Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 05:06
Static task
static1
Behavioral task
behavioral1
Sample
55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exe
Resource
win7-20230831-en
General
-
Target
55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exe
-
Size
1.1MB
-
MD5
9cd9b89143289d7335f6e34dff5bad32
-
SHA1
ee22b4c6d217688c9d537bdf51d08fb4cdb53f21
-
SHA256
55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7
-
SHA512
6947b87ef44c8b33bd96091c38a46566f417c022ed38846c7bf67a57ca438ad9a59aed6c1dee61e8ab5848904d89ac1bd1293241c811d60e4cf9b65d9618f791
-
SSDEEP
24576:ayKznZwBXhuXzO1HbdMHP0nzJ22t7EQgb7lY8dsjAJkudBSy6n:hKWEXY7wP0zXqQgN7dzJfB9
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1476-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1476-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1476-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1476-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4400-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t0401626.exeexplothe.exeu6051079.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation t0401626.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation u6051079.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 14 IoCs
Processes:
z5500185.exez3744457.exez8707879.exez0010713.exeq0875161.exer4501187.exes0300677.exet0401626.exeexplothe.exeu6051079.exelegota.exew5387577.exelegota.exeexplothe.exepid process 1980 z5500185.exe 2208 z3744457.exe 2940 z8707879.exe 3500 z0010713.exe 5068 q0875161.exe 4032 r4501187.exe 2400 s0300677.exe 4172 t0401626.exe 1560 explothe.exe 224 u6051079.exe 4656 legota.exe 5032 w5387577.exe 3564 legota.exe 1980 explothe.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1940 rundll32.exe 4568 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exez5500185.exez3744457.exez8707879.exez0010713.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5500185.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3744457.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z8707879.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z0010713.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q0875161.exer4501187.exes0300677.exedescription pid process target process PID 5068 set thread context of 4400 5068 q0875161.exe AppLaunch.exe PID 4032 set thread context of 1476 4032 r4501187.exe AppLaunch.exe PID 2400 set thread context of 3700 2400 s0300677.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1096 5068 WerFault.exe q0875161.exe 3792 4032 WerFault.exe r4501187.exe 4844 1476 WerFault.exe AppLaunch.exe 484 2400 WerFault.exe s0300677.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 8 schtasks.exe 3120 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 4400 AppLaunch.exe 4400 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4400 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exez5500185.exez3744457.exez8707879.exez0010713.exeq0875161.exer4501187.exes0300677.exet0401626.exeexplothe.exedescription pid process target process PID 4728 wrote to memory of 1980 4728 55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exe z5500185.exe PID 4728 wrote to memory of 1980 4728 55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exe z5500185.exe PID 4728 wrote to memory of 1980 4728 55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exe z5500185.exe PID 1980 wrote to memory of 2208 1980 z5500185.exe z3744457.exe PID 1980 wrote to memory of 2208 1980 z5500185.exe z3744457.exe PID 1980 wrote to memory of 2208 1980 z5500185.exe z3744457.exe PID 2208 wrote to memory of 2940 2208 z3744457.exe z8707879.exe PID 2208 wrote to memory of 2940 2208 z3744457.exe z8707879.exe PID 2208 wrote to memory of 2940 2208 z3744457.exe z8707879.exe PID 2940 wrote to memory of 3500 2940 z8707879.exe z0010713.exe PID 2940 wrote to memory of 3500 2940 z8707879.exe z0010713.exe PID 2940 wrote to memory of 3500 2940 z8707879.exe z0010713.exe PID 3500 wrote to memory of 5068 3500 z0010713.exe q0875161.exe PID 3500 wrote to memory of 5068 3500 z0010713.exe q0875161.exe PID 3500 wrote to memory of 5068 3500 z0010713.exe q0875161.exe PID 5068 wrote to memory of 976 5068 q0875161.exe AppLaunch.exe PID 5068 wrote to memory of 976 5068 q0875161.exe AppLaunch.exe PID 5068 wrote to memory of 976 5068 q0875161.exe AppLaunch.exe PID 5068 wrote to memory of 4400 5068 q0875161.exe AppLaunch.exe PID 5068 wrote to memory of 4400 5068 q0875161.exe AppLaunch.exe PID 5068 wrote to memory of 4400 5068 q0875161.exe AppLaunch.exe PID 5068 wrote to memory of 4400 5068 q0875161.exe AppLaunch.exe PID 5068 wrote to memory of 4400 5068 q0875161.exe AppLaunch.exe PID 5068 wrote to memory of 4400 5068 q0875161.exe AppLaunch.exe PID 5068 wrote to memory of 4400 5068 q0875161.exe AppLaunch.exe PID 5068 wrote to memory of 4400 5068 q0875161.exe AppLaunch.exe PID 3500 wrote to memory of 4032 3500 z0010713.exe r4501187.exe PID 3500 wrote to memory of 4032 3500 z0010713.exe r4501187.exe PID 3500 wrote to memory of 4032 3500 z0010713.exe r4501187.exe PID 4032 wrote to memory of 4068 4032 r4501187.exe AppLaunch.exe PID 4032 wrote to memory of 4068 4032 r4501187.exe AppLaunch.exe PID 4032 wrote to memory of 4068 4032 r4501187.exe AppLaunch.exe PID 4032 wrote to memory of 1476 4032 r4501187.exe AppLaunch.exe PID 4032 wrote to memory of 1476 4032 r4501187.exe AppLaunch.exe PID 4032 wrote to memory of 1476 4032 r4501187.exe AppLaunch.exe PID 4032 wrote to memory of 1476 4032 r4501187.exe AppLaunch.exe PID 4032 wrote to memory of 1476 4032 r4501187.exe AppLaunch.exe PID 4032 wrote to memory of 1476 4032 r4501187.exe AppLaunch.exe PID 4032 wrote to memory of 1476 4032 r4501187.exe AppLaunch.exe PID 4032 wrote to memory of 1476 4032 r4501187.exe AppLaunch.exe PID 4032 wrote to memory of 1476 4032 r4501187.exe AppLaunch.exe PID 4032 wrote to memory of 1476 4032 r4501187.exe AppLaunch.exe PID 2940 wrote to memory of 2400 2940 z8707879.exe s0300677.exe PID 2940 wrote to memory of 2400 2940 z8707879.exe s0300677.exe PID 2940 wrote to memory of 2400 2940 z8707879.exe s0300677.exe PID 2400 wrote to memory of 3700 2400 s0300677.exe AppLaunch.exe PID 2400 wrote to memory of 3700 2400 s0300677.exe AppLaunch.exe PID 2400 wrote to memory of 3700 2400 s0300677.exe AppLaunch.exe PID 2400 wrote to memory of 3700 2400 s0300677.exe AppLaunch.exe PID 2400 wrote to memory of 3700 2400 s0300677.exe AppLaunch.exe PID 2400 wrote to memory of 3700 2400 s0300677.exe AppLaunch.exe PID 2400 wrote to memory of 3700 2400 s0300677.exe AppLaunch.exe PID 2400 wrote to memory of 3700 2400 s0300677.exe AppLaunch.exe PID 2208 wrote to memory of 4172 2208 z3744457.exe t0401626.exe PID 2208 wrote to memory of 4172 2208 z3744457.exe t0401626.exe PID 2208 wrote to memory of 4172 2208 z3744457.exe t0401626.exe PID 4172 wrote to memory of 1560 4172 t0401626.exe explothe.exe PID 4172 wrote to memory of 1560 4172 t0401626.exe explothe.exe PID 4172 wrote to memory of 1560 4172 t0401626.exe explothe.exe PID 1980 wrote to memory of 224 1980 z5500185.exe u6051079.exe PID 1980 wrote to memory of 224 1980 z5500185.exe u6051079.exe PID 1980 wrote to memory of 224 1980 z5500185.exe u6051079.exe PID 1560 wrote to memory of 8 1560 explothe.exe schtasks.exe PID 1560 wrote to memory of 8 1560 explothe.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exe"C:\Users\Admin\AppData\Local\Temp\55a329084a46e90e74ec2d0133bb862268c11af5e17d4af416a1c5417928f8d7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5500185.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5500185.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3744457.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3744457.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8707879.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8707879.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0010713.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0010713.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0875161.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 6047⤵
- Program crash
PID:1096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4501187.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4501187.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 5448⤵
- Program crash
PID:4844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 5887⤵
- Program crash
PID:3792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0300677.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0300677.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 1486⤵
- Program crash
PID:484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0401626.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0401626.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:8
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:3196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1668
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:2108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:1096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2364
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:3472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4796
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1940
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6051079.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6051079.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4656 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3120
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4156
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4920
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4340
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4568
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5387577.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5387577.exe2⤵
- Executes dropped EXE
PID:5032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5068 -ip 50681⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4032 -ip 40321⤵PID:2432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1476 -ip 14761⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2400 -ip 24001⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3564
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1980
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD510afe663c0660dd5750a014d3f036284
SHA15a8c5d1b8a2e6e907860cbb68444f854642c8419
SHA2561ea15085091558becf195e57e538122d27643761e7a6281e60eef14cff4a66ca
SHA5123f4d879c35add4595df4abcf140ca345f983d5c03cd1d57a8be90a13fbab5fdac00a2b2e5ff8b9130181f88461588db196e603b09c79812466da10484e97d657
-
Filesize
23KB
MD510afe663c0660dd5750a014d3f036284
SHA15a8c5d1b8a2e6e907860cbb68444f854642c8419
SHA2561ea15085091558becf195e57e538122d27643761e7a6281e60eef14cff4a66ca
SHA5123f4d879c35add4595df4abcf140ca345f983d5c03cd1d57a8be90a13fbab5fdac00a2b2e5ff8b9130181f88461588db196e603b09c79812466da10484e97d657
-
Filesize
983KB
MD558266f83af667061e2cfc393569a7b9f
SHA108c254dd833bb2bb8c1f242c9ce0780c78b7842a
SHA25676387b1412798f585e66f151a514dd12e1b86708ac828082dc4c9e8ffceb5029
SHA51232815366926a6f0167d74ed7eaf52eae7a024bb08fdaed49972f8099149dfe63d4b1c5d4bebabc411331c40caace9db43610f8eb2f2a3c7269c62f84776f22c4
-
Filesize
983KB
MD558266f83af667061e2cfc393569a7b9f
SHA108c254dd833bb2bb8c1f242c9ce0780c78b7842a
SHA25676387b1412798f585e66f151a514dd12e1b86708ac828082dc4c9e8ffceb5029
SHA51232815366926a6f0167d74ed7eaf52eae7a024bb08fdaed49972f8099149dfe63d4b1c5d4bebabc411331c40caace9db43610f8eb2f2a3c7269c62f84776f22c4
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
801KB
MD5ef9955b255f82ffc464c93ed45dbb404
SHA1b151fdf41f8ed90d1e080a030a8286eba9361152
SHA25685639143956a8ba8f0f2ec71a4c86e0670b6c53c934956d8fbaaec6074c22dc6
SHA512777d38ad19d822b91c2a71bffc69617bf279a2796888990924e99770ff3d53b00c348d0dff36b3408fc568ea5ec995ffbe7cc061ef270aa269a30f210ba0e6eb
-
Filesize
801KB
MD5ef9955b255f82ffc464c93ed45dbb404
SHA1b151fdf41f8ed90d1e080a030a8286eba9361152
SHA25685639143956a8ba8f0f2ec71a4c86e0670b6c53c934956d8fbaaec6074c22dc6
SHA512777d38ad19d822b91c2a71bffc69617bf279a2796888990924e99770ff3d53b00c348d0dff36b3408fc568ea5ec995ffbe7cc061ef270aa269a30f210ba0e6eb
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
618KB
MD5cde3f62527cfc4a3d9459f873a9747c4
SHA1fe406d86edb0a4fdea49e851c32007e614e21967
SHA256d5d0a05d02601ae0ece66361c430a603b29250b4093fccc0811e87d728d47a95
SHA51260d7c5125d3da5bd02553a2df11fcaa247440729c85e4741c1aae9b975475687daed3abdcd611907f42c1791ea76af9be9dc01e528c1dcd6633ab94fd80b1e1f
-
Filesize
618KB
MD5cde3f62527cfc4a3d9459f873a9747c4
SHA1fe406d86edb0a4fdea49e851c32007e614e21967
SHA256d5d0a05d02601ae0ece66361c430a603b29250b4093fccc0811e87d728d47a95
SHA51260d7c5125d3da5bd02553a2df11fcaa247440729c85e4741c1aae9b975475687daed3abdcd611907f42c1791ea76af9be9dc01e528c1dcd6633ab94fd80b1e1f
-
Filesize
390KB
MD56f643fac00a7944e46ec663e069c3f2f
SHA1aaae57a65a509f2f2ad4f5e6a068fefe9c6d7a28
SHA256d811a39c5917ed8160419ff305772fba314f79105ea8a89267135724118befa7
SHA51219378383deda1094a22826a6a88cbdecd378f8655aa46589a2d47f368d8f718a3cceb00d124b36ff534e968e37c1bdf2c04f297c2e5f87f4b27979aa62011d49
-
Filesize
390KB
MD56f643fac00a7944e46ec663e069c3f2f
SHA1aaae57a65a509f2f2ad4f5e6a068fefe9c6d7a28
SHA256d811a39c5917ed8160419ff305772fba314f79105ea8a89267135724118befa7
SHA51219378383deda1094a22826a6a88cbdecd378f8655aa46589a2d47f368d8f718a3cceb00d124b36ff534e968e37c1bdf2c04f297c2e5f87f4b27979aa62011d49
-
Filesize
346KB
MD56997cd3f34a4804aaa2455b658d5611a
SHA19f34421328cd348985fc711ef4cd73ef92a8a3be
SHA2567e1e35765c16f6075ee09e4c5e3aaf0c55bd7c3fc82dccc85b6d25535bb9c8e4
SHA512e2b6b9744e6be384af9ff5c9ff3946d5113b8344e9e099de623197c3ac4d02a901958d4cd18b6f0b3f9b3feeed945fbefbf38d8686e75ff10a69681c9f01cdd6
-
Filesize
346KB
MD56997cd3f34a4804aaa2455b658d5611a
SHA19f34421328cd348985fc711ef4cd73ef92a8a3be
SHA2567e1e35765c16f6075ee09e4c5e3aaf0c55bd7c3fc82dccc85b6d25535bb9c8e4
SHA512e2b6b9744e6be384af9ff5c9ff3946d5113b8344e9e099de623197c3ac4d02a901958d4cd18b6f0b3f9b3feeed945fbefbf38d8686e75ff10a69681c9f01cdd6
-
Filesize
227KB
MD57a0fc5717e796bbedf54e146c9a8af7a
SHA16ebcabbbf3af955bca39253f70ee39f5babb8ef0
SHA2568e5749576a0fb67ef59d38167bb58416dd3732bfc486d3c0ae2136d160c532b5
SHA5122fdda36a2df94de47833ca50be24bdf40a54b5c1a905d3dc5e3f3937c84f033152dfe96ebee2953653a5e8a238e66f1319cf0a644fa672aa583b1a72f1c81a99
-
Filesize
227KB
MD57a0fc5717e796bbedf54e146c9a8af7a
SHA16ebcabbbf3af955bca39253f70ee39f5babb8ef0
SHA2568e5749576a0fb67ef59d38167bb58416dd3732bfc486d3c0ae2136d160c532b5
SHA5122fdda36a2df94de47833ca50be24bdf40a54b5c1a905d3dc5e3f3937c84f033152dfe96ebee2953653a5e8a238e66f1319cf0a644fa672aa583b1a72f1c81a99
-
Filesize
356KB
MD53b23d57f6f6377a41e37d84760ad0e13
SHA1da6f4cb609dd8c30635a3a864ff287ce97efbdaf
SHA2568f6abe4034a93da0f28c792730a1f9e4541c4fa7517b7c29e7e0007f47b75bf9
SHA5126f9ffa06befcbec4ac85fdbd08d4cce69e48e9136ce8d3b8f0b87e5f5d3be438115c547ce5cbea1aa1a1930c47d1615124eade7a97cf0d890bbab93b2174a1d5
-
Filesize
356KB
MD53b23d57f6f6377a41e37d84760ad0e13
SHA1da6f4cb609dd8c30635a3a864ff287ce97efbdaf
SHA2568f6abe4034a93da0f28c792730a1f9e4541c4fa7517b7c29e7e0007f47b75bf9
SHA5126f9ffa06befcbec4ac85fdbd08d4cce69e48e9136ce8d3b8f0b87e5f5d3be438115c547ce5cbea1aa1a1930c47d1615124eade7a97cf0d890bbab93b2174a1d5
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0