Analysis
-
max time kernel
143s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 07:50
Static task
static1
Behavioral task
behavioral1
Sample
694c95140f0dd71142cf9985b87318a51ed1fad2688b81b7bb598c43ddaf73c3.exe
Resource
win7-20230831-en
General
-
Target
694c95140f0dd71142cf9985b87318a51ed1fad2688b81b7bb598c43ddaf73c3.exe
-
Size
1.3MB
-
MD5
79f1236be58ed03ccf930c08f7c2c029
-
SHA1
fd606411772f20ae3d88a4959e41201307601cf8
-
SHA256
694c95140f0dd71142cf9985b87318a51ed1fad2688b81b7bb598c43ddaf73c3
-
SHA512
70e71861971cba994866ab13b1c49a97b1a1985ad53da096155480e28383b774204b2c5af2e8eddb8903bffd389cb36a5964349a07a16a0450a4a8e2dd22af25
-
SSDEEP
24576:byJNnrGrPj0uYkiQDOV3VpFlKpWXWSj1oG3O73yaOCfBAb48xhY:OJI7jtK93VpWpWGizO7H5+h
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3480-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3480-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3480-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3480-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1152-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t0777169.exeu7453718.exeexplonde.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation t0777169.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation u7453718.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z8440322.exez9426222.exez7298509.exez4534210.exeq0619782.exer9397751.exes0286169.exet0777169.exeexplonde.exeu7453718.exelegota.exew8352797.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 4540 z8440322.exe 4136 z9426222.exe 5000 z7298509.exe 4452 z4534210.exe 4912 q0619782.exe 2296 r9397751.exe 472 s0286169.exe 1352 t0777169.exe 1828 explonde.exe 236 u7453718.exe 3808 legota.exe 3584 w8352797.exe 3768 explonde.exe 2364 legota.exe 3612 explonde.exe 2160 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4376 rundll32.exe 2628 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
694c95140f0dd71142cf9985b87318a51ed1fad2688b81b7bb598c43ddaf73c3.exez8440322.exez9426222.exez7298509.exez4534210.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 694c95140f0dd71142cf9985b87318a51ed1fad2688b81b7bb598c43ddaf73c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8440322.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9426222.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7298509.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4534210.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q0619782.exer9397751.exes0286169.exedescription pid process target process PID 4912 set thread context of 1152 4912 q0619782.exe AppLaunch.exe PID 2296 set thread context of 3480 2296 r9397751.exe AppLaunch.exe PID 472 set thread context of 1356 472 s0286169.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3704 4912 WerFault.exe q0619782.exe 4924 2296 WerFault.exe r9397751.exe 1248 3480 WerFault.exe AppLaunch.exe 2364 472 WerFault.exe s0286169.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2848 schtasks.exe 4872 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1152 AppLaunch.exe 1152 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1152 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
694c95140f0dd71142cf9985b87318a51ed1fad2688b81b7bb598c43ddaf73c3.exez8440322.exez9426222.exez7298509.exez4534210.exeq0619782.exer9397751.exes0286169.exet0777169.exeu7453718.exeexplonde.exedescription pid process target process PID 4120 wrote to memory of 4540 4120 694c95140f0dd71142cf9985b87318a51ed1fad2688b81b7bb598c43ddaf73c3.exe z8440322.exe PID 4120 wrote to memory of 4540 4120 694c95140f0dd71142cf9985b87318a51ed1fad2688b81b7bb598c43ddaf73c3.exe z8440322.exe PID 4120 wrote to memory of 4540 4120 694c95140f0dd71142cf9985b87318a51ed1fad2688b81b7bb598c43ddaf73c3.exe z8440322.exe PID 4540 wrote to memory of 4136 4540 z8440322.exe z9426222.exe PID 4540 wrote to memory of 4136 4540 z8440322.exe z9426222.exe PID 4540 wrote to memory of 4136 4540 z8440322.exe z9426222.exe PID 4136 wrote to memory of 5000 4136 z9426222.exe z7298509.exe PID 4136 wrote to memory of 5000 4136 z9426222.exe z7298509.exe PID 4136 wrote to memory of 5000 4136 z9426222.exe z7298509.exe PID 5000 wrote to memory of 4452 5000 z7298509.exe z4534210.exe PID 5000 wrote to memory of 4452 5000 z7298509.exe z4534210.exe PID 5000 wrote to memory of 4452 5000 z7298509.exe z4534210.exe PID 4452 wrote to memory of 4912 4452 z4534210.exe q0619782.exe PID 4452 wrote to memory of 4912 4452 z4534210.exe q0619782.exe PID 4452 wrote to memory of 4912 4452 z4534210.exe q0619782.exe PID 4912 wrote to memory of 1152 4912 q0619782.exe AppLaunch.exe PID 4912 wrote to memory of 1152 4912 q0619782.exe AppLaunch.exe PID 4912 wrote to memory of 1152 4912 q0619782.exe AppLaunch.exe PID 4912 wrote to memory of 1152 4912 q0619782.exe AppLaunch.exe PID 4912 wrote to memory of 1152 4912 q0619782.exe AppLaunch.exe PID 4912 wrote to memory of 1152 4912 q0619782.exe AppLaunch.exe PID 4912 wrote to memory of 1152 4912 q0619782.exe AppLaunch.exe PID 4912 wrote to memory of 1152 4912 q0619782.exe AppLaunch.exe PID 4452 wrote to memory of 2296 4452 z4534210.exe r9397751.exe PID 4452 wrote to memory of 2296 4452 z4534210.exe r9397751.exe PID 4452 wrote to memory of 2296 4452 z4534210.exe r9397751.exe PID 2296 wrote to memory of 3480 2296 r9397751.exe AppLaunch.exe PID 2296 wrote to memory of 3480 2296 r9397751.exe AppLaunch.exe PID 2296 wrote to memory of 3480 2296 r9397751.exe AppLaunch.exe PID 2296 wrote to memory of 3480 2296 r9397751.exe AppLaunch.exe PID 2296 wrote to memory of 3480 2296 r9397751.exe AppLaunch.exe PID 2296 wrote to memory of 3480 2296 r9397751.exe AppLaunch.exe PID 2296 wrote to memory of 3480 2296 r9397751.exe AppLaunch.exe PID 2296 wrote to memory of 3480 2296 r9397751.exe AppLaunch.exe PID 2296 wrote to memory of 3480 2296 r9397751.exe AppLaunch.exe PID 2296 wrote to memory of 3480 2296 r9397751.exe AppLaunch.exe PID 5000 wrote to memory of 472 5000 z7298509.exe s0286169.exe PID 5000 wrote to memory of 472 5000 z7298509.exe s0286169.exe PID 5000 wrote to memory of 472 5000 z7298509.exe s0286169.exe PID 472 wrote to memory of 1356 472 s0286169.exe AppLaunch.exe PID 472 wrote to memory of 1356 472 s0286169.exe AppLaunch.exe PID 472 wrote to memory of 1356 472 s0286169.exe AppLaunch.exe PID 472 wrote to memory of 1356 472 s0286169.exe AppLaunch.exe PID 472 wrote to memory of 1356 472 s0286169.exe AppLaunch.exe PID 472 wrote to memory of 1356 472 s0286169.exe AppLaunch.exe PID 472 wrote to memory of 1356 472 s0286169.exe AppLaunch.exe PID 472 wrote to memory of 1356 472 s0286169.exe AppLaunch.exe PID 4136 wrote to memory of 1352 4136 z9426222.exe t0777169.exe PID 4136 wrote to memory of 1352 4136 z9426222.exe t0777169.exe PID 4136 wrote to memory of 1352 4136 z9426222.exe t0777169.exe PID 1352 wrote to memory of 1828 1352 t0777169.exe explonde.exe PID 1352 wrote to memory of 1828 1352 t0777169.exe explonde.exe PID 1352 wrote to memory of 1828 1352 t0777169.exe explonde.exe PID 4540 wrote to memory of 236 4540 z8440322.exe u7453718.exe PID 4540 wrote to memory of 236 4540 z8440322.exe u7453718.exe PID 4540 wrote to memory of 236 4540 z8440322.exe u7453718.exe PID 236 wrote to memory of 3808 236 u7453718.exe legota.exe PID 236 wrote to memory of 3808 236 u7453718.exe legota.exe PID 236 wrote to memory of 3808 236 u7453718.exe legota.exe PID 1828 wrote to memory of 4872 1828 explonde.exe schtasks.exe PID 1828 wrote to memory of 4872 1828 explonde.exe schtasks.exe PID 1828 wrote to memory of 4872 1828 explonde.exe schtasks.exe PID 1828 wrote to memory of 1312 1828 explonde.exe cmd.exe PID 1828 wrote to memory of 1312 1828 explonde.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\694c95140f0dd71142cf9985b87318a51ed1fad2688b81b7bb598c43ddaf73c3.exe"C:\Users\Admin\AppData\Local\Temp\694c95140f0dd71142cf9985b87318a51ed1fad2688b81b7bb598c43ddaf73c3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8440322.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8440322.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9426222.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9426222.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7298509.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7298509.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4534210.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4534210.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0619782.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q0619782.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 1487⤵
- Program crash
PID:3704
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9397751.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9397751.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 5408⤵
- Program crash
PID:1248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 1527⤵
- Program crash
PID:4924
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0286169.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0286169.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:472 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 472 -s 5926⤵
- Program crash
PID:2364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0777169.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0777169.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:4872
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:1312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1864
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:1684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:3028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:440
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:404
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u7453718.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u7453718.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:3808 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:2848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:3076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4164
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:2260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:1512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4936
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3512
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:3408
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2628
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8352797.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w8352797.exe2⤵
- Executes dropped EXE
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4912 -ip 49121⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2296 -ip 22961⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3480 -ip 34801⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 472 -ip 4721⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3768
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2364
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3612
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2160
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD53eb1d336d7bd9a35cfb7e3e4a22f2b1f
SHA148144dd51e05e0189ee4c1bbe2f0b7bbb837b203
SHA25696e7b7fb0f4b264792a20ebdfe8396645e9e2617f4b67485216da12721f03197
SHA5121325202b1fcd67ac28f346bda133ab3eed17f8cd32af7fe4dddef3d7b4b2aa36f74bb0bf051462328a8d3d256ca1a2365edc6e5d28ab5d0e89de1e334c0919ae
-
Filesize
22KB
MD53eb1d336d7bd9a35cfb7e3e4a22f2b1f
SHA148144dd51e05e0189ee4c1bbe2f0b7bbb837b203
SHA25696e7b7fb0f4b264792a20ebdfe8396645e9e2617f4b67485216da12721f03197
SHA5121325202b1fcd67ac28f346bda133ab3eed17f8cd32af7fe4dddef3d7b4b2aa36f74bb0bf051462328a8d3d256ca1a2365edc6e5d28ab5d0e89de1e334c0919ae
-
Filesize
1.2MB
MD5a2b98cde55a7bce4300eaad4c03d8661
SHA13c085d451c12ebde9442f3419dd9ecc8f3eed14b
SHA256c6006f558ed69ccffb140cacae1c9b831bc92afa61d2473228d4c5c63aae5473
SHA51205fbe1afdeb23e4f3e0e337445a9f7deb44fff5cba1d0dd2e9e421eaaa641eef461c67b14d6bb1e431467942e4079d4237d02aace138a05d51329c385fc88784
-
Filesize
1.2MB
MD5a2b98cde55a7bce4300eaad4c03d8661
SHA13c085d451c12ebde9442f3419dd9ecc8f3eed14b
SHA256c6006f558ed69ccffb140cacae1c9b831bc92afa61d2473228d4c5c63aae5473
SHA51205fbe1afdeb23e4f3e0e337445a9f7deb44fff5cba1d0dd2e9e421eaaa641eef461c67b14d6bb1e431467942e4079d4237d02aace138a05d51329c385fc88784
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
1.0MB
MD58b673278b98cf82f2d5eaf5d87e61e6d
SHA1ea39481329716573a7aba79d074e1e3683315635
SHA256fad92dd2ea05e6cf2c6e2a527ba3ffa4d63b0ddb253cddac48398b298818beba
SHA51223c041fae3cbf6889856d5094339655d4b106666d17e3c5da96981e65b63b074e544cf6807e0c312b4c279cd4b5593d0b6c5b18f12e68b690baddc7d5b8adaaf
-
Filesize
1.0MB
MD58b673278b98cf82f2d5eaf5d87e61e6d
SHA1ea39481329716573a7aba79d074e1e3683315635
SHA256fad92dd2ea05e6cf2c6e2a527ba3ffa4d63b0ddb253cddac48398b298818beba
SHA51223c041fae3cbf6889856d5094339655d4b106666d17e3c5da96981e65b63b074e544cf6807e0c312b4c279cd4b5593d0b6c5b18f12e68b690baddc7d5b8adaaf
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
884KB
MD5259fcdd3d918ab5bd5a5db36501dd25f
SHA1a8c2d5b98a69a76ecfae7ffdb9df8f8f5a717631
SHA25665da8f9db86ce873cfc0c415695699f4a7e4e1fdb92ea4736417f47519d245e4
SHA512a73ee2f354ee72c426ef620ffa145cd5d6e67427d03fab0ba98cdee5ea4eba7a30b1a1892c1b706648f2135e8161bf7167623309f9570b061f7ee0501403a1bc
-
Filesize
884KB
MD5259fcdd3d918ab5bd5a5db36501dd25f
SHA1a8c2d5b98a69a76ecfae7ffdb9df8f8f5a717631
SHA25665da8f9db86ce873cfc0c415695699f4a7e4e1fdb92ea4736417f47519d245e4
SHA512a73ee2f354ee72c426ef620ffa145cd5d6e67427d03fab0ba98cdee5ea4eba7a30b1a1892c1b706648f2135e8161bf7167623309f9570b061f7ee0501403a1bc
-
Filesize
1.0MB
MD596d9f6c15e1f3ef7ada66932db8bf5f1
SHA1dad9920afdc5e63f0effcc8cb368b070649de3d5
SHA25673663a134fd04fdcbad6b61c01635d33a0b027d385bd0aa4f65b0f748e600cc2
SHA512e663af8964d2f86fbee42ef4683ba8f5b1867bf55c8c1cd5699caef75f9b37ae37675c456a27e18bcb4f654ec00dd427079a9c3ec4426746118084dc3c3d4735
-
Filesize
1.0MB
MD596d9f6c15e1f3ef7ada66932db8bf5f1
SHA1dad9920afdc5e63f0effcc8cb368b070649de3d5
SHA25673663a134fd04fdcbad6b61c01635d33a0b027d385bd0aa4f65b0f748e600cc2
SHA512e663af8964d2f86fbee42ef4683ba8f5b1867bf55c8c1cd5699caef75f9b37ae37675c456a27e18bcb4f654ec00dd427079a9c3ec4426746118084dc3c3d4735
-
Filesize
493KB
MD58e7ac95e2e0bf5cd97552967d93ad038
SHA1d21deb58632d5277d48db8c5e3b30f8edf12faff
SHA256f19143454afb951cb7d3546666cbaba9f68385c519e01eb095875dd283f51b70
SHA512bcda7adf788e4d2de36da764a607a4128d36cc2355bb0a048bdc0d7a8ef21e91151a96ebc2e1eb0dd8621b738b08c673de06295783480d9d4da0b8934a1b8813
-
Filesize
493KB
MD58e7ac95e2e0bf5cd97552967d93ad038
SHA1d21deb58632d5277d48db8c5e3b30f8edf12faff
SHA256f19143454afb951cb7d3546666cbaba9f68385c519e01eb095875dd283f51b70
SHA512bcda7adf788e4d2de36da764a607a4128d36cc2355bb0a048bdc0d7a8ef21e91151a96ebc2e1eb0dd8621b738b08c673de06295783480d9d4da0b8934a1b8813
-
Filesize
860KB
MD539db6054b34268ffa05dc2ef6b7bf6d1
SHA1eaef5206410618895b01c22bd4fdf5e13301b2d4
SHA256cd2ef28498ef6bef9e1a98ba982e8ba25972bd2ec5cc94b82a90b00058552b85
SHA5121cb66bc77de4879d63bd63e80e606f0cb4faa6037ac482fbae982bdc5fb17b90de592befed0b58b03475272fa34db55cd3cc50892a8407207d13b8b077172022
-
Filesize
860KB
MD539db6054b34268ffa05dc2ef6b7bf6d1
SHA1eaef5206410618895b01c22bd4fdf5e13301b2d4
SHA256cd2ef28498ef6bef9e1a98ba982e8ba25972bd2ec5cc94b82a90b00058552b85
SHA5121cb66bc77de4879d63bd63e80e606f0cb4faa6037ac482fbae982bdc5fb17b90de592befed0b58b03475272fa34db55cd3cc50892a8407207d13b8b077172022
-
Filesize
1016KB
MD5d33affe5dec45410aaa10db8d323e469
SHA157c07957b46ec75e45df4bb08de4b708fdcbf55e
SHA256b82920817690347a0a9cd69ec83084d05160c88c8481b8e76bf5bd7aab14c214
SHA512b26b18e5d3c2e2c44604a4609586ff3f629913c95635f2656076d49f82194e8a3244f9ed0c9728571bd4261940d6817d9135a7589f4f8663948294e322d4bd6f
-
Filesize
1016KB
MD5d33affe5dec45410aaa10db8d323e469
SHA157c07957b46ec75e45df4bb08de4b708fdcbf55e
SHA256b82920817690347a0a9cd69ec83084d05160c88c8481b8e76bf5bd7aab14c214
SHA512b26b18e5d3c2e2c44604a4609586ff3f629913c95635f2656076d49f82194e8a3244f9ed0c9728571bd4261940d6817d9135a7589f4f8663948294e322d4bd6f
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0