Analysis
-
max time kernel
151s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:55
Static task
static1
Behavioral task
behavioral1
Sample
5a84adb86b9596f4583a653fdcdea8555f0a4d8f4dbaad72b1d7d205563af39d.exe
Resource
win7-20230831-en
General
-
Target
5a84adb86b9596f4583a653fdcdea8555f0a4d8f4dbaad72b1d7d205563af39d.exe
-
Size
1.3MB
-
MD5
a631443f546f458306990b7e9583c139
-
SHA1
a9085ac268d1277d080b0e7347ce39b5a273b3eb
-
SHA256
5a84adb86b9596f4583a653fdcdea8555f0a4d8f4dbaad72b1d7d205563af39d
-
SHA512
24df30fc2e6312e041eae89928f99c61b71b39cfa1862814cef42e1a488fe6a8fd99c95762702faf7cc73c8dad6bc8c2b0ce4bbde7e1d7584af50bd89542e874
-
SSDEEP
24576:1yHsJuNN7Ci54RM1/XIbtuhCtaQGM3dFjsoneL/tmz+keZpvuwM3sA:QAGN7f1P4tuhCtaQHj4Dke3GwM3s
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3536-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3536-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3536-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3536-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2828-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explonde.exeu0735146.exelegota.exet0524478.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation u0735146.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation t0524478.exe -
Executes dropped EXE 18 IoCs
Processes:
z4457473.exez4548134.exez9048149.exez5848411.exeq9078382.exer5271983.exes4119465.exet0524478.exeexplonde.exeu0735146.exelegota.exew0617146.exeexplonde.exelegota.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 4220 z4457473.exe 4896 z4548134.exe 3900 z9048149.exe 3076 z5848411.exe 404 q9078382.exe 4108 r5271983.exe 640 s4119465.exe 1448 t0524478.exe 4972 explonde.exe 2136 u0735146.exe 2188 legota.exe 3896 w0617146.exe 4964 explonde.exe 3652 legota.exe 2080 explonde.exe 1832 legota.exe 3540 explonde.exe 1548 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2176 rundll32.exe 4160 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
5a84adb86b9596f4583a653fdcdea8555f0a4d8f4dbaad72b1d7d205563af39d.exez4457473.exez4548134.exez9048149.exez5848411.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5a84adb86b9596f4583a653fdcdea8555f0a4d8f4dbaad72b1d7d205563af39d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4457473.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4548134.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z9048149.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z5848411.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q9078382.exer5271983.exes4119465.exedescription pid process target process PID 404 set thread context of 2828 404 q9078382.exe AppLaunch.exe PID 4108 set thread context of 3536 4108 r5271983.exe AppLaunch.exe PID 640 set thread context of 5100 640 s4119465.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1240 404 WerFault.exe q9078382.exe 4640 4108 WerFault.exe r5271983.exe 2280 3536 WerFault.exe AppLaunch.exe 4636 640 WerFault.exe s4119465.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1612 schtasks.exe 3580 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 2828 AppLaunch.exe 2828 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 2828 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5a84adb86b9596f4583a653fdcdea8555f0a4d8f4dbaad72b1d7d205563af39d.exez4457473.exez4548134.exez9048149.exez5848411.exeq9078382.exer5271983.exes4119465.exet0524478.exeexplonde.exeu0735146.exedescription pid process target process PID 2632 wrote to memory of 4220 2632 5a84adb86b9596f4583a653fdcdea8555f0a4d8f4dbaad72b1d7d205563af39d.exe z4457473.exe PID 2632 wrote to memory of 4220 2632 5a84adb86b9596f4583a653fdcdea8555f0a4d8f4dbaad72b1d7d205563af39d.exe z4457473.exe PID 2632 wrote to memory of 4220 2632 5a84adb86b9596f4583a653fdcdea8555f0a4d8f4dbaad72b1d7d205563af39d.exe z4457473.exe PID 4220 wrote to memory of 4896 4220 z4457473.exe z4548134.exe PID 4220 wrote to memory of 4896 4220 z4457473.exe z4548134.exe PID 4220 wrote to memory of 4896 4220 z4457473.exe z4548134.exe PID 4896 wrote to memory of 3900 4896 z4548134.exe z9048149.exe PID 4896 wrote to memory of 3900 4896 z4548134.exe z9048149.exe PID 4896 wrote to memory of 3900 4896 z4548134.exe z9048149.exe PID 3900 wrote to memory of 3076 3900 z9048149.exe z5848411.exe PID 3900 wrote to memory of 3076 3900 z9048149.exe z5848411.exe PID 3900 wrote to memory of 3076 3900 z9048149.exe z5848411.exe PID 3076 wrote to memory of 404 3076 z5848411.exe q9078382.exe PID 3076 wrote to memory of 404 3076 z5848411.exe q9078382.exe PID 3076 wrote to memory of 404 3076 z5848411.exe q9078382.exe PID 404 wrote to memory of 2828 404 q9078382.exe AppLaunch.exe PID 404 wrote to memory of 2828 404 q9078382.exe AppLaunch.exe PID 404 wrote to memory of 2828 404 q9078382.exe AppLaunch.exe PID 404 wrote to memory of 2828 404 q9078382.exe AppLaunch.exe PID 404 wrote to memory of 2828 404 q9078382.exe AppLaunch.exe PID 404 wrote to memory of 2828 404 q9078382.exe AppLaunch.exe PID 404 wrote to memory of 2828 404 q9078382.exe AppLaunch.exe PID 404 wrote to memory of 2828 404 q9078382.exe AppLaunch.exe PID 3076 wrote to memory of 4108 3076 z5848411.exe r5271983.exe PID 3076 wrote to memory of 4108 3076 z5848411.exe r5271983.exe PID 3076 wrote to memory of 4108 3076 z5848411.exe r5271983.exe PID 4108 wrote to memory of 3536 4108 r5271983.exe AppLaunch.exe PID 4108 wrote to memory of 3536 4108 r5271983.exe AppLaunch.exe PID 4108 wrote to memory of 3536 4108 r5271983.exe AppLaunch.exe PID 4108 wrote to memory of 3536 4108 r5271983.exe AppLaunch.exe PID 4108 wrote to memory of 3536 4108 r5271983.exe AppLaunch.exe PID 4108 wrote to memory of 3536 4108 r5271983.exe AppLaunch.exe PID 4108 wrote to memory of 3536 4108 r5271983.exe AppLaunch.exe PID 4108 wrote to memory of 3536 4108 r5271983.exe AppLaunch.exe PID 4108 wrote to memory of 3536 4108 r5271983.exe AppLaunch.exe PID 4108 wrote to memory of 3536 4108 r5271983.exe AppLaunch.exe PID 3900 wrote to memory of 640 3900 z9048149.exe s4119465.exe PID 3900 wrote to memory of 640 3900 z9048149.exe s4119465.exe PID 3900 wrote to memory of 640 3900 z9048149.exe s4119465.exe PID 640 wrote to memory of 5100 640 s4119465.exe AppLaunch.exe PID 640 wrote to memory of 5100 640 s4119465.exe AppLaunch.exe PID 640 wrote to memory of 5100 640 s4119465.exe AppLaunch.exe PID 640 wrote to memory of 5100 640 s4119465.exe AppLaunch.exe PID 640 wrote to memory of 5100 640 s4119465.exe AppLaunch.exe PID 640 wrote to memory of 5100 640 s4119465.exe AppLaunch.exe PID 640 wrote to memory of 5100 640 s4119465.exe AppLaunch.exe PID 640 wrote to memory of 5100 640 s4119465.exe AppLaunch.exe PID 4896 wrote to memory of 1448 4896 z4548134.exe t0524478.exe PID 4896 wrote to memory of 1448 4896 z4548134.exe t0524478.exe PID 4896 wrote to memory of 1448 4896 z4548134.exe t0524478.exe PID 1448 wrote to memory of 4972 1448 t0524478.exe explonde.exe PID 1448 wrote to memory of 4972 1448 t0524478.exe explonde.exe PID 1448 wrote to memory of 4972 1448 t0524478.exe explonde.exe PID 4220 wrote to memory of 2136 4220 z4457473.exe u0735146.exe PID 4220 wrote to memory of 2136 4220 z4457473.exe u0735146.exe PID 4220 wrote to memory of 2136 4220 z4457473.exe u0735146.exe PID 4972 wrote to memory of 1612 4972 explonde.exe schtasks.exe PID 4972 wrote to memory of 1612 4972 explonde.exe schtasks.exe PID 4972 wrote to memory of 1612 4972 explonde.exe schtasks.exe PID 4972 wrote to memory of 4160 4972 explonde.exe cmd.exe PID 4972 wrote to memory of 4160 4972 explonde.exe cmd.exe PID 4972 wrote to memory of 4160 4972 explonde.exe cmd.exe PID 2136 wrote to memory of 2188 2136 u0735146.exe legota.exe PID 2136 wrote to memory of 2188 2136 u0735146.exe legota.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a84adb86b9596f4583a653fdcdea8555f0a4d8f4dbaad72b1d7d205563af39d.exe"C:\Users\Admin\AppData\Local\Temp\5a84adb86b9596f4583a653fdcdea8555f0a4d8f4dbaad72b1d7d205563af39d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4457473.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4457473.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4548134.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4548134.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9048149.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9048149.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5848411.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5848411.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9078382.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9078382.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 1567⤵
- Program crash
PID:1240
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5271983.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5271983.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 5408⤵
- Program crash
PID:2280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 5927⤵
- Program crash
PID:4640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4119465.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4119465.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 5646⤵
- Program crash
PID:4636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0524478.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0524478.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:1612
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4672
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:4332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:1240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:5104
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4160
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0735146.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0735146.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3580
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:2104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:2052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:2892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:3792
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2176
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0617146.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0617146.exe2⤵
- Executes dropped EXE
PID:3896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 404 -ip 4041⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4108 -ip 41081⤵PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3536 -ip 35361⤵PID:5020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 640 -ip 6401⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4964
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3652
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:2080
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1832
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3540
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD55440edb2f7c077a87f63d61a936df11a
SHA15c3f97203f5c8fe77a1d9fcf6391efee97d11d28
SHA256fef660396cdcaa920d3571ea43892c1edccc484c85800aa684276f04d95ac417
SHA51240d857ca62ddfab26dfbe45941495013ada146203da8dc901d45318b5877fb511ddd3983961f04b5ab0f6f7b156e6817b4e97ff9e0c19a3581cf30a4aa936ad0
-
Filesize
22KB
MD55440edb2f7c077a87f63d61a936df11a
SHA15c3f97203f5c8fe77a1d9fcf6391efee97d11d28
SHA256fef660396cdcaa920d3571ea43892c1edccc484c85800aa684276f04d95ac417
SHA51240d857ca62ddfab26dfbe45941495013ada146203da8dc901d45318b5877fb511ddd3983961f04b5ab0f6f7b156e6817b4e97ff9e0c19a3581cf30a4aa936ad0
-
Filesize
1.2MB
MD53564dbd5369dc11b40eb55f18a177d6e
SHA1b1a0a3f5214c11258c6cf4ae0fe6e00cf3dbbdd3
SHA25657a9d1fce306a924c7ef31b3075b9f91f1e4f4fac578a227a808ca2d7e57a603
SHA51255e56f50e7bcc5c7df69620f155f4428477c66959250b29eed1004cbaf07db48f0bbc9a4bca226b15223e1c1fac36907f5edf89cdb2e764723755e0e74468d40
-
Filesize
1.2MB
MD53564dbd5369dc11b40eb55f18a177d6e
SHA1b1a0a3f5214c11258c6cf4ae0fe6e00cf3dbbdd3
SHA25657a9d1fce306a924c7ef31b3075b9f91f1e4f4fac578a227a808ca2d7e57a603
SHA51255e56f50e7bcc5c7df69620f155f4428477c66959250b29eed1004cbaf07db48f0bbc9a4bca226b15223e1c1fac36907f5edf89cdb2e764723755e0e74468d40
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
1.0MB
MD5106445b27b90191c8159be6cfd2d5934
SHA1f082a26634bbf64a1bb92e8740e025fecbaa2b9a
SHA2568ca1c57696a85b20c31af95966bca977f00f4540fb1e6d48bb4d268fc2ae1b08
SHA512dc37c9062e1f6f9bd14582ab97a18238ccb575b9ebb92888c073ab6784dfc11c9ffb09f26ef72c81ee9f61d05dae8d219919871556175072f4e96af8018b2065
-
Filesize
1.0MB
MD5106445b27b90191c8159be6cfd2d5934
SHA1f082a26634bbf64a1bb92e8740e025fecbaa2b9a
SHA2568ca1c57696a85b20c31af95966bca977f00f4540fb1e6d48bb4d268fc2ae1b08
SHA512dc37c9062e1f6f9bd14582ab97a18238ccb575b9ebb92888c073ab6784dfc11c9ffb09f26ef72c81ee9f61d05dae8d219919871556175072f4e96af8018b2065
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
881KB
MD5e7abc64a0fbb8cb9ee3647aaa6417404
SHA12ca0281f8432e2cd172f8714c2cdbde5e3f439e0
SHA2563f6618bf364afcd9912277e7c05b80b62cb80c69b6614b7af28788afcdf10e1b
SHA5126ccb3d8658020575af00e65eba59d5c69750281b192824f5b9e3c731a7f9f4ab13479483d6c420bc4811b681e2f8fa95e0bd87c24849e25e1b85a447720177c0
-
Filesize
881KB
MD5e7abc64a0fbb8cb9ee3647aaa6417404
SHA12ca0281f8432e2cd172f8714c2cdbde5e3f439e0
SHA2563f6618bf364afcd9912277e7c05b80b62cb80c69b6614b7af28788afcdf10e1b
SHA5126ccb3d8658020575af00e65eba59d5c69750281b192824f5b9e3c731a7f9f4ab13479483d6c420bc4811b681e2f8fa95e0bd87c24849e25e1b85a447720177c0
-
Filesize
1.0MB
MD5eaa9ca4f068807df055b96de15ae66f8
SHA1d850a41adac923a575002ca6a5f1f1385058d791
SHA256ea78eebd1bcfa431865f1e9c36c9033f1cbf57b72c7df54a087674c0706b0471
SHA512f5b9e9a381e97a17d0ca0d4c2ea8d1c876f85b5ea1a248630e805340d341d98a321e72c325e54efa0e0ce2d30330f7de38b0096634a08da9167e01abf3177eb9
-
Filesize
1.0MB
MD5eaa9ca4f068807df055b96de15ae66f8
SHA1d850a41adac923a575002ca6a5f1f1385058d791
SHA256ea78eebd1bcfa431865f1e9c36c9033f1cbf57b72c7df54a087674c0706b0471
SHA512f5b9e9a381e97a17d0ca0d4c2ea8d1c876f85b5ea1a248630e805340d341d98a321e72c325e54efa0e0ce2d30330f7de38b0096634a08da9167e01abf3177eb9
-
Filesize
491KB
MD55a9ec74b400fad80274046f247452431
SHA1dbbdb71369377a933f7b6c2ca2f19f7bd3d31bc2
SHA2563dce51e61590a39fc3d425cac6b5c9c93d784723e361a153234b40267b14068e
SHA51271fc8e2263865e6ce6edc73aa568b3a6a2e5a14fdfdacbac22744812754aeeb05814379f16c40c3ae8ae742e23dd4370ab0ec901f4e90f1b106d7bb3c04ee623
-
Filesize
491KB
MD55a9ec74b400fad80274046f247452431
SHA1dbbdb71369377a933f7b6c2ca2f19f7bd3d31bc2
SHA2563dce51e61590a39fc3d425cac6b5c9c93d784723e361a153234b40267b14068e
SHA51271fc8e2263865e6ce6edc73aa568b3a6a2e5a14fdfdacbac22744812754aeeb05814379f16c40c3ae8ae742e23dd4370ab0ec901f4e90f1b106d7bb3c04ee623
-
Filesize
860KB
MD5d246b1afb2a5c76f2eae23b442c3bc3b
SHA1e416b7f8408493764dc0bafd57250e22429b53cb
SHA2567703e786ef015879e3b0754338bfd1dcc0a0afc2f6a7b635ec63359861e46b3f
SHA51277b310de1d029003e083b42065ae8b4b0e8b0126f05d0bb3965dedc3794501585ddf0e0c49f462ab024f3ab13e2a9edd9b79e27b59475ffc4040e2bd1008dfb6
-
Filesize
860KB
MD5d246b1afb2a5c76f2eae23b442c3bc3b
SHA1e416b7f8408493764dc0bafd57250e22429b53cb
SHA2567703e786ef015879e3b0754338bfd1dcc0a0afc2f6a7b635ec63359861e46b3f
SHA51277b310de1d029003e083b42065ae8b4b0e8b0126f05d0bb3965dedc3794501585ddf0e0c49f462ab024f3ab13e2a9edd9b79e27b59475ffc4040e2bd1008dfb6
-
Filesize
1016KB
MD5d533b8835d9a70bc6ec63794da29bf16
SHA1d3d0c7298a211b95b0b7289ef5189afcb6083c09
SHA2563a807c74e411061012736218c088e956fa1978b0308f380ab6a7cbf983209956
SHA512012b943b6773c2b48d5843c79e23630d59fe82ef1be617ddbf60c8426336cab7a6bcb336b8d0012c2ad8a16fb2cc6e13e4d0f63c003d42c0d87f1e5068fdcbca
-
Filesize
1016KB
MD5d533b8835d9a70bc6ec63794da29bf16
SHA1d3d0c7298a211b95b0b7289ef5189afcb6083c09
SHA2563a807c74e411061012736218c088e956fa1978b0308f380ab6a7cbf983209956
SHA512012b943b6773c2b48d5843c79e23630d59fe82ef1be617ddbf60c8426336cab7a6bcb336b8d0012c2ad8a16fb2cc6e13e4d0f63c003d42c0d87f1e5068fdcbca
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0