Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:55
Static task
static1
Behavioral task
behavioral1
Sample
98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a.exe
Resource
win7-20230831-en
General
-
Target
98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a.exe
-
Size
1.3MB
-
MD5
0ac444968903762d7eaafb0f01e85266
-
SHA1
f60908de0913fe94dcf94376d1822faae76e638f
-
SHA256
98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a
-
SHA512
26dcf79f0c23bfc3affdb40dd78c53286d387bb132d929b6bb9845dfbddb9514675c2f637fec722b01352dc89dc9bbb6dc22e7fc5708e25327c055dc7ead81a1
-
SSDEEP
24576:/ykqkte0wKSPTAW2gUhd/krnX1jESEdhpDISSFtMdEX6hOIaL4dwC/0:KkqseZKOPAUX1jPy3YYWwBW42W
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3804-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3804-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3804-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3804-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3568-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
legota.exet1398101.exeexplonde.exeu7994724.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t1398101.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u7994724.exe -
Executes dropped EXE 16 IoCs
Processes:
z5368505.exez4242320.exez2689323.exez4832280.exeq4722443.exer7430575.exes1173409.exet1398101.exeexplonde.exeu7994724.exelegota.exew6720938.exelegota.exeexplonde.exelegota.exeexplonde.exepid process 4800 z5368505.exe 1848 z4242320.exe 4556 z2689323.exe 2812 z4832280.exe 1428 q4722443.exe 4116 r7430575.exe 1212 s1173409.exe 1160 t1398101.exe 3364 explonde.exe 4244 u7994724.exe 4056 legota.exe 516 w6720938.exe 2536 legota.exe 4120 explonde.exe 3528 legota.exe 2376 explonde.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1236 rundll32.exe 2492 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a.exez5368505.exez4242320.exez2689323.exez4832280.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5368505.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4242320.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2689323.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4832280.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q4722443.exer7430575.exes1173409.exedescription pid process target process PID 1428 set thread context of 3568 1428 q4722443.exe AppLaunch.exe PID 4116 set thread context of 3804 4116 r7430575.exe AppLaunch.exe PID 1212 set thread context of 1592 1212 s1173409.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4924 1428 WerFault.exe q4722443.exe 2120 4116 WerFault.exe r7430575.exe 4820 3804 WerFault.exe AppLaunch.exe 4384 1212 WerFault.exe s1173409.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2892 schtasks.exe 3728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 3568 AppLaunch.exe 3568 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3568 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a.exez5368505.exez4242320.exez2689323.exez4832280.exeq4722443.exer7430575.exes1173409.exet1398101.exeexplonde.exeu7994724.exedescription pid process target process PID 1776 wrote to memory of 4800 1776 98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a.exe z5368505.exe PID 1776 wrote to memory of 4800 1776 98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a.exe z5368505.exe PID 1776 wrote to memory of 4800 1776 98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a.exe z5368505.exe PID 4800 wrote to memory of 1848 4800 z5368505.exe z4242320.exe PID 4800 wrote to memory of 1848 4800 z5368505.exe z4242320.exe PID 4800 wrote to memory of 1848 4800 z5368505.exe z4242320.exe PID 1848 wrote to memory of 4556 1848 z4242320.exe z2689323.exe PID 1848 wrote to memory of 4556 1848 z4242320.exe z2689323.exe PID 1848 wrote to memory of 4556 1848 z4242320.exe z2689323.exe PID 4556 wrote to memory of 2812 4556 z2689323.exe z4832280.exe PID 4556 wrote to memory of 2812 4556 z2689323.exe z4832280.exe PID 4556 wrote to memory of 2812 4556 z2689323.exe z4832280.exe PID 2812 wrote to memory of 1428 2812 z4832280.exe q4722443.exe PID 2812 wrote to memory of 1428 2812 z4832280.exe q4722443.exe PID 2812 wrote to memory of 1428 2812 z4832280.exe q4722443.exe PID 1428 wrote to memory of 3568 1428 q4722443.exe AppLaunch.exe PID 1428 wrote to memory of 3568 1428 q4722443.exe AppLaunch.exe PID 1428 wrote to memory of 3568 1428 q4722443.exe AppLaunch.exe PID 1428 wrote to memory of 3568 1428 q4722443.exe AppLaunch.exe PID 1428 wrote to memory of 3568 1428 q4722443.exe AppLaunch.exe PID 1428 wrote to memory of 3568 1428 q4722443.exe AppLaunch.exe PID 1428 wrote to memory of 3568 1428 q4722443.exe AppLaunch.exe PID 1428 wrote to memory of 3568 1428 q4722443.exe AppLaunch.exe PID 2812 wrote to memory of 4116 2812 z4832280.exe r7430575.exe PID 2812 wrote to memory of 4116 2812 z4832280.exe r7430575.exe PID 2812 wrote to memory of 4116 2812 z4832280.exe r7430575.exe PID 4116 wrote to memory of 3804 4116 r7430575.exe AppLaunch.exe PID 4116 wrote to memory of 3804 4116 r7430575.exe AppLaunch.exe PID 4116 wrote to memory of 3804 4116 r7430575.exe AppLaunch.exe PID 4116 wrote to memory of 3804 4116 r7430575.exe AppLaunch.exe PID 4116 wrote to memory of 3804 4116 r7430575.exe AppLaunch.exe PID 4116 wrote to memory of 3804 4116 r7430575.exe AppLaunch.exe PID 4116 wrote to memory of 3804 4116 r7430575.exe AppLaunch.exe PID 4116 wrote to memory of 3804 4116 r7430575.exe AppLaunch.exe PID 4116 wrote to memory of 3804 4116 r7430575.exe AppLaunch.exe PID 4116 wrote to memory of 3804 4116 r7430575.exe AppLaunch.exe PID 4556 wrote to memory of 1212 4556 z2689323.exe s1173409.exe PID 4556 wrote to memory of 1212 4556 z2689323.exe s1173409.exe PID 4556 wrote to memory of 1212 4556 z2689323.exe s1173409.exe PID 1212 wrote to memory of 1592 1212 s1173409.exe AppLaunch.exe PID 1212 wrote to memory of 1592 1212 s1173409.exe AppLaunch.exe PID 1212 wrote to memory of 1592 1212 s1173409.exe AppLaunch.exe PID 1212 wrote to memory of 1592 1212 s1173409.exe AppLaunch.exe PID 1212 wrote to memory of 1592 1212 s1173409.exe AppLaunch.exe PID 1212 wrote to memory of 1592 1212 s1173409.exe AppLaunch.exe PID 1212 wrote to memory of 1592 1212 s1173409.exe AppLaunch.exe PID 1212 wrote to memory of 1592 1212 s1173409.exe AppLaunch.exe PID 1848 wrote to memory of 1160 1848 z4242320.exe t1398101.exe PID 1848 wrote to memory of 1160 1848 z4242320.exe t1398101.exe PID 1848 wrote to memory of 1160 1848 z4242320.exe t1398101.exe PID 1160 wrote to memory of 3364 1160 t1398101.exe explonde.exe PID 1160 wrote to memory of 3364 1160 t1398101.exe explonde.exe PID 1160 wrote to memory of 3364 1160 t1398101.exe explonde.exe PID 4800 wrote to memory of 4244 4800 z5368505.exe u7994724.exe PID 4800 wrote to memory of 4244 4800 z5368505.exe u7994724.exe PID 4800 wrote to memory of 4244 4800 z5368505.exe u7994724.exe PID 3364 wrote to memory of 2892 3364 explonde.exe schtasks.exe PID 3364 wrote to memory of 2892 3364 explonde.exe schtasks.exe PID 3364 wrote to memory of 2892 3364 explonde.exe schtasks.exe PID 4244 wrote to memory of 4056 4244 u7994724.exe legota.exe PID 4244 wrote to memory of 4056 4244 u7994724.exe legota.exe PID 4244 wrote to memory of 4056 4244 u7994724.exe legota.exe PID 3364 wrote to memory of 3004 3364 explonde.exe cmd.exe PID 3364 wrote to memory of 3004 3364 explonde.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a.exe"C:\Users\Admin\AppData\Local\Temp\98b265f931da9b52993c2cfab71e5436d2dd9ea7ce2e1da567f497ae975a085a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5368505.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5368505.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4242320.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4242320.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2689323.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2689323.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4832280.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4832280.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4722443.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q4722443.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 1407⤵
- Program crash
PID:4924
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7430575.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7430575.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 5408⤵
- Program crash
PID:4820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 1527⤵
- Program crash
PID:2120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1173409.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1173409.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 1486⤵
- Program crash
PID:4384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1398101.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1398101.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:2892
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:3004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4148
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:5088
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:4560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:1508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:1304
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1236
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u7994724.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u7994724.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4056 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:928
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:1176
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2492
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6720938.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6720938.exe2⤵
- Executes dropped EXE
PID:516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1428 -ip 14281⤵PID:1996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4116 -ip 41161⤵PID:4200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3804 -ip 38041⤵PID:2560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1212 -ip 12121⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2536
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4120
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3528
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:2376
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5f6f72079faf3e9dc21a94222a367bce9
SHA1cd7db0e78f8311ef081e6a8a253b79e2a3178834
SHA256d5b16173ec5a96095d446df254b9f648b6025236747dcc526b08cc29b33331c2
SHA5120f5cea6366fb4e2d1cd52507ae2caa4aadee992749a961a558a82a26cd61abd7393cea93be2d0b5a7a4c4bd4fefc0872089059d77df55afc96f32ab11d13af5d
-
Filesize
22KB
MD5f6f72079faf3e9dc21a94222a367bce9
SHA1cd7db0e78f8311ef081e6a8a253b79e2a3178834
SHA256d5b16173ec5a96095d446df254b9f648b6025236747dcc526b08cc29b33331c2
SHA5120f5cea6366fb4e2d1cd52507ae2caa4aadee992749a961a558a82a26cd61abd7393cea93be2d0b5a7a4c4bd4fefc0872089059d77df55afc96f32ab11d13af5d
-
Filesize
1.2MB
MD5dbaf529b095c5e9c368757cfa0b28051
SHA19ea4dad686895924fdd8d51d6512c1ef07a79fa9
SHA256eb3d67469790f0d6dfc9541fb5ca24349546da0e0dd852830c95b4f7e4f736cf
SHA512fa90268244f1b04d9e6fd83078c1852d1b822c556f679912185d253d14b7d9e90ba73b8bb3fac5fda607db8e9b408872596748462be01de2e7e60deaa1d20fdb
-
Filesize
1.2MB
MD5dbaf529b095c5e9c368757cfa0b28051
SHA19ea4dad686895924fdd8d51d6512c1ef07a79fa9
SHA256eb3d67469790f0d6dfc9541fb5ca24349546da0e0dd852830c95b4f7e4f736cf
SHA512fa90268244f1b04d9e6fd83078c1852d1b822c556f679912185d253d14b7d9e90ba73b8bb3fac5fda607db8e9b408872596748462be01de2e7e60deaa1d20fdb
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
1.0MB
MD5ef971325042cb31519af35e30c177f40
SHA1bca69e0a96c468b81f6c7d9dee36ff7726fd97c8
SHA2566c45b090561a45088841c587d5cb1e28275888e5da28f64d86276ef9cac5542f
SHA5122c5e6264fb0c06fdfbedc2fead1d01bdc26e890562e35a92a35fdc2bbcf0fdd6c795605e13ef439c04d56bca837075fada14a8bf6f036673f949e6c3baf0e920
-
Filesize
1.0MB
MD5ef971325042cb31519af35e30c177f40
SHA1bca69e0a96c468b81f6c7d9dee36ff7726fd97c8
SHA2566c45b090561a45088841c587d5cb1e28275888e5da28f64d86276ef9cac5542f
SHA5122c5e6264fb0c06fdfbedc2fead1d01bdc26e890562e35a92a35fdc2bbcf0fdd6c795605e13ef439c04d56bca837075fada14a8bf6f036673f949e6c3baf0e920
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
880KB
MD5d456f7a294f4455d84448dff356c994c
SHA15c31e9e2a01bfade18c10e7d2af58f0d7c392b42
SHA256a0ee1489e76169ab56e05fdca5cb9cb2c8ad27789a2ef33bb0d72f3fb5bec3c0
SHA512ce19a0408e05124ef71c2cf444f2dc7cc0d6c42fc768dc94f1f2d04678b6e6da18aa2354fa20cd85f02af5c581ad8c59a65b1f8b411b2de01f9bed762ac488e2
-
Filesize
880KB
MD5d456f7a294f4455d84448dff356c994c
SHA15c31e9e2a01bfade18c10e7d2af58f0d7c392b42
SHA256a0ee1489e76169ab56e05fdca5cb9cb2c8ad27789a2ef33bb0d72f3fb5bec3c0
SHA512ce19a0408e05124ef71c2cf444f2dc7cc0d6c42fc768dc94f1f2d04678b6e6da18aa2354fa20cd85f02af5c581ad8c59a65b1f8b411b2de01f9bed762ac488e2
-
Filesize
1.0MB
MD500d0528fe2ccf31de860c32f3dee0ec3
SHA194156d383e1db0dc1a77b2ea88d08245b0fb8cc8
SHA25644aeb79a0cb3a3fc82c219e407788b45ea41b743a0311825172d93d9a5f6c18c
SHA51202f46b4fd922bb674896f66b64dc9b0cddf9dbc83248e84ba11e6de8bf57f818595bb9ab1ab86b6b15e632dfe6655948c57cefef26c7fc10f58ad4fcc8d073b7
-
Filesize
1.0MB
MD500d0528fe2ccf31de860c32f3dee0ec3
SHA194156d383e1db0dc1a77b2ea88d08245b0fb8cc8
SHA25644aeb79a0cb3a3fc82c219e407788b45ea41b743a0311825172d93d9a5f6c18c
SHA51202f46b4fd922bb674896f66b64dc9b0cddf9dbc83248e84ba11e6de8bf57f818595bb9ab1ab86b6b15e632dfe6655948c57cefef26c7fc10f58ad4fcc8d073b7
-
Filesize
490KB
MD5100a1a943fb9c9d6247a9e13d39200c2
SHA1dc7deeca8b0c45cd0e14147590f67286254bc1c5
SHA256ee7cfba1d26dd6013a27f32c525d3a1a8e84b3a83685c4ef839b3ce7aafd8020
SHA512e5db42cf0f9c5cc79c9986a95c402ecc0cca02af982c83ab2a8e4159918caeccc8178163ac644a418ba0a1229bcebef8886e6cd0d86c7f2b988b060cc1223281
-
Filesize
490KB
MD5100a1a943fb9c9d6247a9e13d39200c2
SHA1dc7deeca8b0c45cd0e14147590f67286254bc1c5
SHA256ee7cfba1d26dd6013a27f32c525d3a1a8e84b3a83685c4ef839b3ce7aafd8020
SHA512e5db42cf0f9c5cc79c9986a95c402ecc0cca02af982c83ab2a8e4159918caeccc8178163ac644a418ba0a1229bcebef8886e6cd0d86c7f2b988b060cc1223281
-
Filesize
860KB
MD54e4e0dd3f96e645c5cde6e26b55b5fa2
SHA12f22bebdba1abeeac17110d68108865f181ab61e
SHA256780ce8d7ba7dd21c36de171680e260624643583c5d3ef3e75120522e30f60656
SHA5122d941ef2e689179367194d4af28cdce51b4ef1bcdc9b28dd5dc946aa3f4c24f466cafd5cf481d97be3592417e70851751cbe2dacea3b9f1092878af686456c33
-
Filesize
860KB
MD54e4e0dd3f96e645c5cde6e26b55b5fa2
SHA12f22bebdba1abeeac17110d68108865f181ab61e
SHA256780ce8d7ba7dd21c36de171680e260624643583c5d3ef3e75120522e30f60656
SHA5122d941ef2e689179367194d4af28cdce51b4ef1bcdc9b28dd5dc946aa3f4c24f466cafd5cf481d97be3592417e70851751cbe2dacea3b9f1092878af686456c33
-
Filesize
1016KB
MD59cb87170e34944b43fed93fabcc414de
SHA1858936f05f65ea404ab8b6ebc3b5c90bca134f7a
SHA256216bed25bc02e7f73e6adfbebcf3e2c2b66cef82d621828846256b6966fbdb92
SHA51265b7d8a9082dbacb4962d75d4073ce9158da81bbc1273ae06bc694b7165dc68e00ab8f55945ad0b83ad621ebb7e5b157638be0f932b6fb914f100f67dd050aed
-
Filesize
1016KB
MD59cb87170e34944b43fed93fabcc414de
SHA1858936f05f65ea404ab8b6ebc3b5c90bca134f7a
SHA256216bed25bc02e7f73e6adfbebcf3e2c2b66cef82d621828846256b6966fbdb92
SHA51265b7d8a9082dbacb4962d75d4073ce9158da81bbc1273ae06bc694b7165dc68e00ab8f55945ad0b83ad621ebb7e5b157638be0f932b6fb914f100f67dd050aed
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0