Analysis
-
max time kernel
184s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:34
Static task
static1
Behavioral task
behavioral1
Sample
6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exe
Resource
win7-20230831-en
General
-
Target
6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exe
-
Size
1.0MB
-
MD5
ff41d03ebbb66bdfeba5ec810834f3be
-
SHA1
8222bfda7ae648829cdaa2574f7c404151980119
-
SHA256
6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0
-
SHA512
fb333d91db38e6f054093f6b4926dedab78ea1cefab7dd32cc1d73a76898b480d77b8c879f310bd3cf3b4875ee202ae7e554157b978ee23c1ba3064046257c1d
-
SSDEEP
24576:hye04i7dL0C1nprViGLig0X9uNq63c4ohz:UfnuCPiL92qf4o
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1652-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1652-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1652-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1652-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1796-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t2158776.exeu0849741.exelegota.exeexplonde.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation t2158776.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation u0849741.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation explonde.exe -
Executes dropped EXE 14 IoCs
Processes:
z9959126.exez5624829.exez6788489.exez4109516.exeq2720169.exer0745764.exes3954125.exet2158776.exeexplonde.exeu0849741.exelegota.exew6296180.exelegota.exeexplonde.exepid process 1808 z9959126.exe 2056 z5624829.exe 1884 z6788489.exe 1304 z4109516.exe 3380 q2720169.exe 4848 r0745764.exe 4444 s3954125.exe 3172 t2158776.exe 3996 explonde.exe 8 u0849741.exe 2528 legota.exe 3140 w6296180.exe 1932 legota.exe 4772 explonde.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exez9959126.exez5624829.exez6788489.exez4109516.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9959126.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z5624829.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z6788489.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4109516.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q2720169.exer0745764.exes3954125.exedescription pid process target process PID 3380 set thread context of 1796 3380 q2720169.exe AppLaunch.exe PID 4848 set thread context of 1652 4848 r0745764.exe AppLaunch.exe PID 4444 set thread context of 4544 4444 s3954125.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3804 3380 WerFault.exe q2720169.exe 2096 4848 WerFault.exe r0745764.exe 4420 1652 WerFault.exe AppLaunch.exe 4768 4444 WerFault.exe s3954125.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3456 schtasks.exe 5076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1796 AppLaunch.exe 1796 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1796 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exez9959126.exez5624829.exez6788489.exez4109516.exeq2720169.exer0745764.exes3954125.exet2158776.exeu0849741.exedescription pid process target process PID 2944 wrote to memory of 1808 2944 6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exe z9959126.exe PID 2944 wrote to memory of 1808 2944 6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exe z9959126.exe PID 2944 wrote to memory of 1808 2944 6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exe z9959126.exe PID 1808 wrote to memory of 2056 1808 z9959126.exe z5624829.exe PID 1808 wrote to memory of 2056 1808 z9959126.exe z5624829.exe PID 1808 wrote to memory of 2056 1808 z9959126.exe z5624829.exe PID 2056 wrote to memory of 1884 2056 z5624829.exe z6788489.exe PID 2056 wrote to memory of 1884 2056 z5624829.exe z6788489.exe PID 2056 wrote to memory of 1884 2056 z5624829.exe z6788489.exe PID 1884 wrote to memory of 1304 1884 z6788489.exe z4109516.exe PID 1884 wrote to memory of 1304 1884 z6788489.exe z4109516.exe PID 1884 wrote to memory of 1304 1884 z6788489.exe z4109516.exe PID 1304 wrote to memory of 3380 1304 z4109516.exe q2720169.exe PID 1304 wrote to memory of 3380 1304 z4109516.exe q2720169.exe PID 1304 wrote to memory of 3380 1304 z4109516.exe q2720169.exe PID 3380 wrote to memory of 4888 3380 q2720169.exe AppLaunch.exe PID 3380 wrote to memory of 4888 3380 q2720169.exe AppLaunch.exe PID 3380 wrote to memory of 4888 3380 q2720169.exe AppLaunch.exe PID 3380 wrote to memory of 1796 3380 q2720169.exe AppLaunch.exe PID 3380 wrote to memory of 1796 3380 q2720169.exe AppLaunch.exe PID 3380 wrote to memory of 1796 3380 q2720169.exe AppLaunch.exe PID 3380 wrote to memory of 1796 3380 q2720169.exe AppLaunch.exe PID 3380 wrote to memory of 1796 3380 q2720169.exe AppLaunch.exe PID 3380 wrote to memory of 1796 3380 q2720169.exe AppLaunch.exe PID 3380 wrote to memory of 1796 3380 q2720169.exe AppLaunch.exe PID 3380 wrote to memory of 1796 3380 q2720169.exe AppLaunch.exe PID 1304 wrote to memory of 4848 1304 z4109516.exe r0745764.exe PID 1304 wrote to memory of 4848 1304 z4109516.exe r0745764.exe PID 1304 wrote to memory of 4848 1304 z4109516.exe r0745764.exe PID 4848 wrote to memory of 1652 4848 r0745764.exe AppLaunch.exe PID 4848 wrote to memory of 1652 4848 r0745764.exe AppLaunch.exe PID 4848 wrote to memory of 1652 4848 r0745764.exe AppLaunch.exe PID 4848 wrote to memory of 1652 4848 r0745764.exe AppLaunch.exe PID 4848 wrote to memory of 1652 4848 r0745764.exe AppLaunch.exe PID 4848 wrote to memory of 1652 4848 r0745764.exe AppLaunch.exe PID 4848 wrote to memory of 1652 4848 r0745764.exe AppLaunch.exe PID 4848 wrote to memory of 1652 4848 r0745764.exe AppLaunch.exe PID 4848 wrote to memory of 1652 4848 r0745764.exe AppLaunch.exe PID 4848 wrote to memory of 1652 4848 r0745764.exe AppLaunch.exe PID 1884 wrote to memory of 4444 1884 z6788489.exe s3954125.exe PID 1884 wrote to memory of 4444 1884 z6788489.exe s3954125.exe PID 1884 wrote to memory of 4444 1884 z6788489.exe s3954125.exe PID 4444 wrote to memory of 216 4444 s3954125.exe AppLaunch.exe PID 4444 wrote to memory of 216 4444 s3954125.exe AppLaunch.exe PID 4444 wrote to memory of 216 4444 s3954125.exe AppLaunch.exe PID 4444 wrote to memory of 4544 4444 s3954125.exe AppLaunch.exe PID 4444 wrote to memory of 4544 4444 s3954125.exe AppLaunch.exe PID 4444 wrote to memory of 4544 4444 s3954125.exe AppLaunch.exe PID 4444 wrote to memory of 4544 4444 s3954125.exe AppLaunch.exe PID 4444 wrote to memory of 4544 4444 s3954125.exe AppLaunch.exe PID 4444 wrote to memory of 4544 4444 s3954125.exe AppLaunch.exe PID 4444 wrote to memory of 4544 4444 s3954125.exe AppLaunch.exe PID 4444 wrote to memory of 4544 4444 s3954125.exe AppLaunch.exe PID 2056 wrote to memory of 3172 2056 z5624829.exe t2158776.exe PID 2056 wrote to memory of 3172 2056 z5624829.exe t2158776.exe PID 2056 wrote to memory of 3172 2056 z5624829.exe t2158776.exe PID 3172 wrote to memory of 3996 3172 t2158776.exe explonde.exe PID 3172 wrote to memory of 3996 3172 t2158776.exe explonde.exe PID 3172 wrote to memory of 3996 3172 t2158776.exe explonde.exe PID 1808 wrote to memory of 8 1808 z9959126.exe u0849741.exe PID 1808 wrote to memory of 8 1808 z9959126.exe u0849741.exe PID 1808 wrote to memory of 8 1808 z9959126.exe u0849741.exe PID 8 wrote to memory of 2528 8 u0849741.exe legota.exe PID 8 wrote to memory of 2528 8 u0849741.exe legota.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exe"C:\Users\Admin\AppData\Local\Temp\6b6086b4e3b3e7af21a651494d833aa67ccbd89a26e3ead33b3075df594c15a0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9959126.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9959126.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5624829.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5624829.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6788489.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z6788489.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4109516.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4109516.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2720169.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4888
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 6047⤵
- Program crash
PID:3804
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0745764.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0745764.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 1408⤵
- Program crash
PID:4420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 1527⤵
- Program crash
PID:2096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3954125.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3954125.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:216
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 5846⤵
- Program crash
PID:4768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2158776.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t2158776.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:3996 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:5076
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:1044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:4912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:1928
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:5008
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0849741.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0849741.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:2528 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4700
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:5020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:3788
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6296180.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6296180.exe2⤵
- Executes dropped EXE
PID:3140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3380 -ip 33801⤵PID:1188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4848 -ip 48481⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1652 -ip 16521⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4444 -ip 44441⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1932
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4772
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
23KB
MD52500398dcab5c457cd9c21ad364823af
SHA1233fab84635c52ab50d200997ef0ecb91f4b14ac
SHA256e7eaba3a74e8e08db678ba3ee805a7a34e6714543c396e1891b5d3a1f6d64142
SHA51259e60b3d817640a44b958b9ee4434255e8c5cb5761e96ed80d6c610a23911d51db73fd58b2bbb245df042539052118cde6665dd0539db3658055b0028eb0b64e
-
Filesize
23KB
MD52500398dcab5c457cd9c21ad364823af
SHA1233fab84635c52ab50d200997ef0ecb91f4b14ac
SHA256e7eaba3a74e8e08db678ba3ee805a7a34e6714543c396e1891b5d3a1f6d64142
SHA51259e60b3d817640a44b958b9ee4434255e8c5cb5761e96ed80d6c610a23911d51db73fd58b2bbb245df042539052118cde6665dd0539db3658055b0028eb0b64e
-
Filesize
982KB
MD540f750f24f7bf89f701c68b417a938e4
SHA10c2a12a4995eb84989271ecd07b5d9c4767933ff
SHA256193d2473eccade1eb50d5d21f1deaeee4b1b9106a79706b688ee7673ae01853e
SHA512fbf13e9db610d58c8a7f7bff8cd8fe4f0e7f7a89231a8ce398b08b9347e79f5760c8902c4c69e4f5554e35cd35afe6320940be2e839f8083965544678d0d8612
-
Filesize
982KB
MD540f750f24f7bf89f701c68b417a938e4
SHA10c2a12a4995eb84989271ecd07b5d9c4767933ff
SHA256193d2473eccade1eb50d5d21f1deaeee4b1b9106a79706b688ee7673ae01853e
SHA512fbf13e9db610d58c8a7f7bff8cd8fe4f0e7f7a89231a8ce398b08b9347e79f5760c8902c4c69e4f5554e35cd35afe6320940be2e839f8083965544678d0d8612
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
799KB
MD54dade1387cf49a22213ba98ef43f2275
SHA16e47e03da096739913da80038f3dae9513548ab7
SHA256a12780c5d25d195bcbc07150e41f63b6e48850e7b3c3629fbbdf1f1487abada6
SHA512ccec67afb5a0fbff3ae3b94901c80671be53f2ddf8cf21dcd4bc98d21ac7348a039b4378e4ca9f62450d6c9574a3f74ec9d070f9b64a9c1aba6e7f74b274cf3d
-
Filesize
799KB
MD54dade1387cf49a22213ba98ef43f2275
SHA16e47e03da096739913da80038f3dae9513548ab7
SHA256a12780c5d25d195bcbc07150e41f63b6e48850e7b3c3629fbbdf1f1487abada6
SHA512ccec67afb5a0fbff3ae3b94901c80671be53f2ddf8cf21dcd4bc98d21ac7348a039b4378e4ca9f62450d6c9574a3f74ec9d070f9b64a9c1aba6e7f74b274cf3d
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
616KB
MD5228e102c17fc89e9a8b6999247ce2f47
SHA1fd1c3fb45c9e7d9189410bdd6dcfa088807c77f1
SHA2562d351a9f34adc29a984028c5e809bc67f2ebae81c0590a946aa4229516ab2272
SHA512c4ea12e594a9020d46e510cb24a36c39059dcce306c033739a75a9f3a76a38dbaa23d37216a56278438519499dc3352675a4dfec0bf5a6428d23d2a4060027e4
-
Filesize
616KB
MD5228e102c17fc89e9a8b6999247ce2f47
SHA1fd1c3fb45c9e7d9189410bdd6dcfa088807c77f1
SHA2562d351a9f34adc29a984028c5e809bc67f2ebae81c0590a946aa4229516ab2272
SHA512c4ea12e594a9020d46e510cb24a36c39059dcce306c033739a75a9f3a76a38dbaa23d37216a56278438519499dc3352675a4dfec0bf5a6428d23d2a4060027e4
-
Filesize
390KB
MD55ce313fe309421c63462bd10a5b529ee
SHA1002db3da5c83e0d68fd7a2430e187cb8764ca6fa
SHA2560f5260e6717be0ee57a6310c4fb66ffacd19249703cff0a04a4039bc30cbe268
SHA512d3c1460178eab87525b660e83dee0fd6065edf82f36a8b3317ff8c39a992ed110de26dfaa9409e8a3b1094e28a7685f7f3785fe2cfb0e47c83718ede7ee54092
-
Filesize
390KB
MD55ce313fe309421c63462bd10a5b529ee
SHA1002db3da5c83e0d68fd7a2430e187cb8764ca6fa
SHA2560f5260e6717be0ee57a6310c4fb66ffacd19249703cff0a04a4039bc30cbe268
SHA512d3c1460178eab87525b660e83dee0fd6065edf82f36a8b3317ff8c39a992ed110de26dfaa9409e8a3b1094e28a7685f7f3785fe2cfb0e47c83718ede7ee54092
-
Filesize
346KB
MD5c8b9a8eccf5032871d4240f8c9441e2c
SHA1cfbaef3b51c5269af5f2541afbeaea9d1aec3ccb
SHA2565335a003d121b67a03416ed15abb0c258643afdf04fe0d5c23823bd7f493b72e
SHA512655116e521e7f535166ba7bf617ccce8dfb441767779d8390288c67256bc343400b1555c7aebc8ecb9dce6d90f6da3d7a4fc156dfaf80c8c6e4423c76bc0f01f
-
Filesize
346KB
MD5c8b9a8eccf5032871d4240f8c9441e2c
SHA1cfbaef3b51c5269af5f2541afbeaea9d1aec3ccb
SHA2565335a003d121b67a03416ed15abb0c258643afdf04fe0d5c23823bd7f493b72e
SHA512655116e521e7f535166ba7bf617ccce8dfb441767779d8390288c67256bc343400b1555c7aebc8ecb9dce6d90f6da3d7a4fc156dfaf80c8c6e4423c76bc0f01f
-
Filesize
227KB
MD5500ce1b80940b4932340a76b9c727775
SHA102337490e143c02ff32a8dd1833ee3a5b37c30ca
SHA25649431636380c564955908f7472ddbdf46d7152f9b12d4ad08f83031668d85402
SHA5129dbf022372c7fce6d05701e5f411f204789f8c63aa1e9302c19403caf56f83bfe43005cf12c032ca7fbfca0e1178264306db43579e786a227cde1e7f3291ae3b
-
Filesize
227KB
MD5500ce1b80940b4932340a76b9c727775
SHA102337490e143c02ff32a8dd1833ee3a5b37c30ca
SHA25649431636380c564955908f7472ddbdf46d7152f9b12d4ad08f83031668d85402
SHA5129dbf022372c7fce6d05701e5f411f204789f8c63aa1e9302c19403caf56f83bfe43005cf12c032ca7fbfca0e1178264306db43579e786a227cde1e7f3291ae3b
-
Filesize
356KB
MD54940525e4df6277e78b7fcd6d7944e3d
SHA18ea2d93f5685f13b1338b5dc68247317a7c52dd1
SHA25612350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053
SHA512b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359
-
Filesize
356KB
MD54940525e4df6277e78b7fcd6d7944e3d
SHA18ea2d93f5685f13b1338b5dc68247317a7c52dd1
SHA25612350e79a751e90ba62d549446fa09c6cd2869d60f690c6dfba69cb280d16053
SHA512b9033d66e09b47598abfbfd5fb8200768ddf80a2d760ff14c92b697dd6c65d93b2715049c95f740914232bf1b94a0c3a0947f544f293d29a054229cd77512359
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a