Analysis
-
max time kernel
152s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 09:00
Static task
static1
Behavioral task
behavioral1
Sample
48dcf83a6e12e1ff58a6d3b61009ab8bff8ed04425353c45daab9ebf2e7ef6a0.exe
Resource
win7-20230831-en
General
-
Target
48dcf83a6e12e1ff58a6d3b61009ab8bff8ed04425353c45daab9ebf2e7ef6a0.exe
-
Size
1.3MB
-
MD5
3ad91a42d1a06eb373c54e7cf4ab69df
-
SHA1
d287322d1e505fb15d3f1c20fb9dce995c16cb47
-
SHA256
48dcf83a6e12e1ff58a6d3b61009ab8bff8ed04425353c45daab9ebf2e7ef6a0
-
SHA512
85321e49038aee10b4ce9d799aa4853a1d7f36fb402d92b0415145798c9f25ac5cd54da8d03fae8720243cfcd82c73b0d49f18a325e604b2f63242666749407d
-
SSDEEP
24576:UyyAngXcNYr0pF0rbEtIZGINxpDnFcFXRjKhcEpUSg4s4tP6ZMH:jyGq0kr4tIZfNxp5cFtKlG4tS
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/1688-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1688-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1688-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1688-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/3832-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation t4204852.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation u4904222.exe -
Executes dropped EXE 18 IoCs
pid Process 3304 z9337188.exe 5116 z6524909.exe 3308 z0604415.exe 5004 z8276382.exe 2956 q9857242.exe 2256 r3947041.exe 2844 s8010461.exe 3352 t4204852.exe 1820 explonde.exe 4940 u4904222.exe 3664 legota.exe 4044 w0332713.exe 4092 legota.exe 976 explonde.exe 1284 legota.exe 4244 explonde.exe 1860 legota.exe 4640 explonde.exe -
Loads dropped DLL 2 IoCs
pid Process 3124 rundll32.exe 4252 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 48dcf83a6e12e1ff58a6d3b61009ab8bff8ed04425353c45daab9ebf2e7ef6a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9337188.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6524909.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z0604415.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z8276382.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2956 set thread context of 3832 2956 q9857242.exe 92 PID 2256 set thread context of 1688 2256 r3947041.exe 99 PID 2844 set thread context of 3192 2844 s8010461.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4436 2956 WerFault.exe 90 5044 2256 WerFault.exe 97 2680 1688 WerFault.exe 99 4644 2844 WerFault.exe 104 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4188 schtasks.exe 4408 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3832 AppLaunch.exe 3832 AppLaunch.exe 3832 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3832 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1528 wrote to memory of 3304 1528 48dcf83a6e12e1ff58a6d3b61009ab8bff8ed04425353c45daab9ebf2e7ef6a0.exe 86 PID 1528 wrote to memory of 3304 1528 48dcf83a6e12e1ff58a6d3b61009ab8bff8ed04425353c45daab9ebf2e7ef6a0.exe 86 PID 1528 wrote to memory of 3304 1528 48dcf83a6e12e1ff58a6d3b61009ab8bff8ed04425353c45daab9ebf2e7ef6a0.exe 86 PID 3304 wrote to memory of 5116 3304 z9337188.exe 87 PID 3304 wrote to memory of 5116 3304 z9337188.exe 87 PID 3304 wrote to memory of 5116 3304 z9337188.exe 87 PID 5116 wrote to memory of 3308 5116 z6524909.exe 88 PID 5116 wrote to memory of 3308 5116 z6524909.exe 88 PID 5116 wrote to memory of 3308 5116 z6524909.exe 88 PID 3308 wrote to memory of 5004 3308 z0604415.exe 89 PID 3308 wrote to memory of 5004 3308 z0604415.exe 89 PID 3308 wrote to memory of 5004 3308 z0604415.exe 89 PID 5004 wrote to memory of 2956 5004 z8276382.exe 90 PID 5004 wrote to memory of 2956 5004 z8276382.exe 90 PID 5004 wrote to memory of 2956 5004 z8276382.exe 90 PID 2956 wrote to memory of 3832 2956 q9857242.exe 92 PID 2956 wrote to memory of 3832 2956 q9857242.exe 92 PID 2956 wrote to memory of 3832 2956 q9857242.exe 92 PID 2956 wrote to memory of 3832 2956 q9857242.exe 92 PID 2956 wrote to memory of 3832 2956 q9857242.exe 92 PID 2956 wrote to memory of 3832 2956 q9857242.exe 92 PID 2956 wrote to memory of 3832 2956 q9857242.exe 92 PID 2956 wrote to memory of 3832 2956 q9857242.exe 92 PID 5004 wrote to memory of 2256 5004 z8276382.exe 97 PID 5004 wrote to memory of 2256 5004 z8276382.exe 97 PID 5004 wrote to memory of 2256 5004 z8276382.exe 97 PID 2256 wrote to memory of 1688 2256 r3947041.exe 99 PID 2256 wrote to memory of 1688 2256 r3947041.exe 99 PID 2256 wrote to memory of 1688 2256 r3947041.exe 99 PID 2256 wrote to memory of 1688 2256 r3947041.exe 99 PID 2256 wrote to memory of 1688 2256 r3947041.exe 99 PID 2256 wrote to memory of 1688 2256 r3947041.exe 99 PID 2256 wrote to memory of 1688 2256 r3947041.exe 99 PID 2256 wrote to memory of 1688 2256 r3947041.exe 99 PID 2256 wrote to memory of 1688 2256 r3947041.exe 99 PID 2256 wrote to memory of 1688 2256 r3947041.exe 99 PID 3308 wrote to memory of 2844 3308 z0604415.exe 104 PID 3308 wrote to memory of 2844 3308 z0604415.exe 104 PID 3308 wrote to memory of 2844 3308 z0604415.exe 104 PID 2844 wrote to memory of 3192 2844 s8010461.exe 106 PID 2844 wrote to memory of 3192 2844 s8010461.exe 106 PID 2844 wrote to memory of 3192 2844 s8010461.exe 106 PID 2844 wrote to memory of 3192 2844 s8010461.exe 106 PID 2844 wrote to memory of 3192 2844 s8010461.exe 106 PID 2844 wrote to memory of 3192 2844 s8010461.exe 106 PID 2844 wrote to memory of 3192 2844 s8010461.exe 106 PID 2844 wrote to memory of 3192 2844 s8010461.exe 106 PID 5116 wrote to memory of 3352 5116 z6524909.exe 111 PID 5116 wrote to memory of 3352 5116 z6524909.exe 111 PID 5116 wrote to memory of 3352 5116 z6524909.exe 111 PID 3352 wrote to memory of 1820 3352 t4204852.exe 113 PID 3352 wrote to memory of 1820 3352 t4204852.exe 113 PID 3352 wrote to memory of 1820 3352 t4204852.exe 113 PID 3304 wrote to memory of 4940 3304 z9337188.exe 114 PID 3304 wrote to memory of 4940 3304 z9337188.exe 114 PID 3304 wrote to memory of 4940 3304 z9337188.exe 114 PID 1820 wrote to memory of 4188 1820 explonde.exe 116 PID 1820 wrote to memory of 4188 1820 explonde.exe 116 PID 1820 wrote to memory of 4188 1820 explonde.exe 116 PID 1820 wrote to memory of 4680 1820 explonde.exe 118 PID 1820 wrote to memory of 4680 1820 explonde.exe 118 PID 1820 wrote to memory of 4680 1820 explonde.exe 118 PID 4680 wrote to memory of 4960 4680 cmd.exe 120 PID 4680 wrote to memory of 4960 4680 cmd.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\48dcf83a6e12e1ff58a6d3b61009ab8bff8ed04425353c45daab9ebf2e7ef6a0.exe"C:\Users\Admin\AppData\Local\Temp\48dcf83a6e12e1ff58a6d3b61009ab8bff8ed04425353c45daab9ebf2e7ef6a0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9337188.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9337188.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6524909.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6524909.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0604415.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0604415.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8276382.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z8276382.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9857242.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9857242.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 1527⤵
- Program crash
PID:4436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3947041.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3947041.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 5408⤵
- Program crash
PID:2680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 1527⤵
- Program crash
PID:5044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8010461.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8010461.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 1486⤵
- Program crash
PID:4644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4204852.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4204852.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:4188
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:2608
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:4976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:1864
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:1344
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:4252
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4904222.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4904222.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:3664 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:4408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:2084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:2712
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3124
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0332713.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0332713.exe2⤵
- Executes dropped EXE
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2956 -ip 29561⤵PID:564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2256 -ip 22561⤵PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1688 -ip 16881⤵PID:1284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2844 -ip 28441⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4092
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1284
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4244
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1860
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4640
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5014460f0ec87cfee20f5f93ccc9b2743
SHA1b582837a79dec230007fa7b6f511c8bb388f71e3
SHA2566318513357c176be43590d8ec6a02d661d288a313203c1880ca979c74f2b6801
SHA5122b57b16b6c05723c7cfccbafbde4892c04b017cb7e90f20bffdc22ec5e2b388318820337ed7891f5f9ab4366f7367bc9503d7b885667318b57d6796da9ba53aa
-
Filesize
22KB
MD5014460f0ec87cfee20f5f93ccc9b2743
SHA1b582837a79dec230007fa7b6f511c8bb388f71e3
SHA2566318513357c176be43590d8ec6a02d661d288a313203c1880ca979c74f2b6801
SHA5122b57b16b6c05723c7cfccbafbde4892c04b017cb7e90f20bffdc22ec5e2b388318820337ed7891f5f9ab4366f7367bc9503d7b885667318b57d6796da9ba53aa
-
Filesize
1.2MB
MD50e792322f2929be5694a7efca67fe166
SHA16678675aa91ac81063f58f0bb9bf3b6a10070870
SHA256e71d6637618df0283a49a8f4223c769df1459fa6a4f8e0fd63ed8258df6c29f6
SHA5124fdf527ffe436d64aff289169c51ea9657f93bb22b4cbf653f81525a5c0ed40ff31d851774de114b56abd97fa119e2e2efbf3b0c4df149eab1c751888aa0c26a
-
Filesize
1.2MB
MD50e792322f2929be5694a7efca67fe166
SHA16678675aa91ac81063f58f0bb9bf3b6a10070870
SHA256e71d6637618df0283a49a8f4223c769df1459fa6a4f8e0fd63ed8258df6c29f6
SHA5124fdf527ffe436d64aff289169c51ea9657f93bb22b4cbf653f81525a5c0ed40ff31d851774de114b56abd97fa119e2e2efbf3b0c4df149eab1c751888aa0c26a
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
1.0MB
MD542b48397423aafb6310ba0a9df18c266
SHA1936b7ae5fceaf36733e6ce6cf81644e335eafc85
SHA2560ce596488e41181db8af571040c3ba03dabc9ea719549137834168709e6cb6be
SHA5121bd8838d02021688cd730bb1cec862c75fe788d826e5e8125b5bfbb9ff5998307b201fda0c9c707f50906e09a998b89d977672e44264ccacb6d717340e7b4e99
-
Filesize
1.0MB
MD542b48397423aafb6310ba0a9df18c266
SHA1936b7ae5fceaf36733e6ce6cf81644e335eafc85
SHA2560ce596488e41181db8af571040c3ba03dabc9ea719549137834168709e6cb6be
SHA5121bd8838d02021688cd730bb1cec862c75fe788d826e5e8125b5bfbb9ff5998307b201fda0c9c707f50906e09a998b89d977672e44264ccacb6d717340e7b4e99
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
884KB
MD5fe3c957ecd1fcc4f4eae55cc6333c78f
SHA12286d2ff17bc79d63029b659d0eeea12df51972b
SHA256e1e0596dd921ebeb9b2b42ea234319aeae42c784399045c0e7f3acf0333241b3
SHA51298af44cb3162c7f4dbde1b68998b6a82338fab9837a46635fec9fcafbd606038e1ec2f8616a1136582c2b14410716eedfa469db0a808c5720fb68a22e50cce8e
-
Filesize
884KB
MD5fe3c957ecd1fcc4f4eae55cc6333c78f
SHA12286d2ff17bc79d63029b659d0eeea12df51972b
SHA256e1e0596dd921ebeb9b2b42ea234319aeae42c784399045c0e7f3acf0333241b3
SHA51298af44cb3162c7f4dbde1b68998b6a82338fab9837a46635fec9fcafbd606038e1ec2f8616a1136582c2b14410716eedfa469db0a808c5720fb68a22e50cce8e
-
Filesize
1.0MB
MD54d711256de03b702728122723b08b96c
SHA106cf95a02bc01cc28907925e59ffb5dc48dbc0b4
SHA256cf86d5faa2a69c86c1cdbf687a51f0e83eb35814691d9b1376890cb1e28600e6
SHA512368fcded98f106151caf51ab83a1d18981862b987bcb099da15b9e0cc5dc44c105a75b1283ec1850cbda0efec8652ddc5c721a368501e62d794efb5dc5085b73
-
Filesize
1.0MB
MD54d711256de03b702728122723b08b96c
SHA106cf95a02bc01cc28907925e59ffb5dc48dbc0b4
SHA256cf86d5faa2a69c86c1cdbf687a51f0e83eb35814691d9b1376890cb1e28600e6
SHA512368fcded98f106151caf51ab83a1d18981862b987bcb099da15b9e0cc5dc44c105a75b1283ec1850cbda0efec8652ddc5c721a368501e62d794efb5dc5085b73
-
Filesize
493KB
MD58d005944fe6bc90684a177b7a923424c
SHA1ff2b2ee2c4edf27d46431532913bd77827f101d0
SHA2563c8d4d6741deb70ebfc635813f720d2a76f79b2804afd11478a851b88f14a418
SHA512a5e281e6bd0cad50cbb7beda7f2e2175860e77da6f0410b721de9be2fd6691df3ef322774a7b3514729c4a0dfcb46e43f906833786dc02753292ebfb5d0c928d
-
Filesize
493KB
MD58d005944fe6bc90684a177b7a923424c
SHA1ff2b2ee2c4edf27d46431532913bd77827f101d0
SHA2563c8d4d6741deb70ebfc635813f720d2a76f79b2804afd11478a851b88f14a418
SHA512a5e281e6bd0cad50cbb7beda7f2e2175860e77da6f0410b721de9be2fd6691df3ef322774a7b3514729c4a0dfcb46e43f906833786dc02753292ebfb5d0c928d
-
Filesize
860KB
MD57f04d1f88225cfd07de9af0d9127acd9
SHA1618e16fcee4e934366fc3c0fe53350b658ae06f1
SHA256e37b9dcced4b5c75e1f51a6e1d5cf39270cf3aca8bacdf447f95ec9254c2776e
SHA5128ae547639b0b238d40f658a814bb2544fd97fb0e1533a2cdd14cf40fb3753b421db3b2b914434509dc8cea3030c5f34992e1a985ebcccd7c5dd34a784dfe2fdf
-
Filesize
860KB
MD57f04d1f88225cfd07de9af0d9127acd9
SHA1618e16fcee4e934366fc3c0fe53350b658ae06f1
SHA256e37b9dcced4b5c75e1f51a6e1d5cf39270cf3aca8bacdf447f95ec9254c2776e
SHA5128ae547639b0b238d40f658a814bb2544fd97fb0e1533a2cdd14cf40fb3753b421db3b2b914434509dc8cea3030c5f34992e1a985ebcccd7c5dd34a784dfe2fdf
-
Filesize
1016KB
MD5bd3dd73772c07f633545f5b9d021f835
SHA17fceb1f466ccf439dafb51a1744e6844155b727d
SHA256475002ea687a2a9c7f7f9d430b0f4b2e42cd5f7e78fbd2a52bc06295797221da
SHA512b3e429b383ffbb41db28335a0a4b3d0ce803dd9e9c3b4796e9536f301665ce70b9ba5ed461f897492860d7dd069bd961701f6c202b5205d144ef8e8228f8f00c
-
Filesize
1016KB
MD5bd3dd73772c07f633545f5b9d021f835
SHA17fceb1f466ccf439dafb51a1744e6844155b727d
SHA256475002ea687a2a9c7f7f9d430b0f4b2e42cd5f7e78fbd2a52bc06295797221da
SHA512b3e429b383ffbb41db28335a0a4b3d0ce803dd9e9c3b4796e9536f301665ce70b9ba5ed461f897492860d7dd069bd961701f6c202b5205d144ef8e8228f8f00c
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0