Analysis
-
max time kernel
141s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 08:24
Static task
static1
Behavioral task
behavioral1
Sample
6f8898ab77d99d5750801e09a2db2b0c15b5720fe44d2e065062096232490b52_JC.exe
Resource
win7-20230831-en
General
-
Target
6f8898ab77d99d5750801e09a2db2b0c15b5720fe44d2e065062096232490b52_JC.exe
-
Size
1.1MB
-
MD5
cb7468785ba42b34e258e7e14ad20a99
-
SHA1
e7d4391c8972499e4383233b2ff218309fc142c9
-
SHA256
6f8898ab77d99d5750801e09a2db2b0c15b5720fe44d2e065062096232490b52
-
SHA512
10c9bbcf63c60e2f15a1fcd483cbcb0c140b36a716d6d2ba52e7b4f081d9eee21828766575977f0e6d1f3f8d6dcf08937a20f72e1264f5d61dfdd94f110a442d
-
SSDEEP
24576:lyqCHebSq+IkFsfmMPnMR0kX2bWpneFHZYZWGdR3ySEu1Bx:Av7Ik/aMRzbcF583PR1
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4516-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4516-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4516-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4516-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2016-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explonde.exeu5563053.exelegota.exet3491291.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation u5563053.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation t3491291.exe -
Executes dropped EXE 16 IoCs
Processes:
z0407219.exez4817778.exez7436510.exez2667912.exeq3972079.exer4503785.exes4178378.exet3491291.exeexplonde.exeu5563053.exelegota.exew4099209.exelegota.exeexplonde.exelegota.exeexplonde.exepid process 3168 z0407219.exe 944 z4817778.exe 524 z7436510.exe 5092 z2667912.exe 4236 q3972079.exe 3172 r4503785.exe 1780 s4178378.exe 3788 t3491291.exe 1440 explonde.exe 4248 u5563053.exe 4136 legota.exe 2384 w4099209.exe 348 legota.exe 2348 explonde.exe 2348 legota.exe 1744 explonde.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4424 rundll32.exe 2208 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z7436510.exez2667912.exe6f8898ab77d99d5750801e09a2db2b0c15b5720fe44d2e065062096232490b52_JC.exez0407219.exez4817778.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7436510.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z2667912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f8898ab77d99d5750801e09a2db2b0c15b5720fe44d2e065062096232490b52_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0407219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4817778.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q3972079.exer4503785.exes4178378.exedescription pid process target process PID 4236 set thread context of 2016 4236 q3972079.exe AppLaunch.exe PID 3172 set thread context of 4516 3172 r4503785.exe AppLaunch.exe PID 1780 set thread context of 2248 1780 s4178378.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2612 4236 WerFault.exe q3972079.exe 1308 3172 WerFault.exe r4503785.exe 3972 4516 WerFault.exe AppLaunch.exe 1932 1780 WerFault.exe s4178378.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4796 schtasks.exe 4940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 2016 AppLaunch.exe 2016 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 2016 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6f8898ab77d99d5750801e09a2db2b0c15b5720fe44d2e065062096232490b52_JC.exez0407219.exez4817778.exez7436510.exez2667912.exeq3972079.exer4503785.exes4178378.exet3491291.exeexplonde.execmd.exedescription pid process target process PID 1464 wrote to memory of 3168 1464 6f8898ab77d99d5750801e09a2db2b0c15b5720fe44d2e065062096232490b52_JC.exe z0407219.exe PID 1464 wrote to memory of 3168 1464 6f8898ab77d99d5750801e09a2db2b0c15b5720fe44d2e065062096232490b52_JC.exe z0407219.exe PID 1464 wrote to memory of 3168 1464 6f8898ab77d99d5750801e09a2db2b0c15b5720fe44d2e065062096232490b52_JC.exe z0407219.exe PID 3168 wrote to memory of 944 3168 z0407219.exe z4817778.exe PID 3168 wrote to memory of 944 3168 z0407219.exe z4817778.exe PID 3168 wrote to memory of 944 3168 z0407219.exe z4817778.exe PID 944 wrote to memory of 524 944 z4817778.exe z7436510.exe PID 944 wrote to memory of 524 944 z4817778.exe z7436510.exe PID 944 wrote to memory of 524 944 z4817778.exe z7436510.exe PID 524 wrote to memory of 5092 524 z7436510.exe z2667912.exe PID 524 wrote to memory of 5092 524 z7436510.exe z2667912.exe PID 524 wrote to memory of 5092 524 z7436510.exe z2667912.exe PID 5092 wrote to memory of 4236 5092 z2667912.exe q3972079.exe PID 5092 wrote to memory of 4236 5092 z2667912.exe q3972079.exe PID 5092 wrote to memory of 4236 5092 z2667912.exe q3972079.exe PID 4236 wrote to memory of 2016 4236 q3972079.exe AppLaunch.exe PID 4236 wrote to memory of 2016 4236 q3972079.exe AppLaunch.exe PID 4236 wrote to memory of 2016 4236 q3972079.exe AppLaunch.exe PID 4236 wrote to memory of 2016 4236 q3972079.exe AppLaunch.exe PID 4236 wrote to memory of 2016 4236 q3972079.exe AppLaunch.exe PID 4236 wrote to memory of 2016 4236 q3972079.exe AppLaunch.exe PID 4236 wrote to memory of 2016 4236 q3972079.exe AppLaunch.exe PID 4236 wrote to memory of 2016 4236 q3972079.exe AppLaunch.exe PID 5092 wrote to memory of 3172 5092 z2667912.exe r4503785.exe PID 5092 wrote to memory of 3172 5092 z2667912.exe r4503785.exe PID 5092 wrote to memory of 3172 5092 z2667912.exe r4503785.exe PID 3172 wrote to memory of 4516 3172 r4503785.exe AppLaunch.exe PID 3172 wrote to memory of 4516 3172 r4503785.exe AppLaunch.exe PID 3172 wrote to memory of 4516 3172 r4503785.exe AppLaunch.exe PID 3172 wrote to memory of 4516 3172 r4503785.exe AppLaunch.exe PID 3172 wrote to memory of 4516 3172 r4503785.exe AppLaunch.exe PID 3172 wrote to memory of 4516 3172 r4503785.exe AppLaunch.exe PID 3172 wrote to memory of 4516 3172 r4503785.exe AppLaunch.exe PID 3172 wrote to memory of 4516 3172 r4503785.exe AppLaunch.exe PID 3172 wrote to memory of 4516 3172 r4503785.exe AppLaunch.exe PID 3172 wrote to memory of 4516 3172 r4503785.exe AppLaunch.exe PID 524 wrote to memory of 1780 524 z7436510.exe s4178378.exe PID 524 wrote to memory of 1780 524 z7436510.exe s4178378.exe PID 524 wrote to memory of 1780 524 z7436510.exe s4178378.exe PID 1780 wrote to memory of 2248 1780 s4178378.exe AppLaunch.exe PID 1780 wrote to memory of 2248 1780 s4178378.exe AppLaunch.exe PID 1780 wrote to memory of 2248 1780 s4178378.exe AppLaunch.exe PID 1780 wrote to memory of 2248 1780 s4178378.exe AppLaunch.exe PID 1780 wrote to memory of 2248 1780 s4178378.exe AppLaunch.exe PID 1780 wrote to memory of 2248 1780 s4178378.exe AppLaunch.exe PID 1780 wrote to memory of 2248 1780 s4178378.exe AppLaunch.exe PID 1780 wrote to memory of 2248 1780 s4178378.exe AppLaunch.exe PID 944 wrote to memory of 3788 944 z4817778.exe t3491291.exe PID 944 wrote to memory of 3788 944 z4817778.exe t3491291.exe PID 944 wrote to memory of 3788 944 z4817778.exe t3491291.exe PID 3788 wrote to memory of 1440 3788 t3491291.exe explonde.exe PID 3788 wrote to memory of 1440 3788 t3491291.exe explonde.exe PID 3788 wrote to memory of 1440 3788 t3491291.exe explonde.exe PID 3168 wrote to memory of 4248 3168 z0407219.exe u5563053.exe PID 3168 wrote to memory of 4248 3168 z0407219.exe u5563053.exe PID 3168 wrote to memory of 4248 3168 z0407219.exe u5563053.exe PID 1440 wrote to memory of 4796 1440 explonde.exe schtasks.exe PID 1440 wrote to memory of 4796 1440 explonde.exe schtasks.exe PID 1440 wrote to memory of 4796 1440 explonde.exe schtasks.exe PID 1440 wrote to memory of 4212 1440 explonde.exe cmd.exe PID 1440 wrote to memory of 4212 1440 explonde.exe cmd.exe PID 1440 wrote to memory of 4212 1440 explonde.exe cmd.exe PID 4212 wrote to memory of 3924 4212 cmd.exe cmd.exe PID 4212 wrote to memory of 3924 4212 cmd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f8898ab77d99d5750801e09a2db2b0c15b5720fe44d2e065062096232490b52_JC.exe"C:\Users\Admin\AppData\Local\Temp\6f8898ab77d99d5750801e09a2db2b0c15b5720fe44d2e065062096232490b52_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0407219.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0407219.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4817778.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4817778.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7436510.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7436510.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2667912.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2667912.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3972079.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3972079.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 5687⤵
- Program crash
PID:2612
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4503785.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r4503785.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 5408⤵
- Program crash
PID:3972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 5647⤵
- Program crash
PID:1308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4178378.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s4178378.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 5646⤵
- Program crash
PID:1932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3491291.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3491291.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:4796
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:2544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:1236
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:5020
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u5563053.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u5563053.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4136 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:4940
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:1960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:2612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4236
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:1688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:5044
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4424
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w4099209.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w4099209.exe2⤵
- Executes dropped EXE
PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4236 -ip 42361⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3172 -ip 31721⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4516 -ip 45161⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1780 -ip 17801⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:348
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:2348
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2348
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5c9828a5a40064318adb4f60db971a751
SHA1b1070cfb9b8ae6d0a461cbe174be3252d691d964
SHA2567e046c8d24c3e40db8f0aa8c3115b1694a843a50fcb4e6a3602cc379bbf0b7f5
SHA5129f4af93448ebee2eaf0ca1dd425f3a10700c371d7cf9a52ecdc9473a1c5b64cd80d31e9d005a57193932fedddbeb22aa9a53749649ba364366a5bbd3aca30ebe
-
Filesize
22KB
MD5c9828a5a40064318adb4f60db971a751
SHA1b1070cfb9b8ae6d0a461cbe174be3252d691d964
SHA2567e046c8d24c3e40db8f0aa8c3115b1694a843a50fcb4e6a3602cc379bbf0b7f5
SHA5129f4af93448ebee2eaf0ca1dd425f3a10700c371d7cf9a52ecdc9473a1c5b64cd80d31e9d005a57193932fedddbeb22aa9a53749649ba364366a5bbd3aca30ebe
-
Filesize
997KB
MD529e06c2fc9f1afea42b9bbbbb2d4e115
SHA1a57bce5884e3c0fe22a2860660a9c6c438ac6580
SHA256cb3cceb0bb478c90e68045b23be940250105c194dee36ff6bd6aa0cda2bc5143
SHA512ab75a7a35a91b624d1f0b69b854f03778c698262225fe8389ba0249ae9e43c3df058e46f5bb26abb25126eb1ffc984a52c4f3c0f1a90c4f1ddc3fcd7950852e0
-
Filesize
997KB
MD529e06c2fc9f1afea42b9bbbbb2d4e115
SHA1a57bce5884e3c0fe22a2860660a9c6c438ac6580
SHA256cb3cceb0bb478c90e68045b23be940250105c194dee36ff6bd6aa0cda2bc5143
SHA512ab75a7a35a91b624d1f0b69b854f03778c698262225fe8389ba0249ae9e43c3df058e46f5bb26abb25126eb1ffc984a52c4f3c0f1a90c4f1ddc3fcd7950852e0
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
814KB
MD5f4846d30a40b21bf74bd3a6920772ed8
SHA15a843835505d062c2d7e6eef0f91a53f77ad30e5
SHA2561b458514af41da0cf822312aa50886078945289133016385635045b34b7b6930
SHA5128ba4ab39665c495ac02791c9ff185e6bf430317b50f81d0e618748d5d20b876e44c99a156b9fb45efea9c09bcb1f133fb4b1dea999a1c65828f40ddfc28cad00
-
Filesize
814KB
MD5f4846d30a40b21bf74bd3a6920772ed8
SHA15a843835505d062c2d7e6eef0f91a53f77ad30e5
SHA2561b458514af41da0cf822312aa50886078945289133016385635045b34b7b6930
SHA5128ba4ab39665c495ac02791c9ff185e6bf430317b50f81d0e618748d5d20b876e44c99a156b9fb45efea9c09bcb1f133fb4b1dea999a1c65828f40ddfc28cad00
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
631KB
MD50a4cb1011a91604eedc5ee40f4b03790
SHA1b6c2730f43b4dbbd6196428036e1fe37a804578c
SHA256b4d817a0a53653e4fd05a73a36ede84151de1b82b611dc3a2193932ce4d297e6
SHA512ad0e36a4f31d52771526b1254a6ca078ae4dfd849b1a8a7cbce606fa52274a64e0cdd4700d4b183c61776268fb3b7f93dcb7b6690e254cc84c12fd60cd5b0ef7
-
Filesize
631KB
MD50a4cb1011a91604eedc5ee40f4b03790
SHA1b6c2730f43b4dbbd6196428036e1fe37a804578c
SHA256b4d817a0a53653e4fd05a73a36ede84151de1b82b611dc3a2193932ce4d297e6
SHA512ad0e36a4f31d52771526b1254a6ca078ae4dfd849b1a8a7cbce606fa52274a64e0cdd4700d4b183c61776268fb3b7f93dcb7b6690e254cc84c12fd60cd5b0ef7
-
Filesize
413KB
MD58d8c54ab8d6f1bf71049365d4efce442
SHA1c3cd5e2ee7d4c64761653e0408a10597dbbaa7e1
SHA256188f190057195adfebb4fa8ac011b9ed3d7c05b0be302fc88810510098d32011
SHA512889b4adc46c1a3f64a82cfe2e779cb53c9010772e3af28b7ad976e06c7415ecdd47d84f56c3f3301c343cdca45a1bbf15f5f6f6611a1387494633027fc320879
-
Filesize
413KB
MD58d8c54ab8d6f1bf71049365d4efce442
SHA1c3cd5e2ee7d4c64761653e0408a10597dbbaa7e1
SHA256188f190057195adfebb4fa8ac011b9ed3d7c05b0be302fc88810510098d32011
SHA512889b4adc46c1a3f64a82cfe2e779cb53c9010772e3af28b7ad976e06c7415ecdd47d84f56c3f3301c343cdca45a1bbf15f5f6f6611a1387494633027fc320879
-
Filesize
354KB
MD5439e81f2dd6cbf6014d5c95699eab9fe
SHA1e8864ef33c35ae7b1b0432cbb32968e601c72407
SHA25649a3ea0766b5fa46b6c0a6d79091864e8ab59a4ff78593bd733d6067a7b51b06
SHA512a9c4c0def8420d394a761db701642d74996f17a37d2aaee9e6c059b31c412a2950885f7b33c2cc79f98c9752fd570a20b77aa14db1e806f9f2402d5f5ba28932
-
Filesize
354KB
MD5439e81f2dd6cbf6014d5c95699eab9fe
SHA1e8864ef33c35ae7b1b0432cbb32968e601c72407
SHA25649a3ea0766b5fa46b6c0a6d79091864e8ab59a4ff78593bd733d6067a7b51b06
SHA512a9c4c0def8420d394a761db701642d74996f17a37d2aaee9e6c059b31c412a2950885f7b33c2cc79f98c9752fd570a20b77aa14db1e806f9f2402d5f5ba28932
-
Filesize
250KB
MD5781cf62ac4fcc48d6ecb054e5a6cc134
SHA1f6c3b4983f3e26d16651702cb5819117458f526f
SHA256908637971d7bbd9c2650a359a3312c6fdc2516a77d9714438aa014087ee858ff
SHA512cf2f0970308b28d40d3686315d25dd710886c4b9e244637997cfad987bb593460c84a22824fd0f3cc11edcd39eda6a5544dd3c37825762f4262b9af371936359
-
Filesize
250KB
MD5781cf62ac4fcc48d6ecb054e5a6cc134
SHA1f6c3b4983f3e26d16651702cb5819117458f526f
SHA256908637971d7bbd9c2650a359a3312c6fdc2516a77d9714438aa014087ee858ff
SHA512cf2f0970308b28d40d3686315d25dd710886c4b9e244637997cfad987bb593460c84a22824fd0f3cc11edcd39eda6a5544dd3c37825762f4262b9af371936359
-
Filesize
379KB
MD588c68d138d1c71d01e1322b95d0a4f77
SHA18521ef9bc8231ec79b920396d4cf591944e8d900
SHA256abd71edac838f6dfa7a296c4d2ef58a2be18241fda0bf6688c41d950ace6e31c
SHA512bd2267bf31124a13cd4bab0b7f33983f036eeded7bcce21ac21057e62d4a33f23fa6f22ac9bcef58bd86d47bc2429ed4f95c17961b4c45a70cee99353ef59bad
-
Filesize
379KB
MD588c68d138d1c71d01e1322b95d0a4f77
SHA18521ef9bc8231ec79b920396d4cf591944e8d900
SHA256abd71edac838f6dfa7a296c4d2ef58a2be18241fda0bf6688c41d950ace6e31c
SHA512bd2267bf31124a13cd4bab0b7f33983f036eeded7bcce21ac21057e62d4a33f23fa6f22ac9bcef58bd86d47bc2429ed4f95c17961b4c45a70cee99353ef59bad
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0