Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:45
Static task
static1
Behavioral task
behavioral1
Sample
20c8dc0ccc18587466974d4c7c8d6c777b3cb7eaee31b7da2a5a6f8bbcf3e8ed.exe
Resource
win7-20230831-en
General
-
Target
20c8dc0ccc18587466974d4c7c8d6c777b3cb7eaee31b7da2a5a6f8bbcf3e8ed.exe
-
Size
1.1MB
-
MD5
68a78f2d82e8b080ffb1dd3d5e647b82
-
SHA1
29a6513234aec6863f5b6bf0e52d3d1207a05fba
-
SHA256
20c8dc0ccc18587466974d4c7c8d6c777b3cb7eaee31b7da2a5a6f8bbcf3e8ed
-
SHA512
fda68a36fa44a74a752d711a5accf35aefe2a76d037dfc49378e8fbe8165de402b063b24c6c7580267c04163fbf4c825d283ab5614e78853b7332f386eaf0747
-
SSDEEP
24576:eyUMMv0pFbUu0mHg/nJiNdFb33+oTn2ZA6Auw5FJ37k31yckpoNLC1hul:tUVCFz0UgvQfFbn+oqu17FJ3w1vkpoNL
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2836-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2836-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2836-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2836-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4704-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t6275296.exeexplonde.exeu1987360.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t6275296.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u1987360.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z8255000.exez3191668.exez5654420.exez3423583.exeq7684363.exer0812970.exes2738514.exet6275296.exeexplonde.exeu1987360.exelegota.exew2465663.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 3828 z8255000.exe 3048 z3191668.exe 1504 z5654420.exe 3380 z3423583.exe 2924 q7684363.exe 4036 r0812970.exe 3888 s2738514.exe 2576 t6275296.exe 1072 explonde.exe 3876 u1987360.exe 5092 legota.exe 1280 w2465663.exe 3948 explonde.exe 812 legota.exe 3916 explonde.exe 4240 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3936 rundll32.exe 2568 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
20c8dc0ccc18587466974d4c7c8d6c777b3cb7eaee31b7da2a5a6f8bbcf3e8ed.exez8255000.exez3191668.exez5654420.exez3423583.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 20c8dc0ccc18587466974d4c7c8d6c777b3cb7eaee31b7da2a5a6f8bbcf3e8ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8255000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3191668.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z5654420.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z3423583.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q7684363.exer0812970.exes2738514.exedescription pid process target process PID 2924 set thread context of 4704 2924 q7684363.exe AppLaunch.exe PID 4036 set thread context of 2836 4036 r0812970.exe AppLaunch.exe PID 3888 set thread context of 4188 3888 s2738514.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3744 2924 WerFault.exe q7684363.exe 4472 4036 WerFault.exe r0812970.exe 2516 2836 WerFault.exe AppLaunch.exe 1568 3888 WerFault.exe s2738514.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3256 schtasks.exe 1684 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 4704 AppLaunch.exe 4704 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4704 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
20c8dc0ccc18587466974d4c7c8d6c777b3cb7eaee31b7da2a5a6f8bbcf3e8ed.exez8255000.exez3191668.exez5654420.exez3423583.exeq7684363.exer0812970.exes2738514.exet6275296.exeexplonde.exeu1987360.exedescription pid process target process PID 1056 wrote to memory of 3828 1056 20c8dc0ccc18587466974d4c7c8d6c777b3cb7eaee31b7da2a5a6f8bbcf3e8ed.exe z8255000.exe PID 1056 wrote to memory of 3828 1056 20c8dc0ccc18587466974d4c7c8d6c777b3cb7eaee31b7da2a5a6f8bbcf3e8ed.exe z8255000.exe PID 1056 wrote to memory of 3828 1056 20c8dc0ccc18587466974d4c7c8d6c777b3cb7eaee31b7da2a5a6f8bbcf3e8ed.exe z8255000.exe PID 3828 wrote to memory of 3048 3828 z8255000.exe z3191668.exe PID 3828 wrote to memory of 3048 3828 z8255000.exe z3191668.exe PID 3828 wrote to memory of 3048 3828 z8255000.exe z3191668.exe PID 3048 wrote to memory of 1504 3048 z3191668.exe z5654420.exe PID 3048 wrote to memory of 1504 3048 z3191668.exe z5654420.exe PID 3048 wrote to memory of 1504 3048 z3191668.exe z5654420.exe PID 1504 wrote to memory of 3380 1504 z5654420.exe z3423583.exe PID 1504 wrote to memory of 3380 1504 z5654420.exe z3423583.exe PID 1504 wrote to memory of 3380 1504 z5654420.exe z3423583.exe PID 3380 wrote to memory of 2924 3380 z3423583.exe q7684363.exe PID 3380 wrote to memory of 2924 3380 z3423583.exe q7684363.exe PID 3380 wrote to memory of 2924 3380 z3423583.exe q7684363.exe PID 2924 wrote to memory of 4272 2924 q7684363.exe AppLaunch.exe PID 2924 wrote to memory of 4272 2924 q7684363.exe AppLaunch.exe PID 2924 wrote to memory of 4272 2924 q7684363.exe AppLaunch.exe PID 2924 wrote to memory of 4704 2924 q7684363.exe AppLaunch.exe PID 2924 wrote to memory of 4704 2924 q7684363.exe AppLaunch.exe PID 2924 wrote to memory of 4704 2924 q7684363.exe AppLaunch.exe PID 2924 wrote to memory of 4704 2924 q7684363.exe AppLaunch.exe PID 2924 wrote to memory of 4704 2924 q7684363.exe AppLaunch.exe PID 2924 wrote to memory of 4704 2924 q7684363.exe AppLaunch.exe PID 2924 wrote to memory of 4704 2924 q7684363.exe AppLaunch.exe PID 2924 wrote to memory of 4704 2924 q7684363.exe AppLaunch.exe PID 3380 wrote to memory of 4036 3380 z3423583.exe r0812970.exe PID 3380 wrote to memory of 4036 3380 z3423583.exe r0812970.exe PID 3380 wrote to memory of 4036 3380 z3423583.exe r0812970.exe PID 4036 wrote to memory of 2836 4036 r0812970.exe AppLaunch.exe PID 4036 wrote to memory of 2836 4036 r0812970.exe AppLaunch.exe PID 4036 wrote to memory of 2836 4036 r0812970.exe AppLaunch.exe PID 4036 wrote to memory of 2836 4036 r0812970.exe AppLaunch.exe PID 4036 wrote to memory of 2836 4036 r0812970.exe AppLaunch.exe PID 4036 wrote to memory of 2836 4036 r0812970.exe AppLaunch.exe PID 4036 wrote to memory of 2836 4036 r0812970.exe AppLaunch.exe PID 4036 wrote to memory of 2836 4036 r0812970.exe AppLaunch.exe PID 4036 wrote to memory of 2836 4036 r0812970.exe AppLaunch.exe PID 4036 wrote to memory of 2836 4036 r0812970.exe AppLaunch.exe PID 1504 wrote to memory of 3888 1504 z5654420.exe s2738514.exe PID 1504 wrote to memory of 3888 1504 z5654420.exe s2738514.exe PID 1504 wrote to memory of 3888 1504 z5654420.exe s2738514.exe PID 3888 wrote to memory of 4188 3888 s2738514.exe AppLaunch.exe PID 3888 wrote to memory of 4188 3888 s2738514.exe AppLaunch.exe PID 3888 wrote to memory of 4188 3888 s2738514.exe AppLaunch.exe PID 3888 wrote to memory of 4188 3888 s2738514.exe AppLaunch.exe PID 3888 wrote to memory of 4188 3888 s2738514.exe AppLaunch.exe PID 3888 wrote to memory of 4188 3888 s2738514.exe AppLaunch.exe PID 3888 wrote to memory of 4188 3888 s2738514.exe AppLaunch.exe PID 3888 wrote to memory of 4188 3888 s2738514.exe AppLaunch.exe PID 3048 wrote to memory of 2576 3048 z3191668.exe t6275296.exe PID 3048 wrote to memory of 2576 3048 z3191668.exe t6275296.exe PID 3048 wrote to memory of 2576 3048 z3191668.exe t6275296.exe PID 2576 wrote to memory of 1072 2576 t6275296.exe explonde.exe PID 2576 wrote to memory of 1072 2576 t6275296.exe explonde.exe PID 2576 wrote to memory of 1072 2576 t6275296.exe explonde.exe PID 3828 wrote to memory of 3876 3828 z8255000.exe u1987360.exe PID 3828 wrote to memory of 3876 3828 z8255000.exe u1987360.exe PID 3828 wrote to memory of 3876 3828 z8255000.exe u1987360.exe PID 1072 wrote to memory of 3256 1072 explonde.exe schtasks.exe PID 1072 wrote to memory of 3256 1072 explonde.exe schtasks.exe PID 1072 wrote to memory of 3256 1072 explonde.exe schtasks.exe PID 3876 wrote to memory of 5092 3876 u1987360.exe legota.exe PID 3876 wrote to memory of 5092 3876 u1987360.exe legota.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20c8dc0ccc18587466974d4c7c8d6c777b3cb7eaee31b7da2a5a6f8bbcf3e8ed.exe"C:\Users\Admin\AppData\Local\Temp\20c8dc0ccc18587466974d4c7c8d6c777b3cb7eaee31b7da2a5a6f8bbcf3e8ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8255000.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8255000.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3191668.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3191668.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5654420.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5654420.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3423583.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3423583.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7684363.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7684363.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4272
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 2127⤵
- Program crash
PID:3744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0812970.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0812970.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 5408⤵
- Program crash
PID:2516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 1487⤵
- Program crash
PID:4472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2738514.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s2738514.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 1406⤵
- Program crash
PID:1568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6275296.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6275296.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:3256
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2840
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:4156
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:2236
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:3320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4616
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3936
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1987360.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1987360.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:5092 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:1684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:3644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:552
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:2312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4844
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:2120
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4904
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2568
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2465663.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2465663.exe2⤵
- Executes dropped EXE
PID:1280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2924 -ip 29241⤵PID:2120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4036 -ip 40361⤵PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2836 -ip 28361⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3888 -ip 38881⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3948
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:812
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3916
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4240
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5ca558fb0175f88193c92dae68ee7d50d
SHA1abe3775e134afddc4b7761bb9884a350fb6cbe80
SHA256c41629ebfaa8e7aef89546159b23ac1a8e477217213dfbc3124df31989df8551
SHA512dd8e530eccd58ce8c0dc2d2c9df4c881f753b0d843ba614b4989d0c7428253eb0e9db22152b405eeef0491291d86f8bee8127b6bef1a9555871b241ecc9aa996
-
Filesize
23KB
MD5ca558fb0175f88193c92dae68ee7d50d
SHA1abe3775e134afddc4b7761bb9884a350fb6cbe80
SHA256c41629ebfaa8e7aef89546159b23ac1a8e477217213dfbc3124df31989df8551
SHA512dd8e530eccd58ce8c0dc2d2c9df4c881f753b0d843ba614b4989d0c7428253eb0e9db22152b405eeef0491291d86f8bee8127b6bef1a9555871b241ecc9aa996
-
Filesize
983KB
MD54d7542a6493a7f55792e76f826053681
SHA16852fc4506e9b6997278c15bdfcd335ea1bb4e33
SHA256b44d03d8704df4aca1137872789271d0df4120bb11c943aaeb60cd7541becb18
SHA512e258901df4b3d8534fa1984c2bb97d594cb80fac29db32fcf43fb562bd8004bae671357cafa1679be345b90203bcc5f992b532adc65cd23430b0b18df4df0e1f
-
Filesize
983KB
MD54d7542a6493a7f55792e76f826053681
SHA16852fc4506e9b6997278c15bdfcd335ea1bb4e33
SHA256b44d03d8704df4aca1137872789271d0df4120bb11c943aaeb60cd7541becb18
SHA512e258901df4b3d8534fa1984c2bb97d594cb80fac29db32fcf43fb562bd8004bae671357cafa1679be345b90203bcc5f992b532adc65cd23430b0b18df4df0e1f
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
801KB
MD585b97a04b230418fe163672920b03c2e
SHA19445fcd63d4729f474b80e8b740dd53e97cc76fc
SHA256dc2b37e71979820d86268a71510240037d120935f72e69891ea8fa3ee58b3de6
SHA512473ae11b18d36ead97fce99ec3a652e6c9b17751c81b615e3ee89d8d61fded9937ec2c7c215d41de5a8ed48d4a0d07a809a973f5d9b74afe445a10048a4bc006
-
Filesize
801KB
MD585b97a04b230418fe163672920b03c2e
SHA19445fcd63d4729f474b80e8b740dd53e97cc76fc
SHA256dc2b37e71979820d86268a71510240037d120935f72e69891ea8fa3ee58b3de6
SHA512473ae11b18d36ead97fce99ec3a652e6c9b17751c81b615e3ee89d8d61fded9937ec2c7c215d41de5a8ed48d4a0d07a809a973f5d9b74afe445a10048a4bc006
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
618KB
MD5578a85e2993fc89005090388f47a2b39
SHA177d836cc24aba9657d53f53de7ecda407af5065d
SHA25690aa99baf95fa0af843ec8cdb1b193e5f02cc2ea48d89ed351deb71fafa2f516
SHA512b0a5812c730c7fa773ab174c7b8df08e6d8693cbc847c86095b721e3aa87ddc2f91e3428a512c1825943511fe023e484bd7648ebf0fece24f37c7b35678bb581
-
Filesize
618KB
MD5578a85e2993fc89005090388f47a2b39
SHA177d836cc24aba9657d53f53de7ecda407af5065d
SHA25690aa99baf95fa0af843ec8cdb1b193e5f02cc2ea48d89ed351deb71fafa2f516
SHA512b0a5812c730c7fa773ab174c7b8df08e6d8693cbc847c86095b721e3aa87ddc2f91e3428a512c1825943511fe023e484bd7648ebf0fece24f37c7b35678bb581
-
Filesize
390KB
MD5494c669e5d311a82e1ff8ac7260eb1b7
SHA16d273c364e0971f49339be5c8174f88fded49c57
SHA256bb0113c24d2980a9062ca4219c2a1f08154fff5fd515ccddf1b79a2e590bc702
SHA51244e76d1343335501766b4da6d47d37286ba99b718fc966cc11d603aaf7a6924d5978f00cf751fb834bb48d9d887c3aba4c30d7030fb4b58acfaafea47240a7ed
-
Filesize
390KB
MD5494c669e5d311a82e1ff8ac7260eb1b7
SHA16d273c364e0971f49339be5c8174f88fded49c57
SHA256bb0113c24d2980a9062ca4219c2a1f08154fff5fd515ccddf1b79a2e590bc702
SHA51244e76d1343335501766b4da6d47d37286ba99b718fc966cc11d603aaf7a6924d5978f00cf751fb834bb48d9d887c3aba4c30d7030fb4b58acfaafea47240a7ed
-
Filesize
346KB
MD575313bb1f8180ec2b5884f7d7f395278
SHA1f3be667347370ae7dea8c9f351c22311a946773b
SHA2563b6dfd61e828ea2cd736cd2d7fd4d481a270c7cee09ffc703585e78ddd04a3ed
SHA51248a85e541858a50e0f41e86ceddc8b113b24fa0667bc0a301d18adeeb43264111520e23ea6eb84587237347a0a7f3ea5afe9eb5066658a3ce25e593ede30bf68
-
Filesize
346KB
MD575313bb1f8180ec2b5884f7d7f395278
SHA1f3be667347370ae7dea8c9f351c22311a946773b
SHA2563b6dfd61e828ea2cd736cd2d7fd4d481a270c7cee09ffc703585e78ddd04a3ed
SHA51248a85e541858a50e0f41e86ceddc8b113b24fa0667bc0a301d18adeeb43264111520e23ea6eb84587237347a0a7f3ea5afe9eb5066658a3ce25e593ede30bf68
-
Filesize
227KB
MD5258996f6724ece68184f281c1be18759
SHA12ec5195e5becc88dc95949812e56ebcfe4644d4d
SHA25603bc947d37ae083337b61dfb6103ae0d891e853b906637a94e9316222540e1d5
SHA512a3a46dd976f9fc874a97a5bee6f960305a03442f831083d2151c0dd944d915d06487f427c0d103be4a9ce9bd73b74dd72fe38632be13dc2268c366f4cb1f2ac3
-
Filesize
227KB
MD5258996f6724ece68184f281c1be18759
SHA12ec5195e5becc88dc95949812e56ebcfe4644d4d
SHA25603bc947d37ae083337b61dfb6103ae0d891e853b906637a94e9316222540e1d5
SHA512a3a46dd976f9fc874a97a5bee6f960305a03442f831083d2151c0dd944d915d06487f427c0d103be4a9ce9bd73b74dd72fe38632be13dc2268c366f4cb1f2ac3
-
Filesize
356KB
MD577eb01c522c2f1912aa46ab49f87a51f
SHA19354c3be52fc44aeb04f0143adc2476a6a7e52f8
SHA2568e88e03ed2f467731a9fa685cd7163f71160b8731e66b89471a4137cb6bf7f6c
SHA5125400b13f6f3c81fa1f76afba3a037e545e9087f31925a60558d6590e83fec0d2b255068a67050d7eff0335b3ba1233ac53749bd36d1d74b77aa1bc0c070c4b1e
-
Filesize
356KB
MD577eb01c522c2f1912aa46ab49f87a51f
SHA19354c3be52fc44aeb04f0143adc2476a6a7e52f8
SHA2568e88e03ed2f467731a9fa685cd7163f71160b8731e66b89471a4137cb6bf7f6c
SHA5125400b13f6f3c81fa1f76afba3a037e545e9087f31925a60558d6590e83fec0d2b255068a67050d7eff0335b3ba1233ac53749bd36d1d74b77aa1bc0c070c4b1e
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0