Analysis
-
max time kernel
153s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:56
Static task
static1
Behavioral task
behavioral1
Sample
7dd98ce2c3c0f59c63cbeb4ac70f4c7755406d6c2c3660fea507e590db4c18dd.exe
Resource
win7-20230831-en
General
-
Target
7dd98ce2c3c0f59c63cbeb4ac70f4c7755406d6c2c3660fea507e590db4c18dd.exe
-
Size
1.3MB
-
MD5
7b22b3b878b9caa16b238442b908fad3
-
SHA1
e4463785647f8dae10a795be908b2a9334b8761b
-
SHA256
7dd98ce2c3c0f59c63cbeb4ac70f4c7755406d6c2c3660fea507e590db4c18dd
-
SHA512
fdd8da9fe617eee221f402efb6db45c9c10d00d3cc715f6e6bc49bf49becabf1311c5bd0b0a2187945936afca559ef9c8a5281e25f095f897fbc55dcde30c811
-
SSDEEP
24576:vy80m7As8ssIbJoAdqYQQI8TJNrlBT6CjpZbIctD4TyHdKHtlKhJg9xJhuOAgu:6GdfbOAAYLJNJBrjQctDayHdAEY9vLA
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2224-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2224-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2224-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2224-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1012-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t1933016.exeexplonde.exeu1776216.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation t1933016.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation u1776216.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z6402576.exez8624644.exez0545805.exez7431062.exeq6806581.exer5417574.exes8028463.exet1933016.exeexplonde.exeu1776216.exelegota.exew2910908.exelegota.exeexplonde.exelegota.exeexplonde.exepid process 3736 z6402576.exe 3536 z8624644.exe 1308 z0545805.exe 2284 z7431062.exe 4012 q6806581.exe 1244 r5417574.exe 2428 s8028463.exe 1968 t1933016.exe 3052 explonde.exe 4692 u1776216.exe 4712 legota.exe 4108 w2910908.exe 1708 legota.exe 5052 explonde.exe 5076 legota.exe 1644 explonde.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2216 rundll32.exe 548 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
7dd98ce2c3c0f59c63cbeb4ac70f4c7755406d6c2c3660fea507e590db4c18dd.exez6402576.exez8624644.exez0545805.exez7431062.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7dd98ce2c3c0f59c63cbeb4ac70f4c7755406d6c2c3660fea507e590db4c18dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6402576.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8624644.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z0545805.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z7431062.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q6806581.exer5417574.exes8028463.exedescription pid process target process PID 4012 set thread context of 1012 4012 q6806581.exe AppLaunch.exe PID 1244 set thread context of 2224 1244 r5417574.exe AppLaunch.exe PID 2428 set thread context of 4388 2428 s8028463.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2036 4012 WerFault.exe q6806581.exe 1648 1244 WerFault.exe r5417574.exe 2244 2224 WerFault.exe AppLaunch.exe 796 2428 WerFault.exe s8028463.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2796 schtasks.exe 3372 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1012 AppLaunch.exe 1012 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1012 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7dd98ce2c3c0f59c63cbeb4ac70f4c7755406d6c2c3660fea507e590db4c18dd.exez6402576.exez8624644.exez0545805.exez7431062.exeq6806581.exer5417574.exes8028463.exet1933016.exeexplonde.exeu1776216.exedescription pid process target process PID 1328 wrote to memory of 3736 1328 7dd98ce2c3c0f59c63cbeb4ac70f4c7755406d6c2c3660fea507e590db4c18dd.exe z6402576.exe PID 1328 wrote to memory of 3736 1328 7dd98ce2c3c0f59c63cbeb4ac70f4c7755406d6c2c3660fea507e590db4c18dd.exe z6402576.exe PID 1328 wrote to memory of 3736 1328 7dd98ce2c3c0f59c63cbeb4ac70f4c7755406d6c2c3660fea507e590db4c18dd.exe z6402576.exe PID 3736 wrote to memory of 3536 3736 z6402576.exe z8624644.exe PID 3736 wrote to memory of 3536 3736 z6402576.exe z8624644.exe PID 3736 wrote to memory of 3536 3736 z6402576.exe z8624644.exe PID 3536 wrote to memory of 1308 3536 z8624644.exe z0545805.exe PID 3536 wrote to memory of 1308 3536 z8624644.exe z0545805.exe PID 3536 wrote to memory of 1308 3536 z8624644.exe z0545805.exe PID 1308 wrote to memory of 2284 1308 z0545805.exe z7431062.exe PID 1308 wrote to memory of 2284 1308 z0545805.exe z7431062.exe PID 1308 wrote to memory of 2284 1308 z0545805.exe z7431062.exe PID 2284 wrote to memory of 4012 2284 z7431062.exe q6806581.exe PID 2284 wrote to memory of 4012 2284 z7431062.exe q6806581.exe PID 2284 wrote to memory of 4012 2284 z7431062.exe q6806581.exe PID 4012 wrote to memory of 1012 4012 q6806581.exe AppLaunch.exe PID 4012 wrote to memory of 1012 4012 q6806581.exe AppLaunch.exe PID 4012 wrote to memory of 1012 4012 q6806581.exe AppLaunch.exe PID 4012 wrote to memory of 1012 4012 q6806581.exe AppLaunch.exe PID 4012 wrote to memory of 1012 4012 q6806581.exe AppLaunch.exe PID 4012 wrote to memory of 1012 4012 q6806581.exe AppLaunch.exe PID 4012 wrote to memory of 1012 4012 q6806581.exe AppLaunch.exe PID 4012 wrote to memory of 1012 4012 q6806581.exe AppLaunch.exe PID 2284 wrote to memory of 1244 2284 z7431062.exe r5417574.exe PID 2284 wrote to memory of 1244 2284 z7431062.exe r5417574.exe PID 2284 wrote to memory of 1244 2284 z7431062.exe r5417574.exe PID 1244 wrote to memory of 2224 1244 r5417574.exe AppLaunch.exe PID 1244 wrote to memory of 2224 1244 r5417574.exe AppLaunch.exe PID 1244 wrote to memory of 2224 1244 r5417574.exe AppLaunch.exe PID 1244 wrote to memory of 2224 1244 r5417574.exe AppLaunch.exe PID 1244 wrote to memory of 2224 1244 r5417574.exe AppLaunch.exe PID 1244 wrote to memory of 2224 1244 r5417574.exe AppLaunch.exe PID 1244 wrote to memory of 2224 1244 r5417574.exe AppLaunch.exe PID 1244 wrote to memory of 2224 1244 r5417574.exe AppLaunch.exe PID 1244 wrote to memory of 2224 1244 r5417574.exe AppLaunch.exe PID 1244 wrote to memory of 2224 1244 r5417574.exe AppLaunch.exe PID 1308 wrote to memory of 2428 1308 z0545805.exe s8028463.exe PID 1308 wrote to memory of 2428 1308 z0545805.exe s8028463.exe PID 1308 wrote to memory of 2428 1308 z0545805.exe s8028463.exe PID 2428 wrote to memory of 4388 2428 s8028463.exe AppLaunch.exe PID 2428 wrote to memory of 4388 2428 s8028463.exe AppLaunch.exe PID 2428 wrote to memory of 4388 2428 s8028463.exe AppLaunch.exe PID 2428 wrote to memory of 4388 2428 s8028463.exe AppLaunch.exe PID 2428 wrote to memory of 4388 2428 s8028463.exe AppLaunch.exe PID 2428 wrote to memory of 4388 2428 s8028463.exe AppLaunch.exe PID 2428 wrote to memory of 4388 2428 s8028463.exe AppLaunch.exe PID 2428 wrote to memory of 4388 2428 s8028463.exe AppLaunch.exe PID 3536 wrote to memory of 1968 3536 z8624644.exe t1933016.exe PID 3536 wrote to memory of 1968 3536 z8624644.exe t1933016.exe PID 3536 wrote to memory of 1968 3536 z8624644.exe t1933016.exe PID 1968 wrote to memory of 3052 1968 t1933016.exe explonde.exe PID 1968 wrote to memory of 3052 1968 t1933016.exe explonde.exe PID 1968 wrote to memory of 3052 1968 t1933016.exe explonde.exe PID 3052 wrote to memory of 2796 3052 explonde.exe schtasks.exe PID 3052 wrote to memory of 2796 3052 explonde.exe schtasks.exe PID 3052 wrote to memory of 2796 3052 explonde.exe schtasks.exe PID 3736 wrote to memory of 4692 3736 z6402576.exe u1776216.exe PID 3736 wrote to memory of 4692 3736 z6402576.exe u1776216.exe PID 3736 wrote to memory of 4692 3736 z6402576.exe u1776216.exe PID 4692 wrote to memory of 4712 4692 u1776216.exe legota.exe PID 4692 wrote to memory of 4712 4692 u1776216.exe legota.exe PID 4692 wrote to memory of 4712 4692 u1776216.exe legota.exe PID 3052 wrote to memory of 2632 3052 explonde.exe cmd.exe PID 3052 wrote to memory of 2632 3052 explonde.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dd98ce2c3c0f59c63cbeb4ac70f4c7755406d6c2c3660fea507e590db4c18dd.exe"C:\Users\Admin\AppData\Local\Temp\7dd98ce2c3c0f59c63cbeb4ac70f4c7755406d6c2c3660fea507e590db4c18dd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6402576.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6402576.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8624644.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8624644.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0545805.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0545805.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7431062.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7431062.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6806581.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6806581.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 1527⤵
- Program crash
PID:2036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5417574.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5417574.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 2048⤵
- Program crash
PID:2244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 1527⤵
- Program crash
PID:1648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8028463.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8028463.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 1486⤵
- Program crash
PID:796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1933016.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1933016.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:2796
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:2632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:4024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:2768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:1152
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1776216.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1776216.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4712 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1540
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:2988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3740
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4192
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4720
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:548
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2910908.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2910908.exe2⤵
- Executes dropped EXE
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4012 -ip 40121⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1244 -ip 12441⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2224 -ip 22241⤵PID:4740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2428 -ip 24281⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1708
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:5052
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:5076
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1644
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD561a91150515d242e3b49c79387d26eb2
SHA1acdec90ff70631c17a0706a63d804856ce0580c7
SHA2563b5aad6513c7e566bb9e9a836cf0476bda1cb5dd8f8773e4486da79495a12275
SHA51281d80dffef3847f4ff80f11fc2fff3386e41897854d7f09bf675888198958425c731d7d109ec91896b6733d9b806a2938ab9f52c26896489b7e3aabb4acb463c
-
Filesize
22KB
MD561a91150515d242e3b49c79387d26eb2
SHA1acdec90ff70631c17a0706a63d804856ce0580c7
SHA2563b5aad6513c7e566bb9e9a836cf0476bda1cb5dd8f8773e4486da79495a12275
SHA51281d80dffef3847f4ff80f11fc2fff3386e41897854d7f09bf675888198958425c731d7d109ec91896b6733d9b806a2938ab9f52c26896489b7e3aabb4acb463c
-
Filesize
1.2MB
MD5a2cbf965acfedd6d47df78f9ef42e10b
SHA1a3adfadd2a94335767e860c44fa46dd33a808682
SHA25696901dd920f6e0bb82c73dea73e0102c10f4b3635ecd165c71fa7d1ecc8aa7b3
SHA51204e8f87afd5159b9b4faadd42c7104c86572a5dd8612baac717639c919fa9ef401b171a8517667d8cbe0601f1ce3d4fd289c4a9eda3733e30e2e7096e0659914
-
Filesize
1.2MB
MD5a2cbf965acfedd6d47df78f9ef42e10b
SHA1a3adfadd2a94335767e860c44fa46dd33a808682
SHA25696901dd920f6e0bb82c73dea73e0102c10f4b3635ecd165c71fa7d1ecc8aa7b3
SHA51204e8f87afd5159b9b4faadd42c7104c86572a5dd8612baac717639c919fa9ef401b171a8517667d8cbe0601f1ce3d4fd289c4a9eda3733e30e2e7096e0659914
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
1.0MB
MD5ce11d50ae301285ae062f171369445bd
SHA1f9b86809b778c87748794d07fc6422c9002cb31d
SHA256aee48655817aa6f59c6ccec09dba4078eed85e69dba2018dc1002aa6082a6ca4
SHA512d459be11a3e9adbfea5e0cc5bbb903deb6dd9d680916baa4ccd1b385df9de053b7b27583e0043ae00045f478a9c2bfa2d75e477c2dc6e37ad75b3340f2b8a5ba
-
Filesize
1.0MB
MD5ce11d50ae301285ae062f171369445bd
SHA1f9b86809b778c87748794d07fc6422c9002cb31d
SHA256aee48655817aa6f59c6ccec09dba4078eed85e69dba2018dc1002aa6082a6ca4
SHA512d459be11a3e9adbfea5e0cc5bbb903deb6dd9d680916baa4ccd1b385df9de053b7b27583e0043ae00045f478a9c2bfa2d75e477c2dc6e37ad75b3340f2b8a5ba
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
884KB
MD593a1997f98670f0241573403afcd1ccd
SHA198348a39672b87625ed1f8e641a3a7c887fdb220
SHA256817a3551594bf4387827cdb5bb310c1933ce31e22bc2b47f82202b769f87cc4b
SHA512a8e8c5e70296b8b1bff0f1b580b4a273d691d14169466f1501a0f1c66af8a39f34d199e874865bc7892b78d0728fa2b9e6f6bcc0b139d2ec54ec7e6a77d2e2fc
-
Filesize
884KB
MD593a1997f98670f0241573403afcd1ccd
SHA198348a39672b87625ed1f8e641a3a7c887fdb220
SHA256817a3551594bf4387827cdb5bb310c1933ce31e22bc2b47f82202b769f87cc4b
SHA512a8e8c5e70296b8b1bff0f1b580b4a273d691d14169466f1501a0f1c66af8a39f34d199e874865bc7892b78d0728fa2b9e6f6bcc0b139d2ec54ec7e6a77d2e2fc
-
Filesize
1.0MB
MD59c94fb042717b6ba6dc1632c8d287f66
SHA1caf3d2f52c45b59291565f5f2683263cc27a7b93
SHA25658a08a40b43de56db73e2677a32d91810641e9344c684b5932b46f5e4016774c
SHA512ba559b60df6bcd214b2d9fe5b8a6857cecd229cb0a5a287854102713b6026f0175f33e936ff7907876036aad26b558df388e4dae31cc67719f7735d740979090
-
Filesize
1.0MB
MD59c94fb042717b6ba6dc1632c8d287f66
SHA1caf3d2f52c45b59291565f5f2683263cc27a7b93
SHA25658a08a40b43de56db73e2677a32d91810641e9344c684b5932b46f5e4016774c
SHA512ba559b60df6bcd214b2d9fe5b8a6857cecd229cb0a5a287854102713b6026f0175f33e936ff7907876036aad26b558df388e4dae31cc67719f7735d740979090
-
Filesize
493KB
MD5e1b9ca919aa348b6cd3345fe5e666403
SHA1064bc343a2bdec532a98d435df91e8d757ff5c1c
SHA256bdb17cdba729f80aa443c8d69da8ae564a7981009019a56aa1ae0991a220e4d4
SHA512b5ef6188844adc9a8757f0e5a03c19bd76d85679f21e5a1c5ffdb532d91d74f99eca20280d2f716fdb9db7ac2ee68250a7b02e738b7f75764dd14b391b0fef63
-
Filesize
493KB
MD5e1b9ca919aa348b6cd3345fe5e666403
SHA1064bc343a2bdec532a98d435df91e8d757ff5c1c
SHA256bdb17cdba729f80aa443c8d69da8ae564a7981009019a56aa1ae0991a220e4d4
SHA512b5ef6188844adc9a8757f0e5a03c19bd76d85679f21e5a1c5ffdb532d91d74f99eca20280d2f716fdb9db7ac2ee68250a7b02e738b7f75764dd14b391b0fef63
-
Filesize
860KB
MD51b9b6336075af13a2999ac26531943d7
SHA1ed2add4cb64cfd55a2ac0b8bceffe680931e37c9
SHA256ae3887deb1d778885673d5832fe83dd78ef97a095c94b7b27a37a9bc1481b139
SHA512c968604a49ffbd4d8ed27f0c2b5f13c5219eec5eb517163afb59628f74c75f2b2062e6de876630f9d7b21876cc2dccc982d3d58b8c94836fb592548dd074b1ad
-
Filesize
860KB
MD51b9b6336075af13a2999ac26531943d7
SHA1ed2add4cb64cfd55a2ac0b8bceffe680931e37c9
SHA256ae3887deb1d778885673d5832fe83dd78ef97a095c94b7b27a37a9bc1481b139
SHA512c968604a49ffbd4d8ed27f0c2b5f13c5219eec5eb517163afb59628f74c75f2b2062e6de876630f9d7b21876cc2dccc982d3d58b8c94836fb592548dd074b1ad
-
Filesize
1016KB
MD5188ec0ad5392d49ce14e2d07a7fa90d8
SHA13fa1886ea7bd2d0bd8ee9d6819ec4753dd83ea79
SHA25656b5dfc16cb14c65730af1a366cf92925c3356a0a76a67bc43e0bf929c6846d5
SHA51202c73b94009af8c195498da7b3594c68c7543cca7bf7d4d0256ae0fc42ac06529f0ee030452628c7680a6f7c0ca6eee0ffdf5917deea7bcc8d2f47baf9c06c09
-
Filesize
1016KB
MD5188ec0ad5392d49ce14e2d07a7fa90d8
SHA13fa1886ea7bd2d0bd8ee9d6819ec4753dd83ea79
SHA25656b5dfc16cb14c65730af1a366cf92925c3356a0a76a67bc43e0bf929c6846d5
SHA51202c73b94009af8c195498da7b3594c68c7543cca7bf7d4d0256ae0fc42ac06529f0ee030452628c7680a6f7c0ca6eee0ffdf5917deea7bcc8d2f47baf9c06c09
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0