Analysis
-
max time kernel
164s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 05:57
Static task
static1
Behavioral task
behavioral1
Sample
f6b72e76d9072230d19d70a05f4ed2262ff9ed512b661e7aa4d17c9f140364de_JC.exe
Resource
win7-20230831-en
General
-
Target
f6b72e76d9072230d19d70a05f4ed2262ff9ed512b661e7aa4d17c9f140364de_JC.exe
-
Size
1.0MB
-
MD5
913d2b197aed43d24af9be51b011e7e1
-
SHA1
70be749dff3d0c6fdab8ceb8ca71dd26bc58d83b
-
SHA256
f6b72e76d9072230d19d70a05f4ed2262ff9ed512b661e7aa4d17c9f140364de
-
SHA512
aa07c10c6b5fca8b56d991c30813be1887e7bbb4c16c624b1b83fc6c06dec25bdcf1e912c2464f80df0bb23905a18919d53d7218ba7ec9a4874e5a7d79d4b11a
-
SSDEEP
24576:pyq2kK5H1aZlhg1I2o7p4P57MHiKzfpKy:cq2kK5UuId7mP5wCKr
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2856-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2856-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2856-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2856-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/496-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t1028548.exeexplonde.exeu9233319.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation t1028548.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation u9233319.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z7643193.exez8374896.exez7357120.exez1986787.exeq2956937.exer6908629.exes8128330.exet1028548.exeexplonde.exeu9233319.exelegota.exew4884291.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 3824 z7643193.exe 4824 z8374896.exe 4424 z7357120.exe 1120 z1986787.exe 3756 q2956937.exe 3984 r6908629.exe 4332 s8128330.exe 2660 t1028548.exe 648 explonde.exe 3876 u9233319.exe 2204 legota.exe 4452 w4884291.exe 4888 explonde.exe 3200 legota.exe 4636 explonde.exe 3960 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1524 rundll32.exe 4972 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z7357120.exez1986787.exef6b72e76d9072230d19d70a05f4ed2262ff9ed512b661e7aa4d17c9f140364de_JC.exez7643193.exez8374896.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7357120.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z1986787.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f6b72e76d9072230d19d70a05f4ed2262ff9ed512b661e7aa4d17c9f140364de_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7643193.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8374896.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q2956937.exer6908629.exes8128330.exedescription pid process target process PID 3756 set thread context of 496 3756 q2956937.exe AppLaunch.exe PID 3984 set thread context of 2856 3984 r6908629.exe AppLaunch.exe PID 4332 set thread context of 3196 4332 s8128330.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4376 3756 WerFault.exe q2956937.exe 2684 3984 WerFault.exe r6908629.exe 3536 2856 WerFault.exe AppLaunch.exe 3192 4332 WerFault.exe s8128330.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3452 schtasks.exe 980 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 496 AppLaunch.exe 496 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 496 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f6b72e76d9072230d19d70a05f4ed2262ff9ed512b661e7aa4d17c9f140364de_JC.exez7643193.exez8374896.exez7357120.exez1986787.exeq2956937.exer6908629.exes8128330.exet1028548.exeexplonde.exedescription pid process target process PID 1964 wrote to memory of 3824 1964 f6b72e76d9072230d19d70a05f4ed2262ff9ed512b661e7aa4d17c9f140364de_JC.exe z7643193.exe PID 1964 wrote to memory of 3824 1964 f6b72e76d9072230d19d70a05f4ed2262ff9ed512b661e7aa4d17c9f140364de_JC.exe z7643193.exe PID 1964 wrote to memory of 3824 1964 f6b72e76d9072230d19d70a05f4ed2262ff9ed512b661e7aa4d17c9f140364de_JC.exe z7643193.exe PID 3824 wrote to memory of 4824 3824 z7643193.exe z8374896.exe PID 3824 wrote to memory of 4824 3824 z7643193.exe z8374896.exe PID 3824 wrote to memory of 4824 3824 z7643193.exe z8374896.exe PID 4824 wrote to memory of 4424 4824 z8374896.exe z7357120.exe PID 4824 wrote to memory of 4424 4824 z8374896.exe z7357120.exe PID 4824 wrote to memory of 4424 4824 z8374896.exe z7357120.exe PID 4424 wrote to memory of 1120 4424 z7357120.exe z1986787.exe PID 4424 wrote to memory of 1120 4424 z7357120.exe z1986787.exe PID 4424 wrote to memory of 1120 4424 z7357120.exe z1986787.exe PID 1120 wrote to memory of 3756 1120 z1986787.exe q2956937.exe PID 1120 wrote to memory of 3756 1120 z1986787.exe q2956937.exe PID 1120 wrote to memory of 3756 1120 z1986787.exe q2956937.exe PID 3756 wrote to memory of 496 3756 q2956937.exe AppLaunch.exe PID 3756 wrote to memory of 496 3756 q2956937.exe AppLaunch.exe PID 3756 wrote to memory of 496 3756 q2956937.exe AppLaunch.exe PID 3756 wrote to memory of 496 3756 q2956937.exe AppLaunch.exe PID 3756 wrote to memory of 496 3756 q2956937.exe AppLaunch.exe PID 3756 wrote to memory of 496 3756 q2956937.exe AppLaunch.exe PID 3756 wrote to memory of 496 3756 q2956937.exe AppLaunch.exe PID 3756 wrote to memory of 496 3756 q2956937.exe AppLaunch.exe PID 1120 wrote to memory of 3984 1120 z1986787.exe r6908629.exe PID 1120 wrote to memory of 3984 1120 z1986787.exe r6908629.exe PID 1120 wrote to memory of 3984 1120 z1986787.exe r6908629.exe PID 3984 wrote to memory of 3760 3984 r6908629.exe AppLaunch.exe PID 3984 wrote to memory of 3760 3984 r6908629.exe AppLaunch.exe PID 3984 wrote to memory of 3760 3984 r6908629.exe AppLaunch.exe PID 3984 wrote to memory of 2856 3984 r6908629.exe AppLaunch.exe PID 3984 wrote to memory of 2856 3984 r6908629.exe AppLaunch.exe PID 3984 wrote to memory of 2856 3984 r6908629.exe AppLaunch.exe PID 3984 wrote to memory of 2856 3984 r6908629.exe AppLaunch.exe PID 3984 wrote to memory of 2856 3984 r6908629.exe AppLaunch.exe PID 3984 wrote to memory of 2856 3984 r6908629.exe AppLaunch.exe PID 3984 wrote to memory of 2856 3984 r6908629.exe AppLaunch.exe PID 3984 wrote to memory of 2856 3984 r6908629.exe AppLaunch.exe PID 3984 wrote to memory of 2856 3984 r6908629.exe AppLaunch.exe PID 3984 wrote to memory of 2856 3984 r6908629.exe AppLaunch.exe PID 4424 wrote to memory of 4332 4424 z7357120.exe s8128330.exe PID 4424 wrote to memory of 4332 4424 z7357120.exe s8128330.exe PID 4424 wrote to memory of 4332 4424 z7357120.exe s8128330.exe PID 4332 wrote to memory of 3196 4332 s8128330.exe AppLaunch.exe PID 4332 wrote to memory of 3196 4332 s8128330.exe AppLaunch.exe PID 4332 wrote to memory of 3196 4332 s8128330.exe AppLaunch.exe PID 4332 wrote to memory of 3196 4332 s8128330.exe AppLaunch.exe PID 4332 wrote to memory of 3196 4332 s8128330.exe AppLaunch.exe PID 4332 wrote to memory of 3196 4332 s8128330.exe AppLaunch.exe PID 4332 wrote to memory of 3196 4332 s8128330.exe AppLaunch.exe PID 4332 wrote to memory of 3196 4332 s8128330.exe AppLaunch.exe PID 4824 wrote to memory of 2660 4824 z8374896.exe t1028548.exe PID 4824 wrote to memory of 2660 4824 z8374896.exe t1028548.exe PID 4824 wrote to memory of 2660 4824 z8374896.exe t1028548.exe PID 2660 wrote to memory of 648 2660 t1028548.exe explonde.exe PID 2660 wrote to memory of 648 2660 t1028548.exe explonde.exe PID 2660 wrote to memory of 648 2660 t1028548.exe explonde.exe PID 3824 wrote to memory of 3876 3824 z7643193.exe u9233319.exe PID 3824 wrote to memory of 3876 3824 z7643193.exe u9233319.exe PID 3824 wrote to memory of 3876 3824 z7643193.exe u9233319.exe PID 648 wrote to memory of 980 648 explonde.exe schtasks.exe PID 648 wrote to memory of 980 648 explonde.exe schtasks.exe PID 648 wrote to memory of 980 648 explonde.exe schtasks.exe PID 648 wrote to memory of 3708 648 explonde.exe cmd.exe PID 648 wrote to memory of 3708 648 explonde.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6b72e76d9072230d19d70a05f4ed2262ff9ed512b661e7aa4d17c9f140364de_JC.exe"C:\Users\Admin\AppData\Local\Temp\f6b72e76d9072230d19d70a05f4ed2262ff9ed512b661e7aa4d17c9f140364de_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7643193.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7643193.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8374896.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8374896.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7357120.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7357120.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1986787.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1986787.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2956937.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2956937.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 5807⤵
- Program crash
PID:4376
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6908629.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6908629.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3760
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 5408⤵
- Program crash
PID:3536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 5727⤵
- Program crash
PID:2684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8128330.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8128330.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 5526⤵
- Program crash
PID:3192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1028548.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1028548.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:980
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:3708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:1844
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:1304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4416
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4940
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1524
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9233319.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9233319.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3452
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:3288
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:1744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4588
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4972
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w4884291.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w4884291.exe2⤵
- Executes dropped EXE
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3756 -ip 37561⤵PID:4456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3984 -ip 39841⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2856 -ip 28561⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4332 -ip 43321⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4888
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3200
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4636
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD56c510f4e58a6a10c1d76b2d24838f4f8
SHA1485ff61f8ba747a1082b60f19a8da4f289b12888
SHA25681990d4ef7f12b5dd3d773d776b7ea0c04066d89155fd9d54fc667c904338a5a
SHA512fa64ce8db2058163c839526caa6c110d92d7fad7ca794a9e12d6f98000f018e94d504dbcb080bf761f147087b99dafa9a62de5a2caeda512b1b59e50c7e19d05
-
Filesize
22KB
MD56c510f4e58a6a10c1d76b2d24838f4f8
SHA1485ff61f8ba747a1082b60f19a8da4f289b12888
SHA25681990d4ef7f12b5dd3d773d776b7ea0c04066d89155fd9d54fc667c904338a5a
SHA512fa64ce8db2058163c839526caa6c110d92d7fad7ca794a9e12d6f98000f018e94d504dbcb080bf761f147087b99dafa9a62de5a2caeda512b1b59e50c7e19d05
-
Filesize
961KB
MD5cb4a9153d3de9a6ed98b3102c3c0cef1
SHA1bf5fcdbc97f584b8ca3cae1e094d0577ddb64449
SHA25659de9f3dc980a08f5d851d4d90a6d1d7d76bc1a6cd279f93d93957f9b5ad4c03
SHA5128275e5edf10868031b652303bd38f467b825eb3fa8142fe220c9a1ac186b0880d776de88cafdecace5738073c501ad67b98e5754a667971d640f13e3438bc9ba
-
Filesize
961KB
MD5cb4a9153d3de9a6ed98b3102c3c0cef1
SHA1bf5fcdbc97f584b8ca3cae1e094d0577ddb64449
SHA25659de9f3dc980a08f5d851d4d90a6d1d7d76bc1a6cd279f93d93957f9b5ad4c03
SHA5128275e5edf10868031b652303bd38f467b825eb3fa8142fe220c9a1ac186b0880d776de88cafdecace5738073c501ad67b98e5754a667971d640f13e3438bc9ba
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
779KB
MD554f4d1b32b52958d74d8fbbae6c796f0
SHA108c7b9e00dae46fdf28a49d5c2928c3afe5d3a70
SHA256fda4b79bf378d55c8fde1b8bb0c0b9230f6a3e7d9beccc200d5e93887cc47d22
SHA512abe4115255816ee288c40fc946ea38ae8fbe6a65138f43b896b56aa5d1ff81e043410d0bd6ed40f41ebefde7e844bd522f464ba9d45afd6dbe9261e7ce45509d
-
Filesize
779KB
MD554f4d1b32b52958d74d8fbbae6c796f0
SHA108c7b9e00dae46fdf28a49d5c2928c3afe5d3a70
SHA256fda4b79bf378d55c8fde1b8bb0c0b9230f6a3e7d9beccc200d5e93887cc47d22
SHA512abe4115255816ee288c40fc946ea38ae8fbe6a65138f43b896b56aa5d1ff81e043410d0bd6ed40f41ebefde7e844bd522f464ba9d45afd6dbe9261e7ce45509d
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
596KB
MD545a7222541a208d64cdce06b3dcf3f4d
SHA15fd424d3a6bcc2f30548abbfce74a40c7beed03c
SHA256a95cc1fa85bcaa59435ac4499760e03b38f54260c1b7ddd8eff1aa08493a0f26
SHA51204bafca03613457a27175b45a884d8774865273e7e78a0b2775787a3cc3b6ef5ba21bb8a24df0875a66afc87f588fe17b4ac359c00fdba2cebb52b698fff9eba
-
Filesize
596KB
MD545a7222541a208d64cdce06b3dcf3f4d
SHA15fd424d3a6bcc2f30548abbfce74a40c7beed03c
SHA256a95cc1fa85bcaa59435ac4499760e03b38f54260c1b7ddd8eff1aa08493a0f26
SHA51204bafca03613457a27175b45a884d8774865273e7e78a0b2775787a3cc3b6ef5ba21bb8a24df0875a66afc87f588fe17b4ac359c00fdba2cebb52b698fff9eba
-
Filesize
384KB
MD5be34de9145438e67041cecf58e064021
SHA1449d396130f47944906a20f04b0b64ddd57faa60
SHA2569fb91ff21acddc06cd729a02a8e19b78ef5e002a5be1475f8a04975efc0d76f4
SHA512d90bdb58ae5afafa31f5aed4979a5ed0700fd2600971b0dcafcc78c6aef4e4d978b32f44e1b55c6655578497e2227ad08d3119afe9965cacc1f3387b3445743a
-
Filesize
384KB
MD5be34de9145438e67041cecf58e064021
SHA1449d396130f47944906a20f04b0b64ddd57faa60
SHA2569fb91ff21acddc06cd729a02a8e19b78ef5e002a5be1475f8a04975efc0d76f4
SHA512d90bdb58ae5afafa31f5aed4979a5ed0700fd2600971b0dcafcc78c6aef4e4d978b32f44e1b55c6655578497e2227ad08d3119afe9965cacc1f3387b3445743a
-
Filesize
336KB
MD514f61990a23252eeca939bc573836769
SHA1d012a7b4bc70883abb88339cce478e9fdb4dcf75
SHA256e93929540be89689f505f837ff6686806ba2f12ef2b2a9b2a1926cd5bfee6e0c
SHA512d6e26bf0ae50e3db6bdea1ac2c29f22ec25a06329d335b4fa2cf7d61eff916296c64090f531875634dc438ab73b89e3a29c11e7019f1a8b5640fbb460aef9337
-
Filesize
336KB
MD514f61990a23252eeca939bc573836769
SHA1d012a7b4bc70883abb88339cce478e9fdb4dcf75
SHA256e93929540be89689f505f837ff6686806ba2f12ef2b2a9b2a1926cd5bfee6e0c
SHA512d6e26bf0ae50e3db6bdea1ac2c29f22ec25a06329d335b4fa2cf7d61eff916296c64090f531875634dc438ab73b89e3a29c11e7019f1a8b5640fbb460aef9337
-
Filesize
221KB
MD5f2d7ec691007c3e55295eb4ccdab6279
SHA1cbd44ba451a53ddedc0b79267deb20febe5c337a
SHA25646b2b26bc0f98103474834eb1abe1f42c5c6b8e1cdeb548c7de80c0166719a35
SHA5126a7ebcb188f58907ad7b6797b8e43745f077b54df1d5af23570db064f5af8318f88784f48827cfe0b7c71db4e0731521bd20435fe3c6ff3a17d26e6bb133ddbc
-
Filesize
221KB
MD5f2d7ec691007c3e55295eb4ccdab6279
SHA1cbd44ba451a53ddedc0b79267deb20febe5c337a
SHA25646b2b26bc0f98103474834eb1abe1f42c5c6b8e1cdeb548c7de80c0166719a35
SHA5126a7ebcb188f58907ad7b6797b8e43745f077b54df1d5af23570db064f5af8318f88784f48827cfe0b7c71db4e0731521bd20435fe3c6ff3a17d26e6bb133ddbc
-
Filesize
350KB
MD5b5b88f515070f51c3f3ed54f2dcc312b
SHA166cb40243d4f956d181e787499dd61532062c525
SHA256b6e1f9f6d0986f2fd8d7c90c941e364565852c72024f1027d1262f53aa50aae1
SHA51226472a06e2e8fbd3d399c5ffefc8ede5267cc2100e0300833f0544eb15aa5ede849b340e3033730f6b9d51571a12a20f0124bbc9f222249a52b34adcf9f710e6
-
Filesize
350KB
MD5b5b88f515070f51c3f3ed54f2dcc312b
SHA166cb40243d4f956d181e787499dd61532062c525
SHA256b6e1f9f6d0986f2fd8d7c90c941e364565852c72024f1027d1262f53aa50aae1
SHA51226472a06e2e8fbd3d399c5ffefc8ede5267cc2100e0300833f0544eb15aa5ede849b340e3033730f6b9d51571a12a20f0124bbc9f222249a52b34adcf9f710e6
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0