Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 05:14
Static task
static1
Behavioral task
behavioral1
Sample
019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe
Resource
win7-20230831-en
General
-
Target
019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe
-
Size
1.1MB
-
MD5
0c64d372fdc96ace35f0a777de7c907a
-
SHA1
9718eb5e3fa23eee279b111ed794fb79aa449701
-
SHA256
019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674
-
SHA512
ebf0719226a5839c32a6d2c5d93115ebcd9b3e940c749b7d33276fa23cbe244f416818e067960a9bed6b0fdfa9880d5850196af9e9a8a4a0ab6ec9bc82c770b0
-
SSDEEP
24576:xySTAV9F83DtXNsabc221afMotMa09p92RkaIOb:kST483lNsaIeL+a0F2R
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4368-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4368-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4368-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4368-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4904-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t2190763.exeexplothe.exeu1024129.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t2190763.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u1024129.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z9535555.exez7593087.exez8275524.exez5150266.exeq6849161.exer9977775.exes4686811.exet2190763.exeexplothe.exeu1024129.exelegota.exew8105915.exeexplothe.exelegota.exeexplothe.exelegota.exepid process 3804 z9535555.exe 4740 z7593087.exe 2980 z8275524.exe 1716 z5150266.exe 112 q6849161.exe 4612 r9977775.exe 1384 s4686811.exe 3472 t2190763.exe 3548 explothe.exe 4012 u1024129.exe 3920 legota.exe 4260 w8105915.exe 3004 explothe.exe 2108 legota.exe 3576 explothe.exe 2492 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3404 rundll32.exe 1716 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exez9535555.exez7593087.exez8275524.exez5150266.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9535555.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7593087.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z8275524.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z5150266.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q6849161.exer9977775.exes4686811.exedescription pid process target process PID 112 set thread context of 4904 112 q6849161.exe AppLaunch.exe PID 4612 set thread context of 4368 4612 r9977775.exe AppLaunch.exe PID 1384 set thread context of 4920 1384 s4686811.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2448 112 WerFault.exe q6849161.exe 5032 4612 WerFault.exe r9977775.exe 1296 4368 WerFault.exe AppLaunch.exe 2968 1384 WerFault.exe s4686811.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3592 schtasks.exe 868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 4904 AppLaunch.exe 4904 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4904 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exez9535555.exez7593087.exez8275524.exez5150266.exeq6849161.exer9977775.exes4686811.exet2190763.exeexplothe.exeu1024129.exedescription pid process target process PID 3796 wrote to memory of 3804 3796 019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe z9535555.exe PID 3796 wrote to memory of 3804 3796 019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe z9535555.exe PID 3796 wrote to memory of 3804 3796 019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe z9535555.exe PID 3804 wrote to memory of 4740 3804 z9535555.exe z7593087.exe PID 3804 wrote to memory of 4740 3804 z9535555.exe z7593087.exe PID 3804 wrote to memory of 4740 3804 z9535555.exe z7593087.exe PID 4740 wrote to memory of 2980 4740 z7593087.exe z8275524.exe PID 4740 wrote to memory of 2980 4740 z7593087.exe z8275524.exe PID 4740 wrote to memory of 2980 4740 z7593087.exe z8275524.exe PID 2980 wrote to memory of 1716 2980 z8275524.exe z5150266.exe PID 2980 wrote to memory of 1716 2980 z8275524.exe z5150266.exe PID 2980 wrote to memory of 1716 2980 z8275524.exe z5150266.exe PID 1716 wrote to memory of 112 1716 z5150266.exe q6849161.exe PID 1716 wrote to memory of 112 1716 z5150266.exe q6849161.exe PID 1716 wrote to memory of 112 1716 z5150266.exe q6849161.exe PID 112 wrote to memory of 2680 112 q6849161.exe AppLaunch.exe PID 112 wrote to memory of 2680 112 q6849161.exe AppLaunch.exe PID 112 wrote to memory of 2680 112 q6849161.exe AppLaunch.exe PID 112 wrote to memory of 4904 112 q6849161.exe AppLaunch.exe PID 112 wrote to memory of 4904 112 q6849161.exe AppLaunch.exe PID 112 wrote to memory of 4904 112 q6849161.exe AppLaunch.exe PID 112 wrote to memory of 4904 112 q6849161.exe AppLaunch.exe PID 112 wrote to memory of 4904 112 q6849161.exe AppLaunch.exe PID 112 wrote to memory of 4904 112 q6849161.exe AppLaunch.exe PID 112 wrote to memory of 4904 112 q6849161.exe AppLaunch.exe PID 112 wrote to memory of 4904 112 q6849161.exe AppLaunch.exe PID 1716 wrote to memory of 4612 1716 z5150266.exe r9977775.exe PID 1716 wrote to memory of 4612 1716 z5150266.exe r9977775.exe PID 1716 wrote to memory of 4612 1716 z5150266.exe r9977775.exe PID 4612 wrote to memory of 4368 4612 r9977775.exe AppLaunch.exe PID 4612 wrote to memory of 4368 4612 r9977775.exe AppLaunch.exe PID 4612 wrote to memory of 4368 4612 r9977775.exe AppLaunch.exe PID 4612 wrote to memory of 4368 4612 r9977775.exe AppLaunch.exe PID 4612 wrote to memory of 4368 4612 r9977775.exe AppLaunch.exe PID 4612 wrote to memory of 4368 4612 r9977775.exe AppLaunch.exe PID 4612 wrote to memory of 4368 4612 r9977775.exe AppLaunch.exe PID 4612 wrote to memory of 4368 4612 r9977775.exe AppLaunch.exe PID 4612 wrote to memory of 4368 4612 r9977775.exe AppLaunch.exe PID 4612 wrote to memory of 4368 4612 r9977775.exe AppLaunch.exe PID 2980 wrote to memory of 1384 2980 z8275524.exe s4686811.exe PID 2980 wrote to memory of 1384 2980 z8275524.exe s4686811.exe PID 2980 wrote to memory of 1384 2980 z8275524.exe s4686811.exe PID 1384 wrote to memory of 4920 1384 s4686811.exe AppLaunch.exe PID 1384 wrote to memory of 4920 1384 s4686811.exe AppLaunch.exe PID 1384 wrote to memory of 4920 1384 s4686811.exe AppLaunch.exe PID 1384 wrote to memory of 4920 1384 s4686811.exe AppLaunch.exe PID 1384 wrote to memory of 4920 1384 s4686811.exe AppLaunch.exe PID 1384 wrote to memory of 4920 1384 s4686811.exe AppLaunch.exe PID 1384 wrote to memory of 4920 1384 s4686811.exe AppLaunch.exe PID 1384 wrote to memory of 4920 1384 s4686811.exe AppLaunch.exe PID 4740 wrote to memory of 3472 4740 z7593087.exe t2190763.exe PID 4740 wrote to memory of 3472 4740 z7593087.exe t2190763.exe PID 4740 wrote to memory of 3472 4740 z7593087.exe t2190763.exe PID 3472 wrote to memory of 3548 3472 t2190763.exe explothe.exe PID 3472 wrote to memory of 3548 3472 t2190763.exe explothe.exe PID 3472 wrote to memory of 3548 3472 t2190763.exe explothe.exe PID 3804 wrote to memory of 4012 3804 z9535555.exe u1024129.exe PID 3804 wrote to memory of 4012 3804 z9535555.exe u1024129.exe PID 3804 wrote to memory of 4012 3804 z9535555.exe u1024129.exe PID 3548 wrote to memory of 3592 3548 explothe.exe schtasks.exe PID 3548 wrote to memory of 3592 3548 explothe.exe schtasks.exe PID 3548 wrote to memory of 3592 3548 explothe.exe schtasks.exe PID 4012 wrote to memory of 3920 4012 u1024129.exe legota.exe PID 4012 wrote to memory of 3920 4012 u1024129.exe legota.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe"C:\Users\Admin\AppData\Local\Temp\019e3a36e23057b92c50d319503c93d87f7c2d8410079253038f0da14e72b674.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9535555.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9535555.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7593087.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7593087.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8275524.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8275524.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5150266.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5150266.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6849161.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6849161.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 112 -s 1527⤵
- Program crash
PID:2448
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9977775.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9977775.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4368 -s 5408⤵
- Program crash
PID:1296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 5967⤵
- Program crash
PID:5032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4686811.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4686811.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 5966⤵
- Program crash
PID:2968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2190763.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2190763.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:3592
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:2708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4480
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:2648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4188
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:1040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:368
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3404
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1024129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1024129.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:3920 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4888
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3004
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3768
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1716
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8105915.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8105915.exe2⤵
- Executes dropped EXE
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 112 -ip 1121⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4612 -ip 46121⤵PID:804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4368 -ip 43681⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1384 -ip 13841⤵PID:1648
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3004
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2108
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3576
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD56a6c1fb974d83be923e838430077a6c8
SHA168f7b5ce6f9b518abbe013b8be09f5356db87094
SHA2562642402764d692926a2ebfeaf00b2d228663cb1cd6dfaf233c156d4efd3906cb
SHA5121d737ea7639ad91eb7430d4b001b74d5db0d5a4f7f47443f6c4768afe55fed9b1a5af22b7ae3f26e745305c076ef12eae56b864cc27cabda53c1a257ff1e1ab4
-
Filesize
23KB
MD56a6c1fb974d83be923e838430077a6c8
SHA168f7b5ce6f9b518abbe013b8be09f5356db87094
SHA2562642402764d692926a2ebfeaf00b2d228663cb1cd6dfaf233c156d4efd3906cb
SHA5121d737ea7639ad91eb7430d4b001b74d5db0d5a4f7f47443f6c4768afe55fed9b1a5af22b7ae3f26e745305c076ef12eae56b864cc27cabda53c1a257ff1e1ab4
-
Filesize
982KB
MD58d2a632420e9e71a0aca6db6ac9977a6
SHA12b5e1c9a09a4fd9eef24bcab921287e6ef142987
SHA256d2524dac62e38fc5c3e82b59ff1e7ba60183b5a4d0bc7eccf085c0d7f56163e7
SHA512c506cb8d742e2c95ff0d558c075ceff28a347b82f1983e7a08da804a94f4e34a11891a430248c6d61587ecde3ba27cad9467e2623b91f740171f861c0eb62ad3
-
Filesize
982KB
MD58d2a632420e9e71a0aca6db6ac9977a6
SHA12b5e1c9a09a4fd9eef24bcab921287e6ef142987
SHA256d2524dac62e38fc5c3e82b59ff1e7ba60183b5a4d0bc7eccf085c0d7f56163e7
SHA512c506cb8d742e2c95ff0d558c075ceff28a347b82f1983e7a08da804a94f4e34a11891a430248c6d61587ecde3ba27cad9467e2623b91f740171f861c0eb62ad3
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
799KB
MD516423ac206936c6b26a774559de20fca
SHA1993050c899e8eeb7a138742ab89be57335ac3290
SHA2562fe82e2ab3a62a7e3e6f9f7bfae127f48eb39618d29df67b60d7bece58f4dddf
SHA512ee2fecf3a5f320b67b78a11c4bbc7f50ac9b3072daf1ea2736f0fe83e9492a230a8046475165a94dcf3793f083f8e63e9ed0a53f9751740abb8c9137c709d328
-
Filesize
799KB
MD516423ac206936c6b26a774559de20fca
SHA1993050c899e8eeb7a138742ab89be57335ac3290
SHA2562fe82e2ab3a62a7e3e6f9f7bfae127f48eb39618d29df67b60d7bece58f4dddf
SHA512ee2fecf3a5f320b67b78a11c4bbc7f50ac9b3072daf1ea2736f0fe83e9492a230a8046475165a94dcf3793f083f8e63e9ed0a53f9751740abb8c9137c709d328
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
616KB
MD55fa6a564a4a4ae9da4ce6c9cad74dc3a
SHA1b44cef355e675f44e3a99514629707c717494a18
SHA25663130455466f68b60955f4d4cec2477e57f75a2562e86eb68e75daa3ee190708
SHA51250245a723f3fba2a7a3f96985caad3272f6b1f91a0d5ed021bbb763fffc7fc62c45ee9f9ac8ed901b6f4121c670f9b836dc391fa16d16de20f738b133b520659
-
Filesize
616KB
MD55fa6a564a4a4ae9da4ce6c9cad74dc3a
SHA1b44cef355e675f44e3a99514629707c717494a18
SHA25663130455466f68b60955f4d4cec2477e57f75a2562e86eb68e75daa3ee190708
SHA51250245a723f3fba2a7a3f96985caad3272f6b1f91a0d5ed021bbb763fffc7fc62c45ee9f9ac8ed901b6f4121c670f9b836dc391fa16d16de20f738b133b520659
-
Filesize
390KB
MD5717a6b24b995c40962ed9b4814396e77
SHA1839c20620c21eadc1cf77dccce246248f93be3f4
SHA2564ec203efe214ff4822b8149265a83e80b88355eafb2521541d17d5b320b3276a
SHA512d2fa4e1f257ad7950001b927834ba894588c7e90873ab0b60e6308551a0b7f19264129ede7579e86a636d2e64b007fe48714a516a62f674e6171f05e9674171c
-
Filesize
390KB
MD5717a6b24b995c40962ed9b4814396e77
SHA1839c20620c21eadc1cf77dccce246248f93be3f4
SHA2564ec203efe214ff4822b8149265a83e80b88355eafb2521541d17d5b320b3276a
SHA512d2fa4e1f257ad7950001b927834ba894588c7e90873ab0b60e6308551a0b7f19264129ede7579e86a636d2e64b007fe48714a516a62f674e6171f05e9674171c
-
Filesize
346KB
MD5e7921a7afacc53f28b168407fb300780
SHA14cf6074dfdb29d25c31dd3bad9379f4a3302db8e
SHA2562448ad1b25e596c0b68d77fd6ada33ccdfcd07326aa2b1fdce9a3c36048871e0
SHA512e602996f4c54dbbf9e2a302d90aa3c8e70a8c397eb0bf5b24d94441ee976517dfc49244b76b10b009f0c59803c030b641d736a52cd214c5e9934e8ab380e016f
-
Filesize
346KB
MD5e7921a7afacc53f28b168407fb300780
SHA14cf6074dfdb29d25c31dd3bad9379f4a3302db8e
SHA2562448ad1b25e596c0b68d77fd6ada33ccdfcd07326aa2b1fdce9a3c36048871e0
SHA512e602996f4c54dbbf9e2a302d90aa3c8e70a8c397eb0bf5b24d94441ee976517dfc49244b76b10b009f0c59803c030b641d736a52cd214c5e9934e8ab380e016f
-
Filesize
227KB
MD5b1d477e91870b25e115e978923fe3994
SHA163946ba95970b2fcd30de32782655c78a30a6bbd
SHA256dffa054030059d50ddb4d0dc819f94fedd01752e0a7244794b021ab907d9c1cf
SHA5121e0459e64cd07f1e045fb68ce18b3bdc417bf5f5212db014a1683f792ffe15490d3f40cbd9baf2ba0a10612483e522f085cccc2325239a0a24c9023a07356ab9
-
Filesize
227KB
MD5b1d477e91870b25e115e978923fe3994
SHA163946ba95970b2fcd30de32782655c78a30a6bbd
SHA256dffa054030059d50ddb4d0dc819f94fedd01752e0a7244794b021ab907d9c1cf
SHA5121e0459e64cd07f1e045fb68ce18b3bdc417bf5f5212db014a1683f792ffe15490d3f40cbd9baf2ba0a10612483e522f085cccc2325239a0a24c9023a07356ab9
-
Filesize
356KB
MD533cc83096daa133112e8cf3883a5936a
SHA1a6a0e4725e8d4ae31e6bab127c0aceef9c3ff546
SHA256e3bf8073e8a367abf1536dc0c04f18f383aae7cccc33040c76833351f1641f81
SHA512fc87e64ff0e77e500e12cf10c3aaa767364af49d0d5df083848eb963d1f77d0fe4775dd56277e2270b92661d99ba2dd6dc7cb66e6f8b0b60c35bbd2ab79bd7dd
-
Filesize
356KB
MD533cc83096daa133112e8cf3883a5936a
SHA1a6a0e4725e8d4ae31e6bab127c0aceef9c3ff546
SHA256e3bf8073e8a367abf1536dc0c04f18f383aae7cccc33040c76833351f1641f81
SHA512fc87e64ff0e77e500e12cf10c3aaa767364af49d0d5df083848eb963d1f77d0fe4775dd56277e2270b92661d99ba2dd6dc7cb66e6f8b0b60c35bbd2ab79bd7dd
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
89KB
MD5e913b0d252d36f7c9b71268df4f634fb
SHA15ac70d8793712bcd8ede477071146bbb42d3f018
SHA2564cf5b584cf79ac523f645807a65bc153fbeaa564c0e1acb4dac9004fc9d038da
SHA5123ea08f0897c1b7b5859961351eef59840bbf319a6ad7ebe1c9e1b5e2ce25588d7b1a37fd6c5417653521fc73f1f42eb043d0ee6fcd645aa92b8f305d726273b4
-
Filesize
273B
MD5a5b509a3fb95cc3c8d89cd39fc2a30fb
SHA15aff4266a9c0f2af440f28aa865cebc5ddb9cd5c
SHA2565f3c80056c7b1104c15d6fee49dac07e665c6ffd0795ad486803641ed619c529
SHA5123cc58d989c461a04f29acbfe03ed05f970b3b3e97e6819962fc5c853f55bce7f7aba0544a712e3a45ee52ab31943c898f6b3684d755b590e3e961ae5ecd1edb9
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0