Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 07:46
Static task
static1
Behavioral task
behavioral1
Sample
188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exe
Resource
win7-20230831-en
General
-
Target
188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exe
-
Size
1.3MB
-
MD5
bc0e3701a44a3e7d6f315807181bbdd7
-
SHA1
b1f4382b48fb372ffeb7da618d75e5062c5c69da
-
SHA256
188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36
-
SHA512
701ca71ab37959b92934f907a48da2cadd233b9be9363776c84e6eb63ad8a0ddabc9bd0d246460aa86d29c1082328c095f55766b70e2f5bbd971514f3cd2fa15
-
SSDEEP
24576:Iye2FiAMmHUTXffCh0oOM4GqgJA9x25wHqFY6zQgY9fzEZ5:Pe+iT7TXffgBhJACF7zb8gZ
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1220-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1220-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1220-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1220-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2456-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t1750656.exeexplonde.exeu8751009.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t1750656.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u8751009.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z4299355.exez6766541.exez0986197.exez9927855.exeq8326301.exer9280035.exes7160950.exet1750656.exeexplonde.exeu8751009.exelegota.exew2735829.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 1188 z4299355.exe 1760 z6766541.exe 1160 z0986197.exe 980 z9927855.exe 1540 q8326301.exe 2504 r9280035.exe 4552 s7160950.exe 5024 t1750656.exe 5000 explonde.exe 1664 u8751009.exe 4204 legota.exe 2228 w2735829.exe 3832 explonde.exe 2948 legota.exe 4656 explonde.exe 2380 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3580 rundll32.exe 220 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exez4299355.exez6766541.exez0986197.exez9927855.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4299355.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6766541.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z0986197.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z9927855.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q8326301.exer9280035.exes7160950.exedescription pid process target process PID 1540 set thread context of 2456 1540 q8326301.exe AppLaunch.exe PID 2504 set thread context of 1220 2504 r9280035.exe AppLaunch.exe PID 4552 set thread context of 780 4552 s7160950.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2528 1540 WerFault.exe q8326301.exe 1580 2504 WerFault.exe r9280035.exe 5068 1220 WerFault.exe AppLaunch.exe 4404 4552 WerFault.exe s7160950.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3824 schtasks.exe 1676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 2456 AppLaunch.exe 2456 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 2456 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exez4299355.exez6766541.exez0986197.exez9927855.exeq8326301.exer9280035.exes7160950.exet1750656.exeexplonde.exeu8751009.exedescription pid process target process PID 4728 wrote to memory of 1188 4728 188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exe z4299355.exe PID 4728 wrote to memory of 1188 4728 188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exe z4299355.exe PID 4728 wrote to memory of 1188 4728 188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exe z4299355.exe PID 1188 wrote to memory of 1760 1188 z4299355.exe z6766541.exe PID 1188 wrote to memory of 1760 1188 z4299355.exe z6766541.exe PID 1188 wrote to memory of 1760 1188 z4299355.exe z6766541.exe PID 1760 wrote to memory of 1160 1760 z6766541.exe z0986197.exe PID 1760 wrote to memory of 1160 1760 z6766541.exe z0986197.exe PID 1760 wrote to memory of 1160 1760 z6766541.exe z0986197.exe PID 1160 wrote to memory of 980 1160 z0986197.exe z9927855.exe PID 1160 wrote to memory of 980 1160 z0986197.exe z9927855.exe PID 1160 wrote to memory of 980 1160 z0986197.exe z9927855.exe PID 980 wrote to memory of 1540 980 z9927855.exe q8326301.exe PID 980 wrote to memory of 1540 980 z9927855.exe q8326301.exe PID 980 wrote to memory of 1540 980 z9927855.exe q8326301.exe PID 1540 wrote to memory of 2456 1540 q8326301.exe AppLaunch.exe PID 1540 wrote to memory of 2456 1540 q8326301.exe AppLaunch.exe PID 1540 wrote to memory of 2456 1540 q8326301.exe AppLaunch.exe PID 1540 wrote to memory of 2456 1540 q8326301.exe AppLaunch.exe PID 1540 wrote to memory of 2456 1540 q8326301.exe AppLaunch.exe PID 1540 wrote to memory of 2456 1540 q8326301.exe AppLaunch.exe PID 1540 wrote to memory of 2456 1540 q8326301.exe AppLaunch.exe PID 1540 wrote to memory of 2456 1540 q8326301.exe AppLaunch.exe PID 980 wrote to memory of 2504 980 z9927855.exe r9280035.exe PID 980 wrote to memory of 2504 980 z9927855.exe r9280035.exe PID 980 wrote to memory of 2504 980 z9927855.exe r9280035.exe PID 2504 wrote to memory of 1220 2504 r9280035.exe AppLaunch.exe PID 2504 wrote to memory of 1220 2504 r9280035.exe AppLaunch.exe PID 2504 wrote to memory of 1220 2504 r9280035.exe AppLaunch.exe PID 2504 wrote to memory of 1220 2504 r9280035.exe AppLaunch.exe PID 2504 wrote to memory of 1220 2504 r9280035.exe AppLaunch.exe PID 2504 wrote to memory of 1220 2504 r9280035.exe AppLaunch.exe PID 2504 wrote to memory of 1220 2504 r9280035.exe AppLaunch.exe PID 2504 wrote to memory of 1220 2504 r9280035.exe AppLaunch.exe PID 2504 wrote to memory of 1220 2504 r9280035.exe AppLaunch.exe PID 2504 wrote to memory of 1220 2504 r9280035.exe AppLaunch.exe PID 1160 wrote to memory of 4552 1160 z0986197.exe s7160950.exe PID 1160 wrote to memory of 4552 1160 z0986197.exe s7160950.exe PID 1160 wrote to memory of 4552 1160 z0986197.exe s7160950.exe PID 4552 wrote to memory of 780 4552 s7160950.exe AppLaunch.exe PID 4552 wrote to memory of 780 4552 s7160950.exe AppLaunch.exe PID 4552 wrote to memory of 780 4552 s7160950.exe AppLaunch.exe PID 4552 wrote to memory of 780 4552 s7160950.exe AppLaunch.exe PID 4552 wrote to memory of 780 4552 s7160950.exe AppLaunch.exe PID 4552 wrote to memory of 780 4552 s7160950.exe AppLaunch.exe PID 4552 wrote to memory of 780 4552 s7160950.exe AppLaunch.exe PID 4552 wrote to memory of 780 4552 s7160950.exe AppLaunch.exe PID 1760 wrote to memory of 5024 1760 z6766541.exe t1750656.exe PID 1760 wrote to memory of 5024 1760 z6766541.exe t1750656.exe PID 1760 wrote to memory of 5024 1760 z6766541.exe t1750656.exe PID 5024 wrote to memory of 5000 5024 t1750656.exe explonde.exe PID 5024 wrote to memory of 5000 5024 t1750656.exe explonde.exe PID 5024 wrote to memory of 5000 5024 t1750656.exe explonde.exe PID 1188 wrote to memory of 1664 1188 z4299355.exe u8751009.exe PID 1188 wrote to memory of 1664 1188 z4299355.exe u8751009.exe PID 1188 wrote to memory of 1664 1188 z4299355.exe u8751009.exe PID 5000 wrote to memory of 1676 5000 explonde.exe schtasks.exe PID 5000 wrote to memory of 1676 5000 explonde.exe schtasks.exe PID 5000 wrote to memory of 1676 5000 explonde.exe schtasks.exe PID 1664 wrote to memory of 4204 1664 u8751009.exe legota.exe PID 1664 wrote to memory of 4204 1664 u8751009.exe legota.exe PID 1664 wrote to memory of 4204 1664 u8751009.exe legota.exe PID 5000 wrote to memory of 5084 5000 explonde.exe cmd.exe PID 5000 wrote to memory of 5084 5000 explonde.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exe"C:\Users\Admin\AppData\Local\Temp\188962209b38e87eacedb25c9d09c3b86d348f856b9dc36bce3cd3f3ba419c36.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4299355.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4299355.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6766541.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6766541.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0986197.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0986197.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9927855.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9927855.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q8326301.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 1567⤵
- Program crash
PID:2528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9280035.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9280035.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1220 -s 5408⤵
- Program crash
PID:5068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 1567⤵
- Program crash
PID:1580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7160950.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7160950.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 1486⤵
- Program crash
PID:4404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1750656.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1750656.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:1676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:5084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3580
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:3820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:3468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2152
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:2068
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3580
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8751009.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u8751009.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4204 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3824
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:2176
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1436
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4364
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2735829.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w2735829.exe2⤵
- Executes dropped EXE
PID:2228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1540 -ip 15401⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2504 -ip 25041⤵PID:1348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1220 -ip 12201⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4552 -ip 45521⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3832
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2948
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4656
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2380
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD587d79678edaee70055db4c05fdb96daf
SHA19a1139ea06f93540d472461ca6f9c24540553e52
SHA25678beef113b4dbf7c172e2f213cde4363464ab61ed9ab253661d36eb9a9b75923
SHA51240022d61595e0f44376778cdee608b37bc7bd1e304e493d522724cef67ba975cd61fab1fafc1566d7be458ec5bc616801483ce94e49ecacf80fa8aec55a87b47
-
Filesize
22KB
MD587d79678edaee70055db4c05fdb96daf
SHA19a1139ea06f93540d472461ca6f9c24540553e52
SHA25678beef113b4dbf7c172e2f213cde4363464ab61ed9ab253661d36eb9a9b75923
SHA51240022d61595e0f44376778cdee608b37bc7bd1e304e493d522724cef67ba975cd61fab1fafc1566d7be458ec5bc616801483ce94e49ecacf80fa8aec55a87b47
-
Filesize
1.2MB
MD57c8ff77ec19d33fa97e2c5cdbd5231ed
SHA1074606885628ed5ffecfb94a607020ce19723aae
SHA256010e364a1d14f2100cdfe2fc322cc4bf8dd2c0d5ca3f758959622d5a281513ea
SHA51218fe3d7bc03214677291649674bb3c39c6b30e81eac3270cd91763fdadea0119db1d7e311ede24d363fe9156fd7d7571e983cdf45225b662f2af1e1226be681a
-
Filesize
1.2MB
MD57c8ff77ec19d33fa97e2c5cdbd5231ed
SHA1074606885628ed5ffecfb94a607020ce19723aae
SHA256010e364a1d14f2100cdfe2fc322cc4bf8dd2c0d5ca3f758959622d5a281513ea
SHA51218fe3d7bc03214677291649674bb3c39c6b30e81eac3270cd91763fdadea0119db1d7e311ede24d363fe9156fd7d7571e983cdf45225b662f2af1e1226be681a
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
1.0MB
MD53e83d937fea678f575ae1dedb31a3c8b
SHA178a7889ce26332fc944ea6e4e7a7428b704a8729
SHA2560a012fd28260b6815dd27c9d73418b929e61fe9417cbfcbad9bbec73d2cd4485
SHA51268f29610e1eaa2b791c81b0ce067ed6b7a47255488c37a34c3f72d5dbfbf83510b78a3fd280bb221df66418313dbe1a921894d734d610e0f15d480d787324ac6
-
Filesize
1.0MB
MD53e83d937fea678f575ae1dedb31a3c8b
SHA178a7889ce26332fc944ea6e4e7a7428b704a8729
SHA2560a012fd28260b6815dd27c9d73418b929e61fe9417cbfcbad9bbec73d2cd4485
SHA51268f29610e1eaa2b791c81b0ce067ed6b7a47255488c37a34c3f72d5dbfbf83510b78a3fd280bb221df66418313dbe1a921894d734d610e0f15d480d787324ac6
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
883KB
MD53d3969d946456795a928926440d9d20f
SHA1889dae3e09243e411a23f977d8b3d6ab443272c4
SHA2564e816c229376183db7916275f6dd95cad0ada3b561bfe65447c8f45a24148256
SHA5122884d25d0cea046b2410bc44d112c3e1416aaefe7de999962b38168a13bac502f838a4d1a2745de461a7c4ae55f92d04d9179f6aaab8962d8c9c452298c15637
-
Filesize
883KB
MD53d3969d946456795a928926440d9d20f
SHA1889dae3e09243e411a23f977d8b3d6ab443272c4
SHA2564e816c229376183db7916275f6dd95cad0ada3b561bfe65447c8f45a24148256
SHA5122884d25d0cea046b2410bc44d112c3e1416aaefe7de999962b38168a13bac502f838a4d1a2745de461a7c4ae55f92d04d9179f6aaab8962d8c9c452298c15637
-
Filesize
1.0MB
MD5a8539cf7ff082e1310f0c043b831d548
SHA1927ee4455d97a8774c37f49befe610d4b5f76e62
SHA2561cf025a629b6eff064c483f8bb7909f8e5e535175cd7532e754404f585427145
SHA512b1d123b7513ba22937a29411db8cb91cd148f7f73911a7fbac1e2b69efa9251b81b10c9aa80826c439b23c1d48f1d353cebe2a73d901f0eff5412ea93160e484
-
Filesize
1.0MB
MD5a8539cf7ff082e1310f0c043b831d548
SHA1927ee4455d97a8774c37f49befe610d4b5f76e62
SHA2561cf025a629b6eff064c483f8bb7909f8e5e535175cd7532e754404f585427145
SHA512b1d123b7513ba22937a29411db8cb91cd148f7f73911a7fbac1e2b69efa9251b81b10c9aa80826c439b23c1d48f1d353cebe2a73d901f0eff5412ea93160e484
-
Filesize
492KB
MD53070368ee67a80076d6afbf1ae9aab15
SHA1cec31762aa818a380fab2c047511aa0323bb4625
SHA25690ea252c820022584c7602fe467f102c7af4520ebb09267d90b47d1da0061b90
SHA51284ac34b3766f468eca9245c663e9144fa9835cc6c0fc0b9ac145531dc73366656048058e82767d88fe0b4bed37b86613fcc64d3dba256281b37ceca21fa137ba
-
Filesize
492KB
MD53070368ee67a80076d6afbf1ae9aab15
SHA1cec31762aa818a380fab2c047511aa0323bb4625
SHA25690ea252c820022584c7602fe467f102c7af4520ebb09267d90b47d1da0061b90
SHA51284ac34b3766f468eca9245c663e9144fa9835cc6c0fc0b9ac145531dc73366656048058e82767d88fe0b4bed37b86613fcc64d3dba256281b37ceca21fa137ba
-
Filesize
860KB
MD5caea2fc30e79c39b16e63adc2f41810c
SHA183014753d6d0adedd29a5387ecffb7dcbf39dfb0
SHA25691b58d0bc2c117db99294d5edcecfa8b8eabea3bc3c6918ad71b0d6e71361efe
SHA512de54be146e04944382bf99129fd86dccf177c8226018841f030ef9d97fc89b33e4fa8308916a0d40ba0c6653a51d5de00f52e968e09df54e435ee97cdb6b01de
-
Filesize
860KB
MD5caea2fc30e79c39b16e63adc2f41810c
SHA183014753d6d0adedd29a5387ecffb7dcbf39dfb0
SHA25691b58d0bc2c117db99294d5edcecfa8b8eabea3bc3c6918ad71b0d6e71361efe
SHA512de54be146e04944382bf99129fd86dccf177c8226018841f030ef9d97fc89b33e4fa8308916a0d40ba0c6653a51d5de00f52e968e09df54e435ee97cdb6b01de
-
Filesize
1016KB
MD5398869071a9f9fbe52a32421e0b7a35d
SHA1311e3d9c94c125779eae96096a36d7d0e2c59254
SHA256348d3f14e5554173876bcdf7dc017c16ff94ee522521d528dd12ceaaaede3bab
SHA512e2da7c9a25f6b8956ef3239c11a1cb67a62ca08cf9088d04ff30525a933abc8babd201e2f00f6697af86edfbbc0657a48870a75e63cd73e73e306ee6936a7ac4
-
Filesize
1016KB
MD5398869071a9f9fbe52a32421e0b7a35d
SHA1311e3d9c94c125779eae96096a36d7d0e2c59254
SHA256348d3f14e5554173876bcdf7dc017c16ff94ee522521d528dd12ceaaaede3bab
SHA512e2da7c9a25f6b8956ef3239c11a1cb67a62ca08cf9088d04ff30525a933abc8babd201e2f00f6697af86edfbbc0657a48870a75e63cd73e73e306ee6936a7ac4
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0