Analysis
-
max time kernel
145s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 05:33
Static task
static1
Behavioral task
behavioral1
Sample
45abb02900dbba8f0331d7190d5c462f85a7f3b05815251eafebb20b381113e7.exe
Resource
win7-20230831-en
General
-
Target
45abb02900dbba8f0331d7190d5c462f85a7f3b05815251eafebb20b381113e7.exe
-
Size
1.1MB
-
MD5
85e89f8bfaf9ed483a4e9fa859c282a5
-
SHA1
d885d3d1d3bd4771b9f611cfbdd872b4910de33c
-
SHA256
45abb02900dbba8f0331d7190d5c462f85a7f3b05815251eafebb20b381113e7
-
SHA512
d140bd240012eb699e26d94809992fc2f9c5be6ce7fc0fc80d3131113ef11632ae2b7ff931e04f6985e00da6a93841f731e1f254808d0b37e1da46c248236a07
-
SSDEEP
24576:iyP8Uku1Gm1kQRXmLYlBKIA6SccEuu4GJzJOUqVkOf8ChI6ADWH3hk:JP8Uku1GjqmLkMIA6GEuu4Wktf8gIb6h
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2572-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2572-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2572-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2572-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2304-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t0845991.exeexplothe.exeu1668429.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation t0845991.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation u1668429.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z1677833.exez9492946.exez1435181.exez8449661.exeq2895186.exer8825203.exes9462066.exet0845991.exeexplothe.exeu1668429.exelegota.exew5159951.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4880 z1677833.exe 4364 z9492946.exe 944 z1435181.exe 1668 z8449661.exe 1308 q2895186.exe 3384 r8825203.exe 1280 s9462066.exe 380 t0845991.exe 2512 explothe.exe 4368 u1668429.exe 1656 legota.exe 5044 w5159951.exe 3716 explothe.exe 2416 legota.exe 916 explothe.exe 1832 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3852 rundll32.exe 4840 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
45abb02900dbba8f0331d7190d5c462f85a7f3b05815251eafebb20b381113e7.exez1677833.exez9492946.exez1435181.exez8449661.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45abb02900dbba8f0331d7190d5c462f85a7f3b05815251eafebb20b381113e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1677833.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9492946.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z1435181.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z8449661.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q2895186.exer8825203.exes9462066.exedescription pid process target process PID 1308 set thread context of 2304 1308 q2895186.exe AppLaunch.exe PID 3384 set thread context of 2572 3384 r8825203.exe AppLaunch.exe PID 1280 set thread context of 4808 1280 s9462066.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1832 1308 WerFault.exe q2895186.exe 3464 2572 WerFault.exe AppLaunch.exe 3124 3384 WerFault.exe r8825203.exe 3212 1280 WerFault.exe s9462066.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3096 schtasks.exe 2844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 2304 AppLaunch.exe 2304 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 2304 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
45abb02900dbba8f0331d7190d5c462f85a7f3b05815251eafebb20b381113e7.exez1677833.exez9492946.exez1435181.exez8449661.exeq2895186.exer8825203.exes9462066.exet0845991.exeexplothe.execmd.exedescription pid process target process PID 3740 wrote to memory of 4880 3740 45abb02900dbba8f0331d7190d5c462f85a7f3b05815251eafebb20b381113e7.exe z1677833.exe PID 3740 wrote to memory of 4880 3740 45abb02900dbba8f0331d7190d5c462f85a7f3b05815251eafebb20b381113e7.exe z1677833.exe PID 3740 wrote to memory of 4880 3740 45abb02900dbba8f0331d7190d5c462f85a7f3b05815251eafebb20b381113e7.exe z1677833.exe PID 4880 wrote to memory of 4364 4880 z1677833.exe z9492946.exe PID 4880 wrote to memory of 4364 4880 z1677833.exe z9492946.exe PID 4880 wrote to memory of 4364 4880 z1677833.exe z9492946.exe PID 4364 wrote to memory of 944 4364 z9492946.exe z1435181.exe PID 4364 wrote to memory of 944 4364 z9492946.exe z1435181.exe PID 4364 wrote to memory of 944 4364 z9492946.exe z1435181.exe PID 944 wrote to memory of 1668 944 z1435181.exe z8449661.exe PID 944 wrote to memory of 1668 944 z1435181.exe z8449661.exe PID 944 wrote to memory of 1668 944 z1435181.exe z8449661.exe PID 1668 wrote to memory of 1308 1668 z8449661.exe q2895186.exe PID 1668 wrote to memory of 1308 1668 z8449661.exe q2895186.exe PID 1668 wrote to memory of 1308 1668 z8449661.exe q2895186.exe PID 1308 wrote to memory of 2304 1308 q2895186.exe AppLaunch.exe PID 1308 wrote to memory of 2304 1308 q2895186.exe AppLaunch.exe PID 1308 wrote to memory of 2304 1308 q2895186.exe AppLaunch.exe PID 1308 wrote to memory of 2304 1308 q2895186.exe AppLaunch.exe PID 1308 wrote to memory of 2304 1308 q2895186.exe AppLaunch.exe PID 1308 wrote to memory of 2304 1308 q2895186.exe AppLaunch.exe PID 1308 wrote to memory of 2304 1308 q2895186.exe AppLaunch.exe PID 1308 wrote to memory of 2304 1308 q2895186.exe AppLaunch.exe PID 1668 wrote to memory of 3384 1668 z8449661.exe r8825203.exe PID 1668 wrote to memory of 3384 1668 z8449661.exe r8825203.exe PID 1668 wrote to memory of 3384 1668 z8449661.exe r8825203.exe PID 3384 wrote to memory of 2572 3384 r8825203.exe AppLaunch.exe PID 3384 wrote to memory of 2572 3384 r8825203.exe AppLaunch.exe PID 3384 wrote to memory of 2572 3384 r8825203.exe AppLaunch.exe PID 3384 wrote to memory of 2572 3384 r8825203.exe AppLaunch.exe PID 3384 wrote to memory of 2572 3384 r8825203.exe AppLaunch.exe PID 3384 wrote to memory of 2572 3384 r8825203.exe AppLaunch.exe PID 3384 wrote to memory of 2572 3384 r8825203.exe AppLaunch.exe PID 3384 wrote to memory of 2572 3384 r8825203.exe AppLaunch.exe PID 3384 wrote to memory of 2572 3384 r8825203.exe AppLaunch.exe PID 3384 wrote to memory of 2572 3384 r8825203.exe AppLaunch.exe PID 944 wrote to memory of 1280 944 z1435181.exe s9462066.exe PID 944 wrote to memory of 1280 944 z1435181.exe s9462066.exe PID 944 wrote to memory of 1280 944 z1435181.exe s9462066.exe PID 1280 wrote to memory of 4808 1280 s9462066.exe AppLaunch.exe PID 1280 wrote to memory of 4808 1280 s9462066.exe AppLaunch.exe PID 1280 wrote to memory of 4808 1280 s9462066.exe AppLaunch.exe PID 1280 wrote to memory of 4808 1280 s9462066.exe AppLaunch.exe PID 1280 wrote to memory of 4808 1280 s9462066.exe AppLaunch.exe PID 1280 wrote to memory of 4808 1280 s9462066.exe AppLaunch.exe PID 1280 wrote to memory of 4808 1280 s9462066.exe AppLaunch.exe PID 1280 wrote to memory of 4808 1280 s9462066.exe AppLaunch.exe PID 4364 wrote to memory of 380 4364 z9492946.exe t0845991.exe PID 4364 wrote to memory of 380 4364 z9492946.exe t0845991.exe PID 4364 wrote to memory of 380 4364 z9492946.exe t0845991.exe PID 380 wrote to memory of 2512 380 t0845991.exe explothe.exe PID 380 wrote to memory of 2512 380 t0845991.exe explothe.exe PID 380 wrote to memory of 2512 380 t0845991.exe explothe.exe PID 4880 wrote to memory of 4368 4880 z1677833.exe u1668429.exe PID 4880 wrote to memory of 4368 4880 z1677833.exe u1668429.exe PID 4880 wrote to memory of 4368 4880 z1677833.exe u1668429.exe PID 2512 wrote to memory of 3096 2512 explothe.exe schtasks.exe PID 2512 wrote to memory of 3096 2512 explothe.exe schtasks.exe PID 2512 wrote to memory of 3096 2512 explothe.exe schtasks.exe PID 2512 wrote to memory of 4956 2512 explothe.exe cmd.exe PID 2512 wrote to memory of 4956 2512 explothe.exe cmd.exe PID 2512 wrote to memory of 4956 2512 explothe.exe cmd.exe PID 4956 wrote to memory of 5064 4956 cmd.exe cmd.exe PID 4956 wrote to memory of 5064 4956 cmd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45abb02900dbba8f0331d7190d5c462f85a7f3b05815251eafebb20b381113e7.exe"C:\Users\Admin\AppData\Local\Temp\45abb02900dbba8f0331d7190d5c462f85a7f3b05815251eafebb20b381113e7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1677833.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1677833.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9492946.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9492946.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1435181.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1435181.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8449661.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8449661.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2895186.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2895186.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 5887⤵
- Program crash
PID:1832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8825203.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8825203.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 5408⤵
- Program crash
PID:3464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 1487⤵
- Program crash
PID:3124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9462066.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s9462066.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 1526⤵
- Program crash
PID:3212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0845991.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0845991.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:3096
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:4128
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:1160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4496
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3852
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1668429.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1668429.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:2844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:3388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4436
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:1636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:2708
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:3184
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4840
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5159951.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5159951.exe2⤵
- Executes dropped EXE
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1308 -ip 13081⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3384 -ip 33841⤵PID:4516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2572 -ip 25721⤵PID:1592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1280 -ip 12801⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3716
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2416
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:916
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1832
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5b92b45d89d7a9d075e573b148988c5e9
SHA1a0c2bec5f57b8b2549eb984eb5d412a9814acf47
SHA25699cf3342f4f55f8384c24a7c6c3e47c791a1bd5ccd0b26f4c93c1e82ba281a58
SHA51270d606c34604177818e52fd45a09befe95387b7d284eb69f7200887cbee005328a8a327c9c6cb86c060b74ff1ce04add213a1c10f0bcbf0e67311d740fb6ff7f
-
Filesize
23KB
MD5b92b45d89d7a9d075e573b148988c5e9
SHA1a0c2bec5f57b8b2549eb984eb5d412a9814acf47
SHA25699cf3342f4f55f8384c24a7c6c3e47c791a1bd5ccd0b26f4c93c1e82ba281a58
SHA51270d606c34604177818e52fd45a09befe95387b7d284eb69f7200887cbee005328a8a327c9c6cb86c060b74ff1ce04add213a1c10f0bcbf0e67311d740fb6ff7f
-
Filesize
982KB
MD5545552512144ff928d11a2b76c36afb8
SHA10e379fc7f6b320f97f4341eb45e65dd55f948da1
SHA256caaceaa02b9df110538ffe185423c91b482de55b7d808e760ac7a59dfe3b9ee2
SHA5120cead5b35038320a6717c93d76ce8712776f9b15ca71b76f82e241ee83d0eafbb7bcd301ae0b1db689cd04685aef1e662b2ea922fffa30ec095041916e9e7d3c
-
Filesize
982KB
MD5545552512144ff928d11a2b76c36afb8
SHA10e379fc7f6b320f97f4341eb45e65dd55f948da1
SHA256caaceaa02b9df110538ffe185423c91b482de55b7d808e760ac7a59dfe3b9ee2
SHA5120cead5b35038320a6717c93d76ce8712776f9b15ca71b76f82e241ee83d0eafbb7bcd301ae0b1db689cd04685aef1e662b2ea922fffa30ec095041916e9e7d3c
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
800KB
MD5fb6ebb09bb59fa28594888a9fe739a7b
SHA1b601c04288d0e1105aa6244ac0be7d0fb2ff440c
SHA256b4ca43a4cc8a3eca695dd55b72aeaeeec872d9b04e929b3053bdc850a30752d4
SHA51257e68e765fc8d390a064e40044e9aceb9ea6d84de9cb31c6dd670a99fd7e1a996c35a6af23f15f1ec0fbe1a355c9a4f4bc9ffb816dc9d97eac6c909c78e981eb
-
Filesize
800KB
MD5fb6ebb09bb59fa28594888a9fe739a7b
SHA1b601c04288d0e1105aa6244ac0be7d0fb2ff440c
SHA256b4ca43a4cc8a3eca695dd55b72aeaeeec872d9b04e929b3053bdc850a30752d4
SHA51257e68e765fc8d390a064e40044e9aceb9ea6d84de9cb31c6dd670a99fd7e1a996c35a6af23f15f1ec0fbe1a355c9a4f4bc9ffb816dc9d97eac6c909c78e981eb
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
617KB
MD50fbd4cc2ca1408a4188d4bf7de17db70
SHA1bf50cda50345a6982d62b30a0b363029b4009039
SHA25601b4849d9be262281e485caee51b4163baaeb85285aff2ebe757f549d6bc7919
SHA512126a4bced06411e29a1ba8a44bb92351b5686c78ba4fe4b2d87f0645c7d6635c0ddf2b0a840d546f8ad0a00e25d7921b74cd8c658d6e873b83aed8ce0e4b0a1a
-
Filesize
617KB
MD50fbd4cc2ca1408a4188d4bf7de17db70
SHA1bf50cda50345a6982d62b30a0b363029b4009039
SHA25601b4849d9be262281e485caee51b4163baaeb85285aff2ebe757f549d6bc7919
SHA512126a4bced06411e29a1ba8a44bb92351b5686c78ba4fe4b2d87f0645c7d6635c0ddf2b0a840d546f8ad0a00e25d7921b74cd8c658d6e873b83aed8ce0e4b0a1a
-
Filesize
390KB
MD5e84ecaacb620f03aa3f0d3a73322183a
SHA1b1c1ec19a0f433e81e70fc7ca8c72e8b1eac963f
SHA256c2578d602dd67472e90fb7be077629c15e901b848a95c020ace0dec5ff94fafa
SHA5123e6ab9111ddb5054bbbda0a1779e45b0cac32c93f0ad01713cf24c48f9bf7ce132b37e20f49fefa9c4b965e22234b96098c33146fda8d17d7c50f89ff5cc98ba
-
Filesize
390KB
MD5e84ecaacb620f03aa3f0d3a73322183a
SHA1b1c1ec19a0f433e81e70fc7ca8c72e8b1eac963f
SHA256c2578d602dd67472e90fb7be077629c15e901b848a95c020ace0dec5ff94fafa
SHA5123e6ab9111ddb5054bbbda0a1779e45b0cac32c93f0ad01713cf24c48f9bf7ce132b37e20f49fefa9c4b965e22234b96098c33146fda8d17d7c50f89ff5cc98ba
-
Filesize
346KB
MD5fd83aaa61de2b221c43da5db97e3fdf5
SHA18c70b186e5ad346df0aa4a090cd63193be6d417c
SHA256d53851f81c4d11a81a85b9cdbb496c9a087ce69eb61d3aa30aa9d691c55691c9
SHA512c89f4cc6eaacd37d12ed729c3926f561e3776e57e13637dbea14c84881dd16bb7bbfc2c646767c5b7ce10f9b4c07b0bc55a9a41d8c6d8dccf9bd72b7d787da42
-
Filesize
346KB
MD5fd83aaa61de2b221c43da5db97e3fdf5
SHA18c70b186e5ad346df0aa4a090cd63193be6d417c
SHA256d53851f81c4d11a81a85b9cdbb496c9a087ce69eb61d3aa30aa9d691c55691c9
SHA512c89f4cc6eaacd37d12ed729c3926f561e3776e57e13637dbea14c84881dd16bb7bbfc2c646767c5b7ce10f9b4c07b0bc55a9a41d8c6d8dccf9bd72b7d787da42
-
Filesize
227KB
MD59150f937954000f2857b3211ec876649
SHA1b8dd8b2cb9ea66f7318dfaa5c189a94df12973a0
SHA256f19e2959deb51de4ae96b20bbe41c7d28be3eacae8cd0790298bc0f12a51710c
SHA512d9d7bf733e1ec5e83dfbabd226aa9483308b9b8a3ad2d2e89654075c1f71f4fa6f8cdcbe68e19fbe50cba27750f14c7fd4d7a08fb8c42fa5410262fb979b349a
-
Filesize
227KB
MD59150f937954000f2857b3211ec876649
SHA1b8dd8b2cb9ea66f7318dfaa5c189a94df12973a0
SHA256f19e2959deb51de4ae96b20bbe41c7d28be3eacae8cd0790298bc0f12a51710c
SHA512d9d7bf733e1ec5e83dfbabd226aa9483308b9b8a3ad2d2e89654075c1f71f4fa6f8cdcbe68e19fbe50cba27750f14c7fd4d7a08fb8c42fa5410262fb979b349a
-
Filesize
356KB
MD57e7e0aec313482697a96b45f42f17cfd
SHA14901d4783c3b76672d33e72f5f1874e0d3cc356e
SHA256fb4e4facde2cc23ffde86a9e599cd2178f4c19d11026664407d50e300faef6ce
SHA512966101afcf9db5a8946e081f0e2f1544ed0f0fbec2afd860eb09b354dd520722b0e8342d58b54288d28daee0e1982183e2b0755a31cea398633734982c19d3c6
-
Filesize
356KB
MD57e7e0aec313482697a96b45f42f17cfd
SHA14901d4783c3b76672d33e72f5f1874e0d3cc356e
SHA256fb4e4facde2cc23ffde86a9e599cd2178f4c19d11026664407d50e300faef6ce
SHA512966101afcf9db5a8946e081f0e2f1544ed0f0fbec2afd860eb09b354dd520722b0e8342d58b54288d28daee0e1982183e2b0755a31cea398633734982c19d3c6
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0