Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:55
Static task
static1
Behavioral task
behavioral1
Sample
bbd91ed00978614f466d688e4273b51f2dd114007efa173efbac4f0815af074b.exe
Resource
win7-20230831-en
General
-
Target
bbd91ed00978614f466d688e4273b51f2dd114007efa173efbac4f0815af074b.exe
-
Size
1.3MB
-
MD5
e5718afb2cd01e3514a313b9e2b010b1
-
SHA1
9001788e4b0831b8e53c4a119414b39b0c60b17e
-
SHA256
bbd91ed00978614f466d688e4273b51f2dd114007efa173efbac4f0815af074b
-
SHA512
b89e541b0cb5ca6606c11dd3a91d60c0c33fa023bcdc703216313c3f09c7e38a4484cbe0f98885a93b2f9665fa23ec56bf35a03aa064bf58f71dbd02b7bbef11
-
SSDEEP
24576:uy2iLrvv3sC5GLC1uIFcKATRfMotz9tJHr0uLLvtgQ0:9Trv0CILC4IYfF/J53vr
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4608-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4608-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4608-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4608-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2360-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t0736642.exeexplonde.exeu1312017.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t0736642.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u1312017.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z8770348.exez9698223.exez4525521.exez0817273.exeq2705575.exer5290151.exes7019258.exet0736642.exeexplonde.exeu1312017.exelegota.exew9254926.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 3716 z8770348.exe 2724 z9698223.exe 4856 z4525521.exe 264 z0817273.exe 816 q2705575.exe 3136 r5290151.exe 2748 s7019258.exe 3776 t0736642.exe 1704 explonde.exe 5088 u1312017.exe 2628 legota.exe 3232 w9254926.exe 3904 explonde.exe 208 legota.exe 1460 explonde.exe 3780 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2572 rundll32.exe 4100 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z0817273.exebbd91ed00978614f466d688e4273b51f2dd114007efa173efbac4f0815af074b.exez8770348.exez9698223.exez4525521.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z0817273.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bbd91ed00978614f466d688e4273b51f2dd114007efa173efbac4f0815af074b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8770348.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9698223.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z4525521.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q2705575.exer5290151.exes7019258.exedescription pid process target process PID 816 set thread context of 2360 816 q2705575.exe AppLaunch.exe PID 3136 set thread context of 4608 3136 r5290151.exe AppLaunch.exe PID 2748 set thread context of 3356 2748 s7019258.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2180 816 WerFault.exe q2705575.exe 1156 3136 WerFault.exe r5290151.exe 4796 4608 WerFault.exe AppLaunch.exe 3848 2748 WerFault.exe s7019258.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2448 schtasks.exe 2880 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 2360 AppLaunch.exe 2360 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 2360 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bbd91ed00978614f466d688e4273b51f2dd114007efa173efbac4f0815af074b.exez8770348.exez9698223.exez4525521.exez0817273.exeq2705575.exer5290151.exes7019258.exet0736642.exeexplonde.exeu1312017.exedescription pid process target process PID 744 wrote to memory of 3716 744 bbd91ed00978614f466d688e4273b51f2dd114007efa173efbac4f0815af074b.exe z8770348.exe PID 744 wrote to memory of 3716 744 bbd91ed00978614f466d688e4273b51f2dd114007efa173efbac4f0815af074b.exe z8770348.exe PID 744 wrote to memory of 3716 744 bbd91ed00978614f466d688e4273b51f2dd114007efa173efbac4f0815af074b.exe z8770348.exe PID 3716 wrote to memory of 2724 3716 z8770348.exe z9698223.exe PID 3716 wrote to memory of 2724 3716 z8770348.exe z9698223.exe PID 3716 wrote to memory of 2724 3716 z8770348.exe z9698223.exe PID 2724 wrote to memory of 4856 2724 z9698223.exe z4525521.exe PID 2724 wrote to memory of 4856 2724 z9698223.exe z4525521.exe PID 2724 wrote to memory of 4856 2724 z9698223.exe z4525521.exe PID 4856 wrote to memory of 264 4856 z4525521.exe z0817273.exe PID 4856 wrote to memory of 264 4856 z4525521.exe z0817273.exe PID 4856 wrote to memory of 264 4856 z4525521.exe z0817273.exe PID 264 wrote to memory of 816 264 z0817273.exe q2705575.exe PID 264 wrote to memory of 816 264 z0817273.exe q2705575.exe PID 264 wrote to memory of 816 264 z0817273.exe q2705575.exe PID 816 wrote to memory of 2360 816 q2705575.exe AppLaunch.exe PID 816 wrote to memory of 2360 816 q2705575.exe AppLaunch.exe PID 816 wrote to memory of 2360 816 q2705575.exe AppLaunch.exe PID 816 wrote to memory of 2360 816 q2705575.exe AppLaunch.exe PID 816 wrote to memory of 2360 816 q2705575.exe AppLaunch.exe PID 816 wrote to memory of 2360 816 q2705575.exe AppLaunch.exe PID 816 wrote to memory of 2360 816 q2705575.exe AppLaunch.exe PID 816 wrote to memory of 2360 816 q2705575.exe AppLaunch.exe PID 264 wrote to memory of 3136 264 z0817273.exe r5290151.exe PID 264 wrote to memory of 3136 264 z0817273.exe r5290151.exe PID 264 wrote to memory of 3136 264 z0817273.exe r5290151.exe PID 3136 wrote to memory of 4608 3136 r5290151.exe AppLaunch.exe PID 3136 wrote to memory of 4608 3136 r5290151.exe AppLaunch.exe PID 3136 wrote to memory of 4608 3136 r5290151.exe AppLaunch.exe PID 3136 wrote to memory of 4608 3136 r5290151.exe AppLaunch.exe PID 3136 wrote to memory of 4608 3136 r5290151.exe AppLaunch.exe PID 3136 wrote to memory of 4608 3136 r5290151.exe AppLaunch.exe PID 3136 wrote to memory of 4608 3136 r5290151.exe AppLaunch.exe PID 3136 wrote to memory of 4608 3136 r5290151.exe AppLaunch.exe PID 3136 wrote to memory of 4608 3136 r5290151.exe AppLaunch.exe PID 3136 wrote to memory of 4608 3136 r5290151.exe AppLaunch.exe PID 4856 wrote to memory of 2748 4856 z4525521.exe s7019258.exe PID 4856 wrote to memory of 2748 4856 z4525521.exe s7019258.exe PID 4856 wrote to memory of 2748 4856 z4525521.exe s7019258.exe PID 2748 wrote to memory of 3356 2748 s7019258.exe AppLaunch.exe PID 2748 wrote to memory of 3356 2748 s7019258.exe AppLaunch.exe PID 2748 wrote to memory of 3356 2748 s7019258.exe AppLaunch.exe PID 2748 wrote to memory of 3356 2748 s7019258.exe AppLaunch.exe PID 2748 wrote to memory of 3356 2748 s7019258.exe AppLaunch.exe PID 2748 wrote to memory of 3356 2748 s7019258.exe AppLaunch.exe PID 2748 wrote to memory of 3356 2748 s7019258.exe AppLaunch.exe PID 2748 wrote to memory of 3356 2748 s7019258.exe AppLaunch.exe PID 2724 wrote to memory of 3776 2724 z9698223.exe t0736642.exe PID 2724 wrote to memory of 3776 2724 z9698223.exe t0736642.exe PID 2724 wrote to memory of 3776 2724 z9698223.exe t0736642.exe PID 3776 wrote to memory of 1704 3776 t0736642.exe explonde.exe PID 3776 wrote to memory of 1704 3776 t0736642.exe explonde.exe PID 3776 wrote to memory of 1704 3776 t0736642.exe explonde.exe PID 3716 wrote to memory of 5088 3716 z8770348.exe u1312017.exe PID 3716 wrote to memory of 5088 3716 z8770348.exe u1312017.exe PID 3716 wrote to memory of 5088 3716 z8770348.exe u1312017.exe PID 1704 wrote to memory of 2448 1704 explonde.exe schtasks.exe PID 1704 wrote to memory of 2448 1704 explonde.exe schtasks.exe PID 1704 wrote to memory of 2448 1704 explonde.exe schtasks.exe PID 1704 wrote to memory of 3360 1704 explonde.exe cmd.exe PID 1704 wrote to memory of 3360 1704 explonde.exe cmd.exe PID 1704 wrote to memory of 3360 1704 explonde.exe cmd.exe PID 5088 wrote to memory of 2628 5088 u1312017.exe legota.exe PID 5088 wrote to memory of 2628 5088 u1312017.exe legota.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbd91ed00978614f466d688e4273b51f2dd114007efa173efbac4f0815af074b.exe"C:\Users\Admin\AppData\Local\Temp\bbd91ed00978614f466d688e4273b51f2dd114007efa173efbac4f0815af074b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8770348.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8770348.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9698223.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9698223.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4525521.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4525521.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0817273.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0817273.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2705575.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2705575.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 5927⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5290151.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5290151.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 2008⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 1367⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7019258.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7019258.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 5926⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0736642.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0736642.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1312017.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1312017.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w9254926.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w9254926.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 816 -ip 8161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3136 -ip 31361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4608 -ip 46081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2748 -ip 27481⤵
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w9254926.exeFilesize
22KB
MD5695ee0ed247299ed204a5b98996f53d9
SHA1de51bc89d39f5b2867a6c4c9a622052edcfd1d44
SHA256017459e799e0c54f3aaa36da40679db9b948667e52323991671f9e0f9eb6e8fc
SHA512e4502c31ff99005ca34bcf1710ff76a67f6d05959d00102783392240101ad9db0197a65d89a4a421b960d27162604d3d6decc265e1a4bbc313fa57408428b820
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w9254926.exeFilesize
22KB
MD5695ee0ed247299ed204a5b98996f53d9
SHA1de51bc89d39f5b2867a6c4c9a622052edcfd1d44
SHA256017459e799e0c54f3aaa36da40679db9b948667e52323991671f9e0f9eb6e8fc
SHA512e4502c31ff99005ca34bcf1710ff76a67f6d05959d00102783392240101ad9db0197a65d89a4a421b960d27162604d3d6decc265e1a4bbc313fa57408428b820
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8770348.exeFilesize
1.2MB
MD582afe1f4f3c32d89e374f928fc14a410
SHA17e81b95b5fbbc56f3aa6d92e79fc4827249bae8a
SHA256c83dd7dd3cfe8942ac94f7b623068d3270ce94b6267ac0cecc24f27d5997a899
SHA5128883b8c8d3758a6e1f2218a0eba62fed8f17c2af06b625bc1c177988b4709bb89bfebbfb4fb4c8d5d0d78a7aae3bae5398e4f4138f164927cb68a59caf5ac7c7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8770348.exeFilesize
1.2MB
MD582afe1f4f3c32d89e374f928fc14a410
SHA17e81b95b5fbbc56f3aa6d92e79fc4827249bae8a
SHA256c83dd7dd3cfe8942ac94f7b623068d3270ce94b6267ac0cecc24f27d5997a899
SHA5128883b8c8d3758a6e1f2218a0eba62fed8f17c2af06b625bc1c177988b4709bb89bfebbfb4fb4c8d5d0d78a7aae3bae5398e4f4138f164927cb68a59caf5ac7c7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1312017.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1312017.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9698223.exeFilesize
1.0MB
MD579c668219081fcbbc74c7cbab3225c2c
SHA11ead5c0c08984f900ca2b3a43196eab139cf24d5
SHA25617967f5740c1c4fdac479b71d6a26796582ed03c2dc77b3b67ed94438591d035
SHA5124dd5e0fb7db27ea3bfc0170552161eebbea79a4dbe3ed0c07b9623684ee1f2cb987210b6e5e04d48f4d8d5d335b6dfe57560d8f7639d9a5325f53b50013f86d1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9698223.exeFilesize
1.0MB
MD579c668219081fcbbc74c7cbab3225c2c
SHA11ead5c0c08984f900ca2b3a43196eab139cf24d5
SHA25617967f5740c1c4fdac479b71d6a26796582ed03c2dc77b3b67ed94438591d035
SHA5124dd5e0fb7db27ea3bfc0170552161eebbea79a4dbe3ed0c07b9623684ee1f2cb987210b6e5e04d48f4d8d5d335b6dfe57560d8f7639d9a5325f53b50013f86d1
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0736642.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0736642.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4525521.exeFilesize
886KB
MD51a3ad35e6faa8a9c33ce9a16a9f3f820
SHA12f77f513cd9520a1ac36c791a0f67a1fbdca2254
SHA256800a8165e15ea23e33666bb94d3330677e2ceeea8140c2feda4837bc417d1002
SHA51252e656d9ceb844efeb2ccfb8b9dba4cfbbe679dcc4fdb15a1276027cbc1ece803cbfc1c425de2d1301df49fd5cfcc52e4d8691a7fc02575c9e3a75de28a1ce44
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4525521.exeFilesize
886KB
MD51a3ad35e6faa8a9c33ce9a16a9f3f820
SHA12f77f513cd9520a1ac36c791a0f67a1fbdca2254
SHA256800a8165e15ea23e33666bb94d3330677e2ceeea8140c2feda4837bc417d1002
SHA51252e656d9ceb844efeb2ccfb8b9dba4cfbbe679dcc4fdb15a1276027cbc1ece803cbfc1c425de2d1301df49fd5cfcc52e4d8691a7fc02575c9e3a75de28a1ce44
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7019258.exeFilesize
1.0MB
MD5bba4f23dfd4264cebc327b405d76f871
SHA18b27f31aff1e4f19b3accff2f6b28db55fdcf28f
SHA256e3321f70ac92429c8b878a1dca4f921201184dbbc1d65862ec69b1395e910c2b
SHA512b6d370f0524f8324b244a53c60fb089ba854baa1faa7a5c030d3fbd974680de43c131dc7899e3122e3d7aac6deb91ba03caeecccede00e3cacf4b076718b1173
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7019258.exeFilesize
1.0MB
MD5bba4f23dfd4264cebc327b405d76f871
SHA18b27f31aff1e4f19b3accff2f6b28db55fdcf28f
SHA256e3321f70ac92429c8b878a1dca4f921201184dbbc1d65862ec69b1395e910c2b
SHA512b6d370f0524f8324b244a53c60fb089ba854baa1faa7a5c030d3fbd974680de43c131dc7899e3122e3d7aac6deb91ba03caeecccede00e3cacf4b076718b1173
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0817273.exeFilesize
495KB
MD580846455d02a8e5ba45ef83ef6ec2d11
SHA1f8321444095a755b43510ebf936dc941f62fab9e
SHA2569d5b2b76725aa5b893d7ed4715485a1eeaa844c7ce694da9bd603552e6e33835
SHA512b4143a6f6dd685b761e07d55c01687ac83a2cbea84f3b92cd84b58ea9634a0caea6a616ceae060b229a80bee06b770dbc28b2f4862c0dd56e0663844468bde63
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0817273.exeFilesize
495KB
MD580846455d02a8e5ba45ef83ef6ec2d11
SHA1f8321444095a755b43510ebf936dc941f62fab9e
SHA2569d5b2b76725aa5b893d7ed4715485a1eeaa844c7ce694da9bd603552e6e33835
SHA512b4143a6f6dd685b761e07d55c01687ac83a2cbea84f3b92cd84b58ea9634a0caea6a616ceae060b229a80bee06b770dbc28b2f4862c0dd56e0663844468bde63
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2705575.exeFilesize
860KB
MD56a40431976f7315d2c78acd7b62dfc4f
SHA19fd5b08e97a8224624e932ed8bc35c31f8f93edf
SHA256813016fab33273bed84a4e6d00278166636544103ab1b1f7303405834e75ade1
SHA51261ee5ef4ba5aad08adcb26202d3ae196865473e5e11a57589458b4e45d6a0b284f6aad8c7751c3b8aa5ecaef9a679fdd381e4ee2c7bb40f8d4d5b92c3afd48df
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2705575.exeFilesize
860KB
MD56a40431976f7315d2c78acd7b62dfc4f
SHA19fd5b08e97a8224624e932ed8bc35c31f8f93edf
SHA256813016fab33273bed84a4e6d00278166636544103ab1b1f7303405834e75ade1
SHA51261ee5ef4ba5aad08adcb26202d3ae196865473e5e11a57589458b4e45d6a0b284f6aad8c7751c3b8aa5ecaef9a679fdd381e4ee2c7bb40f8d4d5b92c3afd48df
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5290151.exeFilesize
1016KB
MD521835842330cdbf1c3b7117b55c01fe7
SHA1a663613ee7d5584c145f56421213ae85018533a2
SHA2568d3c5fe5306016f503c8a915e5d4c819472691ad4731194421f505bb5a348910
SHA512dc0a7156cb2d852dda16fe1b2e2420efcdfbd977731f79a01ba4585f0d0a2a0e7f66b98b4bab63db4954f9d2671b0d307d4eda276b0c0a7e8e3e4a0f180fccfe
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5290151.exeFilesize
1016KB
MD521835842330cdbf1c3b7117b55c01fe7
SHA1a663613ee7d5584c145f56421213ae85018533a2
SHA2568d3c5fe5306016f503c8a915e5d4c819472691ad4731194421f505bb5a348910
SHA512dc0a7156cb2d852dda16fe1b2e2420efcdfbd977731f79a01ba4585f0d0a2a0e7f66b98b4bab63db4954f9d2671b0d307d4eda276b0c0a7e8e3e4a0f180fccfe
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0
-
memory/2360-35-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2360-62-0x0000000073CC0000-0x0000000074470000-memory.dmpFilesize
7.7MB
-
memory/2360-36-0x0000000073CC0000-0x0000000074470000-memory.dmpFilesize
7.7MB
-
memory/2360-86-0x0000000073CC0000-0x0000000074470000-memory.dmpFilesize
7.7MB
-
memory/3356-58-0x0000000005330000-0x0000000005342000-memory.dmpFilesize
72KB
-
memory/3356-87-0x0000000073CC0000-0x0000000074470000-memory.dmpFilesize
7.7MB
-
memory/3356-88-0x00000000050E0000-0x00000000050F0000-memory.dmpFilesize
64KB
-
memory/3356-69-0x0000000005510000-0x000000000555C000-memory.dmpFilesize
304KB
-
memory/3356-65-0x0000000005390000-0x00000000053CC000-memory.dmpFilesize
240KB
-
memory/3356-59-0x00000000050E0000-0x00000000050F0000-memory.dmpFilesize
64KB
-
memory/3356-57-0x0000000005400000-0x000000000550A000-memory.dmpFilesize
1.0MB
-
memory/3356-56-0x0000000005910000-0x0000000005F28000-memory.dmpFilesize
6.1MB
-
memory/3356-50-0x0000000005050000-0x0000000005056000-memory.dmpFilesize
24KB
-
memory/3356-49-0x0000000073CC0000-0x0000000074470000-memory.dmpFilesize
7.7MB
-
memory/3356-48-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4608-44-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4608-42-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4608-41-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4608-40-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB