361⤵PID:1904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1840 -ip 18401⤵PID:2816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1508 -ip 15081⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1956
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4268
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1312
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2920
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD51d553a13001953e084862408a1be07af
SHA145e2758e2d7dd4c24ef8012fc9510a8027163b20
SHA256a4ee0a66fac2cd4f3263aec5326fd48ac84763e6c24755bc01bc84d2805cc4db
SHA51259f3a89e6ccaf193e6952f95e979679a42352c2d0bc1a36b312a3885d55323ca2797bfe223b46c4c79acb4680ed89737d2760e2d157a677d15245c845bec9893
-
Filesize
23KB
MD51d553a13001953e084862408a1be07af
SHA145e2758e2d7dd4c24ef8012fc9510a8027163b20
SHA256a4ee0a66fac2cd4f3263aec5326fd48ac84763e6c24755bc01bc84d2805cc4db
SHA51259f3a89e6ccaf193e6952f95e979679a42352c2d0bc1a36b312a3885d55323ca2797bfe223b46c4c79acb4680ed89737d2760e2d157a677d15245c845bec9893
-
Filesize
982KB
MD5baa72f87b2a63f13928de45baccd935f
SHA12d57a016c01d41e7a7a49033f8760c966ea167cd
SHA256242882e9fcb1da6ee48aac9e9b95fff70317f3cbf7db3a61ba58c7c7d67bd49d
SHA512cd9653f196d543907ae6c0c38ebef6c25d1fd38be655c3a285a42569466b7eaf82bb270be3bca9e3aa266b82e608ed2adeb2145d3337b968d598a4d1f28060cb
-
Filesize
982KB
MD5baa72f87b2a63f13928de45baccd935f
SHA12d57a016c01d41e7a7a49033f8760c966ea167cd
SHA256242882e9fcb1da6ee48aac9e9b95fff70317f3cbf7db3a61ba58c7c7d67bd49d
SHA512cd9653f196d543907ae6c0c38ebef6c25d1fd38be655c3a285a42569466b7eaf82bb270be3bca9e3aa266b82e608ed2adeb2145d3337b968d598a4d1f28060cb
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
799KB
MD5a6c6b4ccb397ee25bb9df7779308d0b1
SHA17eb56ac1a4771aa3560629b2e0fb4047592397b1
SHA256054b197fdc32d96b4ab3f444b7ac6775b1c63283289d33d1d542dc35a0637268
SHA5123c4f8511b6ffc0859e433e6a12fe7598364d43b6a14fc82c9f4eed40bbddc6c06e6a16531dd5f1eb077237590a1477e6bce8f00b899d0d00ca4864da47109bfb
-
Filesize
799KB
MD5a6c6b4ccb397ee25bb9df7779308d0b1
SHA17eb56ac1a4771aa3560629b2e0fb4047592397b1
SHA256054b197fdc32d96b4ab3f444b7ac6775b1c63283289d33d1d542dc35a0637268
SHA5123c4f8511b6ffc0859e433e6a12fe7598364d43b6a14fc82c9f4eed40bbddc6c06e6a16531dd5f1eb077237590a1477e6bce8f00b899d0d00ca4864da47109bfb
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
616KB
MD5e266b86a6f8b554fbbc9c4dd64adb037
SHA13e10597950b015939adc45906c6b3d5aebd8196d
SHA25686443a0cde360990fa68c2f4a863a898b4a8d95958acb621e4564df690fe0598
SHA512c7558d05f39a1efed8ecd9eece44a372160030d6dee31086f250d5c205775f9666d6669347864e567a91a88066810225852ff24b0ab8c24cbb775329bcca2a6c
-
Filesize
616KB
MD5e266b86a6f8b554fbbc9c4dd64adb037
SHA13e10597950b015939adc45906c6b3d5aebd8196d
SHA25686443a0cde360990fa68c2f4a863a898b4a8d95958acb621e4564df690fe0598
SHA512c7558d05f39a1efed8ecd9eece44a372160030d6dee31086f250d5c205775f9666d6669347864e567a91a88066810225852ff24b0ab8c24cbb775329bcca2a6c
-
Filesize
390KB
MD5efa3ff65bfb5772b65296f9a81590694
SHA1ff4b9227cc1d92d4efb93bb0e0a12113ea51a780
SHA2563f7c5ebe1643748d0c75cc856dae0157cc44c43a767e5b4df2835977583a50c0
SHA512d7a9a9940d760957bfbbaf31692a1f8de47e8fe0b0ab700d4f6b179c49f7604e400aeeb028712bebc79e195097466354ae5ad42689f13b45fb7559f61a9a5868
-
Filesize
390KB
MD5efa3ff65bfb5772b65296f9a81590694
SHA1ff4b9227cc1d92d4efb93bb0e0a12113ea51a780
SHA2563f7c5ebe1643748d0c75cc856dae0157cc44c43a767e5b4df2835977583a50c0
SHA512d7a9a9940d760957bfbbaf31692a1f8de47e8fe0b0ab700d4f6b179c49f7604e400aeeb028712bebc79e195097466354ae5ad42689f13b45fb7559f61a9a5868
-
Filesize
346KB
MD53edd24cadb6f0e387892b7dec373c871
SHA146ce8cefcf91339bc248f0f734f1af8947abc80c
SHA25660430254cb8388016d9e5cc7c7e52cf9353fdb6532de2898e0e6e7c0af9369a4
SHA51288597c86ac58c2a19b0ba2ab46aca1ff10d8d79edc53173a2dec0358d1426f698d98a5cb8d95999b88a1cb23c9bbc5247c56bf165289e6b34e55eb5c30ef250e
-
Filesize
346KB
MD53edd24cadb6f0e387892b7dec373c871
SHA146ce8cefcf91339bc248f0f734f1af8947abc80c
SHA25660430254cb8388016d9e5cc7c7e52cf9353fdb6532de2898e0e6e7c0af9369a4
SHA51288597c86ac58c2a19b0ba2ab46aca1ff10d8d79edc53173a2dec0358d1426f698d98a5cb8d95999b88a1cb23c9bbc5247c56bf165289e6b34e55eb5c30ef250e
-
Filesize
227KB
MD5f1405104bef752077c08b2a7c82ba2fd
SHA1f7253861b7febe3e44b91a9c6f0a555cd4e74430
SHA2569f99df71dd374e14d9b7fb6d5dd620c70d41f8b6c3ce964d1dbee0c1d0a9279c
SHA512bd31a5da9bdae27b869b2c974b2b598357d732b01914a631cc0143063a72fadb681d3a820bc794929ce0621b80bc63326a35e13d3d8457b42f7a6c641472ab78
-
Filesize
227KB
MD5f1405104bef752077c08b2a7c82ba2fd
SHA1f7253861b7febe3e44b91a9c6f0a555cd4e74430
SHA2569f99df71dd374e14d9b7fb6d5dd620c70d41f8b6c3ce964d1dbee0c1d0a9279c
SHA512bd31a5da9bdae27b869b2c974b2b598357d732b01914a631cc0143063a72fadb681d3a820bc794929ce0621b80bc63326a35e13d3d8457b42f7a6c641472ab78
-
Filesize
356KB
MD5c8294973cb5ddae427def821ac3b14f3
SHA1cbcab16e9323a47e970b7cf55f3cc62b57156c66
SHA256124dd68c60f0ebb1626a1e1b6ab92e288c9e007c69613d4bb680b3c79bd76e36
SHA512b00855eb35bd26a65e9b6ec5b0a48195d6d76c0672fda715fc53062348b001d2a20145427d503778176bf499f518be3dd3f49258d48bca0c1908bd1b10e55456
-
Filesize
356KB
MD5c8294973cb5ddae427def821ac3b14f3
SHA1cbcab16e9323a47e970b7cf55f3cc62b57156c66
SHA256124dd68c60f0ebb1626a1e1b6ab92e288c9e007c69613d4bb680b3c79bd76e36
SHA512b00855eb35bd26a65e9b6ec5b0a48195d6d76c0672fda715fc53062348b001d2a20145427d503778176bf499f518be3dd3f49258d48bca0c1908bd1b10e55456
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0