Analysis
-
max time kernel
157s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 08:03
Static task
static1
Behavioral task
behavioral1
Sample
bed36fd089e44a2a25be3dbf9d4947a65b31bff0297205648745c18c70ab939c.exe
Resource
win7-20230831-en
General
-
Target
bed36fd089e44a2a25be3dbf9d4947a65b31bff0297205648745c18c70ab939c.exe
-
Size
1.3MB
-
MD5
a389bbaab7e8f0f0173b31282fba9e61
-
SHA1
25519d2e02baf53c7acbde414398a08941f7d53f
-
SHA256
bed36fd089e44a2a25be3dbf9d4947a65b31bff0297205648745c18c70ab939c
-
SHA512
774dca9a9426f38904b6d20b507ada12a41ecd553030b543d4da4121759af51d7b2a552c0fa832d481036258e44a89054829870cca7409f47aa431581675e88e
-
SSDEEP
24576:5yuBLVbVobaKmL6zWLPvYNFA8jVrlL1RUpHh555eglue4gQRx5HNVkahI:suZtVsnmKQqT1l1REF5huh7HNVk
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4864-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4864-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4864-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4864-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4412-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t7994945.exeu0931921.exeexplonde.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation t7994945.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation u0931921.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z6231260.exez1410213.exez2935921.exez4593084.exeq9046977.exer4664148.exes5876749.exet7994945.exeexplonde.exeu0931921.exelegota.exew4648228.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 3884 z6231260.exe 2020 z1410213.exe 2088 z2935921.exe 4004 z4593084.exe 2368 q9046977.exe 1808 r4664148.exe 1484 s5876749.exe 3872 t7994945.exe 3344 explonde.exe 2032 u0931921.exe 5092 legota.exe 2776 w4648228.exe 544 explonde.exe 4988 legota.exe 4140 explonde.exe 1324 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4160 rundll32.exe 2036 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z4593084.exebed36fd089e44a2a25be3dbf9d4947a65b31bff0297205648745c18c70ab939c.exez6231260.exez1410213.exez2935921.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4593084.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bed36fd089e44a2a25be3dbf9d4947a65b31bff0297205648745c18c70ab939c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6231260.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1410213.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z2935921.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q9046977.exer4664148.exes5876749.exedescription pid process target process PID 2368 set thread context of 4412 2368 q9046977.exe AppLaunch.exe PID 1808 set thread context of 4864 1808 r4664148.exe AppLaunch.exe PID 1484 set thread context of 396 1484 s5876749.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5060 2368 WerFault.exe q9046977.exe 2212 1808 WerFault.exe r4664148.exe 468 4864 WerFault.exe AppLaunch.exe 4196 1484 WerFault.exe s5876749.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 868 schtasks.exe 1592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
AppLaunch.exepid process 4412 AppLaunch.exe 4412 AppLaunch.exe 4412 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 4412 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bed36fd089e44a2a25be3dbf9d4947a65b31bff0297205648745c18c70ab939c.exez6231260.exez1410213.exez2935921.exez4593084.exeq9046977.exer4664148.exes5876749.exet7994945.exeu0931921.exeexplonde.exedescription pid process target process PID 4080 wrote to memory of 3884 4080 bed36fd089e44a2a25be3dbf9d4947a65b31bff0297205648745c18c70ab939c.exe z6231260.exe PID 4080 wrote to memory of 3884 4080 bed36fd089e44a2a25be3dbf9d4947a65b31bff0297205648745c18c70ab939c.exe z6231260.exe PID 4080 wrote to memory of 3884 4080 bed36fd089e44a2a25be3dbf9d4947a65b31bff0297205648745c18c70ab939c.exe z6231260.exe PID 3884 wrote to memory of 2020 3884 z6231260.exe z1410213.exe PID 3884 wrote to memory of 2020 3884 z6231260.exe z1410213.exe PID 3884 wrote to memory of 2020 3884 z6231260.exe z1410213.exe PID 2020 wrote to memory of 2088 2020 z1410213.exe z2935921.exe PID 2020 wrote to memory of 2088 2020 z1410213.exe z2935921.exe PID 2020 wrote to memory of 2088 2020 z1410213.exe z2935921.exe PID 2088 wrote to memory of 4004 2088 z2935921.exe z4593084.exe PID 2088 wrote to memory of 4004 2088 z2935921.exe z4593084.exe PID 2088 wrote to memory of 4004 2088 z2935921.exe z4593084.exe PID 4004 wrote to memory of 2368 4004 z4593084.exe q9046977.exe PID 4004 wrote to memory of 2368 4004 z4593084.exe q9046977.exe PID 4004 wrote to memory of 2368 4004 z4593084.exe q9046977.exe PID 2368 wrote to memory of 4412 2368 q9046977.exe AppLaunch.exe PID 2368 wrote to memory of 4412 2368 q9046977.exe AppLaunch.exe PID 2368 wrote to memory of 4412 2368 q9046977.exe AppLaunch.exe PID 2368 wrote to memory of 4412 2368 q9046977.exe AppLaunch.exe PID 2368 wrote to memory of 4412 2368 q9046977.exe AppLaunch.exe PID 2368 wrote to memory of 4412 2368 q9046977.exe AppLaunch.exe PID 2368 wrote to memory of 4412 2368 q9046977.exe AppLaunch.exe PID 2368 wrote to memory of 4412 2368 q9046977.exe AppLaunch.exe PID 4004 wrote to memory of 1808 4004 z4593084.exe r4664148.exe PID 4004 wrote to memory of 1808 4004 z4593084.exe r4664148.exe PID 4004 wrote to memory of 1808 4004 z4593084.exe r4664148.exe PID 1808 wrote to memory of 4864 1808 r4664148.exe AppLaunch.exe PID 1808 wrote to memory of 4864 1808 r4664148.exe AppLaunch.exe PID 1808 wrote to memory of 4864 1808 r4664148.exe AppLaunch.exe PID 1808 wrote to memory of 4864 1808 r4664148.exe AppLaunch.exe PID 1808 wrote to memory of 4864 1808 r4664148.exe AppLaunch.exe PID 1808 wrote to memory of 4864 1808 r4664148.exe AppLaunch.exe PID 1808 wrote to memory of 4864 1808 r4664148.exe AppLaunch.exe PID 1808 wrote to memory of 4864 1808 r4664148.exe AppLaunch.exe PID 1808 wrote to memory of 4864 1808 r4664148.exe AppLaunch.exe PID 1808 wrote to memory of 4864 1808 r4664148.exe AppLaunch.exe PID 2088 wrote to memory of 1484 2088 z2935921.exe s5876749.exe PID 2088 wrote to memory of 1484 2088 z2935921.exe s5876749.exe PID 2088 wrote to memory of 1484 2088 z2935921.exe s5876749.exe PID 1484 wrote to memory of 4828 1484 s5876749.exe AppLaunch.exe PID 1484 wrote to memory of 4828 1484 s5876749.exe AppLaunch.exe PID 1484 wrote to memory of 4828 1484 s5876749.exe AppLaunch.exe PID 1484 wrote to memory of 396 1484 s5876749.exe AppLaunch.exe PID 1484 wrote to memory of 396 1484 s5876749.exe AppLaunch.exe PID 1484 wrote to memory of 396 1484 s5876749.exe AppLaunch.exe PID 1484 wrote to memory of 396 1484 s5876749.exe AppLaunch.exe PID 1484 wrote to memory of 396 1484 s5876749.exe AppLaunch.exe PID 1484 wrote to memory of 396 1484 s5876749.exe AppLaunch.exe PID 1484 wrote to memory of 396 1484 s5876749.exe AppLaunch.exe PID 1484 wrote to memory of 396 1484 s5876749.exe AppLaunch.exe PID 2020 wrote to memory of 3872 2020 z1410213.exe t7994945.exe PID 2020 wrote to memory of 3872 2020 z1410213.exe t7994945.exe PID 2020 wrote to memory of 3872 2020 z1410213.exe t7994945.exe PID 3872 wrote to memory of 3344 3872 t7994945.exe explonde.exe PID 3872 wrote to memory of 3344 3872 t7994945.exe explonde.exe PID 3872 wrote to memory of 3344 3872 t7994945.exe explonde.exe PID 3884 wrote to memory of 2032 3884 z6231260.exe u0931921.exe PID 3884 wrote to memory of 2032 3884 z6231260.exe u0931921.exe PID 3884 wrote to memory of 2032 3884 z6231260.exe u0931921.exe PID 2032 wrote to memory of 5092 2032 u0931921.exe legota.exe PID 2032 wrote to memory of 5092 2032 u0931921.exe legota.exe PID 2032 wrote to memory of 5092 2032 u0931921.exe legota.exe PID 3344 wrote to memory of 868 3344 explonde.exe schtasks.exe PID 3344 wrote to memory of 868 3344 explonde.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bed36fd089e44a2a25be3dbf9d4947a65b31bff0297205648745c18c70ab939c.exe"C:\Users\Admin\AppData\Local\Temp\bed36fd089e44a2a25be3dbf9d4947a65b31bff0297205648745c18c70ab939c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6231260.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6231260.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1410213.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1410213.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2935921.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2935921.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4593084.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4593084.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9046977.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9046977.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 5847⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4664148.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4664148.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 2008⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 1367⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5876749.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5876749.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 5846⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7994945.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7994945.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0931921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0931921.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w4648228.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w4648228.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2368 -ip 23681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1808 -ip 18081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4864 -ip 48641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1484 -ip 14841⤵
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w4648228.exeFilesize
22KB
MD50c6650b034c5fca62c1f592a6c0754c5
SHA195262d9844059c0cdd386c13678e31fc26f55abe
SHA256601936b2a1764a174cf6fe65d8ee28e43a6bd3274c8fb32b969f05c817caa0d2
SHA5128e5161802698b8b9ca0d6a8fad08d17055c48b751220bc5dcab6b7010074de24a61628a5d4f70325a41f2134ec2a9f1c60274d82e656b93f4fa39dfea6979baf
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w4648228.exeFilesize
22KB
MD50c6650b034c5fca62c1f592a6c0754c5
SHA195262d9844059c0cdd386c13678e31fc26f55abe
SHA256601936b2a1764a174cf6fe65d8ee28e43a6bd3274c8fb32b969f05c817caa0d2
SHA5128e5161802698b8b9ca0d6a8fad08d17055c48b751220bc5dcab6b7010074de24a61628a5d4f70325a41f2134ec2a9f1c60274d82e656b93f4fa39dfea6979baf
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6231260.exeFilesize
1.2MB
MD5a8c18262cd18b9b166d4594b89f8e758
SHA17049701e476a12531727c277b6064da92b38d77d
SHA2565089174d30dad454545a7c1fd31db77b27d647624d14992821068e21f4c3d24a
SHA5129e2e0aaac1b1e19f0b74a53c3e1489e6414bca8228fdc6a5c14dab8e24c47289655fdf2dca048c1ddb6e397865c00e6d6f38e7689577f9fa5da87b82a1b7e08c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6231260.exeFilesize
1.2MB
MD5a8c18262cd18b9b166d4594b89f8e758
SHA17049701e476a12531727c277b6064da92b38d77d
SHA2565089174d30dad454545a7c1fd31db77b27d647624d14992821068e21f4c3d24a
SHA5129e2e0aaac1b1e19f0b74a53c3e1489e6414bca8228fdc6a5c14dab8e24c47289655fdf2dca048c1ddb6e397865c00e6d6f38e7689577f9fa5da87b82a1b7e08c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0931921.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u0931921.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1410213.exeFilesize
1.0MB
MD52d14ead14ac965c67d398b9299c7c0b3
SHA1d802bd52ad16aca75072e7104a496f74e76d1c01
SHA256837e6a85fd9925f66600061c78040a3989572bec30bfc31a9975a59be7534aa7
SHA5126d32ffb5a227a1a8594c86dbf08fe07533773f4cf71a549db1f63cffe6bb7ddb387003acdad64c6a880652b6e53a2286ff67d9c06b258b54fe9a55f758e01315
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1410213.exeFilesize
1.0MB
MD52d14ead14ac965c67d398b9299c7c0b3
SHA1d802bd52ad16aca75072e7104a496f74e76d1c01
SHA256837e6a85fd9925f66600061c78040a3989572bec30bfc31a9975a59be7534aa7
SHA5126d32ffb5a227a1a8594c86dbf08fe07533773f4cf71a549db1f63cffe6bb7ddb387003acdad64c6a880652b6e53a2286ff67d9c06b258b54fe9a55f758e01315
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7994945.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t7994945.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2935921.exeFilesize
881KB
MD55882403d6c48cfd69a12d52db2220d49
SHA16e1c81aa53fe5587ffdc9def2392dc73c863e5f0
SHA2568491f1f813826b227f16bee2fa52d789d1eb51f4397a8a6690fd6e525ed81088
SHA512009ac37141ffbb7edf8994a4a5eb9894f86dbac89a9c6df01d2790312a8aead7a282d523b89b482468fe023d71eda9e49127abcb7bff74706e4dd51242601842
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z2935921.exeFilesize
881KB
MD55882403d6c48cfd69a12d52db2220d49
SHA16e1c81aa53fe5587ffdc9def2392dc73c863e5f0
SHA2568491f1f813826b227f16bee2fa52d789d1eb51f4397a8a6690fd6e525ed81088
SHA512009ac37141ffbb7edf8994a4a5eb9894f86dbac89a9c6df01d2790312a8aead7a282d523b89b482468fe023d71eda9e49127abcb7bff74706e4dd51242601842
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5876749.exeFilesize
1.0MB
MD5bc26676dfc8ceadf30d930a0e2c5cfda
SHA154bda38be1664b7d2a56d1c02dfce14477fc3f09
SHA256ed37ab10dfef005f1ce054e98d62c58c2827f9aea9a3022263bff4c35bbf0c46
SHA5121eb037d879a66debbcaeb6335b2ef26ff21c52a1179ced23d0b767f29d7a292f791f435b18d6b210c7d04a62b444adf3c9d3fb2cb1269243940532769644ab3a
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5876749.exeFilesize
1.0MB
MD5bc26676dfc8ceadf30d930a0e2c5cfda
SHA154bda38be1664b7d2a56d1c02dfce14477fc3f09
SHA256ed37ab10dfef005f1ce054e98d62c58c2827f9aea9a3022263bff4c35bbf0c46
SHA5121eb037d879a66debbcaeb6335b2ef26ff21c52a1179ced23d0b767f29d7a292f791f435b18d6b210c7d04a62b444adf3c9d3fb2cb1269243940532769644ab3a
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4593084.exeFilesize
490KB
MD5ed29a6a8248e1284be741f5677d6a85e
SHA1390e23afa89f5279e403e8520f95fc293a99aabb
SHA256d81de711f125867a231e20321310396522a5ab0c10fe1ec2a3477ce0bcf7d256
SHA512485759560dafe711bf68b072c9eddf501631acff62765e1cc895cba5d84cda8abb71b911d91fa4f894bff97da6762d8d921446e3223f184d1e2e30ed97e7b493
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4593084.exeFilesize
490KB
MD5ed29a6a8248e1284be741f5677d6a85e
SHA1390e23afa89f5279e403e8520f95fc293a99aabb
SHA256d81de711f125867a231e20321310396522a5ab0c10fe1ec2a3477ce0bcf7d256
SHA512485759560dafe711bf68b072c9eddf501631acff62765e1cc895cba5d84cda8abb71b911d91fa4f894bff97da6762d8d921446e3223f184d1e2e30ed97e7b493
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9046977.exeFilesize
860KB
MD56154b74cfebb293f625a996af06145bf
SHA103bf08a519b47a0213c36547d8da33cab6f2b5fa
SHA256d206ce0626914abee0e927eb0b5e1b695926aaf88b67d2ab9a497cfb91d52333
SHA5129ba0891c19bbe6ed801e8ff869c5027e990f1ad015bd91d92979d5d59406c4d1f812ede0a4fc9024449d676f4d095577278a0bcf197cc15ead211f922f90067f
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9046977.exeFilesize
860KB
MD56154b74cfebb293f625a996af06145bf
SHA103bf08a519b47a0213c36547d8da33cab6f2b5fa
SHA256d206ce0626914abee0e927eb0b5e1b695926aaf88b67d2ab9a497cfb91d52333
SHA5129ba0891c19bbe6ed801e8ff869c5027e990f1ad015bd91d92979d5d59406c4d1f812ede0a4fc9024449d676f4d095577278a0bcf197cc15ead211f922f90067f
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4664148.exeFilesize
1016KB
MD5a5a519863c75a4cf06e948e8a56dcda1
SHA1dc229ab5bf453ac51db5f944d2ac9ff671327112
SHA25639e1ad350280716cde84f413b7933b0308aaaabe1e47bc93c6c9959311e19070
SHA512a22e040a9660ed2f66fb8f0df0947f784ad80fb7e88277066544c2e2db23901ea41e8a512c82389c046a4db0cc3eba79804e83f5aae245e36be5d72e1aca10c9
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4664148.exeFilesize
1016KB
MD5a5a519863c75a4cf06e948e8a56dcda1
SHA1dc229ab5bf453ac51db5f944d2ac9ff671327112
SHA25639e1ad350280716cde84f413b7933b0308aaaabe1e47bc93c6c9959311e19070
SHA512a22e040a9660ed2f66fb8f0df0947f784ad80fb7e88277066544c2e2db23901ea41e8a512c82389c046a4db0cc3eba79804e83f5aae245e36be5d72e1aca10c9
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0
-
memory/396-51-0x0000000005F00000-0x0000000006518000-memory.dmpFilesize
6.1MB
-
memory/396-59-0x00000000058D0000-0x00000000058E0000-memory.dmpFilesize
64KB
-
memory/396-56-0x0000000005840000-0x0000000005852000-memory.dmpFilesize
72KB
-
memory/396-55-0x00000000059F0000-0x0000000005AFA000-memory.dmpFilesize
1.0MB
-
memory/396-60-0x00000000058E0000-0x000000000591C000-memory.dmpFilesize
240KB
-
memory/396-87-0x0000000073E40000-0x00000000745F0000-memory.dmpFilesize
7.7MB
-
memory/396-88-0x00000000058D0000-0x00000000058E0000-memory.dmpFilesize
64KB
-
memory/396-50-0x0000000001950000-0x0000000001956000-memory.dmpFilesize
24KB
-
memory/396-49-0x0000000073E40000-0x00000000745F0000-memory.dmpFilesize
7.7MB
-
memory/396-48-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/396-65-0x0000000005920000-0x000000000596C000-memory.dmpFilesize
304KB
-
memory/4412-84-0x0000000073E40000-0x00000000745F0000-memory.dmpFilesize
7.7MB
-
memory/4412-86-0x0000000073E40000-0x00000000745F0000-memory.dmpFilesize
7.7MB
-
memory/4412-36-0x0000000073E40000-0x00000000745F0000-memory.dmpFilesize
7.7MB
-
memory/4412-35-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/4864-41-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4864-42-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4864-44-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4864-40-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB