Analysis
-
max time kernel
184s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 08:08
Static task
static1
Behavioral task
behavioral1
Sample
a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe
Resource
win7-20230831-en
General
-
Target
a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe
-
Size
1.3MB
-
MD5
0f8712767463cefeef6de3d5f4ad6dc2
-
SHA1
1f277a1216134e92ca94d6f4219e6766271e63e8
-
SHA256
a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c
-
SHA512
5a3c3bda1db65f3909dedd2d6a98429c2e6d3b1c3ddaa4be0fd40806ccc5783fccaf877b9bcaddb0e8159a1f243df8a2a313cc7a82f298d05d1d2c501bf0de73
-
SSDEEP
24576:Myfmv2Zik2RPk0oBy6SfJaL+Tz9H+ibEq5BiRgYtU7zpdTm2CnPjEqv2T/:7IL1joBy6Na/9+hyBhYtUHpdi2CnLEm2
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1684-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1684-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1684-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1684-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4772-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t0482786.exeexplonde.exeu6887254.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation t0482786.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation u6887254.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z8831602.exez7782324.exez0564339.exez2172346.exeq0151018.exer0761324.exes3428091.exet0482786.exeexplonde.exeu6887254.exelegota.exew0622108.exelegota.exeexplonde.exelegota.exeexplonde.exepid process 4860 z8831602.exe 4112 z7782324.exe 1236 z0564339.exe 3996 z2172346.exe 4924 q0151018.exe 4768 r0761324.exe 1456 s3428091.exe 4396 t0482786.exe 468 explonde.exe 3748 u6887254.exe 4708 legota.exe 1488 w0622108.exe 1020 legota.exe 3352 explonde.exe 3020 legota.exe 4484 explonde.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4700 rundll32.exe 4676 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exez8831602.exez7782324.exez0564339.exez2172346.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8831602.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7782324.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z0564339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z2172346.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q0151018.exer0761324.exes3428091.exedescription pid process target process PID 4924 set thread context of 4772 4924 q0151018.exe AppLaunch.exe PID 4768 set thread context of 1684 4768 r0761324.exe AppLaunch.exe PID 1456 set thread context of 3828 1456 s3428091.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1548 4924 WerFault.exe q0151018.exe 1688 4768 WerFault.exe r0761324.exe 3636 1684 WerFault.exe AppLaunch.exe 1288 1456 WerFault.exe s3428091.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5104 schtasks.exe 1864 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 4772 AppLaunch.exe 4772 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4772 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exez8831602.exez7782324.exez0564339.exez2172346.exeq0151018.exer0761324.exes3428091.exet0482786.exeexplonde.exeu6887254.exedescription pid process target process PID 4876 wrote to memory of 4860 4876 a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe z8831602.exe PID 4876 wrote to memory of 4860 4876 a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe z8831602.exe PID 4876 wrote to memory of 4860 4876 a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe z8831602.exe PID 4860 wrote to memory of 4112 4860 z8831602.exe z7782324.exe PID 4860 wrote to memory of 4112 4860 z8831602.exe z7782324.exe PID 4860 wrote to memory of 4112 4860 z8831602.exe z7782324.exe PID 4112 wrote to memory of 1236 4112 z7782324.exe z0564339.exe PID 4112 wrote to memory of 1236 4112 z7782324.exe z0564339.exe PID 4112 wrote to memory of 1236 4112 z7782324.exe z0564339.exe PID 1236 wrote to memory of 3996 1236 z0564339.exe z2172346.exe PID 1236 wrote to memory of 3996 1236 z0564339.exe z2172346.exe PID 1236 wrote to memory of 3996 1236 z0564339.exe z2172346.exe PID 3996 wrote to memory of 4924 3996 z2172346.exe q0151018.exe PID 3996 wrote to memory of 4924 3996 z2172346.exe q0151018.exe PID 3996 wrote to memory of 4924 3996 z2172346.exe q0151018.exe PID 4924 wrote to memory of 4772 4924 q0151018.exe AppLaunch.exe PID 4924 wrote to memory of 4772 4924 q0151018.exe AppLaunch.exe PID 4924 wrote to memory of 4772 4924 q0151018.exe AppLaunch.exe PID 4924 wrote to memory of 4772 4924 q0151018.exe AppLaunch.exe PID 4924 wrote to memory of 4772 4924 q0151018.exe AppLaunch.exe PID 4924 wrote to memory of 4772 4924 q0151018.exe AppLaunch.exe PID 4924 wrote to memory of 4772 4924 q0151018.exe AppLaunch.exe PID 4924 wrote to memory of 4772 4924 q0151018.exe AppLaunch.exe PID 3996 wrote to memory of 4768 3996 z2172346.exe r0761324.exe PID 3996 wrote to memory of 4768 3996 z2172346.exe r0761324.exe PID 3996 wrote to memory of 4768 3996 z2172346.exe r0761324.exe PID 4768 wrote to memory of 1684 4768 r0761324.exe AppLaunch.exe PID 4768 wrote to memory of 1684 4768 r0761324.exe AppLaunch.exe PID 4768 wrote to memory of 1684 4768 r0761324.exe AppLaunch.exe PID 4768 wrote to memory of 1684 4768 r0761324.exe AppLaunch.exe PID 4768 wrote to memory of 1684 4768 r0761324.exe AppLaunch.exe PID 4768 wrote to memory of 1684 4768 r0761324.exe AppLaunch.exe PID 4768 wrote to memory of 1684 4768 r0761324.exe AppLaunch.exe PID 4768 wrote to memory of 1684 4768 r0761324.exe AppLaunch.exe PID 4768 wrote to memory of 1684 4768 r0761324.exe AppLaunch.exe PID 4768 wrote to memory of 1684 4768 r0761324.exe AppLaunch.exe PID 1236 wrote to memory of 1456 1236 z0564339.exe s3428091.exe PID 1236 wrote to memory of 1456 1236 z0564339.exe s3428091.exe PID 1236 wrote to memory of 1456 1236 z0564339.exe s3428091.exe PID 1456 wrote to memory of 3828 1456 s3428091.exe AppLaunch.exe PID 1456 wrote to memory of 3828 1456 s3428091.exe AppLaunch.exe PID 1456 wrote to memory of 3828 1456 s3428091.exe AppLaunch.exe PID 1456 wrote to memory of 3828 1456 s3428091.exe AppLaunch.exe PID 1456 wrote to memory of 3828 1456 s3428091.exe AppLaunch.exe PID 1456 wrote to memory of 3828 1456 s3428091.exe AppLaunch.exe PID 1456 wrote to memory of 3828 1456 s3428091.exe AppLaunch.exe PID 1456 wrote to memory of 3828 1456 s3428091.exe AppLaunch.exe PID 4112 wrote to memory of 4396 4112 z7782324.exe t0482786.exe PID 4112 wrote to memory of 4396 4112 z7782324.exe t0482786.exe PID 4112 wrote to memory of 4396 4112 z7782324.exe t0482786.exe PID 4396 wrote to memory of 468 4396 t0482786.exe explonde.exe PID 4396 wrote to memory of 468 4396 t0482786.exe explonde.exe PID 4396 wrote to memory of 468 4396 t0482786.exe explonde.exe PID 4860 wrote to memory of 3748 4860 z8831602.exe u6887254.exe PID 4860 wrote to memory of 3748 4860 z8831602.exe u6887254.exe PID 4860 wrote to memory of 3748 4860 z8831602.exe u6887254.exe PID 468 wrote to memory of 5104 468 explonde.exe schtasks.exe PID 468 wrote to memory of 5104 468 explonde.exe schtasks.exe PID 468 wrote to memory of 5104 468 explonde.exe schtasks.exe PID 3748 wrote to memory of 4708 3748 u6887254.exe legota.exe PID 3748 wrote to memory of 4708 3748 u6887254.exe legota.exe PID 3748 wrote to memory of 4708 3748 u6887254.exe legota.exe PID 4876 wrote to memory of 1488 4876 a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe w0622108.exe PID 4876 wrote to memory of 1488 4876 a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe w0622108.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe"C:\Users\Admin\AppData\Local\Temp\a1df62763a05a83533555416896291d06b1dbc519a1f9ba0a3f6e94469fd521c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8831602.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8831602.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7782324.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7782324.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0564339.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0564339.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2172346.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2172346.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 1407⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0761324.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0761324.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 5408⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 1487⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3428091.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3428091.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 1486⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0482786.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0482786.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6887254.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6887254.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0622108.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0622108.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4924 -ip 49241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4768 -ip 47681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1684 -ip 16841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1456 -ip 14561⤵
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0622108.exeFilesize
22KB
MD584820c558bb7ac216b691b4ea5afbee5
SHA1a71b25abc6c110a960307360a9974e6460efdbb8
SHA256afc052e15b279f3c06680a417a743a10d514fe29f46a118e880b2362e9be40a8
SHA512df22a1281d182b7b5e52270019b685acd53d2a8fbb3419983ee685e16f83d8c7fc602579440ec2bbdbe41d48ea796f0af1db7b998161f037684ac35cff4576a0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0622108.exeFilesize
22KB
MD584820c558bb7ac216b691b4ea5afbee5
SHA1a71b25abc6c110a960307360a9974e6460efdbb8
SHA256afc052e15b279f3c06680a417a743a10d514fe29f46a118e880b2362e9be40a8
SHA512df22a1281d182b7b5e52270019b685acd53d2a8fbb3419983ee685e16f83d8c7fc602579440ec2bbdbe41d48ea796f0af1db7b998161f037684ac35cff4576a0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8831602.exeFilesize
1.2MB
MD51d4d60f8c45702b2800608e7448dc1fd
SHA1935ad0d82c6713a74dc91c874a5378dd9eec2958
SHA25642e2ef9154798ec7c428b8f59c3475c718c3486aae1b2dd1a4e946851c49d4c2
SHA5122cc861a0d92286f10f2494ce170efb05d4071275c3d6c8f604daa00d2bdec5ba6f8acc75d9beb1476bcc7c48318e520557ada1dcdee2b62ad4d6beb07da37f66
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8831602.exeFilesize
1.2MB
MD51d4d60f8c45702b2800608e7448dc1fd
SHA1935ad0d82c6713a74dc91c874a5378dd9eec2958
SHA25642e2ef9154798ec7c428b8f59c3475c718c3486aae1b2dd1a4e946851c49d4c2
SHA5122cc861a0d92286f10f2494ce170efb05d4071275c3d6c8f604daa00d2bdec5ba6f8acc75d9beb1476bcc7c48318e520557ada1dcdee2b62ad4d6beb07da37f66
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6887254.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6887254.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7782324.exeFilesize
1.0MB
MD5689068789ef917719aba53e4c9cf7587
SHA1f0d985dc7260696c5529f973bb1014f9429455ab
SHA25634b0561dc70baa089c225c06cda8658d3f1020f673410db58856f85b3d17dc75
SHA5125e6c5ceae169d5fb4a5aaea77a1ae496fb6da0ee1d8dc1b2e936627bfb7a4fdd937e4784b968cc0ce97ea8423276eaca91facef8024115196f94dc927f6d1f3a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7782324.exeFilesize
1.0MB
MD5689068789ef917719aba53e4c9cf7587
SHA1f0d985dc7260696c5529f973bb1014f9429455ab
SHA25634b0561dc70baa089c225c06cda8658d3f1020f673410db58856f85b3d17dc75
SHA5125e6c5ceae169d5fb4a5aaea77a1ae496fb6da0ee1d8dc1b2e936627bfb7a4fdd937e4784b968cc0ce97ea8423276eaca91facef8024115196f94dc927f6d1f3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0482786.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0482786.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0564339.exeFilesize
882KB
MD57b732df386f591feca1b2360dd23e728
SHA160c08482d0cd6a5eb6b390678987814798400f10
SHA256511b52cf9374c0becec560e14a0200015826932a83f02050eee72c398a3728c3
SHA512da94cf43cbc97ce8904872f9c2084c108b7a5a8cf36c5630d9bdf1083ebc5b37d2573b0d4e0a3540694ff7b38ee2ff54726f232317acbceeed5dda1981fd3209
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0564339.exeFilesize
882KB
MD57b732df386f591feca1b2360dd23e728
SHA160c08482d0cd6a5eb6b390678987814798400f10
SHA256511b52cf9374c0becec560e14a0200015826932a83f02050eee72c398a3728c3
SHA512da94cf43cbc97ce8904872f9c2084c108b7a5a8cf36c5630d9bdf1083ebc5b37d2573b0d4e0a3540694ff7b38ee2ff54726f232317acbceeed5dda1981fd3209
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3428091.exeFilesize
1.0MB
MD5ada13d5ff69aa81563d6815de4ab5d1f
SHA149f1e7dfa68e00baf1ba016f5cfce25ad0e26fc2
SHA256bd0cb1700ea1347c9d307bc1a455b893655abefbff0d5d069a50a2fc3899ba20
SHA5128a2a9a5a4293b0ecd4c2af9062d6174cbf87f2c2d5a0412a17b757de89a50477ed9951932267adbec95f647acf07b58082b5cf8d72b28e7df91aecd223306c27
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s3428091.exeFilesize
1.0MB
MD5ada13d5ff69aa81563d6815de4ab5d1f
SHA149f1e7dfa68e00baf1ba016f5cfce25ad0e26fc2
SHA256bd0cb1700ea1347c9d307bc1a455b893655abefbff0d5d069a50a2fc3899ba20
SHA5128a2a9a5a4293b0ecd4c2af9062d6174cbf87f2c2d5a0412a17b757de89a50477ed9951932267adbec95f647acf07b58082b5cf8d72b28e7df91aecd223306c27
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2172346.exeFilesize
491KB
MD5d9216ea0a5dd7873573a86bee96498b6
SHA15e97eab2b38adeab54e832514af522f980aea540
SHA2564017af2cf43fdf3e00ca1e3d536caf8ce6b9564bd23dd1fe668e48ff8f8bf909
SHA512d95c0c7f4c5238f829a10678351b8b9a4906aa14f925890661737441b7ef11d276986eeda3a446a98d0e70e4d60eb1997c950dcb26e488e328ff27b4d3253e89
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2172346.exeFilesize
491KB
MD5d9216ea0a5dd7873573a86bee96498b6
SHA15e97eab2b38adeab54e832514af522f980aea540
SHA2564017af2cf43fdf3e00ca1e3d536caf8ce6b9564bd23dd1fe668e48ff8f8bf909
SHA512d95c0c7f4c5238f829a10678351b8b9a4906aa14f925890661737441b7ef11d276986eeda3a446a98d0e70e4d60eb1997c950dcb26e488e328ff27b4d3253e89
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exeFilesize
860KB
MD56c6967b2d2dafd04fe6bf56e7c1c1d35
SHA124b644dd28e111bad61fbb7ffd31ba030b33cdeb
SHA2564351287799c9336c16fda56149ccbce1fb0ac5d94d06f6face930372666f47e8
SHA5124de4f1d5ac85b51de6943a37eb474c784717a0e5b806a1d2b88ecdbf4b1977e2bf09789cdf00d2be16b33529d28322aeb77cd97ab12d6e7bf212dc7111571ec7
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0151018.exeFilesize
860KB
MD56c6967b2d2dafd04fe6bf56e7c1c1d35
SHA124b644dd28e111bad61fbb7ffd31ba030b33cdeb
SHA2564351287799c9336c16fda56149ccbce1fb0ac5d94d06f6face930372666f47e8
SHA5124de4f1d5ac85b51de6943a37eb474c784717a0e5b806a1d2b88ecdbf4b1977e2bf09789cdf00d2be16b33529d28322aeb77cd97ab12d6e7bf212dc7111571ec7
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0761324.exeFilesize
1016KB
MD544196a6f6bf439d88806290b3844094d
SHA1b5803d4a27de2c45864849ee828a76ad4720a908
SHA256c8e84ad704ad3a567dccda3106ec83d53e624cd942f39765f328a2650e39bfd4
SHA512dfa121022e481531b447e875fe9cdb53c69a1d6ba548236cbef8afadb484527176036882641aef5f5c11e44059afcf43043dbd6e2b9be81e6f1b8b8140224179
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0761324.exeFilesize
1016KB
MD544196a6f6bf439d88806290b3844094d
SHA1b5803d4a27de2c45864849ee828a76ad4720a908
SHA256c8e84ad704ad3a567dccda3106ec83d53e624cd942f39765f328a2650e39bfd4
SHA512dfa121022e481531b447e875fe9cdb53c69a1d6ba548236cbef8afadb484527176036882641aef5f5c11e44059afcf43043dbd6e2b9be81e6f1b8b8140224179
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0
-
memory/1684-40-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1684-42-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1684-44-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1684-41-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3828-60-0x0000000004ED0000-0x0000000004FDA000-memory.dmpFilesize
1.0MB
-
memory/3828-62-0x0000000004DC0000-0x0000000004DD2000-memory.dmpFilesize
72KB
-
memory/3828-88-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/3828-61-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/3828-59-0x00000000053E0000-0x00000000059F8000-memory.dmpFilesize
6.1MB
-
memory/3828-79-0x0000000074280000-0x0000000074A30000-memory.dmpFilesize
7.7MB
-
memory/3828-51-0x0000000004C60000-0x0000000004C66000-memory.dmpFilesize
24KB
-
memory/3828-50-0x0000000074280000-0x0000000074A30000-memory.dmpFilesize
7.7MB
-
memory/3828-49-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3828-67-0x0000000004E20000-0x0000000004E5C000-memory.dmpFilesize
240KB
-
memory/3828-71-0x0000000004E70000-0x0000000004EBC000-memory.dmpFilesize
304KB
-
memory/4772-53-0x0000000074280000-0x0000000074A30000-memory.dmpFilesize
7.7MB
-
memory/4772-45-0x0000000074280000-0x0000000074A30000-memory.dmpFilesize
7.7MB
-
memory/4772-36-0x0000000074280000-0x0000000074A30000-memory.dmpFilesize
7.7MB
-
memory/4772-35-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB