Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 09:09
Static task
static1
Behavioral task
behavioral1
Sample
0905ecc2e29a66245e718f2f52b25ee6a31db3e002cdfd047a20cc940c882338.exe
Resource
win7-20230831-en
General
-
Target
0905ecc2e29a66245e718f2f52b25ee6a31db3e002cdfd047a20cc940c882338.exe
-
Size
1.3MB
-
MD5
f385384fd849ff6aaf187105960cc093
-
SHA1
2c88b6d58b799ae6003bc439e18e32ba4336b942
-
SHA256
0905ecc2e29a66245e718f2f52b25ee6a31db3e002cdfd047a20cc940c882338
-
SHA512
5e12ab16287b4a9186932812cdecb59886ef9ebcb2c0b20d478168265c8867b4370568292e41ccaad10918302e0f0c3465adb8bfee84831452870aee00f0b8f6
-
SSDEEP
24576:jyR7G4iFeCjm3jzZx2gfT6Yfk+vTHNJ2Gqq716w4vKS8XcUkEEP5+1p7o03276g+:2h4tjAzZMgfT1fk+vyTLsMUkE8o27
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/5072-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5072-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5072-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/5072-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/2980-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t0458314.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u4957008.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 18 IoCs
pid Process 1628 z0312415.exe 540 z1703803.exe 4556 z7932444.exe 3696 z4542077.exe 736 q5629605.exe 3192 r8099249.exe 1504 s1671617.exe 2068 t0458314.exe 832 explonde.exe 3748 u4957008.exe 448 legota.exe 3088 w5826090.exe 3756 explonde.exe 1584 legota.exe 1780 explonde.exe 536 legota.exe 2940 explonde.exe 4564 legota.exe -
Loads dropped DLL 2 IoCs
pid Process 1492 rundll32.exe 2604 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4542077.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0905ecc2e29a66245e718f2f52b25ee6a31db3e002cdfd047a20cc940c882338.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0312415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1703803.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7932444.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 736 set thread context of 2980 736 q5629605.exe 92 PID 3192 set thread context of 5072 3192 r8099249.exe 100 PID 1504 set thread context of 1828 1504 s1671617.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1576 736 WerFault.exe 88 4908 3192 WerFault.exe 96 3852 5072 WerFault.exe 100 2864 1504 WerFault.exe 106 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4684 schtasks.exe 2028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2980 AppLaunch.exe 2980 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2980 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1628 2372 0905ecc2e29a66245e718f2f52b25ee6a31db3e002cdfd047a20cc940c882338.exe 83 PID 2372 wrote to memory of 1628 2372 0905ecc2e29a66245e718f2f52b25ee6a31db3e002cdfd047a20cc940c882338.exe 83 PID 2372 wrote to memory of 1628 2372 0905ecc2e29a66245e718f2f52b25ee6a31db3e002cdfd047a20cc940c882338.exe 83 PID 1628 wrote to memory of 540 1628 z0312415.exe 85 PID 1628 wrote to memory of 540 1628 z0312415.exe 85 PID 1628 wrote to memory of 540 1628 z0312415.exe 85 PID 540 wrote to memory of 4556 540 z1703803.exe 86 PID 540 wrote to memory of 4556 540 z1703803.exe 86 PID 540 wrote to memory of 4556 540 z1703803.exe 86 PID 4556 wrote to memory of 3696 4556 z7932444.exe 87 PID 4556 wrote to memory of 3696 4556 z7932444.exe 87 PID 4556 wrote to memory of 3696 4556 z7932444.exe 87 PID 3696 wrote to memory of 736 3696 z4542077.exe 88 PID 3696 wrote to memory of 736 3696 z4542077.exe 88 PID 3696 wrote to memory of 736 3696 z4542077.exe 88 PID 736 wrote to memory of 1208 736 q5629605.exe 90 PID 736 wrote to memory of 1208 736 q5629605.exe 90 PID 736 wrote to memory of 1208 736 q5629605.exe 90 PID 736 wrote to memory of 1500 736 q5629605.exe 91 PID 736 wrote to memory of 1500 736 q5629605.exe 91 PID 736 wrote to memory of 1500 736 q5629605.exe 91 PID 736 wrote to memory of 2980 736 q5629605.exe 92 PID 736 wrote to memory of 2980 736 q5629605.exe 92 PID 736 wrote to memory of 2980 736 q5629605.exe 92 PID 736 wrote to memory of 2980 736 q5629605.exe 92 PID 736 wrote to memory of 2980 736 q5629605.exe 92 PID 736 wrote to memory of 2980 736 q5629605.exe 92 PID 736 wrote to memory of 2980 736 q5629605.exe 92 PID 736 wrote to memory of 2980 736 q5629605.exe 92 PID 3696 wrote to memory of 3192 3696 z4542077.exe 96 PID 3696 wrote to memory of 3192 3696 z4542077.exe 96 PID 3696 wrote to memory of 3192 3696 z4542077.exe 96 PID 3192 wrote to memory of 5072 3192 r8099249.exe 100 PID 3192 wrote to memory of 5072 3192 r8099249.exe 100 PID 3192 wrote to memory of 5072 3192 r8099249.exe 100 PID 3192 wrote to memory of 5072 3192 r8099249.exe 100 PID 3192 wrote to memory of 5072 3192 r8099249.exe 100 PID 3192 wrote to memory of 5072 3192 r8099249.exe 100 PID 3192 wrote to memory of 5072 3192 r8099249.exe 100 PID 3192 wrote to memory of 5072 3192 r8099249.exe 100 PID 3192 wrote to memory of 5072 3192 r8099249.exe 100 PID 3192 wrote to memory of 5072 3192 r8099249.exe 100 PID 4556 wrote to memory of 1504 4556 z7932444.exe 106 PID 4556 wrote to memory of 1504 4556 z7932444.exe 106 PID 4556 wrote to memory of 1504 4556 z7932444.exe 106 PID 1504 wrote to memory of 1828 1504 s1671617.exe 109 PID 1504 wrote to memory of 1828 1504 s1671617.exe 109 PID 1504 wrote to memory of 1828 1504 s1671617.exe 109 PID 1504 wrote to memory of 1828 1504 s1671617.exe 109 PID 1504 wrote to memory of 1828 1504 s1671617.exe 109 PID 1504 wrote to memory of 1828 1504 s1671617.exe 109 PID 1504 wrote to memory of 1828 1504 s1671617.exe 109 PID 1504 wrote to memory of 1828 1504 s1671617.exe 109 PID 540 wrote to memory of 2068 540 z1703803.exe 112 PID 540 wrote to memory of 2068 540 z1703803.exe 112 PID 540 wrote to memory of 2068 540 z1703803.exe 112 PID 2068 wrote to memory of 832 2068 t0458314.exe 114 PID 2068 wrote to memory of 832 2068 t0458314.exe 114 PID 2068 wrote to memory of 832 2068 t0458314.exe 114 PID 1628 wrote to memory of 3748 1628 z0312415.exe 115 PID 1628 wrote to memory of 3748 1628 z0312415.exe 115 PID 1628 wrote to memory of 3748 1628 z0312415.exe 115 PID 832 wrote to memory of 4684 832 explonde.exe 117 PID 832 wrote to memory of 4684 832 explonde.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\0905ecc2e29a66245e718f2f52b25ee6a31db3e002cdfd047a20cc940c882338.exe"C:\Users\Admin\AppData\Local\Temp\0905ecc2e29a66245e718f2f52b25ee6a31db3e002cdfd047a20cc940c882338.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0312415.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0312415.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1703803.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1703803.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7932444.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7932444.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4542077.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4542077.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5629605.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5629605.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1208
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1500
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 6047⤵
- Program crash
PID:1576
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8099249.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8099249.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:5072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 5408⤵
- Program crash
PID:3852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 1567⤵
- Program crash
PID:4908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1671617.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1671617.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 5846⤵
- Program crash
PID:2864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0458314.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0458314.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:4684
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:1544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:4824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:4260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3380
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:464
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1492
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4957008.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4957008.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:2028
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:2084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:2588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3876
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4716
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:1576
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2604
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5826090.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5826090.exe2⤵
- Executes dropped EXE
PID:3088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 736 -ip 7361⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3192 -ip 31921⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5072 -ip 50721⤵PID:2780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1504 -ip 15041⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3756
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1584
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1780
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:536
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:2940
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4564
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD58f7c70560386c529dd7a77a1afea333e
SHA119a200b759f5cb3a8683b687b79744e98ab49f7a
SHA256722fc1587d477e8a7fe6069ad7e49b5214f86219b4c985c7ba735b4546c103f1
SHA512b48ed7c4ee979bd7cd95cc2c4c39b63cbb85810fe6342a50d8ee896cb8bcc0b90acefa4538826174c414dd2c49963571b8351318049233e4057c630b860d133e
-
Filesize
22KB
MD58f7c70560386c529dd7a77a1afea333e
SHA119a200b759f5cb3a8683b687b79744e98ab49f7a
SHA256722fc1587d477e8a7fe6069ad7e49b5214f86219b4c985c7ba735b4546c103f1
SHA512b48ed7c4ee979bd7cd95cc2c4c39b63cbb85810fe6342a50d8ee896cb8bcc0b90acefa4538826174c414dd2c49963571b8351318049233e4057c630b860d133e
-
Filesize
1.2MB
MD5c607eb7887e11d53e789a652f1d19fbf
SHA154f4cac57ec19c0afe699ae2f7c96eafbbeb77f1
SHA256da1cae1f47b371a02d0ddba24dd820185e9d30942e076fdc75eeec1eb3e2855a
SHA512b1f4d004cfa306f26ea0174ec277be78a69c2ca2d74b255e58aafcdfce3ecb355442bc65da9d110c9607a0f3a3e608fb173d1e1f8901c0df910deabc9b263e56
-
Filesize
1.2MB
MD5c607eb7887e11d53e789a652f1d19fbf
SHA154f4cac57ec19c0afe699ae2f7c96eafbbeb77f1
SHA256da1cae1f47b371a02d0ddba24dd820185e9d30942e076fdc75eeec1eb3e2855a
SHA512b1f4d004cfa306f26ea0174ec277be78a69c2ca2d74b255e58aafcdfce3ecb355442bc65da9d110c9607a0f3a3e608fb173d1e1f8901c0df910deabc9b263e56
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
1.0MB
MD52ef3250f8e0a931a3c1abba919864e28
SHA11e7dbdf88a3a061ab8e2afe2ae73063832515d42
SHA2563ba44a202d1ad29717d832aa4ef18e9f53c8bfaa83f3e009ffb24888900ad826
SHA512cae16fd7054015bdf3840825e978dffcc644dfb2bf1707fc70e90dcf04484c244bf03e7ba8e4a4d7e1135bbe78293b87a9551aeb0d88c7832c19ef87748d969c
-
Filesize
1.0MB
MD52ef3250f8e0a931a3c1abba919864e28
SHA11e7dbdf88a3a061ab8e2afe2ae73063832515d42
SHA2563ba44a202d1ad29717d832aa4ef18e9f53c8bfaa83f3e009ffb24888900ad826
SHA512cae16fd7054015bdf3840825e978dffcc644dfb2bf1707fc70e90dcf04484c244bf03e7ba8e4a4d7e1135bbe78293b87a9551aeb0d88c7832c19ef87748d969c
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
887KB
MD54d260090bc7d2b6f61b8bf8576562c0b
SHA1113c749fc9d061381b720f8206605828030e8eaf
SHA2569239b4b0033786a75fb1efe183acffa2df167041d7cae88971115fdb586bd9e9
SHA512a2d19a4c7aff5e674178597ad4606e067d3ed08b5e57be2dc9f2d16434c4b4e69775feefcbdcf230eeaa4e228838d634aebda1fcbba7572ea6cee6bf747127f5
-
Filesize
887KB
MD54d260090bc7d2b6f61b8bf8576562c0b
SHA1113c749fc9d061381b720f8206605828030e8eaf
SHA2569239b4b0033786a75fb1efe183acffa2df167041d7cae88971115fdb586bd9e9
SHA512a2d19a4c7aff5e674178597ad4606e067d3ed08b5e57be2dc9f2d16434c4b4e69775feefcbdcf230eeaa4e228838d634aebda1fcbba7572ea6cee6bf747127f5
-
Filesize
1.0MB
MD52a9ff230b7ea9093c26bba88a5273318
SHA1477bd43d31b92f33ba9c833df14c7b047fcb2b11
SHA25673badd05a49fa84dbdcb0c26e8cc94c564e32f1d00ce99f4eaa7f7066b104440
SHA512431a213bca30b3a0be48a0c7197e823db852d6ab8257d2da25f7aa8d8399c4073dddeeeb45b155d063855407477774d615c64395899f3adb8c456e185e55f954
-
Filesize
1.0MB
MD52a9ff230b7ea9093c26bba88a5273318
SHA1477bd43d31b92f33ba9c833df14c7b047fcb2b11
SHA25673badd05a49fa84dbdcb0c26e8cc94c564e32f1d00ce99f4eaa7f7066b104440
SHA512431a213bca30b3a0be48a0c7197e823db852d6ab8257d2da25f7aa8d8399c4073dddeeeb45b155d063855407477774d615c64395899f3adb8c456e185e55f954
-
Filesize
496KB
MD5af19632b59b0d27e6868693b809ddb13
SHA1b83e60525bbe1a8060bbb2b4df071e4b1181141e
SHA2569e7e43074c363993753bac3ae8aa0cf4a5cec7ee7ce9e454834504a1d4142c32
SHA5123523174704f20ae41e15c61ab6293617d7df73c8fa1ac4e130397066e3639a454b3fb7a1706853cdacb1fedb55e6424e1d9ea3d0f386b2d522c5defe23d7ac5d
-
Filesize
496KB
MD5af19632b59b0d27e6868693b809ddb13
SHA1b83e60525bbe1a8060bbb2b4df071e4b1181141e
SHA2569e7e43074c363993753bac3ae8aa0cf4a5cec7ee7ce9e454834504a1d4142c32
SHA5123523174704f20ae41e15c61ab6293617d7df73c8fa1ac4e130397066e3639a454b3fb7a1706853cdacb1fedb55e6424e1d9ea3d0f386b2d522c5defe23d7ac5d
-
Filesize
860KB
MD5a2bcbcb38aab5f804b58b33c08d767b5
SHA138b5d1d0cd59a1deb9c1920c7d6d27144db90658
SHA25669f3681fdb69029aa783260ccf61ee433bfd1252538b41c372ba204ec360cf3f
SHA5129ebcef807316b4edfe4021b3d16b704f8b420bbbbd6c175647435a7a0578f83af81f5c3779e97d98403291721e8cf8a3093d8ed8b29140f573f01b4f747089f9
-
Filesize
860KB
MD5a2bcbcb38aab5f804b58b33c08d767b5
SHA138b5d1d0cd59a1deb9c1920c7d6d27144db90658
SHA25669f3681fdb69029aa783260ccf61ee433bfd1252538b41c372ba204ec360cf3f
SHA5129ebcef807316b4edfe4021b3d16b704f8b420bbbbd6c175647435a7a0578f83af81f5c3779e97d98403291721e8cf8a3093d8ed8b29140f573f01b4f747089f9
-
Filesize
1016KB
MD546a4548f46e48464a55ae3789b08cf00
SHA15c67f64f1ed6aca1b8e590981ff60f3cab515cdc
SHA256dd5ae01d6aee37a0b95c1a525075be0f0298fd11d72cc32d7cd5129cdfc1b95a
SHA512e7cb4e10b4fcb3adb67cfa2cb70adecf69e83f59036ddfceacfcce1875f3f2b95d2f510abd6765739249bf185b05a468db897c82d81f2e6de856f6b8bd41a375
-
Filesize
1016KB
MD546a4548f46e48464a55ae3789b08cf00
SHA15c67f64f1ed6aca1b8e590981ff60f3cab515cdc
SHA256dd5ae01d6aee37a0b95c1a525075be0f0298fd11d72cc32d7cd5129cdfc1b95a
SHA512e7cb4e10b4fcb3adb67cfa2cb70adecf69e83f59036ddfceacfcce1875f3f2b95d2f510abd6765739249bf185b05a468db897c82d81f2e6de856f6b8bd41a375
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0