Analysis
-
max time kernel
146s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:12
Static task
static1
Behavioral task
behavioral1
Sample
6a7fc5d0d3c02cc74908e86139d57e27649df1498462729c97f116f0c9e865fd.exe
Resource
win7-20230831-en
General
-
Target
6a7fc5d0d3c02cc74908e86139d57e27649df1498462729c97f116f0c9e865fd.exe
-
Size
1.1MB
-
MD5
9a248ccb49c6c132646b76361702df39
-
SHA1
0ca854475297d1685c1f79dd4535b7ba3b58799c
-
SHA256
6a7fc5d0d3c02cc74908e86139d57e27649df1498462729c97f116f0c9e865fd
-
SHA512
72ec548ba0c57d36875fb0c1a4ac55d3ad5228551e241747a47788e5377000b0dfb8d1c9ebbc96f3009a93dbad6863fbd1e900f603b015af66a2b2181d9f1be3
-
SSDEEP
24576:LyYZBSiPXq1YaBWQTyARUKHenDJLpZLaAkty7J6Twp:+YZMiP6SaB1WAHedL5dh
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3712-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3712-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3712-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3712-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3548-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explonde.exelegota.exet7613059.exeu5577148.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation t7613059.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation u5577148.exe -
Executes dropped EXE 14 IoCs
Processes:
z8822974.exez4034902.exez9991724.exez1236433.exeq1027449.exer7450345.exes4905590.exet7613059.exeexplonde.exeu5577148.exelegota.exew0733556.exelegota.exeexplonde.exepid process 664 z8822974.exe 456 z4034902.exe 608 z9991724.exe 1632 z1236433.exe 2828 q1027449.exe 1724 r7450345.exe 2900 s4905590.exe 2332 t7613059.exe 2140 explonde.exe 1296 u5577148.exe 4636 legota.exe 4208 w0733556.exe 800 legota.exe 1620 explonde.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4192 rundll32.exe 4992 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
6a7fc5d0d3c02cc74908e86139d57e27649df1498462729c97f116f0c9e865fd.exez8822974.exez4034902.exez9991724.exez1236433.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6a7fc5d0d3c02cc74908e86139d57e27649df1498462729c97f116f0c9e865fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8822974.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4034902.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z9991724.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z1236433.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q1027449.exer7450345.exes4905590.exedescription pid process target process PID 2828 set thread context of 3548 2828 q1027449.exe AppLaunch.exe PID 1724 set thread context of 3712 1724 r7450345.exe AppLaunch.exe PID 2900 set thread context of 2240 2900 s4905590.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1956 2828 WerFault.exe q1027449.exe 1648 1724 WerFault.exe r7450345.exe 3056 3712 WerFault.exe AppLaunch.exe 4952 2900 WerFault.exe s4905590.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3128 schtasks.exe 3924 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 3548 AppLaunch.exe 3548 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3548 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6a7fc5d0d3c02cc74908e86139d57e27649df1498462729c97f116f0c9e865fd.exez8822974.exez4034902.exez9991724.exez1236433.exeq1027449.exer7450345.exes4905590.exet7613059.exeu5577148.exeexplonde.exedescription pid process target process PID 4732 wrote to memory of 664 4732 6a7fc5d0d3c02cc74908e86139d57e27649df1498462729c97f116f0c9e865fd.exe z8822974.exe PID 4732 wrote to memory of 664 4732 6a7fc5d0d3c02cc74908e86139d57e27649df1498462729c97f116f0c9e865fd.exe z8822974.exe PID 4732 wrote to memory of 664 4732 6a7fc5d0d3c02cc74908e86139d57e27649df1498462729c97f116f0c9e865fd.exe z8822974.exe PID 664 wrote to memory of 456 664 z8822974.exe z4034902.exe PID 664 wrote to memory of 456 664 z8822974.exe z4034902.exe PID 664 wrote to memory of 456 664 z8822974.exe z4034902.exe PID 456 wrote to memory of 608 456 z4034902.exe z9991724.exe PID 456 wrote to memory of 608 456 z4034902.exe z9991724.exe PID 456 wrote to memory of 608 456 z4034902.exe z9991724.exe PID 608 wrote to memory of 1632 608 z9991724.exe z1236433.exe PID 608 wrote to memory of 1632 608 z9991724.exe z1236433.exe PID 608 wrote to memory of 1632 608 z9991724.exe z1236433.exe PID 1632 wrote to memory of 2828 1632 z1236433.exe q1027449.exe PID 1632 wrote to memory of 2828 1632 z1236433.exe q1027449.exe PID 1632 wrote to memory of 2828 1632 z1236433.exe q1027449.exe PID 2828 wrote to memory of 4996 2828 q1027449.exe AppLaunch.exe PID 2828 wrote to memory of 4996 2828 q1027449.exe AppLaunch.exe PID 2828 wrote to memory of 4996 2828 q1027449.exe AppLaunch.exe PID 2828 wrote to memory of 3548 2828 q1027449.exe AppLaunch.exe PID 2828 wrote to memory of 3548 2828 q1027449.exe AppLaunch.exe PID 2828 wrote to memory of 3548 2828 q1027449.exe AppLaunch.exe PID 2828 wrote to memory of 3548 2828 q1027449.exe AppLaunch.exe PID 2828 wrote to memory of 3548 2828 q1027449.exe AppLaunch.exe PID 2828 wrote to memory of 3548 2828 q1027449.exe AppLaunch.exe PID 2828 wrote to memory of 3548 2828 q1027449.exe AppLaunch.exe PID 2828 wrote to memory of 3548 2828 q1027449.exe AppLaunch.exe PID 1632 wrote to memory of 1724 1632 z1236433.exe r7450345.exe PID 1632 wrote to memory of 1724 1632 z1236433.exe r7450345.exe PID 1632 wrote to memory of 1724 1632 z1236433.exe r7450345.exe PID 1724 wrote to memory of 3712 1724 r7450345.exe AppLaunch.exe PID 1724 wrote to memory of 3712 1724 r7450345.exe AppLaunch.exe PID 1724 wrote to memory of 3712 1724 r7450345.exe AppLaunch.exe PID 1724 wrote to memory of 3712 1724 r7450345.exe AppLaunch.exe PID 1724 wrote to memory of 3712 1724 r7450345.exe AppLaunch.exe PID 1724 wrote to memory of 3712 1724 r7450345.exe AppLaunch.exe PID 1724 wrote to memory of 3712 1724 r7450345.exe AppLaunch.exe PID 1724 wrote to memory of 3712 1724 r7450345.exe AppLaunch.exe PID 1724 wrote to memory of 3712 1724 r7450345.exe AppLaunch.exe PID 1724 wrote to memory of 3712 1724 r7450345.exe AppLaunch.exe PID 608 wrote to memory of 2900 608 z9991724.exe s4905590.exe PID 608 wrote to memory of 2900 608 z9991724.exe s4905590.exe PID 608 wrote to memory of 2900 608 z9991724.exe s4905590.exe PID 2900 wrote to memory of 2240 2900 s4905590.exe AppLaunch.exe PID 2900 wrote to memory of 2240 2900 s4905590.exe AppLaunch.exe PID 2900 wrote to memory of 2240 2900 s4905590.exe AppLaunch.exe PID 2900 wrote to memory of 2240 2900 s4905590.exe AppLaunch.exe PID 2900 wrote to memory of 2240 2900 s4905590.exe AppLaunch.exe PID 2900 wrote to memory of 2240 2900 s4905590.exe AppLaunch.exe PID 2900 wrote to memory of 2240 2900 s4905590.exe AppLaunch.exe PID 2900 wrote to memory of 2240 2900 s4905590.exe AppLaunch.exe PID 456 wrote to memory of 2332 456 z4034902.exe t7613059.exe PID 456 wrote to memory of 2332 456 z4034902.exe t7613059.exe PID 456 wrote to memory of 2332 456 z4034902.exe t7613059.exe PID 2332 wrote to memory of 2140 2332 t7613059.exe explonde.exe PID 2332 wrote to memory of 2140 2332 t7613059.exe explonde.exe PID 2332 wrote to memory of 2140 2332 t7613059.exe explonde.exe PID 664 wrote to memory of 1296 664 z8822974.exe u5577148.exe PID 664 wrote to memory of 1296 664 z8822974.exe u5577148.exe PID 664 wrote to memory of 1296 664 z8822974.exe u5577148.exe PID 1296 wrote to memory of 4636 1296 u5577148.exe legota.exe PID 1296 wrote to memory of 4636 1296 u5577148.exe legota.exe PID 1296 wrote to memory of 4636 1296 u5577148.exe legota.exe PID 2140 wrote to memory of 3128 2140 explonde.exe schtasks.exe PID 2140 wrote to memory of 3128 2140 explonde.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a7fc5d0d3c02cc74908e86139d57e27649df1498462729c97f116f0c9e865fd.exe"C:\Users\Admin\AppData\Local\Temp\6a7fc5d0d3c02cc74908e86139d57e27649df1498462729c97f116f0c9e865fd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8822974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8822974.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4034902.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4034902.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9991724.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9991724.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1236433.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1236433.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1027449.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1027449.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 2247⤵
- Program crash
PID:1956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7450345.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7450345.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 5408⤵
- Program crash
PID:3056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 1487⤵
- Program crash
PID:1648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4905590.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4905590.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 1486⤵
- Program crash
PID:4952
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7613059.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7613059.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:3128
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1196
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:4176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:3668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3868
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4196
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:2232
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4192
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u5577148.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u5577148.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4636 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3924
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:368
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3476
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:412
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1460
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:1660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3568
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:2416
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4992
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0733556.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0733556.exe2⤵
- Executes dropped EXE
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2828 -ip 28281⤵PID:412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1724 -ip 17241⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3712 -ip 37121⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2900 -ip 29001⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:800
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
23KB
MD5a8a041220808f6bafd30cb9c2d94663c
SHA1787e5675d5563f6b247c3408abc60c4c45273859
SHA256dbd9394290d940a119972a6c46e867b0be752db373da060a1f9ebc25f73a0d27
SHA512043df6efa2ce593e3ad02a49eed9ba04ad097757af6b2bb50067afc42a919cb06ea5ecb727677a5a3c424b8197987dc67b610d472b380ef76b53c2798768d8f1
-
Filesize
23KB
MD5a8a041220808f6bafd30cb9c2d94663c
SHA1787e5675d5563f6b247c3408abc60c4c45273859
SHA256dbd9394290d940a119972a6c46e867b0be752db373da060a1f9ebc25f73a0d27
SHA512043df6efa2ce593e3ad02a49eed9ba04ad097757af6b2bb50067afc42a919cb06ea5ecb727677a5a3c424b8197987dc67b610d472b380ef76b53c2798768d8f1
-
Filesize
984KB
MD5725c684178badb8939874eed83f4d45a
SHA13b51501c6ecdf15ba486e0e569cb3834de23bf82
SHA2566a63b8b088e38a4ca03aca45ccc623d4590512bb2b4f89de721b3202f6c5d1f8
SHA51218ff01ab9e48071ae1dd57f712d2712aff3e27e9140f67da5d090a183ae995fcabea175071af95a2a9616c315ce5572a5cd92c242112b5e44b507ce6a0f356d1
-
Filesize
984KB
MD5725c684178badb8939874eed83f4d45a
SHA13b51501c6ecdf15ba486e0e569cb3834de23bf82
SHA2566a63b8b088e38a4ca03aca45ccc623d4590512bb2b4f89de721b3202f6c5d1f8
SHA51218ff01ab9e48071ae1dd57f712d2712aff3e27e9140f67da5d090a183ae995fcabea175071af95a2a9616c315ce5572a5cd92c242112b5e44b507ce6a0f356d1
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
801KB
MD56de2459f72273629de1be883c3b09c57
SHA172973f54cd27a53429f57996f448e31dbe6194c0
SHA256707fdfcdc97375a738a8ab0a8b7feab751b646b3954fcf87811f9333b451143e
SHA512203c2ab1f0cfb094014f1b6578e048f21536c85614400e8b56dc7532acfdf1eae7d6aa9ea59734b9940ee57c5d635250d1c0c34fb0d269cdbcb6f99979643fdc
-
Filesize
801KB
MD56de2459f72273629de1be883c3b09c57
SHA172973f54cd27a53429f57996f448e31dbe6194c0
SHA256707fdfcdc97375a738a8ab0a8b7feab751b646b3954fcf87811f9333b451143e
SHA512203c2ab1f0cfb094014f1b6578e048f21536c85614400e8b56dc7532acfdf1eae7d6aa9ea59734b9940ee57c5d635250d1c0c34fb0d269cdbcb6f99979643fdc
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
618KB
MD554ba9d8bfa285b9ffd6e1aa6d7a144f2
SHA1830c70dcbee1fabcac13f014acae1d816985abf9
SHA2560a6453f38e163cb96434f9ccfa24d32a50f3a5fba0781dc3b7b1e3439fea6661
SHA512d6ee1883cca7683c29c4605ac47ae8f5d7d9d72ddef0b9fab320cc3e5f646ff14972ba8fb7cd7358beb77b7037f4d5d5774da58978cb004a644a137b973d998f
-
Filesize
618KB
MD554ba9d8bfa285b9ffd6e1aa6d7a144f2
SHA1830c70dcbee1fabcac13f014acae1d816985abf9
SHA2560a6453f38e163cb96434f9ccfa24d32a50f3a5fba0781dc3b7b1e3439fea6661
SHA512d6ee1883cca7683c29c4605ac47ae8f5d7d9d72ddef0b9fab320cc3e5f646ff14972ba8fb7cd7358beb77b7037f4d5d5774da58978cb004a644a137b973d998f
-
Filesize
390KB
MD545e744735acf955086f453672d051918
SHA19034a4d9fd7d587c6d8cba728a95ea77afd947d2
SHA256d433141ffe3bc7961761ef563841e38bc34e2b10d4de2ebeb2acf9892dc60ae6
SHA512e378c5fcd9c5cceb12a335360957af18c1da40f24197ad7eab3430cf76d9a4ee2037a171e055780739d5e324ecc750f93e35f42724b02e0cba67d8e4a192de65
-
Filesize
390KB
MD545e744735acf955086f453672d051918
SHA19034a4d9fd7d587c6d8cba728a95ea77afd947d2
SHA256d433141ffe3bc7961761ef563841e38bc34e2b10d4de2ebeb2acf9892dc60ae6
SHA512e378c5fcd9c5cceb12a335360957af18c1da40f24197ad7eab3430cf76d9a4ee2037a171e055780739d5e324ecc750f93e35f42724b02e0cba67d8e4a192de65
-
Filesize
346KB
MD5999d7a3af394c96d3bb7e8719efd3d4d
SHA1115d735255941d6ee42d7d23aceaf260afeb44c5
SHA256363f9af9db2f17b0bc63137ca0a855e8b6a6c5d6faa2972312d3202302f0df3b
SHA5125be6315c0383159d6d879fcf9a28b40ab21dc810e39846e48ff614071c9fbe1caf1e4ee39bc847938a2ec0d7d66311e8024955fa4fd092841f247b4869739732
-
Filesize
346KB
MD5999d7a3af394c96d3bb7e8719efd3d4d
SHA1115d735255941d6ee42d7d23aceaf260afeb44c5
SHA256363f9af9db2f17b0bc63137ca0a855e8b6a6c5d6faa2972312d3202302f0df3b
SHA5125be6315c0383159d6d879fcf9a28b40ab21dc810e39846e48ff614071c9fbe1caf1e4ee39bc847938a2ec0d7d66311e8024955fa4fd092841f247b4869739732
-
Filesize
227KB
MD5c3ab5dffd3409babb2f32e768586fd9a
SHA1807aaa3d074aab7b18bb33b7db9873a59055d4e5
SHA2566f0f0b302b5f68194b044c562cfb40d676f811bf6e8773f1a0b5242b46962399
SHA512aa416b90114f82f22476cdfedb8ba6ac6e4a23b60bdac7df04fa9028e1db2a1a2825746edc4c49781742d0febe74d5388cab74c33851e0e7a6e5b71a914077ea
-
Filesize
227KB
MD5c3ab5dffd3409babb2f32e768586fd9a
SHA1807aaa3d074aab7b18bb33b7db9873a59055d4e5
SHA2566f0f0b302b5f68194b044c562cfb40d676f811bf6e8773f1a0b5242b46962399
SHA512aa416b90114f82f22476cdfedb8ba6ac6e4a23b60bdac7df04fa9028e1db2a1a2825746edc4c49781742d0febe74d5388cab74c33851e0e7a6e5b71a914077ea
-
Filesize
356KB
MD5bd9cdc3f2e0804b6ebdfdc3b70713a63
SHA1dd4da155484973f0efe37ac309a4bd63bafd23e5
SHA2563b63cd84f226ad333c29ad1cc4cc9e530279b0abb632f5c2bd307324c3e898e9
SHA512c2835244da5620ac7ef13c555dea95f8ac8f0ab5f50d9306c6703b7ba4d668e209f9e30e0700a017f23626d222a7075d5b6c9a702204b91edc63bd82a031ad88
-
Filesize
356KB
MD5bd9cdc3f2e0804b6ebdfdc3b70713a63
SHA1dd4da155484973f0efe37ac309a4bd63bafd23e5
SHA2563b63cd84f226ad333c29ad1cc4cc9e530279b0abb632f5c2bd307324c3e898e9
SHA512c2835244da5620ac7ef13c555dea95f8ac8f0ab5f50d9306c6703b7ba4d668e209f9e30e0700a017f23626d222a7075d5b6c9a702204b91edc63bd82a031ad88
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0