Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 05:53
Static task
static1
Behavioral task
behavioral1
Sample
7518fe12c6defb5823fb248ce659835833c846ce935cbd8067fa5d14178808fd.exe
Resource
win7-20230831-en
General
-
Target
7518fe12c6defb5823fb248ce659835833c846ce935cbd8067fa5d14178808fd.exe
-
Size
1.1MB
-
MD5
e98e20b6be649e1332b01d471df7caff
-
SHA1
35bd62819783920eae71c0c503db46894856fda5
-
SHA256
7518fe12c6defb5823fb248ce659835833c846ce935cbd8067fa5d14178808fd
-
SHA512
0ae71f208a5f6d6503b2aca59ae13f2444f4c66765f0eacb22c6114fddc27149598caf22c7572c69e36ab931fd4113af34eb2c9880e1d2d00b3250312278bb9a
-
SSDEEP
12288:9Mrgy9061TSXjMtcM7Yxoc9fZAtBndG++i2PsaifcG1gOiordAVVGDtxvqxg2I7s:Vy3TiocvYGTPOf8bjMuxg2eM1XDL
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4680-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4680-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4680-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4680-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1868-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t9018697.exeexplonde.exeu7972380.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation t9018697.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation u7972380.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 14 IoCs
Processes:
z7933715.exez2553441.exez3768226.exez6520333.exeq6364931.exer9766761.exes3613647.exet9018697.exeexplonde.exeu7972380.exelegota.exew8778054.exeexplonde.exelegota.exepid process 4232 z7933715.exe 2816 z2553441.exe 2400 z3768226.exe 1956 z6520333.exe 3852 q6364931.exe 4776 r9766761.exe 1744 s3613647.exe 2548 t9018697.exe 840 explonde.exe 2032 u7972380.exe 2900 legota.exe 5080 w8778054.exe 5032 explonde.exe 4008 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2400 rundll32.exe 4440 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
7518fe12c6defb5823fb248ce659835833c846ce935cbd8067fa5d14178808fd.exez7933715.exez2553441.exez3768226.exez6520333.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7518fe12c6defb5823fb248ce659835833c846ce935cbd8067fa5d14178808fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7933715.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z2553441.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z3768226.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z6520333.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q6364931.exer9766761.exes3613647.exedescription pid process target process PID 3852 set thread context of 1868 3852 q6364931.exe AppLaunch.exe PID 4776 set thread context of 4680 4776 r9766761.exe AppLaunch.exe PID 1744 set thread context of 2336 1744 s3613647.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4616 3852 WerFault.exe q6364931.exe 2744 4776 WerFault.exe r9766761.exe 4304 4680 WerFault.exe AppLaunch.exe 4696 1744 WerFault.exe s3613647.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2692 schtasks.exe 768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1868 AppLaunch.exe 1868 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1868 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7518fe12c6defb5823fb248ce659835833c846ce935cbd8067fa5d14178808fd.exez7933715.exez2553441.exez3768226.exez6520333.exeq6364931.exer9766761.exes3613647.exet9018697.exedescription pid process target process PID 3772 wrote to memory of 4232 3772 7518fe12c6defb5823fb248ce659835833c846ce935cbd8067fa5d14178808fd.exe z7933715.exe PID 3772 wrote to memory of 4232 3772 7518fe12c6defb5823fb248ce659835833c846ce935cbd8067fa5d14178808fd.exe z7933715.exe PID 3772 wrote to memory of 4232 3772 7518fe12c6defb5823fb248ce659835833c846ce935cbd8067fa5d14178808fd.exe z7933715.exe PID 4232 wrote to memory of 2816 4232 z7933715.exe z2553441.exe PID 4232 wrote to memory of 2816 4232 z7933715.exe z2553441.exe PID 4232 wrote to memory of 2816 4232 z7933715.exe z2553441.exe PID 2816 wrote to memory of 2400 2816 z2553441.exe z3768226.exe PID 2816 wrote to memory of 2400 2816 z2553441.exe z3768226.exe PID 2816 wrote to memory of 2400 2816 z2553441.exe z3768226.exe PID 2400 wrote to memory of 1956 2400 z3768226.exe z6520333.exe PID 2400 wrote to memory of 1956 2400 z3768226.exe z6520333.exe PID 2400 wrote to memory of 1956 2400 z3768226.exe z6520333.exe PID 1956 wrote to memory of 3852 1956 z6520333.exe q6364931.exe PID 1956 wrote to memory of 3852 1956 z6520333.exe q6364931.exe PID 1956 wrote to memory of 3852 1956 z6520333.exe q6364931.exe PID 3852 wrote to memory of 416 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 416 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 416 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 4476 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 4476 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 4476 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 1964 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 1964 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 1964 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 1868 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 1868 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 1868 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 1868 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 1868 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 1868 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 1868 3852 q6364931.exe AppLaunch.exe PID 3852 wrote to memory of 1868 3852 q6364931.exe AppLaunch.exe PID 1956 wrote to memory of 4776 1956 z6520333.exe r9766761.exe PID 1956 wrote to memory of 4776 1956 z6520333.exe r9766761.exe PID 1956 wrote to memory of 4776 1956 z6520333.exe r9766761.exe PID 4776 wrote to memory of 4680 4776 r9766761.exe AppLaunch.exe PID 4776 wrote to memory of 4680 4776 r9766761.exe AppLaunch.exe PID 4776 wrote to memory of 4680 4776 r9766761.exe AppLaunch.exe PID 4776 wrote to memory of 4680 4776 r9766761.exe AppLaunch.exe PID 4776 wrote to memory of 4680 4776 r9766761.exe AppLaunch.exe PID 4776 wrote to memory of 4680 4776 r9766761.exe AppLaunch.exe PID 4776 wrote to memory of 4680 4776 r9766761.exe AppLaunch.exe PID 4776 wrote to memory of 4680 4776 r9766761.exe AppLaunch.exe PID 4776 wrote to memory of 4680 4776 r9766761.exe AppLaunch.exe PID 4776 wrote to memory of 4680 4776 r9766761.exe AppLaunch.exe PID 2400 wrote to memory of 1744 2400 z3768226.exe s3613647.exe PID 2400 wrote to memory of 1744 2400 z3768226.exe s3613647.exe PID 2400 wrote to memory of 1744 2400 z3768226.exe s3613647.exe PID 1744 wrote to memory of 2336 1744 s3613647.exe AppLaunch.exe PID 1744 wrote to memory of 2336 1744 s3613647.exe AppLaunch.exe PID 1744 wrote to memory of 2336 1744 s3613647.exe AppLaunch.exe PID 1744 wrote to memory of 2336 1744 s3613647.exe AppLaunch.exe PID 1744 wrote to memory of 2336 1744 s3613647.exe AppLaunch.exe PID 1744 wrote to memory of 2336 1744 s3613647.exe AppLaunch.exe PID 1744 wrote to memory of 2336 1744 s3613647.exe AppLaunch.exe PID 1744 wrote to memory of 2336 1744 s3613647.exe AppLaunch.exe PID 2816 wrote to memory of 2548 2816 z2553441.exe t9018697.exe PID 2816 wrote to memory of 2548 2816 z2553441.exe t9018697.exe PID 2816 wrote to memory of 2548 2816 z2553441.exe t9018697.exe PID 2548 wrote to memory of 840 2548 t9018697.exe explonde.exe PID 2548 wrote to memory of 840 2548 t9018697.exe explonde.exe PID 2548 wrote to memory of 840 2548 t9018697.exe explonde.exe PID 4232 wrote to memory of 2032 4232 z7933715.exe u7972380.exe PID 4232 wrote to memory of 2032 4232 z7933715.exe u7972380.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7518fe12c6defb5823fb248ce659835833c846ce935cbd8067fa5d14178808fd.exe"C:\Users\Admin\AppData\Local\Temp\7518fe12c6defb5823fb248ce659835833c846ce935cbd8067fa5d14178808fd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7933715.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7933715.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2553441.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2553441.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3768226.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3768226.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6520333.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6520333.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6364931.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6364931.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:416
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4476
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1964
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 6047⤵
- Program crash
PID:4616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9766761.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9766761.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4680 -s 5408⤵
- Program crash
PID:4304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 5847⤵
- Program crash
PID:2744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3613647.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3613647.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 1526⤵
- Program crash
PID:4696
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9018697.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t9018697.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:2692
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:1504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:3284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:3040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:1292
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:5024
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2400
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u7972380.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u7972380.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:768
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:3124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2420
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4380
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1920
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3400
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:2224
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4440
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8778054.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8778054.exe2⤵
- Executes dropped EXE
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3852 -ip 38521⤵PID:2900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4776 -ip 47761⤵PID:4148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4680 -ip 46801⤵PID:5096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1744 -ip 17441⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:5032
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4008
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5b5408ae0b5fcfb191a532976feae36cd
SHA179c4623911b73ffad3d8fc0a15f30ad6add84249
SHA25645645afff9f8becf8be649bb927f8fe02d778320c141a18588f20aeda8be6275
SHA512f9e14bcfffd536a2cffb497a361a5928fee9d286b9e8547645d1c054bebb497ca16e643123570ed24ea1249a2a895082a2d8fff5c6bf4c07cbf064fe6755377f
-
Filesize
23KB
MD5b5408ae0b5fcfb191a532976feae36cd
SHA179c4623911b73ffad3d8fc0a15f30ad6add84249
SHA25645645afff9f8becf8be649bb927f8fe02d778320c141a18588f20aeda8be6275
SHA512f9e14bcfffd536a2cffb497a361a5928fee9d286b9e8547645d1c054bebb497ca16e643123570ed24ea1249a2a895082a2d8fff5c6bf4c07cbf064fe6755377f
-
Filesize
983KB
MD55cf31f8a828883282e03bd1bbd212da4
SHA138786a9f8c2c37792a67586ab727cb9f222e137e
SHA25632da1140c63b7a4e820ed950fafc03d0882c7b0fb8e2ef3ea7bb5dd57c9e5b0f
SHA51268cd44869122ce2fcc57a7809b892d4772c38160ee229d6e0d77002fb57ed623dff2f54dbe4e6ecee34596da459b8b938964b2569e3b0b053fda607a5a282808
-
Filesize
983KB
MD55cf31f8a828883282e03bd1bbd212da4
SHA138786a9f8c2c37792a67586ab727cb9f222e137e
SHA25632da1140c63b7a4e820ed950fafc03d0882c7b0fb8e2ef3ea7bb5dd57c9e5b0f
SHA51268cd44869122ce2fcc57a7809b892d4772c38160ee229d6e0d77002fb57ed623dff2f54dbe4e6ecee34596da459b8b938964b2569e3b0b053fda607a5a282808
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
800KB
MD5f37636fe38d0acbe7aa1b7285a0269bf
SHA1f1c667fe41252208ab7cb5981cdc55e479caf444
SHA2564ec3283152cb09aed6eae7c57b6d6b8f9a2a63bcf047cb3c16c7cbf2727fd6c9
SHA51273b1293a578dd7fbd8190de9f4710fd693e4d8e6260b9523e983474384d817f7e04ed5d97e082c860bfc537022c314309363b36f0672fda49ea739bc173985b0
-
Filesize
800KB
MD5f37636fe38d0acbe7aa1b7285a0269bf
SHA1f1c667fe41252208ab7cb5981cdc55e479caf444
SHA2564ec3283152cb09aed6eae7c57b6d6b8f9a2a63bcf047cb3c16c7cbf2727fd6c9
SHA51273b1293a578dd7fbd8190de9f4710fd693e4d8e6260b9523e983474384d817f7e04ed5d97e082c860bfc537022c314309363b36f0672fda49ea739bc173985b0
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
617KB
MD51d6c82a182d017dd344cc0825cfc6b7c
SHA1800ed060feaa0d2aff50aeed9909e7d15a36221c
SHA25671991025339b09a8930e5a851b4f219d620a6406d6bfd27d0cf558363462294f
SHA512d902af4cdb6e7269a39dca652a7612476ef028a435df6f43b1e6f696945bfb5038b37e5e672933c6aeb3237ec46d9bc7c6697f9613c31afa275d1f8502ac017c
-
Filesize
617KB
MD51d6c82a182d017dd344cc0825cfc6b7c
SHA1800ed060feaa0d2aff50aeed9909e7d15a36221c
SHA25671991025339b09a8930e5a851b4f219d620a6406d6bfd27d0cf558363462294f
SHA512d902af4cdb6e7269a39dca652a7612476ef028a435df6f43b1e6f696945bfb5038b37e5e672933c6aeb3237ec46d9bc7c6697f9613c31afa275d1f8502ac017c
-
Filesize
390KB
MD5dc29df336c9d6e45e9426b02ae553944
SHA15632613174e6d4b08e6a8b8d92235880f46d5466
SHA256d4df1b3eba0d1a674242afbb7af85c95fc2022d30ad0d2cb1427810a6d4781ea
SHA51259cd571ceef28922acc537201e37f3170b4aad7c8bddcdda58bb2bc7d21a692fcc5baac7a0fbc655f06a7ae655dfb6796f05f4998448ecee5af7bb2710cd8f20
-
Filesize
390KB
MD5dc29df336c9d6e45e9426b02ae553944
SHA15632613174e6d4b08e6a8b8d92235880f46d5466
SHA256d4df1b3eba0d1a674242afbb7af85c95fc2022d30ad0d2cb1427810a6d4781ea
SHA51259cd571ceef28922acc537201e37f3170b4aad7c8bddcdda58bb2bc7d21a692fcc5baac7a0fbc655f06a7ae655dfb6796f05f4998448ecee5af7bb2710cd8f20
-
Filesize
346KB
MD5b8c201074b5c0bdd613ac7df7cd180d0
SHA1ae7f6f40e8a3baf1cb0bc700aefabc71c5f8d5d7
SHA2567fb9db3a5207ddcbb52a6a6e45059a4b47acaf6941c2ce268f713a071d21c129
SHA51250efa225bf1cfd65e57bcb3f5ecdfea5958966d4e77d5b482c7751b6136a8eb2e688f61de8854cf733b8d8b95c62531d1d50867d92857b73b13e294cad3581db
-
Filesize
346KB
MD5b8c201074b5c0bdd613ac7df7cd180d0
SHA1ae7f6f40e8a3baf1cb0bc700aefabc71c5f8d5d7
SHA2567fb9db3a5207ddcbb52a6a6e45059a4b47acaf6941c2ce268f713a071d21c129
SHA51250efa225bf1cfd65e57bcb3f5ecdfea5958966d4e77d5b482c7751b6136a8eb2e688f61de8854cf733b8d8b95c62531d1d50867d92857b73b13e294cad3581db
-
Filesize
227KB
MD578674139f9875cf11fc2a1e2356b6be5
SHA17aa63c21445ce3e9b128af139e8f7934d5cbead5
SHA25688836811048857d6c1abb5ab7c7c6d9ff4b7b5fcfd7e5c5671ef2369d1a6c345
SHA512258d75752c83906712ce05e5847c3106cad5a038e1e14d79e48d23611341caab64439293c705d0c271d84bbc461618c4fc9cb0a5cca888cc2992c41ab7a02aef
-
Filesize
227KB
MD578674139f9875cf11fc2a1e2356b6be5
SHA17aa63c21445ce3e9b128af139e8f7934d5cbead5
SHA25688836811048857d6c1abb5ab7c7c6d9ff4b7b5fcfd7e5c5671ef2369d1a6c345
SHA512258d75752c83906712ce05e5847c3106cad5a038e1e14d79e48d23611341caab64439293c705d0c271d84bbc461618c4fc9cb0a5cca888cc2992c41ab7a02aef
-
Filesize
356KB
MD51d1974200db092861a2f0a1fab160997
SHA1ed13469c1b94f60d2ba758ecac5bc8232e5e6a76
SHA2564e3c751b8b946700fc257ce61fe58b35565ebe9da655cb9d4ce999966f194b44
SHA5129c671cf3e3690657faa6f28957a0e605131ca3626bb70fa5c011641c7040edb1212b37b4003edf7b99cd5b3eb2062b831bfe298517f5e9da881d50a4d7f46e69
-
Filesize
356KB
MD51d1974200db092861a2f0a1fab160997
SHA1ed13469c1b94f60d2ba758ecac5bc8232e5e6a76
SHA2564e3c751b8b946700fc257ce61fe58b35565ebe9da655cb9d4ce999966f194b44
SHA5129c671cf3e3690657faa6f28957a0e605131ca3626bb70fa5c011641c7040edb1212b37b4003edf7b99cd5b3eb2062b831bfe298517f5e9da881d50a4d7f46e69
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0