Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 07:49
Static task
static1
Behavioral task
behavioral1
Sample
f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20.exe
Resource
win7-20230831-en
General
-
Target
f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20.exe
-
Size
1.3MB
-
MD5
6c612b0df68dcf61601e2b7082693594
-
SHA1
e18dddd567fc1a9052e864d970ede48a0f6c2915
-
SHA256
f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20
-
SHA512
c32e41d0cc77fed88aac35f7940e61851616286d7cf30ad6ba0976ca685e9cb074df7fbb130f551a044ab2e88a174aef5348abc45d0f4cba19dcc9b60d107a11
-
SSDEEP
24576:jyn+UAG2diUwe3O7TIl35s+8E7nR+EW1b4phk299DVFNWUezH:2n+rdize3HJ78Mg1b4phB99Df41
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1508-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1508-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1508-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1508-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1328-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t8941364.exeexplonde.exeu9962047.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation t8941364.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation u9962047.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z9079378.exez9399152.exez0264032.exez4124860.exeq1971370.exer2870985.exes8983832.exet8941364.exeexplonde.exeu9962047.exelegota.exew0739397.exelegota.exeexplonde.exelegota.exeexplonde.exepid process 4756 z9079378.exe 4788 z9399152.exe 4024 z0264032.exe 4800 z4124860.exe 1648 q1971370.exe 1536 r2870985.exe 3736 s8983832.exe 5104 t8941364.exe 1808 explonde.exe 2948 u9962047.exe 4508 legota.exe 3276 w0739397.exe 1500 legota.exe 1580 explonde.exe 628 legota.exe 2900 explonde.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3736 rundll32.exe 4396 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20.exez9079378.exez9399152.exez0264032.exez4124860.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9079378.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9399152.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z0264032.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4124860.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q1971370.exer2870985.exes8983832.exedescription pid process target process PID 1648 set thread context of 1328 1648 q1971370.exe AppLaunch.exe PID 1536 set thread context of 1508 1536 r2870985.exe AppLaunch.exe PID 3736 set thread context of 3616 3736 s8983832.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3704 1648 WerFault.exe q1971370.exe 3656 1536 WerFault.exe r2870985.exe 2196 1508 WerFault.exe AppLaunch.exe 3460 3736 WerFault.exe s8983832.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1692 schtasks.exe 1360 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1328 AppLaunch.exe 1328 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1328 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20.exez9079378.exez9399152.exez0264032.exez4124860.exeq1971370.exer2870985.exes8983832.exet8941364.exeu9962047.exeexplonde.exedescription pid process target process PID 1820 wrote to memory of 4756 1820 f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20.exe z9079378.exe PID 1820 wrote to memory of 4756 1820 f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20.exe z9079378.exe PID 1820 wrote to memory of 4756 1820 f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20.exe z9079378.exe PID 4756 wrote to memory of 4788 4756 z9079378.exe z9399152.exe PID 4756 wrote to memory of 4788 4756 z9079378.exe z9399152.exe PID 4756 wrote to memory of 4788 4756 z9079378.exe z9399152.exe PID 4788 wrote to memory of 4024 4788 z9399152.exe z0264032.exe PID 4788 wrote to memory of 4024 4788 z9399152.exe z0264032.exe PID 4788 wrote to memory of 4024 4788 z9399152.exe z0264032.exe PID 4024 wrote to memory of 4800 4024 z0264032.exe z4124860.exe PID 4024 wrote to memory of 4800 4024 z0264032.exe z4124860.exe PID 4024 wrote to memory of 4800 4024 z0264032.exe z4124860.exe PID 4800 wrote to memory of 1648 4800 z4124860.exe q1971370.exe PID 4800 wrote to memory of 1648 4800 z4124860.exe q1971370.exe PID 4800 wrote to memory of 1648 4800 z4124860.exe q1971370.exe PID 1648 wrote to memory of 1328 1648 q1971370.exe AppLaunch.exe PID 1648 wrote to memory of 1328 1648 q1971370.exe AppLaunch.exe PID 1648 wrote to memory of 1328 1648 q1971370.exe AppLaunch.exe PID 1648 wrote to memory of 1328 1648 q1971370.exe AppLaunch.exe PID 1648 wrote to memory of 1328 1648 q1971370.exe AppLaunch.exe PID 1648 wrote to memory of 1328 1648 q1971370.exe AppLaunch.exe PID 1648 wrote to memory of 1328 1648 q1971370.exe AppLaunch.exe PID 1648 wrote to memory of 1328 1648 q1971370.exe AppLaunch.exe PID 4800 wrote to memory of 1536 4800 z4124860.exe r2870985.exe PID 4800 wrote to memory of 1536 4800 z4124860.exe r2870985.exe PID 4800 wrote to memory of 1536 4800 z4124860.exe r2870985.exe PID 1536 wrote to memory of 1508 1536 r2870985.exe AppLaunch.exe PID 1536 wrote to memory of 1508 1536 r2870985.exe AppLaunch.exe PID 1536 wrote to memory of 1508 1536 r2870985.exe AppLaunch.exe PID 1536 wrote to memory of 1508 1536 r2870985.exe AppLaunch.exe PID 1536 wrote to memory of 1508 1536 r2870985.exe AppLaunch.exe PID 1536 wrote to memory of 1508 1536 r2870985.exe AppLaunch.exe PID 1536 wrote to memory of 1508 1536 r2870985.exe AppLaunch.exe PID 1536 wrote to memory of 1508 1536 r2870985.exe AppLaunch.exe PID 1536 wrote to memory of 1508 1536 r2870985.exe AppLaunch.exe PID 1536 wrote to memory of 1508 1536 r2870985.exe AppLaunch.exe PID 4024 wrote to memory of 3736 4024 z0264032.exe s8983832.exe PID 4024 wrote to memory of 3736 4024 z0264032.exe s8983832.exe PID 4024 wrote to memory of 3736 4024 z0264032.exe s8983832.exe PID 3736 wrote to memory of 3616 3736 s8983832.exe AppLaunch.exe PID 3736 wrote to memory of 3616 3736 s8983832.exe AppLaunch.exe PID 3736 wrote to memory of 3616 3736 s8983832.exe AppLaunch.exe PID 3736 wrote to memory of 3616 3736 s8983832.exe AppLaunch.exe PID 3736 wrote to memory of 3616 3736 s8983832.exe AppLaunch.exe PID 3736 wrote to memory of 3616 3736 s8983832.exe AppLaunch.exe PID 3736 wrote to memory of 3616 3736 s8983832.exe AppLaunch.exe PID 3736 wrote to memory of 3616 3736 s8983832.exe AppLaunch.exe PID 4788 wrote to memory of 5104 4788 z9399152.exe t8941364.exe PID 4788 wrote to memory of 5104 4788 z9399152.exe t8941364.exe PID 4788 wrote to memory of 5104 4788 z9399152.exe t8941364.exe PID 5104 wrote to memory of 1808 5104 t8941364.exe explonde.exe PID 5104 wrote to memory of 1808 5104 t8941364.exe explonde.exe PID 5104 wrote to memory of 1808 5104 t8941364.exe explonde.exe PID 4756 wrote to memory of 2948 4756 z9079378.exe u9962047.exe PID 4756 wrote to memory of 2948 4756 z9079378.exe u9962047.exe PID 4756 wrote to memory of 2948 4756 z9079378.exe u9962047.exe PID 2948 wrote to memory of 4508 2948 u9962047.exe legota.exe PID 2948 wrote to memory of 4508 2948 u9962047.exe legota.exe PID 2948 wrote to memory of 4508 2948 u9962047.exe legota.exe PID 1808 wrote to memory of 1692 1808 explonde.exe schtasks.exe PID 1808 wrote to memory of 1692 1808 explonde.exe schtasks.exe PID 1808 wrote to memory of 1692 1808 explonde.exe schtasks.exe PID 1820 wrote to memory of 3276 1820 f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20.exe w0739397.exe PID 1820 wrote to memory of 3276 1820 f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20.exe w0739397.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20.exe"C:\Users\Admin\AppData\Local\Temp\f47a27f03341cfb2834ec7ee4831908d6f3d6bf9120708b73488b2ec9c4c6e20.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9079378.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9079378.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9399152.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9399152.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0264032.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0264032.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4124860.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4124860.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1971370.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1971370.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 6087⤵
- Program crash
PID:3704
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2870985.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r2870985.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 5408⤵
- Program crash
PID:2196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 1487⤵
- Program crash
PID:3656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8983832.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8983832.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 1526⤵
- Program crash
PID:3460
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t8941364.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t8941364.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:2520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:4672
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:1920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:2572
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4248
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:1692
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3736
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9962047.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9962047.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4508 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:1360
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1564
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2980
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:5056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:1116
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4396
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0739397.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0739397.exe2⤵
- Executes dropped EXE
PID:3276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1648 -ip 16481⤵PID:3592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1536 -ip 15361⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1508 -ip 15081⤵PID:5004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3736 -ip 37361⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1500
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1580
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:628
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:2900
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD59e313b97654a56b3491d86801e3f82c7
SHA10d7557b14c6a2160215871d786ffcc87585921bb
SHA25675fdd616a4cd2fbab91045940cc815201e106e1fd090657dc6173dc239a327ec
SHA512939febb2b9ccf779b35cfff095adb25f812bac9f4831a30d4ee6dcc3736f69aa60ce8e32970d6a04442ed421d62486343e213faff822ff9776fb033428627707
-
Filesize
22KB
MD59e313b97654a56b3491d86801e3f82c7
SHA10d7557b14c6a2160215871d786ffcc87585921bb
SHA25675fdd616a4cd2fbab91045940cc815201e106e1fd090657dc6173dc239a327ec
SHA512939febb2b9ccf779b35cfff095adb25f812bac9f4831a30d4ee6dcc3736f69aa60ce8e32970d6a04442ed421d62486343e213faff822ff9776fb033428627707
-
Filesize
1.2MB
MD5a8cd327efdbaf221e558a03ec83fdea6
SHA1ebe2b1e77b08b9cd9fe66a3d3bb43f6a33fc8a86
SHA256b0db02e143761397257549b69a3df5ceb83b5188b588630653191c6a4aa02c7a
SHA512a38fb40d20a51eef67866b9489e8c71dbb172741a33f9ebf9a01095065b62281b1f2ccba9fdd2ad6fff7b8872633262a9cad2b79cff603bd5ba3738863727472
-
Filesize
1.2MB
MD5a8cd327efdbaf221e558a03ec83fdea6
SHA1ebe2b1e77b08b9cd9fe66a3d3bb43f6a33fc8a86
SHA256b0db02e143761397257549b69a3df5ceb83b5188b588630653191c6a4aa02c7a
SHA512a38fb40d20a51eef67866b9489e8c71dbb172741a33f9ebf9a01095065b62281b1f2ccba9fdd2ad6fff7b8872633262a9cad2b79cff603bd5ba3738863727472
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
1.0MB
MD578cac1a63626eba0e6f73c371d091a35
SHA1bb9d013c17cf6588514a931d9c328e1e8bf99e06
SHA256dadf2f36d3dc88e3d724c91fd30350fe675546d99ec5b6bd3ad0198846a27066
SHA5124ddb4dd07be764f4d0e8d92f67bb873f882fdff8245b55d05166d0936357371cd9be8c0f74e7bef81045c33e36c6aefd5944bd6becdc9d8d069040cf19b68779
-
Filesize
1.0MB
MD578cac1a63626eba0e6f73c371d091a35
SHA1bb9d013c17cf6588514a931d9c328e1e8bf99e06
SHA256dadf2f36d3dc88e3d724c91fd30350fe675546d99ec5b6bd3ad0198846a27066
SHA5124ddb4dd07be764f4d0e8d92f67bb873f882fdff8245b55d05166d0936357371cd9be8c0f74e7bef81045c33e36c6aefd5944bd6becdc9d8d069040cf19b68779
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
881KB
MD5fa2e46ff027aa7c3e42918ad9bddc342
SHA180853f8d5504dd97ca043d8106ffa46289aba1a9
SHA2565a97fa823ab17efa2c79c459b0f9d4b180e44fd0949065365cd44d69600af6ce
SHA512616b959c60a20ddac2a8e9df6a1c8aab80abc30a861cb722d6ecc268ae34ad8ecdc08734633d2f4e5615dea67ca2c8c07fa83a36df4e2de595a416b05e94059d
-
Filesize
881KB
MD5fa2e46ff027aa7c3e42918ad9bddc342
SHA180853f8d5504dd97ca043d8106ffa46289aba1a9
SHA2565a97fa823ab17efa2c79c459b0f9d4b180e44fd0949065365cd44d69600af6ce
SHA512616b959c60a20ddac2a8e9df6a1c8aab80abc30a861cb722d6ecc268ae34ad8ecdc08734633d2f4e5615dea67ca2c8c07fa83a36df4e2de595a416b05e94059d
-
Filesize
1.0MB
MD589bb454d5d5ff80af6416435b8032852
SHA1570f9fc67195be43cb8252947e30ce9dd811fcb6
SHA2562244e5d8195656c5df38befaa8d248a8cd1a3036a198b7930d41407adce40027
SHA5125ccdefd823d02785fe199a13395cc13ac8e4b67f220f78119b350b7f99ab3c1d787647a2e0c7ce2642af7868c3d35d404b1246226a5250b7c4b7b8dee1d36da9
-
Filesize
1.0MB
MD589bb454d5d5ff80af6416435b8032852
SHA1570f9fc67195be43cb8252947e30ce9dd811fcb6
SHA2562244e5d8195656c5df38befaa8d248a8cd1a3036a198b7930d41407adce40027
SHA5125ccdefd823d02785fe199a13395cc13ac8e4b67f220f78119b350b7f99ab3c1d787647a2e0c7ce2642af7868c3d35d404b1246226a5250b7c4b7b8dee1d36da9
-
Filesize
491KB
MD5587b83da1247f9b28259caa956a3fd0e
SHA1b576efc531f5ea18b54fd8e553f5c1ef203cd454
SHA256567578fbd9c68df9424016011dcd9ef976d9559dd038fa14d051d96962d268a5
SHA5121156e1e1a8a9eb399099c6869ea65872c65932d1a74f414191422e07cdc23dfc324026a7edc9285b24b6bb2cec2449c3b39645a82c2efbfddb05baaeca1a71ac
-
Filesize
491KB
MD5587b83da1247f9b28259caa956a3fd0e
SHA1b576efc531f5ea18b54fd8e553f5c1ef203cd454
SHA256567578fbd9c68df9424016011dcd9ef976d9559dd038fa14d051d96962d268a5
SHA5121156e1e1a8a9eb399099c6869ea65872c65932d1a74f414191422e07cdc23dfc324026a7edc9285b24b6bb2cec2449c3b39645a82c2efbfddb05baaeca1a71ac
-
Filesize
860KB
MD535ba735b05ae1a966060321d22af44b2
SHA10dd305f91072a8d9a8c3147d7b3cab7f6159dbdb
SHA256d63d6cdcaa102ebe3729ea5d0d96f8bde5c864a92b8304146001bcbc6088cc31
SHA512659550839745df82063524709373418d59502b2c39175acc2927c91ba562476228531dd6c48ae943b75a4ce8df49f5d1c00a486d181dde40cbf83e4927ec8492
-
Filesize
860KB
MD535ba735b05ae1a966060321d22af44b2
SHA10dd305f91072a8d9a8c3147d7b3cab7f6159dbdb
SHA256d63d6cdcaa102ebe3729ea5d0d96f8bde5c864a92b8304146001bcbc6088cc31
SHA512659550839745df82063524709373418d59502b2c39175acc2927c91ba562476228531dd6c48ae943b75a4ce8df49f5d1c00a486d181dde40cbf83e4927ec8492
-
Filesize
1016KB
MD5aeea04d78b471eaca0c6a08c45ef684e
SHA12455de46a3349b5a82a7d844a6abb7d303db3931
SHA256fae78ea192c822e02e1709bb633ec1ec7de213e6fb9e74c4b5b5f966c697a68a
SHA5125c7b974df6001b39f4dd478b3c3b6032fd18148652105feb8d909340f727aa7337ac0c1cc02a044c1b71d36ba57692b168c61171c9489d8c6d93d11788d7bdbb
-
Filesize
1016KB
MD5aeea04d78b471eaca0c6a08c45ef684e
SHA12455de46a3349b5a82a7d844a6abb7d303db3931
SHA256fae78ea192c822e02e1709bb633ec1ec7de213e6fb9e74c4b5b5f966c697a68a
SHA5125c7b974df6001b39f4dd478b3c3b6032fd18148652105feb8d909340f727aa7337ac0c1cc02a044c1b71d36ba57692b168c61171c9489d8c6d93d11788d7bdbb
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0