Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:45
Static task
static1
Behavioral task
behavioral1
Sample
d69ce8ce36355d084e4c32f2e16b58aea1ab4746385d43a1ee2036e2151bc492.exe
Resource
win7-20230831-en
General
-
Target
d69ce8ce36355d084e4c32f2e16b58aea1ab4746385d43a1ee2036e2151bc492.exe
-
Size
1.1MB
-
MD5
9800496ab5cc5d8ab777ba4a6c07f028
-
SHA1
1b6e1c11372d7c110e63736313db7c2bb583955f
-
SHA256
d69ce8ce36355d084e4c32f2e16b58aea1ab4746385d43a1ee2036e2151bc492
-
SHA512
5f11708e79f09fd9425de7f62e6c1e64c2fd4da1c43bf4b5955a1a2adb80295fa1b021151ca04228428fdcb7c0da953c790b396b3019efcbbbcee93b686e5500
-
SSDEEP
24576:7ytZLjD4G00YUuugpNKokVNNBH30ZxFGqtU6NoQHEMZDh:utZLf8muxp0omNjEHYcU6NoQkMZD
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4336-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4336-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4336-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4336-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2616-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t5584090.exeexplonde.exeu8115771.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t5584090.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u8115771.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z5304957.exez3155339.exez7831829.exez2502793.exeq5900523.exer7746177.exes5451385.exet5584090.exeexplonde.exeu8115771.exelegota.exew8782859.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 2184 z5304957.exe 4624 z3155339.exe 3284 z7831829.exe 4700 z2502793.exe 2692 q5900523.exe 3576 r7746177.exe 3372 s5451385.exe 4432 t5584090.exe 5104 explonde.exe 4892 u8115771.exe 404 legota.exe 2832 w8782859.exe 4324 explonde.exe 1856 legota.exe 332 explonde.exe 3280 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3336 rundll32.exe 1804 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
d69ce8ce36355d084e4c32f2e16b58aea1ab4746385d43a1ee2036e2151bc492.exez5304957.exez3155339.exez7831829.exez2502793.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d69ce8ce36355d084e4c32f2e16b58aea1ab4746385d43a1ee2036e2151bc492.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5304957.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3155339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7831829.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z2502793.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q5900523.exer7746177.exes5451385.exedescription pid process target process PID 2692 set thread context of 2616 2692 q5900523.exe AppLaunch.exe PID 3576 set thread context of 4336 3576 r7746177.exe AppLaunch.exe PID 3372 set thread context of 864 3372 s5451385.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3260 2692 WerFault.exe q5900523.exe 4608 3576 WerFault.exe r7746177.exe 3204 4336 WerFault.exe AppLaunch.exe 1856 3372 WerFault.exe s5451385.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2644 schtasks.exe 4516 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 2616 AppLaunch.exe 2616 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 2616 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d69ce8ce36355d084e4c32f2e16b58aea1ab4746385d43a1ee2036e2151bc492.exez5304957.exez3155339.exez7831829.exez2502793.exeq5900523.exer7746177.exes5451385.exet5584090.exeexplonde.execmd.exedescription pid process target process PID 3080 wrote to memory of 2184 3080 d69ce8ce36355d084e4c32f2e16b58aea1ab4746385d43a1ee2036e2151bc492.exe z5304957.exe PID 3080 wrote to memory of 2184 3080 d69ce8ce36355d084e4c32f2e16b58aea1ab4746385d43a1ee2036e2151bc492.exe z5304957.exe PID 3080 wrote to memory of 2184 3080 d69ce8ce36355d084e4c32f2e16b58aea1ab4746385d43a1ee2036e2151bc492.exe z5304957.exe PID 2184 wrote to memory of 4624 2184 z5304957.exe z3155339.exe PID 2184 wrote to memory of 4624 2184 z5304957.exe z3155339.exe PID 2184 wrote to memory of 4624 2184 z5304957.exe z3155339.exe PID 4624 wrote to memory of 3284 4624 z3155339.exe z7831829.exe PID 4624 wrote to memory of 3284 4624 z3155339.exe z7831829.exe PID 4624 wrote to memory of 3284 4624 z3155339.exe z7831829.exe PID 3284 wrote to memory of 4700 3284 z7831829.exe z2502793.exe PID 3284 wrote to memory of 4700 3284 z7831829.exe z2502793.exe PID 3284 wrote to memory of 4700 3284 z7831829.exe z2502793.exe PID 4700 wrote to memory of 2692 4700 z2502793.exe q5900523.exe PID 4700 wrote to memory of 2692 4700 z2502793.exe q5900523.exe PID 4700 wrote to memory of 2692 4700 z2502793.exe q5900523.exe PID 2692 wrote to memory of 2616 2692 q5900523.exe AppLaunch.exe PID 2692 wrote to memory of 2616 2692 q5900523.exe AppLaunch.exe PID 2692 wrote to memory of 2616 2692 q5900523.exe AppLaunch.exe PID 2692 wrote to memory of 2616 2692 q5900523.exe AppLaunch.exe PID 2692 wrote to memory of 2616 2692 q5900523.exe AppLaunch.exe PID 2692 wrote to memory of 2616 2692 q5900523.exe AppLaunch.exe PID 2692 wrote to memory of 2616 2692 q5900523.exe AppLaunch.exe PID 2692 wrote to memory of 2616 2692 q5900523.exe AppLaunch.exe PID 4700 wrote to memory of 3576 4700 z2502793.exe r7746177.exe PID 4700 wrote to memory of 3576 4700 z2502793.exe r7746177.exe PID 4700 wrote to memory of 3576 4700 z2502793.exe r7746177.exe PID 3576 wrote to memory of 4336 3576 r7746177.exe AppLaunch.exe PID 3576 wrote to memory of 4336 3576 r7746177.exe AppLaunch.exe PID 3576 wrote to memory of 4336 3576 r7746177.exe AppLaunch.exe PID 3576 wrote to memory of 4336 3576 r7746177.exe AppLaunch.exe PID 3576 wrote to memory of 4336 3576 r7746177.exe AppLaunch.exe PID 3576 wrote to memory of 4336 3576 r7746177.exe AppLaunch.exe PID 3576 wrote to memory of 4336 3576 r7746177.exe AppLaunch.exe PID 3576 wrote to memory of 4336 3576 r7746177.exe AppLaunch.exe PID 3576 wrote to memory of 4336 3576 r7746177.exe AppLaunch.exe PID 3576 wrote to memory of 4336 3576 r7746177.exe AppLaunch.exe PID 3284 wrote to memory of 3372 3284 z7831829.exe s5451385.exe PID 3284 wrote to memory of 3372 3284 z7831829.exe s5451385.exe PID 3284 wrote to memory of 3372 3284 z7831829.exe s5451385.exe PID 3372 wrote to memory of 864 3372 s5451385.exe AppLaunch.exe PID 3372 wrote to memory of 864 3372 s5451385.exe AppLaunch.exe PID 3372 wrote to memory of 864 3372 s5451385.exe AppLaunch.exe PID 3372 wrote to memory of 864 3372 s5451385.exe AppLaunch.exe PID 3372 wrote to memory of 864 3372 s5451385.exe AppLaunch.exe PID 3372 wrote to memory of 864 3372 s5451385.exe AppLaunch.exe PID 3372 wrote to memory of 864 3372 s5451385.exe AppLaunch.exe PID 3372 wrote to memory of 864 3372 s5451385.exe AppLaunch.exe PID 4624 wrote to memory of 4432 4624 z3155339.exe t5584090.exe PID 4624 wrote to memory of 4432 4624 z3155339.exe t5584090.exe PID 4624 wrote to memory of 4432 4624 z3155339.exe t5584090.exe PID 4432 wrote to memory of 5104 4432 t5584090.exe explonde.exe PID 4432 wrote to memory of 5104 4432 t5584090.exe explonde.exe PID 4432 wrote to memory of 5104 4432 t5584090.exe explonde.exe PID 2184 wrote to memory of 4892 2184 z5304957.exe u8115771.exe PID 2184 wrote to memory of 4892 2184 z5304957.exe u8115771.exe PID 2184 wrote to memory of 4892 2184 z5304957.exe u8115771.exe PID 5104 wrote to memory of 2644 5104 explonde.exe schtasks.exe PID 5104 wrote to memory of 2644 5104 explonde.exe schtasks.exe PID 5104 wrote to memory of 2644 5104 explonde.exe schtasks.exe PID 5104 wrote to memory of 4216 5104 explonde.exe cmd.exe PID 5104 wrote to memory of 4216 5104 explonde.exe cmd.exe PID 5104 wrote to memory of 4216 5104 explonde.exe cmd.exe PID 4216 wrote to memory of 5048 4216 cmd.exe cmd.exe PID 4216 wrote to memory of 5048 4216 cmd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d69ce8ce36355d084e4c32f2e16b58aea1ab4746385d43a1ee2036e2151bc492.exe"C:\Users\Admin\AppData\Local\Temp\d69ce8ce36355d084e4c32f2e16b58aea1ab4746385d43a1ee2036e2151bc492.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5304957.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5304957.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3155339.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3155339.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7831829.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7831829.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2502793.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2502793.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5900523.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5900523.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 5967⤵
- Program crash
PID:3260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7746177.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7746177.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 5408⤵
- Program crash
PID:3204
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 1367⤵
- Program crash
PID:4608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5451385.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5451385.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3372 -s 1486⤵
- Program crash
PID:1856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5584090.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5584090.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:2644
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5048
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:1920
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:1980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3816
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:1420
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3336
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8115771.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8115771.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:404 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:4516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:2652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:1432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:3260
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1804
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8782859.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8782859.exe2⤵
- Executes dropped EXE
PID:2832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2692 -ip 26921⤵PID:1864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3576 -ip 35761⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4336 -ip 43361⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3372 -ip 33721⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4324
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1856
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:332
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3280
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD59ec85a7b3d89f52a1c92c3c8317d2c8b
SHA1ec12e556f44b5da5f1c37a5766cc92bf6bb75d33
SHA2563230589ed66393bc551dabc6c90e3179262751a46c5981877ead387537dad03e
SHA5120aadb942eaf318ac1d934111d4d45cd34ccaa4f93a0ec523dd08f332f685c718bb51e3847845cb4c3dc803b0c2621a317f2fbc46ee3b81f877c8aa422d159124
-
Filesize
23KB
MD59ec85a7b3d89f52a1c92c3c8317d2c8b
SHA1ec12e556f44b5da5f1c37a5766cc92bf6bb75d33
SHA2563230589ed66393bc551dabc6c90e3179262751a46c5981877ead387537dad03e
SHA5120aadb942eaf318ac1d934111d4d45cd34ccaa4f93a0ec523dd08f332f685c718bb51e3847845cb4c3dc803b0c2621a317f2fbc46ee3b81f877c8aa422d159124
-
Filesize
984KB
MD5f68cbc455589f600c88d6bd21af0b922
SHA110ad514cb5a113171f3cb66dbe34e41bc70269f2
SHA2569278e303032827780296bdf123b651cdbd17264f969c882b0f5eb6be54043ac2
SHA512b408b9fc099124b68e05f2e8b928e719ea6be1e9f393ce2a08b682f38cd19787bb68e29627cda99e417c08220ac280c6dae19ecb8f44b419f282184661a4dc62
-
Filesize
984KB
MD5f68cbc455589f600c88d6bd21af0b922
SHA110ad514cb5a113171f3cb66dbe34e41bc70269f2
SHA2569278e303032827780296bdf123b651cdbd17264f969c882b0f5eb6be54043ac2
SHA512b408b9fc099124b68e05f2e8b928e719ea6be1e9f393ce2a08b682f38cd19787bb68e29627cda99e417c08220ac280c6dae19ecb8f44b419f282184661a4dc62
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
800KB
MD5790dd82d964ec4bb743dbb5ef0a53360
SHA1066f9b416ff8738442f69e16d75a3d97f90144d8
SHA2568e541c56fdea2209f4a6893b62700b4ee57d264a18f0afd048af4f29b90c1b55
SHA5120e67aa30e584964926cd1cd27d225acba8953347ea3c5bb26bd443a2c50b1782d9aaeca6947331c6e60785271be589a31fe37a5bc47696129ed2a220ac54c76f
-
Filesize
800KB
MD5790dd82d964ec4bb743dbb5ef0a53360
SHA1066f9b416ff8738442f69e16d75a3d97f90144d8
SHA2568e541c56fdea2209f4a6893b62700b4ee57d264a18f0afd048af4f29b90c1b55
SHA5120e67aa30e584964926cd1cd27d225acba8953347ea3c5bb26bd443a2c50b1782d9aaeca6947331c6e60785271be589a31fe37a5bc47696129ed2a220ac54c76f
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
617KB
MD5c2709b260ffd46135c2339d868a133a4
SHA17fa5ea3a68e3eb5b60c92adec591b3b1784c330c
SHA256a03a893769c60b65f9febe1ddcc2e4605b86687f2a4c9db7c273bac59519e629
SHA512e45ea7e5d94cfacd1db888bc9dda7daa9898e8a5c84479275a16f7bc64e68a650c039cbd34392c9065cc94a38cc450c5292854bae1c471b9cf35b3ccf7057ce7
-
Filesize
617KB
MD5c2709b260ffd46135c2339d868a133a4
SHA17fa5ea3a68e3eb5b60c92adec591b3b1784c330c
SHA256a03a893769c60b65f9febe1ddcc2e4605b86687f2a4c9db7c273bac59519e629
SHA512e45ea7e5d94cfacd1db888bc9dda7daa9898e8a5c84479275a16f7bc64e68a650c039cbd34392c9065cc94a38cc450c5292854bae1c471b9cf35b3ccf7057ce7
-
Filesize
390KB
MD573e75a756cc70e01933ce220598dd463
SHA1b8d93797360f2117404c227c36718e50ba2eefd8
SHA2562862ac27dc368aa556daa991b52730349119a96cb7a960960399c5e8971b0df8
SHA5124c67bd262e929454c35e174300285bfe8bc2b995d5605696ec151f450a6abafbcfa9726bf3c3887b4782156f3425b0c1f55875fbb120ba0f287a2c3592d339fa
-
Filesize
390KB
MD573e75a756cc70e01933ce220598dd463
SHA1b8d93797360f2117404c227c36718e50ba2eefd8
SHA2562862ac27dc368aa556daa991b52730349119a96cb7a960960399c5e8971b0df8
SHA5124c67bd262e929454c35e174300285bfe8bc2b995d5605696ec151f450a6abafbcfa9726bf3c3887b4782156f3425b0c1f55875fbb120ba0f287a2c3592d339fa
-
Filesize
346KB
MD53e6ad4e3457cccf472d2a912b15d50a1
SHA183291c763756f99cf414f23588efca92cc572b78
SHA2567a8b457b3ed8674eecf576d27c3c19deea44f0b9611bb86fc73eae1a99852675
SHA5127e040d8811e153ae66c2b56139f21f6296d857bce1415256365a1d32af134ee2f03039eb239786c697e168a69e537f92147878ce7bb9cbc616ce3059a7304ddf
-
Filesize
346KB
MD53e6ad4e3457cccf472d2a912b15d50a1
SHA183291c763756f99cf414f23588efca92cc572b78
SHA2567a8b457b3ed8674eecf576d27c3c19deea44f0b9611bb86fc73eae1a99852675
SHA5127e040d8811e153ae66c2b56139f21f6296d857bce1415256365a1d32af134ee2f03039eb239786c697e168a69e537f92147878ce7bb9cbc616ce3059a7304ddf
-
Filesize
227KB
MD5cc0189c19631a1deb3d30918b3a69245
SHA11a0bc09f624ca58508bf0a26fede8f3f90a40215
SHA256dea301242f2c5aed27bddb4c9deb22901b2c9aa2c85a74091d1a2f53fde8af3b
SHA512695d0854b9ed98b021666bc1bf03fecad23e42efca4694431709e903f6f969faaf1c33abd6f40d9b21d69132fd3c3d90f2306f68485642d46891114b9c350d40
-
Filesize
227KB
MD5cc0189c19631a1deb3d30918b3a69245
SHA11a0bc09f624ca58508bf0a26fede8f3f90a40215
SHA256dea301242f2c5aed27bddb4c9deb22901b2c9aa2c85a74091d1a2f53fde8af3b
SHA512695d0854b9ed98b021666bc1bf03fecad23e42efca4694431709e903f6f969faaf1c33abd6f40d9b21d69132fd3c3d90f2306f68485642d46891114b9c350d40
-
Filesize
356KB
MD50cb34b1f6bbc9c0019e93c60fe7ae632
SHA1d8cbd91e89a369d6841865787d0677433a114d6a
SHA25624e63ce001370b0e14825a1cb1fa793070d62a2cc813fbd03e43243e23cdbc96
SHA51253652df36955ed4dc188251054e039b7efd7d6b2f17c6f264b82cd9cfbb05680cd2cbb00447f02eaa3b940239b17c147666815a69232499c199fc674232eaf13
-
Filesize
356KB
MD50cb34b1f6bbc9c0019e93c60fe7ae632
SHA1d8cbd91e89a369d6841865787d0677433a114d6a
SHA25624e63ce001370b0e14825a1cb1fa793070d62a2cc813fbd03e43243e23cdbc96
SHA51253652df36955ed4dc188251054e039b7efd7d6b2f17c6f264b82cd9cfbb05680cd2cbb00447f02eaa3b940239b17c147666815a69232499c199fc674232eaf13
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0