Analysis
-
max time kernel
149s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 04:48
Static task
static1
Behavioral task
behavioral1
Sample
00304daad986944c62e3bdc85217e16c.exe
Resource
win7-20230831-en
General
-
Target
00304daad986944c62e3bdc85217e16c.exe
-
Size
1.1MB
-
MD5
00304daad986944c62e3bdc85217e16c
-
SHA1
ff3d833bd13d915a5ea4517bf56ac4144480170a
-
SHA256
3c06b888fa64e1994ad92bda806599ea9cc2af64aaa33f7f77ba9f3e6f29c811
-
SHA512
dcc5cb10e522aca5022810dd3a925b4ba6919b0de4d2733811c9785457043e554e4533e04899246608d74ca59290c902c8d843c18adc449d08ca3abaeb8e27c8
-
SSDEEP
24576:myhXYARBQdLar0HTXm6/wLwSLOFSP+AcNMaLKW:1hXYARmLdyIAOFSP+/jLK
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4548-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4548-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4548-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4548-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1516-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t8352732.exeexplothe.exeu7792977.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation t8352732.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation u7792977.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z6062802.exez0589186.exez5886800.exez6340952.exeq8311641.exer4308167.exes2700582.exet8352732.exeexplothe.exeu7792977.exelegota.exew0597426.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 4104 z6062802.exe 2684 z0589186.exe 944 z5886800.exe 2236 z6340952.exe 3784 q8311641.exe 3996 r4308167.exe 2756 s2700582.exe 340 t8352732.exe 636 explothe.exe 4740 u7792977.exe 4172 legota.exe 2044 w0597426.exe 3608 explothe.exe 2728 legota.exe 2660 explothe.exe 1588 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4692 rundll32.exe 624 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z5886800.exez6340952.exe00304daad986944c62e3bdc85217e16c.exez6062802.exez0589186.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z5886800.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z6340952.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 00304daad986944c62e3bdc85217e16c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6062802.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0589186.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q8311641.exer4308167.exes2700582.exedescription pid process target process PID 3784 set thread context of 1516 3784 q8311641.exe AppLaunch.exe PID 3996 set thread context of 4548 3996 r4308167.exe AppLaunch.exe PID 2756 set thread context of 4832 2756 s2700582.exe AppLaunch.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3692 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2492 3784 WerFault.exe q8311641.exe 3892 3996 WerFault.exe r4308167.exe 1276 4548 WerFault.exe AppLaunch.exe 1928 2756 WerFault.exe s2700582.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 728 schtasks.exe 4276 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1516 AppLaunch.exe 1516 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1516 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
00304daad986944c62e3bdc85217e16c.exez6062802.exez0589186.exez5886800.exez6340952.exeq8311641.exer4308167.exes2700582.exet8352732.exeexplothe.exedescription pid process target process PID 2664 wrote to memory of 4104 2664 00304daad986944c62e3bdc85217e16c.exe z6062802.exe PID 2664 wrote to memory of 4104 2664 00304daad986944c62e3bdc85217e16c.exe z6062802.exe PID 2664 wrote to memory of 4104 2664 00304daad986944c62e3bdc85217e16c.exe z6062802.exe PID 4104 wrote to memory of 2684 4104 z6062802.exe z0589186.exe PID 4104 wrote to memory of 2684 4104 z6062802.exe z0589186.exe PID 4104 wrote to memory of 2684 4104 z6062802.exe z0589186.exe PID 2684 wrote to memory of 944 2684 z0589186.exe z5886800.exe PID 2684 wrote to memory of 944 2684 z0589186.exe z5886800.exe PID 2684 wrote to memory of 944 2684 z0589186.exe z5886800.exe PID 944 wrote to memory of 2236 944 z5886800.exe z6340952.exe PID 944 wrote to memory of 2236 944 z5886800.exe z6340952.exe PID 944 wrote to memory of 2236 944 z5886800.exe z6340952.exe PID 2236 wrote to memory of 3784 2236 z6340952.exe q8311641.exe PID 2236 wrote to memory of 3784 2236 z6340952.exe q8311641.exe PID 2236 wrote to memory of 3784 2236 z6340952.exe q8311641.exe PID 3784 wrote to memory of 4004 3784 q8311641.exe AppLaunch.exe PID 3784 wrote to memory of 4004 3784 q8311641.exe AppLaunch.exe PID 3784 wrote to memory of 4004 3784 q8311641.exe AppLaunch.exe PID 3784 wrote to memory of 1516 3784 q8311641.exe AppLaunch.exe PID 3784 wrote to memory of 1516 3784 q8311641.exe AppLaunch.exe PID 3784 wrote to memory of 1516 3784 q8311641.exe AppLaunch.exe PID 3784 wrote to memory of 1516 3784 q8311641.exe AppLaunch.exe PID 3784 wrote to memory of 1516 3784 q8311641.exe AppLaunch.exe PID 3784 wrote to memory of 1516 3784 q8311641.exe AppLaunch.exe PID 3784 wrote to memory of 1516 3784 q8311641.exe AppLaunch.exe PID 3784 wrote to memory of 1516 3784 q8311641.exe AppLaunch.exe PID 2236 wrote to memory of 3996 2236 z6340952.exe r4308167.exe PID 2236 wrote to memory of 3996 2236 z6340952.exe r4308167.exe PID 2236 wrote to memory of 3996 2236 z6340952.exe r4308167.exe PID 3996 wrote to memory of 2560 3996 r4308167.exe AppLaunch.exe PID 3996 wrote to memory of 2560 3996 r4308167.exe AppLaunch.exe PID 3996 wrote to memory of 2560 3996 r4308167.exe AppLaunch.exe PID 3996 wrote to memory of 4548 3996 r4308167.exe AppLaunch.exe PID 3996 wrote to memory of 4548 3996 r4308167.exe AppLaunch.exe PID 3996 wrote to memory of 4548 3996 r4308167.exe AppLaunch.exe PID 3996 wrote to memory of 4548 3996 r4308167.exe AppLaunch.exe PID 3996 wrote to memory of 4548 3996 r4308167.exe AppLaunch.exe PID 3996 wrote to memory of 4548 3996 r4308167.exe AppLaunch.exe PID 3996 wrote to memory of 4548 3996 r4308167.exe AppLaunch.exe PID 3996 wrote to memory of 4548 3996 r4308167.exe AppLaunch.exe PID 3996 wrote to memory of 4548 3996 r4308167.exe AppLaunch.exe PID 3996 wrote to memory of 4548 3996 r4308167.exe AppLaunch.exe PID 944 wrote to memory of 2756 944 z5886800.exe s2700582.exe PID 944 wrote to memory of 2756 944 z5886800.exe s2700582.exe PID 944 wrote to memory of 2756 944 z5886800.exe s2700582.exe PID 2756 wrote to memory of 4832 2756 s2700582.exe AppLaunch.exe PID 2756 wrote to memory of 4832 2756 s2700582.exe AppLaunch.exe PID 2756 wrote to memory of 4832 2756 s2700582.exe AppLaunch.exe PID 2756 wrote to memory of 4832 2756 s2700582.exe AppLaunch.exe PID 2756 wrote to memory of 4832 2756 s2700582.exe AppLaunch.exe PID 2756 wrote to memory of 4832 2756 s2700582.exe AppLaunch.exe PID 2756 wrote to memory of 4832 2756 s2700582.exe AppLaunch.exe PID 2756 wrote to memory of 4832 2756 s2700582.exe AppLaunch.exe PID 2684 wrote to memory of 340 2684 z0589186.exe t8352732.exe PID 2684 wrote to memory of 340 2684 z0589186.exe t8352732.exe PID 2684 wrote to memory of 340 2684 z0589186.exe t8352732.exe PID 340 wrote to memory of 636 340 t8352732.exe explothe.exe PID 340 wrote to memory of 636 340 t8352732.exe explothe.exe PID 340 wrote to memory of 636 340 t8352732.exe explothe.exe PID 4104 wrote to memory of 4740 4104 z6062802.exe u7792977.exe PID 4104 wrote to memory of 4740 4104 z6062802.exe u7792977.exe PID 4104 wrote to memory of 4740 4104 z6062802.exe u7792977.exe PID 636 wrote to memory of 728 636 explothe.exe schtasks.exe PID 636 wrote to memory of 728 636 explothe.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00304daad986944c62e3bdc85217e16c.exe"C:\Users\Admin\AppData\Local\Temp\00304daad986944c62e3bdc85217e16c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6062802.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6062802.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0589186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0589186.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5886800.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5886800.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6340952.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6340952.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8311641.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8311641.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 6207⤵
- Program crash
PID:2492
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4308167.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4308167.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 2008⤵
- Program crash
PID:1276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 5887⤵
- Program crash
PID:3892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2700582.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2700582.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 1526⤵
- Program crash
PID:1928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t8352732.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t8352732.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:2316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:1640
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2492
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3784
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3252
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u7792977.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u7792977.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4172 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:4276
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:3632
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:2716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4412
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:2836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4048
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:880
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:624
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0597426.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0597426.exe2⤵
- Executes dropped EXE
PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3784 -ip 37841⤵PID:1020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3996 -ip 39961⤵PID:3680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4548 -ip 45481⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2756 -ip 27561⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3608
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2728
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2660
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1588
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3692
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD59c69c6344715bcbbb9f1e7e4310bd9bf
SHA148625cdd156fc3fbc943a9b73a28fee23e227c89
SHA256014068c3caf206d7de36f86cd597d6626d322446e6d264475f196d7ba4d50180
SHA512735b6998373e106b16e8078548712b637ca54a5358ca75cfee5b8314a9206465cb4662a256354d32b92f2893a15c11e9aa368627c2f90f9e3603b4916945cb28
-
Filesize
23KB
MD59c69c6344715bcbbb9f1e7e4310bd9bf
SHA148625cdd156fc3fbc943a9b73a28fee23e227c89
SHA256014068c3caf206d7de36f86cd597d6626d322446e6d264475f196d7ba4d50180
SHA512735b6998373e106b16e8078548712b637ca54a5358ca75cfee5b8314a9206465cb4662a256354d32b92f2893a15c11e9aa368627c2f90f9e3603b4916945cb28
-
Filesize
983KB
MD5a99c5c8035b84c06ab3a8acc4913b38c
SHA1d5b672f82fc7c434dc9e98399377c7eff5df6276
SHA25625a753a24ef7feb7829b5987dc7a651dd6e58d2c406448141667c5a78776168c
SHA512b053bc28634b818b0e1e2bd15acbb5c3808ae5814287832c3be66c9bdee9980d187d7333bbcc9d8438d08604bdaa3d75c3eb8f49daf36a30473653a310110c70
-
Filesize
983KB
MD5a99c5c8035b84c06ab3a8acc4913b38c
SHA1d5b672f82fc7c434dc9e98399377c7eff5df6276
SHA25625a753a24ef7feb7829b5987dc7a651dd6e58d2c406448141667c5a78776168c
SHA512b053bc28634b818b0e1e2bd15acbb5c3808ae5814287832c3be66c9bdee9980d187d7333bbcc9d8438d08604bdaa3d75c3eb8f49daf36a30473653a310110c70
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
800KB
MD5a3ae03f19e5d68fc143a4ff3aced9666
SHA14081f3c0e33dd5ed97a5e2dd0e2b93f68508abf9
SHA256c156a6c9ba60804896c516c27bb5edc259b03e885a9174882709aabf48c7c80f
SHA51228b1e10c87af18a89375b9e8f1043dd548f27dba0e88425cf2b6b0e41752e33f46d1b485ae80acfa3e2d97b85bf0bc345af44aece1b22080ca7be885b08111bf
-
Filesize
800KB
MD5a3ae03f19e5d68fc143a4ff3aced9666
SHA14081f3c0e33dd5ed97a5e2dd0e2b93f68508abf9
SHA256c156a6c9ba60804896c516c27bb5edc259b03e885a9174882709aabf48c7c80f
SHA51228b1e10c87af18a89375b9e8f1043dd548f27dba0e88425cf2b6b0e41752e33f46d1b485ae80acfa3e2d97b85bf0bc345af44aece1b22080ca7be885b08111bf
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
618KB
MD5920eca1c9c01eb887be8c9b2f355114b
SHA129b6c4c798c1164b5cea0d4793f39101b91f8286
SHA2566eb3b144cab9b11583b74e394f51e6d3d32d2f45a8ccc71bd68c162aa692905a
SHA512933c1acea57006476609d5a96d3e035592cb5e59aeb56cbf58fb4b1b7c322243943f3875e1aaf8290101f9d0753d23033e2f6544a98314baa3ed88b3aa6c6534
-
Filesize
618KB
MD5920eca1c9c01eb887be8c9b2f355114b
SHA129b6c4c798c1164b5cea0d4793f39101b91f8286
SHA2566eb3b144cab9b11583b74e394f51e6d3d32d2f45a8ccc71bd68c162aa692905a
SHA512933c1acea57006476609d5a96d3e035592cb5e59aeb56cbf58fb4b1b7c322243943f3875e1aaf8290101f9d0753d23033e2f6544a98314baa3ed88b3aa6c6534
-
Filesize
390KB
MD53403a5da848025136cb62f6b154fc261
SHA19fe04d29823a307e47204c7435d50e2b4b229312
SHA256e33d2a699685de1080bbfb04fe8dd97f28fdeae6c8c8bed15131280916133636
SHA5121aae964ae7cf3c20ebed1afbd0e2346f510a63170a4a9aa4749f50dbf3d99cb7f60dfbebbf221f70931d383dda5c2ba330565b8c2dbebb2b1eb78d44144c87d8
-
Filesize
390KB
MD53403a5da848025136cb62f6b154fc261
SHA19fe04d29823a307e47204c7435d50e2b4b229312
SHA256e33d2a699685de1080bbfb04fe8dd97f28fdeae6c8c8bed15131280916133636
SHA5121aae964ae7cf3c20ebed1afbd0e2346f510a63170a4a9aa4749f50dbf3d99cb7f60dfbebbf221f70931d383dda5c2ba330565b8c2dbebb2b1eb78d44144c87d8
-
Filesize
347KB
MD5f6192fe7be195e23b99f9e0339ecd42d
SHA14c2a4306106b7e15742dc9bf1daffb7a6a0e0dca
SHA256446c757e27c5ae70fe6d1eff102da41178d1682a0842314f119048595de995cf
SHA5120d957a490574a38779d2f1b5cab16ba753d0675f86815afa5f4528576b2896f5e4077efb26dc62136033cf8d54b462eea4938d5e9ab3f8af8226959773ed7eb7
-
Filesize
347KB
MD5f6192fe7be195e23b99f9e0339ecd42d
SHA14c2a4306106b7e15742dc9bf1daffb7a6a0e0dca
SHA256446c757e27c5ae70fe6d1eff102da41178d1682a0842314f119048595de995cf
SHA5120d957a490574a38779d2f1b5cab16ba753d0675f86815afa5f4528576b2896f5e4077efb26dc62136033cf8d54b462eea4938d5e9ab3f8af8226959773ed7eb7
-
Filesize
227KB
MD55c5100acc4a0f37adc1c91297d7e2477
SHA16903f6653071a8e3f769b1fcce2bc25aeee95544
SHA256df95dd7f124a94e45d89f55a309de728d260630fef018146af6fb7f0513e4c63
SHA512c21dccf68b54fd7ac3d1eff6de62e5ad90cfe8387528138c8c6c1f42e0fdda68fb0d7114ada76a2ad09dee514c82707794452f4c697736c23778fb3d50609829
-
Filesize
227KB
MD55c5100acc4a0f37adc1c91297d7e2477
SHA16903f6653071a8e3f769b1fcce2bc25aeee95544
SHA256df95dd7f124a94e45d89f55a309de728d260630fef018146af6fb7f0513e4c63
SHA512c21dccf68b54fd7ac3d1eff6de62e5ad90cfe8387528138c8c6c1f42e0fdda68fb0d7114ada76a2ad09dee514c82707794452f4c697736c23778fb3d50609829
-
Filesize
356KB
MD50334bc9f83b69f77d29ee1b8e5dcdb6e
SHA1f22a57c189286440a6246ad9f4c6ba279b262b6f
SHA25679d6336810c0dded2716ef03d56a83e33f185179b6aba6da386adf36b439d45f
SHA512e10d0d907e9c83aa3f8acf6638646466d6f47b10d0d14563e95db23740935a93bde6b13f67ad26c24f25f0c269152c1fc82ccd5e3a13054f5834324d3c4d17fc
-
Filesize
356KB
MD50334bc9f83b69f77d29ee1b8e5dcdb6e
SHA1f22a57c189286440a6246ad9f4c6ba279b262b6f
SHA25679d6336810c0dded2716ef03d56a83e33f185179b6aba6da386adf36b439d45f
SHA512e10d0d907e9c83aa3f8acf6638646466d6f47b10d0d14563e95db23740935a93bde6b13f67ad26c24f25f0c269152c1fc82ccd5e3a13054f5834324d3c4d17fc
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0