Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:21
Static task
static1
Behavioral task
behavioral1
Sample
b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exe
Resource
win7-20230831-en
General
-
Target
b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exe
-
Size
1.1MB
-
MD5
fafc62b9215345003160cbde5263ebd5
-
SHA1
80650b4a0c9ec5b2afad5ac06c18b204c9869a51
-
SHA256
b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d
-
SHA512
fd1f48bb97f8bfc366b1d4e5c3fb700c3f127c93acf622dda0a9ef9ad899a92358d35d85055745a0de2e2ee28a8c5f8b85943bf3c9ea223d414323e66cc8424f
-
SSDEEP
24576:dyC17jHDA3oSjASR2dr/Pyeg2eDANU24Vqqo:4C1XIo3C2dieg2a
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4816-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4816-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4816-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4816-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4968-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t8283349.exeexplonde.exeu2365994.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t8283349.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u2365994.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z3369295.exez3697928.exez2241715.exez5322879.exeq3542142.exer0792813.exes4656979.exet8283349.exeexplonde.exeu2365994.exelegota.exew8792476.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 4716 z3369295.exe 368 z3697928.exe 2172 z2241715.exe 4940 z5322879.exe 3636 q3542142.exe 5060 r0792813.exe 4696 s4656979.exe 4728 t8283349.exe 2932 explonde.exe 2876 u2365994.exe 3924 legota.exe 2436 w8792476.exe 4268 explonde.exe 4704 legota.exe 4376 explonde.exe 1100 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4800 rundll32.exe 3588 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z3697928.exez2241715.exez5322879.exeb92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exez3369295.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3697928.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2241715.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z5322879.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3369295.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q3542142.exer0792813.exes4656979.exedescription pid process target process PID 3636 set thread context of 4968 3636 q3542142.exe AppLaunch.exe PID 5060 set thread context of 4816 5060 r0792813.exe AppLaunch.exe PID 4696 set thread context of 3076 4696 s4656979.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4496 3636 WerFault.exe q3542142.exe 1100 5060 WerFault.exe r0792813.exe 4360 4816 WerFault.exe AppLaunch.exe 864 4696 WerFault.exe s4656979.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2100 schtasks.exe 408 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 4968 AppLaunch.exe 4968 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4968 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exez3369295.exez3697928.exez2241715.exez5322879.exeq3542142.exer0792813.exes4656979.exet8283349.exeexplonde.exeu2365994.exedescription pid process target process PID 1692 wrote to memory of 4716 1692 b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exe z3369295.exe PID 1692 wrote to memory of 4716 1692 b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exe z3369295.exe PID 1692 wrote to memory of 4716 1692 b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exe z3369295.exe PID 4716 wrote to memory of 368 4716 z3369295.exe z3697928.exe PID 4716 wrote to memory of 368 4716 z3369295.exe z3697928.exe PID 4716 wrote to memory of 368 4716 z3369295.exe z3697928.exe PID 368 wrote to memory of 2172 368 z3697928.exe z2241715.exe PID 368 wrote to memory of 2172 368 z3697928.exe z2241715.exe PID 368 wrote to memory of 2172 368 z3697928.exe z2241715.exe PID 2172 wrote to memory of 4940 2172 z2241715.exe z5322879.exe PID 2172 wrote to memory of 4940 2172 z2241715.exe z5322879.exe PID 2172 wrote to memory of 4940 2172 z2241715.exe z5322879.exe PID 4940 wrote to memory of 3636 4940 z5322879.exe q3542142.exe PID 4940 wrote to memory of 3636 4940 z5322879.exe q3542142.exe PID 4940 wrote to memory of 3636 4940 z5322879.exe q3542142.exe PID 3636 wrote to memory of 4968 3636 q3542142.exe AppLaunch.exe PID 3636 wrote to memory of 4968 3636 q3542142.exe AppLaunch.exe PID 3636 wrote to memory of 4968 3636 q3542142.exe AppLaunch.exe PID 3636 wrote to memory of 4968 3636 q3542142.exe AppLaunch.exe PID 3636 wrote to memory of 4968 3636 q3542142.exe AppLaunch.exe PID 3636 wrote to memory of 4968 3636 q3542142.exe AppLaunch.exe PID 3636 wrote to memory of 4968 3636 q3542142.exe AppLaunch.exe PID 3636 wrote to memory of 4968 3636 q3542142.exe AppLaunch.exe PID 4940 wrote to memory of 5060 4940 z5322879.exe r0792813.exe PID 4940 wrote to memory of 5060 4940 z5322879.exe r0792813.exe PID 4940 wrote to memory of 5060 4940 z5322879.exe r0792813.exe PID 5060 wrote to memory of 4816 5060 r0792813.exe AppLaunch.exe PID 5060 wrote to memory of 4816 5060 r0792813.exe AppLaunch.exe PID 5060 wrote to memory of 4816 5060 r0792813.exe AppLaunch.exe PID 5060 wrote to memory of 4816 5060 r0792813.exe AppLaunch.exe PID 5060 wrote to memory of 4816 5060 r0792813.exe AppLaunch.exe PID 5060 wrote to memory of 4816 5060 r0792813.exe AppLaunch.exe PID 5060 wrote to memory of 4816 5060 r0792813.exe AppLaunch.exe PID 5060 wrote to memory of 4816 5060 r0792813.exe AppLaunch.exe PID 5060 wrote to memory of 4816 5060 r0792813.exe AppLaunch.exe PID 5060 wrote to memory of 4816 5060 r0792813.exe AppLaunch.exe PID 2172 wrote to memory of 4696 2172 z2241715.exe s4656979.exe PID 2172 wrote to memory of 4696 2172 z2241715.exe s4656979.exe PID 2172 wrote to memory of 4696 2172 z2241715.exe s4656979.exe PID 4696 wrote to memory of 3076 4696 s4656979.exe AppLaunch.exe PID 4696 wrote to memory of 3076 4696 s4656979.exe AppLaunch.exe PID 4696 wrote to memory of 3076 4696 s4656979.exe AppLaunch.exe PID 4696 wrote to memory of 3076 4696 s4656979.exe AppLaunch.exe PID 4696 wrote to memory of 3076 4696 s4656979.exe AppLaunch.exe PID 4696 wrote to memory of 3076 4696 s4656979.exe AppLaunch.exe PID 4696 wrote to memory of 3076 4696 s4656979.exe AppLaunch.exe PID 4696 wrote to memory of 3076 4696 s4656979.exe AppLaunch.exe PID 368 wrote to memory of 4728 368 z3697928.exe t8283349.exe PID 368 wrote to memory of 4728 368 z3697928.exe t8283349.exe PID 368 wrote to memory of 4728 368 z3697928.exe t8283349.exe PID 4728 wrote to memory of 2932 4728 t8283349.exe explonde.exe PID 4728 wrote to memory of 2932 4728 t8283349.exe explonde.exe PID 4728 wrote to memory of 2932 4728 t8283349.exe explonde.exe PID 4716 wrote to memory of 2876 4716 z3369295.exe u2365994.exe PID 4716 wrote to memory of 2876 4716 z3369295.exe u2365994.exe PID 4716 wrote to memory of 2876 4716 z3369295.exe u2365994.exe PID 2932 wrote to memory of 2100 2932 explonde.exe schtasks.exe PID 2932 wrote to memory of 2100 2932 explonde.exe schtasks.exe PID 2932 wrote to memory of 2100 2932 explonde.exe schtasks.exe PID 2876 wrote to memory of 3924 2876 u2365994.exe legota.exe PID 2876 wrote to memory of 3924 2876 u2365994.exe legota.exe PID 2876 wrote to memory of 3924 2876 u2365994.exe legota.exe PID 2932 wrote to memory of 4944 2932 explonde.exe cmd.exe PID 2932 wrote to memory of 4944 2932 explonde.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exe"C:\Users\Admin\AppData\Local\Temp\b92114283b26e5d05da5f89a206c7f680082a01caf5831b3b1afc8ea4741102d_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3369295.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3369295.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3697928.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3697928.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2241715.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2241715.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5322879.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5322879.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3542142.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 5647⤵
- Program crash
PID:4496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0792813.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0792813.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 5408⤵
- Program crash
PID:4360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 5647⤵
- Program crash
PID:1100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4656979.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4656979.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 5646⤵
- Program crash
PID:864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t8283349.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t8283349.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:2100
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2732
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:5000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:1060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4792
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4504
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:972
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u2365994.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u2365994.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:3924 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:956
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4152
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:3828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:3660
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8792476.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8792476.exe2⤵
- Executes dropped EXE
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3636 -ip 36361⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5060 -ip 50601⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4816 -ip 48161⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4696 -ip 46961⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4268
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4704
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4376
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5db0620ee5b6e899b0ecd180bd4a82fc7
SHA1707ef19b5727a8a175edf67075f0f261e7fa805e
SHA2564dd97d5a551dc490c94e5606b491d7959a8023ed60d8d2f496ca473cf920c934
SHA512598e77f77c49a28b3a029b0452908c54d9adebf1447a8ec401036cd74b65d7c846743c4d722986dbdfac1202649bf47fddd4583e1c97882d15fae5b6cc722bba
-
Filesize
22KB
MD5db0620ee5b6e899b0ecd180bd4a82fc7
SHA1707ef19b5727a8a175edf67075f0f261e7fa805e
SHA2564dd97d5a551dc490c94e5606b491d7959a8023ed60d8d2f496ca473cf920c934
SHA512598e77f77c49a28b3a029b0452908c54d9adebf1447a8ec401036cd74b65d7c846743c4d722986dbdfac1202649bf47fddd4583e1c97882d15fae5b6cc722bba
-
Filesize
997KB
MD543b2e340f76a521617f01e5fa10c1400
SHA1d2157ac295f3b18223c692ab87e7abafcb0650e9
SHA256518563a69784e4c0f1ffc369fcfcf5a22c5381ff5d1ff0ba6bae351ede772fd4
SHA512035cd5c8a4df4e84d40a9a23c2dd9fa52f57801a3e488ab23ed36f5904f7457ffea1ad3a43171be295d607cf17eb281176b972a30f1b2e04b65b581541a9d890
-
Filesize
997KB
MD543b2e340f76a521617f01e5fa10c1400
SHA1d2157ac295f3b18223c692ab87e7abafcb0650e9
SHA256518563a69784e4c0f1ffc369fcfcf5a22c5381ff5d1ff0ba6bae351ede772fd4
SHA512035cd5c8a4df4e84d40a9a23c2dd9fa52f57801a3e488ab23ed36f5904f7457ffea1ad3a43171be295d607cf17eb281176b972a30f1b2e04b65b581541a9d890
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
814KB
MD5a3b33512d3926c6cdd140de63b13941a
SHA14fe4e7b870378b54082e9dea5db38fc85e5cba3c
SHA256cd5daa62c106d3e3ff56c28c82f17ac1e7a1a28a5966d367f2733b3b38d8b878
SHA51214deb7db81d2f2593ac3b1209814193f49b4f89fdb2611e7f7bd0649e827eadc9988c673e3ffbe7cce7d5eba4d11c0fadc0fe7544b4ace5068de3e1c17a8df83
-
Filesize
814KB
MD5a3b33512d3926c6cdd140de63b13941a
SHA14fe4e7b870378b54082e9dea5db38fc85e5cba3c
SHA256cd5daa62c106d3e3ff56c28c82f17ac1e7a1a28a5966d367f2733b3b38d8b878
SHA51214deb7db81d2f2593ac3b1209814193f49b4f89fdb2611e7f7bd0649e827eadc9988c673e3ffbe7cce7d5eba4d11c0fadc0fe7544b4ace5068de3e1c17a8df83
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
631KB
MD5f5d47eec8de04ef99c4879d38dbf6cbe
SHA1d781c956af6425370241657db5b8e78ef0e67a9a
SHA25613640e56420f7c89e4bffb1d0b5ebaf874c705ddbc18d16d9b870a013145083d
SHA5124a01c0e3da29b687f4edd0aee4416eca9fa3bd8d567453e56b0fd342b68f3efb828b71cb12537af22f40e294d94c6d8758d73b2a3b67c97623d8fb4a5015bbbe
-
Filesize
631KB
MD5f5d47eec8de04ef99c4879d38dbf6cbe
SHA1d781c956af6425370241657db5b8e78ef0e67a9a
SHA25613640e56420f7c89e4bffb1d0b5ebaf874c705ddbc18d16d9b870a013145083d
SHA5124a01c0e3da29b687f4edd0aee4416eca9fa3bd8d567453e56b0fd342b68f3efb828b71cb12537af22f40e294d94c6d8758d73b2a3b67c97623d8fb4a5015bbbe
-
Filesize
413KB
MD52ee91dd5308e8ea41cd0f8ad870502fa
SHA1c49dd35d819feb01a20a89e4d23346d2c14bf74c
SHA2560e260e9ced84c5d82ee84f28ca9820744853a82af20a0f0d164ee01f768e9e8d
SHA512770f4a8795f11c4e7b7e0cbdf24d14280286c7e11b4a5b501af647e93eab1681604232c46c0a7fa2b2e067671cbff75dac37d09a0928dcca0d8380a80915eef6
-
Filesize
413KB
MD52ee91dd5308e8ea41cd0f8ad870502fa
SHA1c49dd35d819feb01a20a89e4d23346d2c14bf74c
SHA2560e260e9ced84c5d82ee84f28ca9820744853a82af20a0f0d164ee01f768e9e8d
SHA512770f4a8795f11c4e7b7e0cbdf24d14280286c7e11b4a5b501af647e93eab1681604232c46c0a7fa2b2e067671cbff75dac37d09a0928dcca0d8380a80915eef6
-
Filesize
354KB
MD56a3389a7eb61b558465a8c5e2800cd30
SHA1ce8d3da7e8188ad6b25240b28c0cc3baecdaf4ef
SHA256df9baab802dea5c88556abe981af0ab3c01cd12dc98d8d20668d1fe26dca8cf0
SHA512e54ff4ab34947f6a0f53e4fb9e72065db3ea9e8030625f022773cc7ddc0711b73792a938dcf816e2e7afa00765aad0b2139fa9a3a90ddf31cc40bd18ce27df9f
-
Filesize
354KB
MD56a3389a7eb61b558465a8c5e2800cd30
SHA1ce8d3da7e8188ad6b25240b28c0cc3baecdaf4ef
SHA256df9baab802dea5c88556abe981af0ab3c01cd12dc98d8d20668d1fe26dca8cf0
SHA512e54ff4ab34947f6a0f53e4fb9e72065db3ea9e8030625f022773cc7ddc0711b73792a938dcf816e2e7afa00765aad0b2139fa9a3a90ddf31cc40bd18ce27df9f
-
Filesize
250KB
MD51df6699c2ac64d07b36d70d354d7a090
SHA105734dce299499e8dd5a620cd3dccefce40ede52
SHA256b31ad5193cee53a043722448b5d89c1b586ed501a9210c303d195ca0329d93b7
SHA512ec02f527aa0dc9eda05f33f60fbe92731943709d9f34bf8cd5601cec3225362f01377e1097b72c1c36c59fa871e2006b9166f1d1244101944e2cd28a3369a884
-
Filesize
250KB
MD51df6699c2ac64d07b36d70d354d7a090
SHA105734dce299499e8dd5a620cd3dccefce40ede52
SHA256b31ad5193cee53a043722448b5d89c1b586ed501a9210c303d195ca0329d93b7
SHA512ec02f527aa0dc9eda05f33f60fbe92731943709d9f34bf8cd5601cec3225362f01377e1097b72c1c36c59fa871e2006b9166f1d1244101944e2cd28a3369a884
-
Filesize
379KB
MD5cd7feee122009284d8b467413dc20e20
SHA19ff5d149ba7ef9015a068b7840735b5845b3cd4d
SHA256e898eb3c55ddc1e814ee194b1f3933960667d1415678e5008e5d348ad68e252f
SHA5123af27a8513dfd0f6be9b78fe7a913a9a3f80f637f25b3a449950ce463927b21eb39b3ece54ff40913948f9aab5e5c5110dcf1177c7bcf9588adfc60a29e87772
-
Filesize
379KB
MD5cd7feee122009284d8b467413dc20e20
SHA19ff5d149ba7ef9015a068b7840735b5845b3cd4d
SHA256e898eb3c55ddc1e814ee194b1f3933960667d1415678e5008e5d348ad68e252f
SHA5123af27a8513dfd0f6be9b78fe7a913a9a3f80f637f25b3a449950ce463927b21eb39b3ece54ff40913948f9aab5e5c5110dcf1177c7bcf9588adfc60a29e87772
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0