Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 06:57
Static task
static1
Behavioral task
behavioral1
Sample
ce40d94599ac5d107c7307394926c3ba40229426b355943fc36b627f535d0612.exe
Resource
win7-20230831-en
General
-
Target
ce40d94599ac5d107c7307394926c3ba40229426b355943fc36b627f535d0612.exe
-
Size
1.3MB
-
MD5
0a7ebf60fb5ff5461dfb3cd9db9ff0b7
-
SHA1
c4b558e18b9b3c22051020e67b5956bbea5dc63b
-
SHA256
ce40d94599ac5d107c7307394926c3ba40229426b355943fc36b627f535d0612
-
SHA512
bd4fa654caec95ab7b2a4cc107b7cf25ff07bed3ea9b136ffb85050c829f9bdc26a6f4cd95418ffa1889564ee6ee12ec63efbf3b996720438510f3915747c292
-
SSDEEP
24576:XyzlhzBVhabCQ0ySll5IvC9y12hEg0wpnmpCJHEecYtb3725JITNze:i3zBni9Sz5IvUhE7wpECJ/9ab8Nz
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4496-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4496-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4496-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4496-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1208-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t1679174.exeexplonde.exeu6653940.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t1679174.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u6653940.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z2019760.exez9576804.exez9963970.exez3703839.exeq1627864.exer0955917.exes7295657.exet1679174.exeexplonde.exeu6653940.exelegota.exew6299467.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 3780 z2019760.exe 1632 z9576804.exe 2852 z9963970.exe 1652 z3703839.exe 3360 q1627864.exe 3424 r0955917.exe 504 s7295657.exe 4712 t1679174.exe 3992 explonde.exe 740 u6653940.exe 4364 legota.exe 1776 w6299467.exe 940 explonde.exe 3856 legota.exe 5068 explonde.exe 2764 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1580 rundll32.exe 3644 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
ce40d94599ac5d107c7307394926c3ba40229426b355943fc36b627f535d0612.exez2019760.exez9576804.exez9963970.exez3703839.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce40d94599ac5d107c7307394926c3ba40229426b355943fc36b627f535d0612.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2019760.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9576804.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z9963970.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z3703839.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q1627864.exer0955917.exes7295657.exedescription pid process target process PID 3360 set thread context of 1208 3360 q1627864.exe AppLaunch.exe PID 3424 set thread context of 4496 3424 r0955917.exe AppLaunch.exe PID 504 set thread context of 4424 504 s7295657.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4784 3360 WerFault.exe q1627864.exe 2904 3424 WerFault.exe r0955917.exe 5024 4496 WerFault.exe AppLaunch.exe 3336 504 WerFault.exe s7295657.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1456 schtasks.exe 3084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1208 AppLaunch.exe 1208 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1208 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ce40d94599ac5d107c7307394926c3ba40229426b355943fc36b627f535d0612.exez2019760.exez9576804.exez9963970.exez3703839.exeq1627864.exer0955917.exes7295657.exet1679174.exeexplonde.exeu6653940.exedescription pid process target process PID 4988 wrote to memory of 3780 4988 ce40d94599ac5d107c7307394926c3ba40229426b355943fc36b627f535d0612.exe z2019760.exe PID 4988 wrote to memory of 3780 4988 ce40d94599ac5d107c7307394926c3ba40229426b355943fc36b627f535d0612.exe z2019760.exe PID 4988 wrote to memory of 3780 4988 ce40d94599ac5d107c7307394926c3ba40229426b355943fc36b627f535d0612.exe z2019760.exe PID 3780 wrote to memory of 1632 3780 z2019760.exe z9576804.exe PID 3780 wrote to memory of 1632 3780 z2019760.exe z9576804.exe PID 3780 wrote to memory of 1632 3780 z2019760.exe z9576804.exe PID 1632 wrote to memory of 2852 1632 z9576804.exe z9963970.exe PID 1632 wrote to memory of 2852 1632 z9576804.exe z9963970.exe PID 1632 wrote to memory of 2852 1632 z9576804.exe z9963970.exe PID 2852 wrote to memory of 1652 2852 z9963970.exe z3703839.exe PID 2852 wrote to memory of 1652 2852 z9963970.exe z3703839.exe PID 2852 wrote to memory of 1652 2852 z9963970.exe z3703839.exe PID 1652 wrote to memory of 3360 1652 z3703839.exe q1627864.exe PID 1652 wrote to memory of 3360 1652 z3703839.exe q1627864.exe PID 1652 wrote to memory of 3360 1652 z3703839.exe q1627864.exe PID 3360 wrote to memory of 1208 3360 q1627864.exe AppLaunch.exe PID 3360 wrote to memory of 1208 3360 q1627864.exe AppLaunch.exe PID 3360 wrote to memory of 1208 3360 q1627864.exe AppLaunch.exe PID 3360 wrote to memory of 1208 3360 q1627864.exe AppLaunch.exe PID 3360 wrote to memory of 1208 3360 q1627864.exe AppLaunch.exe PID 3360 wrote to memory of 1208 3360 q1627864.exe AppLaunch.exe PID 3360 wrote to memory of 1208 3360 q1627864.exe AppLaunch.exe PID 3360 wrote to memory of 1208 3360 q1627864.exe AppLaunch.exe PID 1652 wrote to memory of 3424 1652 z3703839.exe r0955917.exe PID 1652 wrote to memory of 3424 1652 z3703839.exe r0955917.exe PID 1652 wrote to memory of 3424 1652 z3703839.exe r0955917.exe PID 3424 wrote to memory of 4496 3424 r0955917.exe AppLaunch.exe PID 3424 wrote to memory of 4496 3424 r0955917.exe AppLaunch.exe PID 3424 wrote to memory of 4496 3424 r0955917.exe AppLaunch.exe PID 3424 wrote to memory of 4496 3424 r0955917.exe AppLaunch.exe PID 3424 wrote to memory of 4496 3424 r0955917.exe AppLaunch.exe PID 3424 wrote to memory of 4496 3424 r0955917.exe AppLaunch.exe PID 3424 wrote to memory of 4496 3424 r0955917.exe AppLaunch.exe PID 3424 wrote to memory of 4496 3424 r0955917.exe AppLaunch.exe PID 3424 wrote to memory of 4496 3424 r0955917.exe AppLaunch.exe PID 3424 wrote to memory of 4496 3424 r0955917.exe AppLaunch.exe PID 2852 wrote to memory of 504 2852 z9963970.exe s7295657.exe PID 2852 wrote to memory of 504 2852 z9963970.exe s7295657.exe PID 2852 wrote to memory of 504 2852 z9963970.exe s7295657.exe PID 504 wrote to memory of 4424 504 s7295657.exe AppLaunch.exe PID 504 wrote to memory of 4424 504 s7295657.exe AppLaunch.exe PID 504 wrote to memory of 4424 504 s7295657.exe AppLaunch.exe PID 504 wrote to memory of 4424 504 s7295657.exe AppLaunch.exe PID 504 wrote to memory of 4424 504 s7295657.exe AppLaunch.exe PID 504 wrote to memory of 4424 504 s7295657.exe AppLaunch.exe PID 504 wrote to memory of 4424 504 s7295657.exe AppLaunch.exe PID 504 wrote to memory of 4424 504 s7295657.exe AppLaunch.exe PID 1632 wrote to memory of 4712 1632 z9576804.exe t1679174.exe PID 1632 wrote to memory of 4712 1632 z9576804.exe t1679174.exe PID 1632 wrote to memory of 4712 1632 z9576804.exe t1679174.exe PID 4712 wrote to memory of 3992 4712 t1679174.exe explonde.exe PID 4712 wrote to memory of 3992 4712 t1679174.exe explonde.exe PID 4712 wrote to memory of 3992 4712 t1679174.exe explonde.exe PID 3780 wrote to memory of 740 3780 z2019760.exe u6653940.exe PID 3780 wrote to memory of 740 3780 z2019760.exe u6653940.exe PID 3780 wrote to memory of 740 3780 z2019760.exe u6653940.exe PID 3992 wrote to memory of 1456 3992 explonde.exe schtasks.exe PID 3992 wrote to memory of 1456 3992 explonde.exe schtasks.exe PID 3992 wrote to memory of 1456 3992 explonde.exe schtasks.exe PID 3992 wrote to memory of 2016 3992 explonde.exe cmd.exe PID 3992 wrote to memory of 2016 3992 explonde.exe cmd.exe PID 3992 wrote to memory of 2016 3992 explonde.exe cmd.exe PID 740 wrote to memory of 4364 740 u6653940.exe legota.exe PID 740 wrote to memory of 4364 740 u6653940.exe legota.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce40d94599ac5d107c7307394926c3ba40229426b355943fc36b627f535d0612.exe"C:\Users\Admin\AppData\Local\Temp\ce40d94599ac5d107c7307394926c3ba40229426b355943fc36b627f535d0612.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2019760.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2019760.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9576804.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9576804.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9963970.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9963970.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3703839.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3703839.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1627864.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1627864.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 5927⤵
- Program crash
PID:4784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0955917.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0955917.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 5488⤵
- Program crash
PID:5024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 1527⤵
- Program crash
PID:2904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7295657.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7295657.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 504 -s 1486⤵
- Program crash
PID:3336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1679174.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1679174.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:1456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:2016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1368
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:3332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:3948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:1952
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4872
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1580
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6653940.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6653940.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4364 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3084
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:1740
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4780
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:1196
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:2116
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3644
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6299467.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6299467.exe2⤵
- Executes dropped EXE
PID:1776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3360 -ip 33601⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3424 -ip 34241⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4496 -ip 44961⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 504 -ip 5041⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:940
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3856
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:5068
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2764
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD52ddb118c4953d854b71bfe33bdbd7c07
SHA11b14ee2d4704cc76ccc299cea045f68407f3ec5f
SHA256469011deb906aaff4124130457748524c2b1d6ae977d6d38ed421538bd19b742
SHA51256996a3af64957b994a43eea5270e412dd09f9c9063ca80239c6e28691e0c1aaea239190f4e89386d6d968abd3ea2e2f7bcbf414414b608b0f375ea24c7cfffa
-
Filesize
22KB
MD52ddb118c4953d854b71bfe33bdbd7c07
SHA11b14ee2d4704cc76ccc299cea045f68407f3ec5f
SHA256469011deb906aaff4124130457748524c2b1d6ae977d6d38ed421538bd19b742
SHA51256996a3af64957b994a43eea5270e412dd09f9c9063ca80239c6e28691e0c1aaea239190f4e89386d6d968abd3ea2e2f7bcbf414414b608b0f375ea24c7cfffa
-
Filesize
1.2MB
MD5d175432b92657b05ddbc660077a3fac1
SHA1e9e03b8adc142532058577a2c1885918d8e9d8d6
SHA256cc6f16102552285cc2d9887a23801d8084c4411aabf568918386ecf781e4e90d
SHA512efc8318c34c547cf1f73a5ad0428a51b16f38e0667bcab5bcc0ef06a52ee66bceb8c7584c9bb17cd87d80274ab5072232f0e629e7bb5f378053caa19b3474370
-
Filesize
1.2MB
MD5d175432b92657b05ddbc660077a3fac1
SHA1e9e03b8adc142532058577a2c1885918d8e9d8d6
SHA256cc6f16102552285cc2d9887a23801d8084c4411aabf568918386ecf781e4e90d
SHA512efc8318c34c547cf1f73a5ad0428a51b16f38e0667bcab5bcc0ef06a52ee66bceb8c7584c9bb17cd87d80274ab5072232f0e629e7bb5f378053caa19b3474370
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
1.0MB
MD50c6467777e2abdd618ab3072b0ede450
SHA1790a4ebf1c75388181b0ae1a7bcf4f83bb65daa1
SHA256f092a50378d8f606f7fc8c47de1275e2732d24c06228d684c8ea51fddb81ebcf
SHA5129798788090f22f5fc55862d61ba63841a1cf6f2a52af713496cf03956853e732194d578a4225dc4cb1f0ec2c52ed66a39465f4a76f6be93251f071c5bad75983
-
Filesize
1.0MB
MD50c6467777e2abdd618ab3072b0ede450
SHA1790a4ebf1c75388181b0ae1a7bcf4f83bb65daa1
SHA256f092a50378d8f606f7fc8c47de1275e2732d24c06228d684c8ea51fddb81ebcf
SHA5129798788090f22f5fc55862d61ba63841a1cf6f2a52af713496cf03956853e732194d578a4225dc4cb1f0ec2c52ed66a39465f4a76f6be93251f071c5bad75983
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
880KB
MD560b7d8aac0bf7141cae3981458d0e77a
SHA16d901ad4fc5c4c5568bad8d93c3d4953b431a674
SHA2567fdb994b3c0a23789fb7ff7020fd32ae23a63946e1075e1248017724846de8bd
SHA5129e54536f09156e666416bc81ecafa1b5fe42f807ce35fc7d32ab00ac16a278c3a824f9a66a625d495c37a2c45b7a7d640c3af647544acc57d378b5220dbc7cbf
-
Filesize
880KB
MD560b7d8aac0bf7141cae3981458d0e77a
SHA16d901ad4fc5c4c5568bad8d93c3d4953b431a674
SHA2567fdb994b3c0a23789fb7ff7020fd32ae23a63946e1075e1248017724846de8bd
SHA5129e54536f09156e666416bc81ecafa1b5fe42f807ce35fc7d32ab00ac16a278c3a824f9a66a625d495c37a2c45b7a7d640c3af647544acc57d378b5220dbc7cbf
-
Filesize
1.0MB
MD58d4438e77ff2f3a523c0c00549b9954d
SHA1c8a3b051b2f72f96da992fefd12aa46efea09f51
SHA25647093d2c8758a792d3eef812729f3fa34a19c949aadafdbcc5813572137ae234
SHA512b579a20a9a3480b3439b21e5bae28715d4f87208e579cd9910b23a982b07621195aae92b269da0598ba1a8488fb7d7db2f69223888caabf1873f6fc1715eb3fe
-
Filesize
1.0MB
MD58d4438e77ff2f3a523c0c00549b9954d
SHA1c8a3b051b2f72f96da992fefd12aa46efea09f51
SHA25647093d2c8758a792d3eef812729f3fa34a19c949aadafdbcc5813572137ae234
SHA512b579a20a9a3480b3439b21e5bae28715d4f87208e579cd9910b23a982b07621195aae92b269da0598ba1a8488fb7d7db2f69223888caabf1873f6fc1715eb3fe
-
Filesize
490KB
MD5d8940c0cdb4f5cd48c8af24ffbe3a658
SHA16a849a210aecc956cb48b6d712bdae287ec18155
SHA25689cba7e8ab0e5125b5d78bb4f758b9946ed749bf888961e3e7af469ccb7f0258
SHA512ba5c6e49d3798d88085c5bb4b072ed77b37ce9670e7f3b86e1e2e3e04cdd22f5af5f0da224e3c3b7741523a1ba5bd3793b6f4a0d71664637b9392f792ecdf647
-
Filesize
490KB
MD5d8940c0cdb4f5cd48c8af24ffbe3a658
SHA16a849a210aecc956cb48b6d712bdae287ec18155
SHA25689cba7e8ab0e5125b5d78bb4f758b9946ed749bf888961e3e7af469ccb7f0258
SHA512ba5c6e49d3798d88085c5bb4b072ed77b37ce9670e7f3b86e1e2e3e04cdd22f5af5f0da224e3c3b7741523a1ba5bd3793b6f4a0d71664637b9392f792ecdf647
-
Filesize
860KB
MD52e1dd0d52f66f03925820ccc9815340f
SHA15436432984ee1fe62a5fd5bdad5b3d9a18cac511
SHA256d338dbe1d5e31284aeaf0b178b6b9e9bba37d1fa6144d3c9fd97903c20080778
SHA51280fd6fa48b900902ff948f0a5d2f2f64858528f478d4167e5388634a1e45018ecb4a7cd0f93a151a9879d33948c0c4a53b224ebc50324726de4b25b55e7fa108
-
Filesize
860KB
MD52e1dd0d52f66f03925820ccc9815340f
SHA15436432984ee1fe62a5fd5bdad5b3d9a18cac511
SHA256d338dbe1d5e31284aeaf0b178b6b9e9bba37d1fa6144d3c9fd97903c20080778
SHA51280fd6fa48b900902ff948f0a5d2f2f64858528f478d4167e5388634a1e45018ecb4a7cd0f93a151a9879d33948c0c4a53b224ebc50324726de4b25b55e7fa108
-
Filesize
1016KB
MD5656038a9ba5fd937f0dd6906abf852c3
SHA1e835cce5add3d6aa225c54d60126a43cc892f22b
SHA256e5821f2aaa267f3986b542ceb969e7fc3ebf620b942984815f7ef5090a8713ce
SHA5123f8431f9c8137fe9533d2a71c72535742e45dcf8fe4ffd2112418a4cdbc395cd11dddced439805491cc1d2666c783c1fae1cf76f13599ec5210decb84e936f8d
-
Filesize
1016KB
MD5656038a9ba5fd937f0dd6906abf852c3
SHA1e835cce5add3d6aa225c54d60126a43cc892f22b
SHA256e5821f2aaa267f3986b542ceb969e7fc3ebf620b942984815f7ef5090a8713ce
SHA5123f8431f9c8137fe9533d2a71c72535742e45dcf8fe4ffd2112418a4cdbc395cd11dddced439805491cc1d2666c783c1fae1cf76f13599ec5210decb84e936f8d
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0