Analysis
-
max time kernel
68s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:22
Static task
static1
Behavioral task
behavioral1
Sample
a09c8de6b1354ee1789d59804de40af3d1ee78ed9bb889017b83f9bd308d2271.exe
Resource
win7-20230831-en
General
-
Target
a09c8de6b1354ee1789d59804de40af3d1ee78ed9bb889017b83f9bd308d2271.exe
-
Size
1.1MB
-
MD5
d826efe3e25a803d6fe2a9eb80b708c6
-
SHA1
4e0877b603cecd3ffbf93516ce98928d117616c6
-
SHA256
a09c8de6b1354ee1789d59804de40af3d1ee78ed9bb889017b83f9bd308d2271
-
SHA512
f9ff05380da28669bc1e18a8d5538ccc88a7727eb8ba38547604b88f875d8566298afbcbdea354ea9458781523bbf62e07036f368e07c546175adc5075c00f0d
-
SSDEEP
24576:ly3HdOcBSU2fBx8BwaCQz93mOdGuqcIY/xheyy1U:AtOuwJaCoZmOdGhpS2
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/968-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/968-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/968-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/968-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4500-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t4319898.exeexplonde.exeu0070898.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t4319898.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u0070898.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 14 IoCs
Processes:
z7977204.exez7880515.exez0485610.exez5952763.exeq4008859.exer6878528.exes6733924.exet4319898.exeexplonde.exeu0070898.exelegota.exew2371974.exelegota.exeexplonde.exepid process 4564 z7977204.exe 1988 z7880515.exe 1228 z0485610.exe 2044 z5952763.exe 4384 q4008859.exe 5056 r6878528.exe 1056 s6733924.exe 3288 t4319898.exe 4208 explonde.exe 3964 u0070898.exe 876 legota.exe 3664 w2371974.exe 4420 legota.exe 3032 explonde.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z7880515.exez0485610.exez5952763.exea09c8de6b1354ee1789d59804de40af3d1ee78ed9bb889017b83f9bd308d2271.exez7977204.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7880515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z0485610.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z5952763.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a09c8de6b1354ee1789d59804de40af3d1ee78ed9bb889017b83f9bd308d2271.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7977204.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q4008859.exer6878528.exes6733924.exedescription pid process target process PID 4384 set thread context of 4500 4384 q4008859.exe AppLaunch.exe PID 5056 set thread context of 968 5056 r6878528.exe AppLaunch.exe PID 1056 set thread context of 1444 1056 s6733924.exe AppLaunch.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4608 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4740 4384 WerFault.exe q4008859.exe 4036 5056 WerFault.exe r6878528.exe 1160 968 WerFault.exe AppLaunch.exe 4948 1056 WerFault.exe s6733924.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3556 schtasks.exe 1044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 4500 AppLaunch.exe 4500 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4500 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a09c8de6b1354ee1789d59804de40af3d1ee78ed9bb889017b83f9bd308d2271.exez7977204.exez7880515.exez0485610.exez5952763.exeq4008859.exer6878528.exes6733924.exet4319898.exeexplonde.exeu0070898.exedescription pid process target process PID 1896 wrote to memory of 4564 1896 a09c8de6b1354ee1789d59804de40af3d1ee78ed9bb889017b83f9bd308d2271.exe z7977204.exe PID 1896 wrote to memory of 4564 1896 a09c8de6b1354ee1789d59804de40af3d1ee78ed9bb889017b83f9bd308d2271.exe z7977204.exe PID 1896 wrote to memory of 4564 1896 a09c8de6b1354ee1789d59804de40af3d1ee78ed9bb889017b83f9bd308d2271.exe z7977204.exe PID 4564 wrote to memory of 1988 4564 z7977204.exe z7880515.exe PID 4564 wrote to memory of 1988 4564 z7977204.exe z7880515.exe PID 4564 wrote to memory of 1988 4564 z7977204.exe z7880515.exe PID 1988 wrote to memory of 1228 1988 z7880515.exe z0485610.exe PID 1988 wrote to memory of 1228 1988 z7880515.exe z0485610.exe PID 1988 wrote to memory of 1228 1988 z7880515.exe z0485610.exe PID 1228 wrote to memory of 2044 1228 z0485610.exe z5952763.exe PID 1228 wrote to memory of 2044 1228 z0485610.exe z5952763.exe PID 1228 wrote to memory of 2044 1228 z0485610.exe z5952763.exe PID 2044 wrote to memory of 4384 2044 z5952763.exe q4008859.exe PID 2044 wrote to memory of 4384 2044 z5952763.exe q4008859.exe PID 2044 wrote to memory of 4384 2044 z5952763.exe q4008859.exe PID 4384 wrote to memory of 4500 4384 q4008859.exe AppLaunch.exe PID 4384 wrote to memory of 4500 4384 q4008859.exe AppLaunch.exe PID 4384 wrote to memory of 4500 4384 q4008859.exe AppLaunch.exe PID 4384 wrote to memory of 4500 4384 q4008859.exe AppLaunch.exe PID 4384 wrote to memory of 4500 4384 q4008859.exe AppLaunch.exe PID 4384 wrote to memory of 4500 4384 q4008859.exe AppLaunch.exe PID 4384 wrote to memory of 4500 4384 q4008859.exe AppLaunch.exe PID 4384 wrote to memory of 4500 4384 q4008859.exe AppLaunch.exe PID 2044 wrote to memory of 5056 2044 z5952763.exe r6878528.exe PID 2044 wrote to memory of 5056 2044 z5952763.exe r6878528.exe PID 2044 wrote to memory of 5056 2044 z5952763.exe r6878528.exe PID 5056 wrote to memory of 968 5056 r6878528.exe AppLaunch.exe PID 5056 wrote to memory of 968 5056 r6878528.exe AppLaunch.exe PID 5056 wrote to memory of 968 5056 r6878528.exe AppLaunch.exe PID 5056 wrote to memory of 968 5056 r6878528.exe AppLaunch.exe PID 5056 wrote to memory of 968 5056 r6878528.exe AppLaunch.exe PID 5056 wrote to memory of 968 5056 r6878528.exe AppLaunch.exe PID 5056 wrote to memory of 968 5056 r6878528.exe AppLaunch.exe PID 5056 wrote to memory of 968 5056 r6878528.exe AppLaunch.exe PID 5056 wrote to memory of 968 5056 r6878528.exe AppLaunch.exe PID 5056 wrote to memory of 968 5056 r6878528.exe AppLaunch.exe PID 1228 wrote to memory of 1056 1228 z0485610.exe s6733924.exe PID 1228 wrote to memory of 1056 1228 z0485610.exe s6733924.exe PID 1228 wrote to memory of 1056 1228 z0485610.exe s6733924.exe PID 1056 wrote to memory of 2008 1056 s6733924.exe AppLaunch.exe PID 1056 wrote to memory of 2008 1056 s6733924.exe AppLaunch.exe PID 1056 wrote to memory of 2008 1056 s6733924.exe AppLaunch.exe PID 1056 wrote to memory of 1444 1056 s6733924.exe AppLaunch.exe PID 1056 wrote to memory of 1444 1056 s6733924.exe AppLaunch.exe PID 1056 wrote to memory of 1444 1056 s6733924.exe AppLaunch.exe PID 1056 wrote to memory of 1444 1056 s6733924.exe AppLaunch.exe PID 1056 wrote to memory of 1444 1056 s6733924.exe AppLaunch.exe PID 1056 wrote to memory of 1444 1056 s6733924.exe AppLaunch.exe PID 1056 wrote to memory of 1444 1056 s6733924.exe AppLaunch.exe PID 1056 wrote to memory of 1444 1056 s6733924.exe AppLaunch.exe PID 1988 wrote to memory of 3288 1988 z7880515.exe t4319898.exe PID 1988 wrote to memory of 3288 1988 z7880515.exe t4319898.exe PID 1988 wrote to memory of 3288 1988 z7880515.exe t4319898.exe PID 3288 wrote to memory of 4208 3288 t4319898.exe explonde.exe PID 3288 wrote to memory of 4208 3288 t4319898.exe explonde.exe PID 3288 wrote to memory of 4208 3288 t4319898.exe explonde.exe PID 4564 wrote to memory of 3964 4564 z7977204.exe u0070898.exe PID 4564 wrote to memory of 3964 4564 z7977204.exe u0070898.exe PID 4564 wrote to memory of 3964 4564 z7977204.exe u0070898.exe PID 4208 wrote to memory of 3556 4208 explonde.exe schtasks.exe PID 4208 wrote to memory of 3556 4208 explonde.exe schtasks.exe PID 4208 wrote to memory of 3556 4208 explonde.exe schtasks.exe PID 3964 wrote to memory of 876 3964 u0070898.exe legota.exe PID 3964 wrote to memory of 876 3964 u0070898.exe legota.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a09c8de6b1354ee1789d59804de40af3d1ee78ed9bb889017b83f9bd308d2271.exe"C:\Users\Admin\AppData\Local\Temp\a09c8de6b1354ee1789d59804de40af3d1ee78ed9bb889017b83f9bd308d2271.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7977204.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7977204.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7880515.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7880515.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0485610.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0485610.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5952763.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5952763.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4008859.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4008859.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 5847⤵
- Program crash
PID:4740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6878528.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6878528.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 5408⤵
- Program crash
PID:1160
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1407⤵
- Program crash
PID:4036
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6733924.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6733924.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2008
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 2126⤵
- Program crash
PID:4948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4319898.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4319898.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:3556
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:1648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4572
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:2416
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:3372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:1736
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵PID:5052
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0070898.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0070898.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:1044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:1188
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:1852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:452
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵PID:4916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2371974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2371974.exe2⤵
- Executes dropped EXE
PID:3664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4384 -ip 43841⤵PID:1412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5056 -ip 50561⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 968 -ip 9681⤵PID:1324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1056 -ip 10561⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4420
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3032
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵PID:2136
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4608
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5667ae469c916147a955731d790033a63
SHA17f97880925f79afecd8ea6faf404f15706939880
SHA256e86a2c9f349dfb4e30677c58c40736612adbfe8b67bf53f90e8215705f368282
SHA512a6a9ff09471afe22ae76983c1194e85721b2d89278b91d1ba25a6e3d63c6c59eaf81e17152b68b5646bf91c3c9978ff9ff16ace989154139ea9515f07aa3a2a0
-
Filesize
23KB
MD5667ae469c916147a955731d790033a63
SHA17f97880925f79afecd8ea6faf404f15706939880
SHA256e86a2c9f349dfb4e30677c58c40736612adbfe8b67bf53f90e8215705f368282
SHA512a6a9ff09471afe22ae76983c1194e85721b2d89278b91d1ba25a6e3d63c6c59eaf81e17152b68b5646bf91c3c9978ff9ff16ace989154139ea9515f07aa3a2a0
-
Filesize
983KB
MD52a227efa213b718f5d6a2a5a43ad393a
SHA1c8e55b30c783533dafc9c41d1217de27aa3c2e51
SHA256f8367e7c7d6b6c2bb7921010e303800c99b5ef32a7cae8a335ba73d45c3fe44c
SHA512303931d5586c7ff52edbbb4214be46c7e034f9b0be5f0482756555d32adea33fa03387847c896c2053542fff5f3b2bc04f3b134816f9354d67ce5ccf018e0bbe
-
Filesize
983KB
MD52a227efa213b718f5d6a2a5a43ad393a
SHA1c8e55b30c783533dafc9c41d1217de27aa3c2e51
SHA256f8367e7c7d6b6c2bb7921010e303800c99b5ef32a7cae8a335ba73d45c3fe44c
SHA512303931d5586c7ff52edbbb4214be46c7e034f9b0be5f0482756555d32adea33fa03387847c896c2053542fff5f3b2bc04f3b134816f9354d67ce5ccf018e0bbe
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
800KB
MD556b3e2315607dc138cbbccc1e4e5fb78
SHA11a3cd4b87534350d2328d108b6da949b55f8931a
SHA256b2fb2a9e9c363760678914d2268fe5fd1a3e54b747069967c5ac0c6d56b718d9
SHA512ef9c6cea0cf0a73021bb9b6dadc35c9d834caa6dc4b43ef8c23fdfab3b7fb3a5108b318749e6f8618441c170698446914fed14ee4d99edc0a6736dc658426588
-
Filesize
800KB
MD556b3e2315607dc138cbbccc1e4e5fb78
SHA11a3cd4b87534350d2328d108b6da949b55f8931a
SHA256b2fb2a9e9c363760678914d2268fe5fd1a3e54b747069967c5ac0c6d56b718d9
SHA512ef9c6cea0cf0a73021bb9b6dadc35c9d834caa6dc4b43ef8c23fdfab3b7fb3a5108b318749e6f8618441c170698446914fed14ee4d99edc0a6736dc658426588
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
617KB
MD5697f83571886a0c06cc10743daf6d4c6
SHA17ba6ab5b768ef22b8867977d375de2c9326b4352
SHA25603f8c799b1ef864d32ee1db15bc2cf46c3d19690fdc533fc24721c69fc0fbeb9
SHA5123c6e985c55cca3c585ed71fb620dd7208b2e522ef680e326ca95de422c5de26156169eb16a41974ed4b059a2c32320fa4befb8e3c0a65afcc04246dc2ec5557e
-
Filesize
617KB
MD5697f83571886a0c06cc10743daf6d4c6
SHA17ba6ab5b768ef22b8867977d375de2c9326b4352
SHA25603f8c799b1ef864d32ee1db15bc2cf46c3d19690fdc533fc24721c69fc0fbeb9
SHA5123c6e985c55cca3c585ed71fb620dd7208b2e522ef680e326ca95de422c5de26156169eb16a41974ed4b059a2c32320fa4befb8e3c0a65afcc04246dc2ec5557e
-
Filesize
390KB
MD527e8eab392bcf5b505e17076a7bedbca
SHA1013ece5b2bdd7bd6ecce240cf06da10fd4ce2b94
SHA256c61d81cf830af77f0c3a3d55b48a6e07f58e5e9b7ee6764d11084836806461ee
SHA51234f9dddd54ad6b95d3d44d359d66edd2afb9c0a55a4bcc104233294d44d13c0046cb25cbef2ffff713e3e9dc6c3a02ec148e086571e3e4595c94c9e20f8c3f8b
-
Filesize
390KB
MD527e8eab392bcf5b505e17076a7bedbca
SHA1013ece5b2bdd7bd6ecce240cf06da10fd4ce2b94
SHA256c61d81cf830af77f0c3a3d55b48a6e07f58e5e9b7ee6764d11084836806461ee
SHA51234f9dddd54ad6b95d3d44d359d66edd2afb9c0a55a4bcc104233294d44d13c0046cb25cbef2ffff713e3e9dc6c3a02ec148e086571e3e4595c94c9e20f8c3f8b
-
Filesize
346KB
MD5b8fa0c9ca9fa7158b66182186bd8b4b3
SHA182e941d09ec2672f92d74e1bcc5e77a583cf475a
SHA2569f55326825b1925f9d238a53529a7a8a3b4ebfc948cb5e4060d7ba489a77eed8
SHA512adef81f0c9995cffb05fc11180442f5c1d7a258ac2de69d8e75cbe20319f9b0029a98485efb649e5d0ab5e3fb2bbe001a48da038816969fb4973450ba0818649
-
Filesize
346KB
MD5b8fa0c9ca9fa7158b66182186bd8b4b3
SHA182e941d09ec2672f92d74e1bcc5e77a583cf475a
SHA2569f55326825b1925f9d238a53529a7a8a3b4ebfc948cb5e4060d7ba489a77eed8
SHA512adef81f0c9995cffb05fc11180442f5c1d7a258ac2de69d8e75cbe20319f9b0029a98485efb649e5d0ab5e3fb2bbe001a48da038816969fb4973450ba0818649
-
Filesize
227KB
MD528c53499a0f93874577e1c17e7a45aa3
SHA16fd1f15bda1d0e556cfe21289c22d8499d7768a3
SHA256360dbf7f44811de0212c4ea39a7a2d71e25cad8b6f2d8baafd3d9dffe8606f9f
SHA512a623b0d28b673c293cf4d2fc6eec6ae577f488a967152c3f59b2ec92544939a215c3e29824befb0ec9b2babddb4c0ea4e1c444b5b4ae262c3b4e807920c9d6a0
-
Filesize
227KB
MD528c53499a0f93874577e1c17e7a45aa3
SHA16fd1f15bda1d0e556cfe21289c22d8499d7768a3
SHA256360dbf7f44811de0212c4ea39a7a2d71e25cad8b6f2d8baafd3d9dffe8606f9f
SHA512a623b0d28b673c293cf4d2fc6eec6ae577f488a967152c3f59b2ec92544939a215c3e29824befb0ec9b2babddb4c0ea4e1c444b5b4ae262c3b4e807920c9d6a0
-
Filesize
356KB
MD56c0dd165bde04d6cbf771896ecba605a
SHA1759a28efc4a4ed481d3f542c02b0e6cdcb0156a9
SHA256bbeb4b8a3129bd49611285f77e881d56011e3fa9a9976e689ae311cd6b7cc9a1
SHA5125efaf3b10efd4fdea69c87f8b84491c6d94951e896fe5a0cc3e4214b0e4c355d449cf9f8b65dbfed0ff626eb04ca6fd4752b48656cd0329a6db6f2ed6a033d3e
-
Filesize
356KB
MD56c0dd165bde04d6cbf771896ecba605a
SHA1759a28efc4a4ed481d3f542c02b0e6cdcb0156a9
SHA256bbeb4b8a3129bd49611285f77e881d56011e3fa9a9976e689ae311cd6b7cc9a1
SHA5125efaf3b10efd4fdea69c87f8b84491c6d94951e896fe5a0cc3e4214b0e4c355d449cf9f8b65dbfed0ff626eb04ca6fd4752b48656cd0329a6db6f2ed6a033d3e
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0