Analysis
-
max time kernel
170s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 07:54
Static task
static1
Behavioral task
behavioral1
Sample
0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exe
Resource
win7-20230831-en
General
-
Target
0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exe
-
Size
1.3MB
-
MD5
3cb0854a76c7ca760d453aefbcceb6fe
-
SHA1
8fcf3b3dcf6acc417bcce5aef8d18f7843acd4b6
-
SHA256
0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263
-
SHA512
300938af999edce3f4c69c9599b8249b66f8ac620375b47fcaf863739c80cd966293e1ce3776b9470d4a65f5c16c004adc90a577d0aa5d6efb4b328db03ca865
-
SSDEEP
24576:8yuiiqy86U6PWjmb0/0CKkearNg55Pm3u+EvmNlC7B+nr4U6OWAWfalgV:rqnPt0/0u/3u+puAr/wjf
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3340-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3340-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3340-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3340-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5064-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t0666924.exeexplonde.exeu1300178.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation t0666924.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation u1300178.exe Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 14 IoCs
Processes:
z8640339.exez0954764.exez7525724.exez9739561.exeq5651491.exer5175211.exes0202526.exet0666924.exeexplonde.exeu1300178.exelegota.exew1844845.exeexplonde.exelegota.exepid process 3172 z8640339.exe 2328 z0954764.exe 2796 z7525724.exe 4180 z9739561.exe 4592 q5651491.exe 4156 r5175211.exe 4656 s0202526.exe 3768 t0666924.exe 2552 explonde.exe 3060 u1300178.exe 4928 legota.exe 4528 w1844845.exe 1988 explonde.exe 2104 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4588 rundll32.exe 3684 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z9739561.exe0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exez8640339.exez0954764.exez7525724.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z9739561.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8640339.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0954764.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7525724.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q5651491.exer5175211.exes0202526.exedescription pid process target process PID 4592 set thread context of 5064 4592 q5651491.exe AppLaunch.exe PID 4156 set thread context of 3340 4156 r5175211.exe AppLaunch.exe PID 4656 set thread context of 3940 4656 s0202526.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3232 4592 WerFault.exe q5651491.exe 1896 4156 WerFault.exe r5175211.exe 4176 3340 WerFault.exe AppLaunch.exe 4752 4656 WerFault.exe s0202526.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 552 schtasks.exe 836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 5064 AppLaunch.exe 5064 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 5064 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exez8640339.exez0954764.exez7525724.exez9739561.exeq5651491.exer5175211.exes0202526.exet0666924.exeexplonde.exeu1300178.exelegota.exedescription pid process target process PID 4756 wrote to memory of 3172 4756 0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exe z8640339.exe PID 4756 wrote to memory of 3172 4756 0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exe z8640339.exe PID 4756 wrote to memory of 3172 4756 0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exe z8640339.exe PID 3172 wrote to memory of 2328 3172 z8640339.exe z0954764.exe PID 3172 wrote to memory of 2328 3172 z8640339.exe z0954764.exe PID 3172 wrote to memory of 2328 3172 z8640339.exe z0954764.exe PID 2328 wrote to memory of 2796 2328 z0954764.exe z7525724.exe PID 2328 wrote to memory of 2796 2328 z0954764.exe z7525724.exe PID 2328 wrote to memory of 2796 2328 z0954764.exe z7525724.exe PID 2796 wrote to memory of 4180 2796 z7525724.exe z9739561.exe PID 2796 wrote to memory of 4180 2796 z7525724.exe z9739561.exe PID 2796 wrote to memory of 4180 2796 z7525724.exe z9739561.exe PID 4180 wrote to memory of 4592 4180 z9739561.exe q5651491.exe PID 4180 wrote to memory of 4592 4180 z9739561.exe q5651491.exe PID 4180 wrote to memory of 4592 4180 z9739561.exe q5651491.exe PID 4592 wrote to memory of 5064 4592 q5651491.exe AppLaunch.exe PID 4592 wrote to memory of 5064 4592 q5651491.exe AppLaunch.exe PID 4592 wrote to memory of 5064 4592 q5651491.exe AppLaunch.exe PID 4592 wrote to memory of 5064 4592 q5651491.exe AppLaunch.exe PID 4592 wrote to memory of 5064 4592 q5651491.exe AppLaunch.exe PID 4592 wrote to memory of 5064 4592 q5651491.exe AppLaunch.exe PID 4592 wrote to memory of 5064 4592 q5651491.exe AppLaunch.exe PID 4592 wrote to memory of 5064 4592 q5651491.exe AppLaunch.exe PID 4180 wrote to memory of 4156 4180 z9739561.exe r5175211.exe PID 4180 wrote to memory of 4156 4180 z9739561.exe r5175211.exe PID 4180 wrote to memory of 4156 4180 z9739561.exe r5175211.exe PID 4156 wrote to memory of 3340 4156 r5175211.exe AppLaunch.exe PID 4156 wrote to memory of 3340 4156 r5175211.exe AppLaunch.exe PID 4156 wrote to memory of 3340 4156 r5175211.exe AppLaunch.exe PID 4156 wrote to memory of 3340 4156 r5175211.exe AppLaunch.exe PID 4156 wrote to memory of 3340 4156 r5175211.exe AppLaunch.exe PID 4156 wrote to memory of 3340 4156 r5175211.exe AppLaunch.exe PID 4156 wrote to memory of 3340 4156 r5175211.exe AppLaunch.exe PID 4156 wrote to memory of 3340 4156 r5175211.exe AppLaunch.exe PID 4156 wrote to memory of 3340 4156 r5175211.exe AppLaunch.exe PID 4156 wrote to memory of 3340 4156 r5175211.exe AppLaunch.exe PID 2796 wrote to memory of 4656 2796 z7525724.exe s0202526.exe PID 2796 wrote to memory of 4656 2796 z7525724.exe s0202526.exe PID 2796 wrote to memory of 4656 2796 z7525724.exe s0202526.exe PID 4656 wrote to memory of 3940 4656 s0202526.exe AppLaunch.exe PID 4656 wrote to memory of 3940 4656 s0202526.exe AppLaunch.exe PID 4656 wrote to memory of 3940 4656 s0202526.exe AppLaunch.exe PID 4656 wrote to memory of 3940 4656 s0202526.exe AppLaunch.exe PID 4656 wrote to memory of 3940 4656 s0202526.exe AppLaunch.exe PID 4656 wrote to memory of 3940 4656 s0202526.exe AppLaunch.exe PID 4656 wrote to memory of 3940 4656 s0202526.exe AppLaunch.exe PID 4656 wrote to memory of 3940 4656 s0202526.exe AppLaunch.exe PID 2328 wrote to memory of 3768 2328 z0954764.exe t0666924.exe PID 2328 wrote to memory of 3768 2328 z0954764.exe t0666924.exe PID 2328 wrote to memory of 3768 2328 z0954764.exe t0666924.exe PID 3768 wrote to memory of 2552 3768 t0666924.exe explonde.exe PID 3768 wrote to memory of 2552 3768 t0666924.exe explonde.exe PID 3768 wrote to memory of 2552 3768 t0666924.exe explonde.exe PID 2552 wrote to memory of 552 2552 explonde.exe schtasks.exe PID 2552 wrote to memory of 552 2552 explonde.exe schtasks.exe PID 2552 wrote to memory of 552 2552 explonde.exe schtasks.exe PID 3172 wrote to memory of 3060 3172 z8640339.exe u1300178.exe PID 3172 wrote to memory of 3060 3172 z8640339.exe u1300178.exe PID 3172 wrote to memory of 3060 3172 z8640339.exe u1300178.exe PID 3060 wrote to memory of 4928 3060 u1300178.exe legota.exe PID 3060 wrote to memory of 4928 3060 u1300178.exe legota.exe PID 3060 wrote to memory of 4928 3060 u1300178.exe legota.exe PID 4928 wrote to memory of 836 4928 legota.exe schtasks.exe PID 4928 wrote to memory of 836 4928 legota.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exe"C:\Users\Admin\AppData\Local\Temp\0a2360bf27369ce13fcfb223ee765ca8eb09a33262cda4a2d84c04ad5ae20263.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8640339.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8640339.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0954764.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0954764.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7525724.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7525724.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9739561.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9739561.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 1407⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175211.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175211.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 2008⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4156 -s 1527⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0202526.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0202526.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4656 -s 1526⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0666924.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0666924.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1300178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1300178.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1844845.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1844845.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4592 -ip 45921⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4156 -ip 41561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3340 -ip 33401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4656 -ip 46561⤵
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1844845.exeFilesize
22KB
MD55cd20d6d18bc9bf0dd18c4dd8ff6b5cb
SHA17d5e3c449fb604b20d2f82dcdb43394ee1fe1e6d
SHA25646086de7bbf7aae3b34ada9b5ed44664a76210f0c8930363382e5abfdf753f8c
SHA5127f56ecc3f9e659462016e990620eb424a05e30a3a9205fbf86a3f6171a86ec65dc7dd18ba5841b64d53c8ca332e41541675d5c3eaf2fa00ca8df6a100c1f3366
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1844845.exeFilesize
22KB
MD55cd20d6d18bc9bf0dd18c4dd8ff6b5cb
SHA17d5e3c449fb604b20d2f82dcdb43394ee1fe1e6d
SHA25646086de7bbf7aae3b34ada9b5ed44664a76210f0c8930363382e5abfdf753f8c
SHA5127f56ecc3f9e659462016e990620eb424a05e30a3a9205fbf86a3f6171a86ec65dc7dd18ba5841b64d53c8ca332e41541675d5c3eaf2fa00ca8df6a100c1f3366
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8640339.exeFilesize
1.2MB
MD54754f1a18494182c411082d3a2ce3159
SHA11b45a2cd48befc5ba6a9e3ac8acd8e7e3614bf00
SHA256aba55d6c04cdf27c0b6717b4ac31e2f6daca8d5cc2f360b4b93044b6a8ffde23
SHA51290cd38168268b145ab227360c3aab9881fe2e3f03b05cb68745e467b99427f5093a5250b5cd843411e530307d07a18c4e68c47a41010bf4a72e58de02db2051c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8640339.exeFilesize
1.2MB
MD54754f1a18494182c411082d3a2ce3159
SHA11b45a2cd48befc5ba6a9e3ac8acd8e7e3614bf00
SHA256aba55d6c04cdf27c0b6717b4ac31e2f6daca8d5cc2f360b4b93044b6a8ffde23
SHA51290cd38168268b145ab227360c3aab9881fe2e3f03b05cb68745e467b99427f5093a5250b5cd843411e530307d07a18c4e68c47a41010bf4a72e58de02db2051c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1300178.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1300178.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0954764.exeFilesize
1.0MB
MD5377cce5f674dafb998be5e6f087d0a2c
SHA168d4f6049590c5357fde76e93e0a3c7aee62dfdc
SHA25609b532ec54855c3216bfeb0eef45179b3445502a4bfa5117660c077eb88b8d3b
SHA51255b94877a2598e87d96bc7ce6f12b7cd11407c40be583b80334152cff4724142602ae86002eaeac66124e98fe67bcce0332bb663fd9da3a986341ca13b103fa7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0954764.exeFilesize
1.0MB
MD5377cce5f674dafb998be5e6f087d0a2c
SHA168d4f6049590c5357fde76e93e0a3c7aee62dfdc
SHA25609b532ec54855c3216bfeb0eef45179b3445502a4bfa5117660c077eb88b8d3b
SHA51255b94877a2598e87d96bc7ce6f12b7cd11407c40be583b80334152cff4724142602ae86002eaeac66124e98fe67bcce0332bb663fd9da3a986341ca13b103fa7
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0666924.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0666924.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7525724.exeFilesize
883KB
MD57a11f4a98e6d15e68353a31f5038f641
SHA144b69e539ee86369c3f359bf779d18563fbc6e5c
SHA256fb4949c87681a91ab3d743b5cd57a565d6a00412891e32ada609fb11b48fe14e
SHA512cad2cee0947ff039386fd3d1e2b9eeac3a08533ae045bfd93867efe75c09aab06f9fdac8c31c02433f7040ef3c2d29e8ccd79e0f2c71718e2003926bdcace07c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7525724.exeFilesize
883KB
MD57a11f4a98e6d15e68353a31f5038f641
SHA144b69e539ee86369c3f359bf779d18563fbc6e5c
SHA256fb4949c87681a91ab3d743b5cd57a565d6a00412891e32ada609fb11b48fe14e
SHA512cad2cee0947ff039386fd3d1e2b9eeac3a08533ae045bfd93867efe75c09aab06f9fdac8c31c02433f7040ef3c2d29e8ccd79e0f2c71718e2003926bdcace07c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0202526.exeFilesize
1.0MB
MD5353d405e90cf8dd981fe07be99304532
SHA12af525ab1de55fd303481835fcceab1bfd04b625
SHA256b5171403b278bc3e58be650547dee03a6829f022cfcd14c0feb0e4d6536c39ef
SHA51278fb03f17edf16bc1380bf248bb2c4f2e2b417417e65b00c92878c1c50ca688947c65e9fc0e6f335481a79dc489e3b5e24f0a84bb3465efb2c87317d4f687bdf
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s0202526.exeFilesize
1.0MB
MD5353d405e90cf8dd981fe07be99304532
SHA12af525ab1de55fd303481835fcceab1bfd04b625
SHA256b5171403b278bc3e58be650547dee03a6829f022cfcd14c0feb0e4d6536c39ef
SHA51278fb03f17edf16bc1380bf248bb2c4f2e2b417417e65b00c92878c1c50ca688947c65e9fc0e6f335481a79dc489e3b5e24f0a84bb3465efb2c87317d4f687bdf
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9739561.exeFilesize
492KB
MD508f96c7ad826c352ca7ff92db730569b
SHA182cd678d4b1078b1ba06a5f144b6f21b3fb0ec34
SHA256d3fbbf225f3fb8aeadf736978a5060e932fdfd39e4cb24298e22d04c4aa2c13a
SHA512998741be6656fd830a8ac2c5b48398a0d89b1677ac9598ddf4d0186d5f1e67e8580fe44a3f3c595bc95b014e2cee469345d2e58ff2f79972132aa66c0ef34555
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9739561.exeFilesize
492KB
MD508f96c7ad826c352ca7ff92db730569b
SHA182cd678d4b1078b1ba06a5f144b6f21b3fb0ec34
SHA256d3fbbf225f3fb8aeadf736978a5060e932fdfd39e4cb24298e22d04c4aa2c13a
SHA512998741be6656fd830a8ac2c5b48398a0d89b1677ac9598ddf4d0186d5f1e67e8580fe44a3f3c595bc95b014e2cee469345d2e58ff2f79972132aa66c0ef34555
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exeFilesize
860KB
MD5a659f28ed73051a054d4ff0c2be85f33
SHA14319b05e40468e8c904f3c2e26974e0ea1dfdc98
SHA2560bf6cee86bc8f8c9c870c0c166f5c75403db9265c6c4ba907b113414445cf865
SHA512919cf70f42f39759cb254a65d96f36460a034cb3ad45b7d52f7cdfc5c526b65942251af77d406c7d61dcf3cfb65911e003a3cd618e192395805a8806b0cf06f4
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5651491.exeFilesize
860KB
MD5a659f28ed73051a054d4ff0c2be85f33
SHA14319b05e40468e8c904f3c2e26974e0ea1dfdc98
SHA2560bf6cee86bc8f8c9c870c0c166f5c75403db9265c6c4ba907b113414445cf865
SHA512919cf70f42f39759cb254a65d96f36460a034cb3ad45b7d52f7cdfc5c526b65942251af77d406c7d61dcf3cfb65911e003a3cd618e192395805a8806b0cf06f4
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175211.exeFilesize
1016KB
MD5f867970436e5ca91f6f2bcaa0b69c569
SHA1902358d47d19d3a749c12819767dec4c2f5d2520
SHA2565aec0f58773c62b367218a2f1efabd273ea673a65ef53383ba9ca6d8c8a17d00
SHA51250a23788141b3b4058b2dbb86d916228f1babdf81021cc3dbc6419eb99e07c39e7af6f699ba2678423f7a67884e586d62ba697fc19a0d38cf60f6efec4abaaa7
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r5175211.exeFilesize
1016KB
MD5f867970436e5ca91f6f2bcaa0b69c569
SHA1902358d47d19d3a749c12819767dec4c2f5d2520
SHA2565aec0f58773c62b367218a2f1efabd273ea673a65ef53383ba9ca6d8c8a17d00
SHA51250a23788141b3b4058b2dbb86d916228f1babdf81021cc3dbc6419eb99e07c39e7af6f699ba2678423f7a67884e586d62ba697fc19a0d38cf60f6efec4abaaa7
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0
-
memory/3340-43-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3340-45-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3340-42-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3340-41-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3940-54-0x00000000030F0000-0x00000000030F6000-memory.dmpFilesize
24KB
-
memory/3940-82-0x000000000B300000-0x000000000B918000-memory.dmpFilesize
6.1MB
-
memory/3940-86-0x000000000ADE0000-0x000000000AE1C000-memory.dmpFilesize
240KB
-
memory/3940-87-0x0000000003120000-0x0000000003130000-memory.dmpFilesize
64KB
-
memory/3940-88-0x000000000AF60000-0x000000000AFAC000-memory.dmpFilesize
304KB
-
memory/3940-84-0x0000000003120000-0x0000000003130000-memory.dmpFilesize
64KB
-
memory/3940-83-0x000000000AE50000-0x000000000AF5A000-memory.dmpFilesize
1.0MB
-
memory/3940-85-0x000000000AD80000-0x000000000AD92000-memory.dmpFilesize
72KB
-
memory/3940-49-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3940-57-0x0000000073D60000-0x0000000074510000-memory.dmpFilesize
7.7MB
-
memory/3940-50-0x0000000073D60000-0x0000000074510000-memory.dmpFilesize
7.7MB
-
memory/5064-78-0x0000000073D60000-0x0000000074510000-memory.dmpFilesize
7.7MB
-
memory/5064-37-0x0000000073D60000-0x0000000074510000-memory.dmpFilesize
7.7MB
-
memory/5064-36-0x0000000073D60000-0x0000000074510000-memory.dmpFilesize
7.7MB
-
memory/5064-35-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB