Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 07:01
Static task
static1
Behavioral task
behavioral1
Sample
1f85b7ef1b3a20fb80390135ffcb7c1a0ab4f0a0831f8b0f89b7b798b8037190.exe
Resource
win7-20230831-en
General
-
Target
1f85b7ef1b3a20fb80390135ffcb7c1a0ab4f0a0831f8b0f89b7b798b8037190.exe
-
Size
1.3MB
-
MD5
07825af86e8c8b90bf90da7ca95dde22
-
SHA1
d5b19d117361c8cc4c2f712e93f969371c9c3cd2
-
SHA256
1f85b7ef1b3a20fb80390135ffcb7c1a0ab4f0a0831f8b0f89b7b798b8037190
-
SHA512
716b55de5620570c3552ba541486270cd939108eabceaa6bba8e274560e2fe4ccac25f39efa020e7e39302c92c2fa968aeeb8b2bf46591ae123c1e0a2a5a68e9
-
SSDEEP
24576:VycAfbipqVXR8GjKwAl164s0AM+h9cYeyO8vW2GqK8hy8XaW5s7QY3P2SLX:wcAfbAqVKGjKrl1B1+h9jO8yq337C7Qg
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/2388-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2388-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2388-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/2388-47-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4080-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation u8981411.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation t1934430.exe -
Executes dropped EXE 16 IoCs
pid Process 1360 z5365700.exe 452 z5571524.exe 2860 z3308665.exe 3204 z8668518.exe 3296 q7492683.exe 3792 r3527092.exe 1392 s0499714.exe 1064 t1934430.exe 1296 explonde.exe 3812 u8981411.exe 688 legota.exe 3184 w0534039.exe 1196 explonde.exe 2416 legota.exe 2596 explonde.exe 944 legota.exe -
Loads dropped DLL 2 IoCs
pid Process 2884 rundll32.exe 2264 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1f85b7ef1b3a20fb80390135ffcb7c1a0ab4f0a0831f8b0f89b7b798b8037190.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5365700.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z5571524.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z3308665.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z8668518.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3296 set thread context of 4080 3296 q7492683.exe 95 PID 3792 set thread context of 2388 3792 r3527092.exe 107 PID 1392 set thread context of 4732 1392 s0499714.exe 114 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3436 3296 WerFault.exe 90 4116 3792 WerFault.exe 103 396 2388 WerFault.exe 107 4336 1392 WerFault.exe 112 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2460 schtasks.exe 3900 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4080 AppLaunch.exe 4080 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4080 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 860 wrote to memory of 1360 860 1f85b7ef1b3a20fb80390135ffcb7c1a0ab4f0a0831f8b0f89b7b798b8037190.exe 86 PID 860 wrote to memory of 1360 860 1f85b7ef1b3a20fb80390135ffcb7c1a0ab4f0a0831f8b0f89b7b798b8037190.exe 86 PID 860 wrote to memory of 1360 860 1f85b7ef1b3a20fb80390135ffcb7c1a0ab4f0a0831f8b0f89b7b798b8037190.exe 86 PID 1360 wrote to memory of 452 1360 z5365700.exe 87 PID 1360 wrote to memory of 452 1360 z5365700.exe 87 PID 1360 wrote to memory of 452 1360 z5365700.exe 87 PID 452 wrote to memory of 2860 452 z5571524.exe 88 PID 452 wrote to memory of 2860 452 z5571524.exe 88 PID 452 wrote to memory of 2860 452 z5571524.exe 88 PID 2860 wrote to memory of 3204 2860 z3308665.exe 89 PID 2860 wrote to memory of 3204 2860 z3308665.exe 89 PID 2860 wrote to memory of 3204 2860 z3308665.exe 89 PID 3204 wrote to memory of 3296 3204 z8668518.exe 90 PID 3204 wrote to memory of 3296 3204 z8668518.exe 90 PID 3204 wrote to memory of 3296 3204 z8668518.exe 90 PID 3296 wrote to memory of 2548 3296 q7492683.exe 92 PID 3296 wrote to memory of 2548 3296 q7492683.exe 92 PID 3296 wrote to memory of 2548 3296 q7492683.exe 92 PID 3296 wrote to memory of 3452 3296 q7492683.exe 93 PID 3296 wrote to memory of 3452 3296 q7492683.exe 93 PID 3296 wrote to memory of 3452 3296 q7492683.exe 93 PID 3296 wrote to memory of 1284 3296 q7492683.exe 94 PID 3296 wrote to memory of 1284 3296 q7492683.exe 94 PID 3296 wrote to memory of 1284 3296 q7492683.exe 94 PID 3296 wrote to memory of 4080 3296 q7492683.exe 95 PID 3296 wrote to memory of 4080 3296 q7492683.exe 95 PID 3296 wrote to memory of 4080 3296 q7492683.exe 95 PID 3296 wrote to memory of 4080 3296 q7492683.exe 95 PID 3296 wrote to memory of 4080 3296 q7492683.exe 95 PID 3296 wrote to memory of 4080 3296 q7492683.exe 95 PID 3296 wrote to memory of 4080 3296 q7492683.exe 95 PID 3296 wrote to memory of 4080 3296 q7492683.exe 95 PID 3204 wrote to memory of 3792 3204 z8668518.exe 103 PID 3204 wrote to memory of 3792 3204 z8668518.exe 103 PID 3204 wrote to memory of 3792 3204 z8668518.exe 103 PID 3792 wrote to memory of 4820 3792 r3527092.exe 105 PID 3792 wrote to memory of 4820 3792 r3527092.exe 105 PID 3792 wrote to memory of 4820 3792 r3527092.exe 105 PID 3792 wrote to memory of 4452 3792 r3527092.exe 106 PID 3792 wrote to memory of 4452 3792 r3527092.exe 106 PID 3792 wrote to memory of 4452 3792 r3527092.exe 106 PID 3792 wrote to memory of 2388 3792 r3527092.exe 107 PID 3792 wrote to memory of 2388 3792 r3527092.exe 107 PID 3792 wrote to memory of 2388 3792 r3527092.exe 107 PID 3792 wrote to memory of 2388 3792 r3527092.exe 107 PID 3792 wrote to memory of 2388 3792 r3527092.exe 107 PID 3792 wrote to memory of 2388 3792 r3527092.exe 107 PID 3792 wrote to memory of 2388 3792 r3527092.exe 107 PID 3792 wrote to memory of 2388 3792 r3527092.exe 107 PID 3792 wrote to memory of 2388 3792 r3527092.exe 107 PID 3792 wrote to memory of 2388 3792 r3527092.exe 107 PID 2860 wrote to memory of 1392 2860 z3308665.exe 112 PID 2860 wrote to memory of 1392 2860 z3308665.exe 112 PID 2860 wrote to memory of 1392 2860 z3308665.exe 112 PID 1392 wrote to memory of 4732 1392 s0499714.exe 114 PID 1392 wrote to memory of 4732 1392 s0499714.exe 114 PID 1392 wrote to memory of 4732 1392 s0499714.exe 114 PID 1392 wrote to memory of 4732 1392 s0499714.exe 114 PID 1392 wrote to memory of 4732 1392 s0499714.exe 114 PID 1392 wrote to memory of 4732 1392 s0499714.exe 114 PID 1392 wrote to memory of 4732 1392 s0499714.exe 114 PID 1392 wrote to memory of 4732 1392 s0499714.exe 114 PID 452 wrote to memory of 1064 452 z5571524.exe 117 PID 452 wrote to memory of 1064 452 z5571524.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f85b7ef1b3a20fb80390135ffcb7c1a0ab4f0a0831f8b0f89b7b798b8037190.exe"C:\Users\Admin\AppData\Local\Temp\1f85b7ef1b3a20fb80390135ffcb7c1a0ab4f0a0831f8b0f89b7b798b8037190.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5365700.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5365700.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5571524.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5571524.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3308665.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z3308665.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8668518.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8668518.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7492683.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7492683.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1284
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 6007⤵
- Program crash
PID:3436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3527092.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3527092.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 5408⤵
- Program crash
PID:396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 5887⤵
- Program crash
PID:4116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0499714.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0499714.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 1486⤵
- Program crash
PID:4336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1934430.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1934430.exe4⤵
- Checks computer location settings
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1296 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:2460
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:3884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1420
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:3064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:5032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4400
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:3624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4980
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2884
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8981411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8981411.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:688 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3900
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4368
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4952
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2264
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0534039.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0534039.exe2⤵
- Executes dropped EXE
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3296 -ip 32961⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3792 -ip 37921⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2388 -ip 23881⤵PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1392 -ip 13921⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1196
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2416
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:2596
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
22KB
MD5d8a3efd3c749d0308c82d35cc043a719
SHA169562ef1ac0a18bf4ab9b52d211d89cb79de5041
SHA2566801d5969a5ffa37f02c897b8f7e77868142246e9bd8a5bfaaffbfdf0de9a8ae
SHA512550d034d7e321c415cd1a1b32424570760f29c5658024be2afecfeba4674d1f35119c3e50bb74c2655e55c0f6235e635ba0df3d558acef4aa09e208ef5c89e39
-
Filesize
22KB
MD5d8a3efd3c749d0308c82d35cc043a719
SHA169562ef1ac0a18bf4ab9b52d211d89cb79de5041
SHA2566801d5969a5ffa37f02c897b8f7e77868142246e9bd8a5bfaaffbfdf0de9a8ae
SHA512550d034d7e321c415cd1a1b32424570760f29c5658024be2afecfeba4674d1f35119c3e50bb74c2655e55c0f6235e635ba0df3d558acef4aa09e208ef5c89e39
-
Filesize
1.2MB
MD5defb7e193ad9d10f275d34f1cef69efb
SHA1e15d6304d7668c7b68f79bf7afc0da8421751a38
SHA256a4e5f188a00a14ee51665b4368898c7b3dbe711b77e6f8ed39f722bc58fe7c3a
SHA512906802908688e401df0eb08ca0d7832215ee83466fa11ad2d26f10bc4390fd3bfcdeede9e48a01344cc1ff61e8fc0876fed405e0069c46c5720becb78152fffb
-
Filesize
1.2MB
MD5defb7e193ad9d10f275d34f1cef69efb
SHA1e15d6304d7668c7b68f79bf7afc0da8421751a38
SHA256a4e5f188a00a14ee51665b4368898c7b3dbe711b77e6f8ed39f722bc58fe7c3a
SHA512906802908688e401df0eb08ca0d7832215ee83466fa11ad2d26f10bc4390fd3bfcdeede9e48a01344cc1ff61e8fc0876fed405e0069c46c5720becb78152fffb
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
1.0MB
MD524690cd09edffe5da3ae65e70cf47a7b
SHA19e12a9a8840784022d66c331cba3c3486fa758e1
SHA2567f4d2e9de49773aa8c9432d15eee76e868011cda4b978b0128136db70fcb1e28
SHA51223c9d0ff46a452c3262400aee65f6245f12d930f2bd33f743a85edf13c4ffe6677816e49bbe611e1e99b925c75e868e07a44e82d6efff21dced033fd20d02964
-
Filesize
1.0MB
MD524690cd09edffe5da3ae65e70cf47a7b
SHA19e12a9a8840784022d66c331cba3c3486fa758e1
SHA2567f4d2e9de49773aa8c9432d15eee76e868011cda4b978b0128136db70fcb1e28
SHA51223c9d0ff46a452c3262400aee65f6245f12d930f2bd33f743a85edf13c4ffe6677816e49bbe611e1e99b925c75e868e07a44e82d6efff21dced033fd20d02964
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
882KB
MD5fd22b1cdeaf8692509c8c650a6a658c1
SHA19b0ca03c650da0df578f9f486a1f3aed6475660d
SHA2560fd1d9d6d5a4d3708adec992895ebda431eaeae2a846fc6c4cd676fd62ee78db
SHA5123bbf267eaa4533c1cc35675096562b3d410fcbe6cbdb676299e3f09400a4f1e419f156c1157df8a582d0aa9e8a633048cd912a06c15f5254f4864c3366bbf712
-
Filesize
882KB
MD5fd22b1cdeaf8692509c8c650a6a658c1
SHA19b0ca03c650da0df578f9f486a1f3aed6475660d
SHA2560fd1d9d6d5a4d3708adec992895ebda431eaeae2a846fc6c4cd676fd62ee78db
SHA5123bbf267eaa4533c1cc35675096562b3d410fcbe6cbdb676299e3f09400a4f1e419f156c1157df8a582d0aa9e8a633048cd912a06c15f5254f4864c3366bbf712
-
Filesize
1.0MB
MD5e42edaedc1e255921255b1335d34710a
SHA11f6d8b42efbb6fb5eaac3905da6b2be3cbb012bd
SHA256d4ef54679ce4b13d071cc890b2940a52a29f3d2ce1c3294b3b665920f4050d8d
SHA512fb27573760cf9a204aba4299fd2e57a029dc5ed4eb35f036a36439abd61d980961b0e3b45bc40df2dff1f43780b08c971c44cd1440574b5a230cfb787bd3ef93
-
Filesize
1.0MB
MD5e42edaedc1e255921255b1335d34710a
SHA11f6d8b42efbb6fb5eaac3905da6b2be3cbb012bd
SHA256d4ef54679ce4b13d071cc890b2940a52a29f3d2ce1c3294b3b665920f4050d8d
SHA512fb27573760cf9a204aba4299fd2e57a029dc5ed4eb35f036a36439abd61d980961b0e3b45bc40df2dff1f43780b08c971c44cd1440574b5a230cfb787bd3ef93
-
Filesize
491KB
MD548d929213c9e12a175ef81ff15b6535c
SHA1828090ea6bc87a23c43fde7c69b6b51d329d0a0e
SHA25681d18520e2d4db0811434699cc97a081590001f91b5f32c40110289c45928ef2
SHA5121e0df17ff34499658b780142266ace4dc0939846532d604a3db6a089f6a63846b2e1f00e585d464c0578aa7e283c91876b0e2d02c31779ce5c910a0058f9dd14
-
Filesize
491KB
MD548d929213c9e12a175ef81ff15b6535c
SHA1828090ea6bc87a23c43fde7c69b6b51d329d0a0e
SHA25681d18520e2d4db0811434699cc97a081590001f91b5f32c40110289c45928ef2
SHA5121e0df17ff34499658b780142266ace4dc0939846532d604a3db6a089f6a63846b2e1f00e585d464c0578aa7e283c91876b0e2d02c31779ce5c910a0058f9dd14
-
Filesize
860KB
MD5da4e6a0da29649c246622855c6fba58a
SHA1cc241ccc00f2cb151b3b0867523bf1dc58c03aea
SHA25686fd48dcda8a2f809b103823a7e4356d74700d49eddc42a44b6d90e70eb6eead
SHA512ac2cbd7aca393c62a2ba15334426fd8c690c0ce607cbe1a1de6aa30e1815bbe242dab6fa3ba858593e2b7e2f93dee6d34c6754af8c415c0c5b9b560c976f777b
-
Filesize
860KB
MD5da4e6a0da29649c246622855c6fba58a
SHA1cc241ccc00f2cb151b3b0867523bf1dc58c03aea
SHA25686fd48dcda8a2f809b103823a7e4356d74700d49eddc42a44b6d90e70eb6eead
SHA512ac2cbd7aca393c62a2ba15334426fd8c690c0ce607cbe1a1de6aa30e1815bbe242dab6fa3ba858593e2b7e2f93dee6d34c6754af8c415c0c5b9b560c976f777b
-
Filesize
1016KB
MD516cb009f4b4c3552ea5525ca283c0cec
SHA1ab16e3517e0d7b40dcfdf32ef4d4ac1439dcbf91
SHA256d40b713208ffb5fc2a7fb38b113471dd0de13dfcbbe7000f7ca665c8ebb6a65a
SHA5129b9cc0b2fea85771804f0213370569b4a7a927fe3940aa09f9529dc2d61beef70c2a89c8f5c604ca07205d786f1cff5a3e0715c751c74241071f055cd9d310df
-
Filesize
1016KB
MD516cb009f4b4c3552ea5525ca283c0cec
SHA1ab16e3517e0d7b40dcfdf32ef4d4ac1439dcbf91
SHA256d40b713208ffb5fc2a7fb38b113471dd0de13dfcbbe7000f7ca665c8ebb6a65a
SHA5129b9cc0b2fea85771804f0213370569b4a7a927fe3940aa09f9529dc2d61beef70c2a89c8f5c604ca07205d786f1cff5a3e0715c751c74241071f055cd9d310df
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0