Analysis
-
max time kernel
138s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:27
Static task
static1
Behavioral task
behavioral1
Sample
fcb31f69f02730bb2243cf9249389d9c6300f6dd5d73dac7022df9954331cb63.exe
Resource
win7-20230831-en
General
-
Target
fcb31f69f02730bb2243cf9249389d9c6300f6dd5d73dac7022df9954331cb63.exe
-
Size
1.1MB
-
MD5
c3cefb39907a3bcdbb162dc3411f750d
-
SHA1
793eee219a4d15b0ee972d4fafbaf559133a5044
-
SHA256
fcb31f69f02730bb2243cf9249389d9c6300f6dd5d73dac7022df9954331cb63
-
SHA512
4e5d4f95f9b38cc6efbe90a475f36867b609b05c365ebb9ee285bbf7f411c4fe318821060151326382a8cd617bcbc28b7d177cd1df0a3d0052f73323027340d7
-
SSDEEP
24576:Dy2tGlP//o0lMsB3k8YWLT71ZC2yImqsFQcFAOXSR:W2sdnOsB3k87HCkmZFnAO
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1716-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1716-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1716-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1716-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3540-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
legota.exet5607672.exeexplonde.exeu6712751.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation t5607672.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation u6712751.exe -
Executes dropped EXE 14 IoCs
Processes:
z5583539.exez6721405.exez2004222.exez3803854.exeq8380713.exer2370115.exes6049773.exet5607672.exeexplonde.exeu6712751.exelegota.exew6475602.exeexplonde.exelegota.exepid process 4480 z5583539.exe 1488 z6721405.exe 4704 z2004222.exe 3528 z3803854.exe 3840 q8380713.exe 2620 r2370115.exe 516 s6049773.exe 4676 t5607672.exe 2408 explonde.exe 1316 u6712751.exe 3620 legota.exe 4176 w6475602.exe 2688 explonde.exe 1892 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 244 rundll32.exe 3180 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z6721405.exez2004222.exez3803854.exefcb31f69f02730bb2243cf9249389d9c6300f6dd5d73dac7022df9954331cb63.exez5583539.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6721405.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2004222.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z3803854.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fcb31f69f02730bb2243cf9249389d9c6300f6dd5d73dac7022df9954331cb63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5583539.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q8380713.exer2370115.exes6049773.exedescription pid process target process PID 3840 set thread context of 3540 3840 q8380713.exe AppLaunch.exe PID 2620 set thread context of 1716 2620 r2370115.exe AppLaunch.exe PID 516 set thread context of 4524 516 s6049773.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3784 3840 WerFault.exe q8380713.exe 3448 2620 WerFault.exe r2370115.exe 4204 1716 WerFault.exe AppLaunch.exe 1088 516 WerFault.exe s6049773.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3948 schtasks.exe 1428 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 3540 AppLaunch.exe 3540 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3540 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fcb31f69f02730bb2243cf9249389d9c6300f6dd5d73dac7022df9954331cb63.exez5583539.exez6721405.exez2004222.exez3803854.exeq8380713.exer2370115.exes6049773.exet5607672.exeexplonde.exedescription pid process target process PID 2868 wrote to memory of 4480 2868 fcb31f69f02730bb2243cf9249389d9c6300f6dd5d73dac7022df9954331cb63.exe z5583539.exe PID 2868 wrote to memory of 4480 2868 fcb31f69f02730bb2243cf9249389d9c6300f6dd5d73dac7022df9954331cb63.exe z5583539.exe PID 2868 wrote to memory of 4480 2868 fcb31f69f02730bb2243cf9249389d9c6300f6dd5d73dac7022df9954331cb63.exe z5583539.exe PID 4480 wrote to memory of 1488 4480 z5583539.exe z6721405.exe PID 4480 wrote to memory of 1488 4480 z5583539.exe z6721405.exe PID 4480 wrote to memory of 1488 4480 z5583539.exe z6721405.exe PID 1488 wrote to memory of 4704 1488 z6721405.exe z2004222.exe PID 1488 wrote to memory of 4704 1488 z6721405.exe z2004222.exe PID 1488 wrote to memory of 4704 1488 z6721405.exe z2004222.exe PID 4704 wrote to memory of 3528 4704 z2004222.exe z3803854.exe PID 4704 wrote to memory of 3528 4704 z2004222.exe z3803854.exe PID 4704 wrote to memory of 3528 4704 z2004222.exe z3803854.exe PID 3528 wrote to memory of 3840 3528 z3803854.exe q8380713.exe PID 3528 wrote to memory of 3840 3528 z3803854.exe q8380713.exe PID 3528 wrote to memory of 3840 3528 z3803854.exe q8380713.exe PID 3840 wrote to memory of 3540 3840 q8380713.exe AppLaunch.exe PID 3840 wrote to memory of 3540 3840 q8380713.exe AppLaunch.exe PID 3840 wrote to memory of 3540 3840 q8380713.exe AppLaunch.exe PID 3840 wrote to memory of 3540 3840 q8380713.exe AppLaunch.exe PID 3840 wrote to memory of 3540 3840 q8380713.exe AppLaunch.exe PID 3840 wrote to memory of 3540 3840 q8380713.exe AppLaunch.exe PID 3840 wrote to memory of 3540 3840 q8380713.exe AppLaunch.exe PID 3840 wrote to memory of 3540 3840 q8380713.exe AppLaunch.exe PID 3528 wrote to memory of 2620 3528 z3803854.exe r2370115.exe PID 3528 wrote to memory of 2620 3528 z3803854.exe r2370115.exe PID 3528 wrote to memory of 2620 3528 z3803854.exe r2370115.exe PID 2620 wrote to memory of 2488 2620 r2370115.exe AppLaunch.exe PID 2620 wrote to memory of 2488 2620 r2370115.exe AppLaunch.exe PID 2620 wrote to memory of 2488 2620 r2370115.exe AppLaunch.exe PID 2620 wrote to memory of 1716 2620 r2370115.exe AppLaunch.exe PID 2620 wrote to memory of 1716 2620 r2370115.exe AppLaunch.exe PID 2620 wrote to memory of 1716 2620 r2370115.exe AppLaunch.exe PID 2620 wrote to memory of 1716 2620 r2370115.exe AppLaunch.exe PID 2620 wrote to memory of 1716 2620 r2370115.exe AppLaunch.exe PID 2620 wrote to memory of 1716 2620 r2370115.exe AppLaunch.exe PID 2620 wrote to memory of 1716 2620 r2370115.exe AppLaunch.exe PID 2620 wrote to memory of 1716 2620 r2370115.exe AppLaunch.exe PID 2620 wrote to memory of 1716 2620 r2370115.exe AppLaunch.exe PID 2620 wrote to memory of 1716 2620 r2370115.exe AppLaunch.exe PID 4704 wrote to memory of 516 4704 z2004222.exe s6049773.exe PID 4704 wrote to memory of 516 4704 z2004222.exe s6049773.exe PID 4704 wrote to memory of 516 4704 z2004222.exe s6049773.exe PID 516 wrote to memory of 4524 516 s6049773.exe AppLaunch.exe PID 516 wrote to memory of 4524 516 s6049773.exe AppLaunch.exe PID 516 wrote to memory of 4524 516 s6049773.exe AppLaunch.exe PID 516 wrote to memory of 4524 516 s6049773.exe AppLaunch.exe PID 516 wrote to memory of 4524 516 s6049773.exe AppLaunch.exe PID 516 wrote to memory of 4524 516 s6049773.exe AppLaunch.exe PID 516 wrote to memory of 4524 516 s6049773.exe AppLaunch.exe PID 516 wrote to memory of 4524 516 s6049773.exe AppLaunch.exe PID 1488 wrote to memory of 4676 1488 z6721405.exe t5607672.exe PID 1488 wrote to memory of 4676 1488 z6721405.exe t5607672.exe PID 1488 wrote to memory of 4676 1488 z6721405.exe t5607672.exe PID 4676 wrote to memory of 2408 4676 t5607672.exe explonde.exe PID 4676 wrote to memory of 2408 4676 t5607672.exe explonde.exe PID 4676 wrote to memory of 2408 4676 t5607672.exe explonde.exe PID 4480 wrote to memory of 1316 4480 z5583539.exe u6712751.exe PID 4480 wrote to memory of 1316 4480 z5583539.exe u6712751.exe PID 4480 wrote to memory of 1316 4480 z5583539.exe u6712751.exe PID 2408 wrote to memory of 1428 2408 explonde.exe schtasks.exe PID 2408 wrote to memory of 1428 2408 explonde.exe schtasks.exe PID 2408 wrote to memory of 1428 2408 explonde.exe schtasks.exe PID 2408 wrote to memory of 3052 2408 explonde.exe cmd.exe PID 2408 wrote to memory of 3052 2408 explonde.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcb31f69f02730bb2243cf9249389d9c6300f6dd5d73dac7022df9954331cb63.exe"C:\Users\Admin\AppData\Local\Temp\fcb31f69f02730bb2243cf9249389d9c6300f6dd5d73dac7022df9954331cb63.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5583539.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5583539.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6721405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6721405.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2004222.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2004222.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3803854.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3803854.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8380713.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8380713.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 1407⤵
- Program crash
PID:3784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2370115.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2370115.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 5408⤵
- Program crash
PID:4204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 1527⤵
- Program crash
PID:3448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6049773.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6049773.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 1406⤵
- Program crash
PID:1088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5607672.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5607672.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:1428
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:3052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:4756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:2468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5028
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:3800
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:5064
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:244
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6712751.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6712751.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:3620 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3948
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:264
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2292
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:5068
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:1256
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3180
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6475602.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6475602.exe2⤵
- Executes dropped EXE
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3840 -ip 38401⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2620 -ip 26201⤵PID:2932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1716 -ip 17161⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 516 -ip 5161⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:2688
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1892
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5e16cad7b08d1ff72602930c947cc5810
SHA1eab3c39b532e58ebd570dd8c596d74b1b5bc972a
SHA256487afba306c2f1e7c769aa6ad8b7c89ecdcb83d411df2a41e2f3b33b3b966c1c
SHA512b5511507acdacfc42c54263311e0994f0804ce3c4e173b9c2ed10836dbaa72cf0a646262f3e88d6d0edf12efc6b68fa8d04be03106e7cbe65033c72b8a20dfb9
-
Filesize
23KB
MD5e16cad7b08d1ff72602930c947cc5810
SHA1eab3c39b532e58ebd570dd8c596d74b1b5bc972a
SHA256487afba306c2f1e7c769aa6ad8b7c89ecdcb83d411df2a41e2f3b33b3b966c1c
SHA512b5511507acdacfc42c54263311e0994f0804ce3c4e173b9c2ed10836dbaa72cf0a646262f3e88d6d0edf12efc6b68fa8d04be03106e7cbe65033c72b8a20dfb9
-
Filesize
984KB
MD5e0fb9e6472a1d030776488e33be43f34
SHA100e91b21c182d845b9568e2743d03ab78454e8e5
SHA256ac4b345e7b1ecd8219963d2d52b9393d6807fa602349da51425f7b7a51f88efd
SHA5128a176907dc0fa2a0a385d29674448ece4742e186ae3b432833732590e6c1dedfc6420259490a1185e39a4d8cd73230b10b3c350f685ae883fd1ab4595652e3fa
-
Filesize
984KB
MD5e0fb9e6472a1d030776488e33be43f34
SHA100e91b21c182d845b9568e2743d03ab78454e8e5
SHA256ac4b345e7b1ecd8219963d2d52b9393d6807fa602349da51425f7b7a51f88efd
SHA5128a176907dc0fa2a0a385d29674448ece4742e186ae3b432833732590e6c1dedfc6420259490a1185e39a4d8cd73230b10b3c350f685ae883fd1ab4595652e3fa
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
801KB
MD50a1a18b0cf5cd116a6e985b55fe57d45
SHA147179b1d0ca4528dc41cef049fea211b04f27102
SHA256c532baddcd17c06a02186b509b3bf41414903e32956bc78257b9068c710b68b1
SHA512743719d165b50f10d4db1144ce02e5a00260737c0445590debffd22fa0358141a21f0b84f0a237a581516d4288d63408ef3d6d3c52cfb3b6cb83c94bfcaf5df5
-
Filesize
801KB
MD50a1a18b0cf5cd116a6e985b55fe57d45
SHA147179b1d0ca4528dc41cef049fea211b04f27102
SHA256c532baddcd17c06a02186b509b3bf41414903e32956bc78257b9068c710b68b1
SHA512743719d165b50f10d4db1144ce02e5a00260737c0445590debffd22fa0358141a21f0b84f0a237a581516d4288d63408ef3d6d3c52cfb3b6cb83c94bfcaf5df5
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
618KB
MD51ddd36569729b27dbe27c15029ddf498
SHA10499a9af084c2f0f4e4b16c06cfcb130480da88b
SHA25668918ee8155a735dc24db933b990142b0576d10c9a959c26a02bc3a399f8a2e0
SHA512a546e4bc0acee3b11b432970da76dea205767617ded08a38d2bebb3b36e4bafd15d232459acbc2fc18cc6f0d2fd7ae9598e8d601934e521d4b49929a02491b30
-
Filesize
618KB
MD51ddd36569729b27dbe27c15029ddf498
SHA10499a9af084c2f0f4e4b16c06cfcb130480da88b
SHA25668918ee8155a735dc24db933b990142b0576d10c9a959c26a02bc3a399f8a2e0
SHA512a546e4bc0acee3b11b432970da76dea205767617ded08a38d2bebb3b36e4bafd15d232459acbc2fc18cc6f0d2fd7ae9598e8d601934e521d4b49929a02491b30
-
Filesize
390KB
MD50648c3f789f17f3ecaf3fe96baeb0b6c
SHA18c2fa4aac6873e7164ee452265f149776534e3a8
SHA25637d5f5214d53f86cf7fb641d26da2eaa82bf2d59648a9364b0fc39231e0dfcc1
SHA512d1d598852b0e6a80add9221299a553b25c80bd43838272e5e9c0c3621183af79a1d1dedd3e8fb130af0b7b4f1d68423cccadd6e827bda5e81a9a359d0bd4b77c
-
Filesize
390KB
MD50648c3f789f17f3ecaf3fe96baeb0b6c
SHA18c2fa4aac6873e7164ee452265f149776534e3a8
SHA25637d5f5214d53f86cf7fb641d26da2eaa82bf2d59648a9364b0fc39231e0dfcc1
SHA512d1d598852b0e6a80add9221299a553b25c80bd43838272e5e9c0c3621183af79a1d1dedd3e8fb130af0b7b4f1d68423cccadd6e827bda5e81a9a359d0bd4b77c
-
Filesize
346KB
MD5c8c955044f535183c3d84d0950b14866
SHA11fcaf7de3e6741228030330402866c087b049d66
SHA25616f84bf4f9482e9020d78a923ff7b0c7948fc682ec20c24950c9a4091c56bbe9
SHA5129c7eadaa3c44e9409d430d138f6015746dd21560008ece42a5a04005d2af5bb3b950de484a862c64db914ab126f964babe7561ed203a83954e92cf1e40269147
-
Filesize
346KB
MD5c8c955044f535183c3d84d0950b14866
SHA11fcaf7de3e6741228030330402866c087b049d66
SHA25616f84bf4f9482e9020d78a923ff7b0c7948fc682ec20c24950c9a4091c56bbe9
SHA5129c7eadaa3c44e9409d430d138f6015746dd21560008ece42a5a04005d2af5bb3b950de484a862c64db914ab126f964babe7561ed203a83954e92cf1e40269147
-
Filesize
227KB
MD5418e1ebc53166a707c4e7d32796bab49
SHA168d8de0a7718b221a3d1a517dd809b8ae3e07620
SHA2566d39a2ed09a0ceffc659f3704da7ac7e91181752df766db22eab60892db334c0
SHA51267b9e13f04b82ffd4bf4d1c18bb2412f8268580fc271eab8724541f0de403aede7eb3f2c97e0ee64847109544afa720352df9cc2f5020d0a6b81e2080d615d00
-
Filesize
227KB
MD5418e1ebc53166a707c4e7d32796bab49
SHA168d8de0a7718b221a3d1a517dd809b8ae3e07620
SHA2566d39a2ed09a0ceffc659f3704da7ac7e91181752df766db22eab60892db334c0
SHA51267b9e13f04b82ffd4bf4d1c18bb2412f8268580fc271eab8724541f0de403aede7eb3f2c97e0ee64847109544afa720352df9cc2f5020d0a6b81e2080d615d00
-
Filesize
356KB
MD5f7f83a39dae871c86126c619ee2a814d
SHA1988d41cd834e7bfffef1c5bc224fcb568a57d9cf
SHA256e737dc5188b38ff7b79bcd66b3a40b2c02de0fbef77045dfc7274a95fac823a9
SHA512daab26ffe9e66d23d1800bf29c71abcebdad5cd4dcbf1490ae34439eceeb712a7eaed8adba1264dafc4437df928ec66ba0a9afee887b693199df07553da589ac
-
Filesize
356KB
MD5f7f83a39dae871c86126c619ee2a814d
SHA1988d41cd834e7bfffef1c5bc224fcb568a57d9cf
SHA256e737dc5188b38ff7b79bcd66b3a40b2c02de0fbef77045dfc7274a95fac823a9
SHA512daab26ffe9e66d23d1800bf29c71abcebdad5cd4dcbf1490ae34439eceeb712a7eaed8adba1264dafc4437df928ec66ba0a9afee887b693199df07553da589ac
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0