Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7.exe
Resource
win7-20230831-en
General
-
Target
34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7.exe
-
Size
1.0MB
-
MD5
2500cc1ac24011d637e0c48d4cb04f78
-
SHA1
541793e81d062bbfe9c72d910f43fd91679c7f4c
-
SHA256
34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7
-
SHA512
6c62275782d6a1839b60ee38907f5f172c1e648adba2f58f6738095b4b0310dfab42ffdbb5891d047739162d08ba10caffbca98ae9961256e341dd617cc66292
-
SSDEEP
24576:eywvGgQm9uKYg40JfNz8ZOUPyL4aLxoOfEFR:twWbpd0JfNgZbPeLxi
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4612-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4612-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4612-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4612-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/2208-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u1490441.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t4939893.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explonde.exe -
Executes dropped EXE 18 IoCs
pid Process 212 z1871349.exe 3376 z6326565.exe 4676 z7372573.exe 4476 z2190626.exe 1636 q7561540.exe 1660 r6677686.exe 4596 s1215105.exe 1932 t4939893.exe 2152 explonde.exe 4440 u1490441.exe 2280 legota.exe 4576 w1439159.exe 1168 explonde.exe 2852 legota.exe 4828 explonde.exe 3800 legota.exe 5004 explonde.exe 4556 legota.exe -
Loads dropped DLL 2 IoCs
pid Process 3976 rundll32.exe 4864 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1871349.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6326565.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7372573.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z2190626.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1636 set thread context of 2208 1636 q7561540.exe 89 PID 1660 set thread context of 4612 1660 r6677686.exe 99 PID 4596 set thread context of 4324 4596 s1215105.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 1156 1636 WerFault.exe 87 4860 1660 WerFault.exe 94 4796 4612 WerFault.exe 99 840 4596 WerFault.exe 105 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5100 schtasks.exe 1896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2208 AppLaunch.exe 2208 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2208 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 868 wrote to memory of 212 868 34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7.exe 83 PID 868 wrote to memory of 212 868 34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7.exe 83 PID 868 wrote to memory of 212 868 34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7.exe 83 PID 212 wrote to memory of 3376 212 z1871349.exe 84 PID 212 wrote to memory of 3376 212 z1871349.exe 84 PID 212 wrote to memory of 3376 212 z1871349.exe 84 PID 3376 wrote to memory of 4676 3376 z6326565.exe 85 PID 3376 wrote to memory of 4676 3376 z6326565.exe 85 PID 3376 wrote to memory of 4676 3376 z6326565.exe 85 PID 4676 wrote to memory of 4476 4676 z7372573.exe 86 PID 4676 wrote to memory of 4476 4676 z7372573.exe 86 PID 4676 wrote to memory of 4476 4676 z7372573.exe 86 PID 4476 wrote to memory of 1636 4476 z2190626.exe 87 PID 4476 wrote to memory of 1636 4476 z2190626.exe 87 PID 4476 wrote to memory of 1636 4476 z2190626.exe 87 PID 1636 wrote to memory of 4244 1636 q7561540.exe 88 PID 1636 wrote to memory of 4244 1636 q7561540.exe 88 PID 1636 wrote to memory of 4244 1636 q7561540.exe 88 PID 1636 wrote to memory of 2208 1636 q7561540.exe 89 PID 1636 wrote to memory of 2208 1636 q7561540.exe 89 PID 1636 wrote to memory of 2208 1636 q7561540.exe 89 PID 1636 wrote to memory of 2208 1636 q7561540.exe 89 PID 1636 wrote to memory of 2208 1636 q7561540.exe 89 PID 1636 wrote to memory of 2208 1636 q7561540.exe 89 PID 1636 wrote to memory of 2208 1636 q7561540.exe 89 PID 1636 wrote to memory of 2208 1636 q7561540.exe 89 PID 4476 wrote to memory of 1660 4476 z2190626.exe 94 PID 4476 wrote to memory of 1660 4476 z2190626.exe 94 PID 4476 wrote to memory of 1660 4476 z2190626.exe 94 PID 1660 wrote to memory of 3104 1660 r6677686.exe 97 PID 1660 wrote to memory of 3104 1660 r6677686.exe 97 PID 1660 wrote to memory of 3104 1660 r6677686.exe 97 PID 1660 wrote to memory of 4116 1660 r6677686.exe 98 PID 1660 wrote to memory of 4116 1660 r6677686.exe 98 PID 1660 wrote to memory of 4116 1660 r6677686.exe 98 PID 1660 wrote to memory of 4612 1660 r6677686.exe 99 PID 1660 wrote to memory of 4612 1660 r6677686.exe 99 PID 1660 wrote to memory of 4612 1660 r6677686.exe 99 PID 1660 wrote to memory of 4612 1660 r6677686.exe 99 PID 1660 wrote to memory of 4612 1660 r6677686.exe 99 PID 1660 wrote to memory of 4612 1660 r6677686.exe 99 PID 1660 wrote to memory of 4612 1660 r6677686.exe 99 PID 1660 wrote to memory of 4612 1660 r6677686.exe 99 PID 1660 wrote to memory of 4612 1660 r6677686.exe 99 PID 1660 wrote to memory of 4612 1660 r6677686.exe 99 PID 4676 wrote to memory of 4596 4676 z7372573.exe 105 PID 4676 wrote to memory of 4596 4676 z7372573.exe 105 PID 4676 wrote to memory of 4596 4676 z7372573.exe 105 PID 4596 wrote to memory of 4324 4596 s1215105.exe 107 PID 4596 wrote to memory of 4324 4596 s1215105.exe 107 PID 4596 wrote to memory of 4324 4596 s1215105.exe 107 PID 4596 wrote to memory of 4324 4596 s1215105.exe 107 PID 4596 wrote to memory of 4324 4596 s1215105.exe 107 PID 4596 wrote to memory of 4324 4596 s1215105.exe 107 PID 4596 wrote to memory of 4324 4596 s1215105.exe 107 PID 4596 wrote to memory of 4324 4596 s1215105.exe 107 PID 3376 wrote to memory of 1932 3376 z6326565.exe 110 PID 3376 wrote to memory of 1932 3376 z6326565.exe 110 PID 3376 wrote to memory of 1932 3376 z6326565.exe 110 PID 1932 wrote to memory of 2152 1932 t4939893.exe 112 PID 1932 wrote to memory of 2152 1932 t4939893.exe 112 PID 1932 wrote to memory of 2152 1932 t4939893.exe 112 PID 212 wrote to memory of 4440 212 z1871349.exe 113 PID 212 wrote to memory of 4440 212 z1871349.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7.exe"C:\Users\Admin\AppData\Local\Temp\34da6ece2c9a97d6c2e647d1f330946f774f33a73d0fc7d6b81de64f2c73ece7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1871349.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1871349.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6326565.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6326565.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7372573.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7372573.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2190626.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2190626.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7561540.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4244
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 5887⤵
- Program crash
PID:1156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6677686.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6677686.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3104
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 5408⤵
- Program crash
PID:4796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 5847⤵
- Program crash
PID:4860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1215105.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s1215105.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 5526⤵
- Program crash
PID:840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4939893.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4939893.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:2152 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:5100
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:1116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:2240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:2016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4780
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:3984
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3976
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1490441.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1490441.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:1896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3480
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:1780
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4620
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:2892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4060
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4864
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1439159.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w1439159.exe2⤵
- Executes dropped EXE
PID:4576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1636 -ip 16361⤵PID:3112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1660 -ip 16601⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4612 -ip 46121⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4596 -ip 45961⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1168
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2852
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4828
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3800
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:5004
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4556
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5d2e24f41b4e2911e59c478bbe1e6fdb2
SHA127e8ceee414c50d8d026ee1fd81db213559b4246
SHA256d32671955c46d792e4f198dd82dd5e7466bee8328f846b3d6e18aefd877fe4cf
SHA512731caccdce88d2e96c385f704808fdd9ba2c1c5cd24258aba1ec4f3be08c4b572490d19c90feee24b4fd0a1e5336e66459cc8b04d6fa30a7b66a6f1f96f41a04
-
Filesize
22KB
MD5d2e24f41b4e2911e59c478bbe1e6fdb2
SHA127e8ceee414c50d8d026ee1fd81db213559b4246
SHA256d32671955c46d792e4f198dd82dd5e7466bee8328f846b3d6e18aefd877fe4cf
SHA512731caccdce88d2e96c385f704808fdd9ba2c1c5cd24258aba1ec4f3be08c4b572490d19c90feee24b4fd0a1e5336e66459cc8b04d6fa30a7b66a6f1f96f41a04
-
Filesize
961KB
MD5fd19f92920461fffb462252d98db3e82
SHA182cf0755dc86b0875ccf59d344dc4bf86e249aa5
SHA25622396d0b1810a8a908951d5c93c311f7ac5c91ea2bee05b7e55753049170888d
SHA512cacf57af8d7b664da95837f8142f674c243c18c9345650698eeb7b4011a7bc3d1923b5e92c8acafa30407ac850b59aae884f0a55575d5796b15707d719ee1bb9
-
Filesize
961KB
MD5fd19f92920461fffb462252d98db3e82
SHA182cf0755dc86b0875ccf59d344dc4bf86e249aa5
SHA25622396d0b1810a8a908951d5c93c311f7ac5c91ea2bee05b7e55753049170888d
SHA512cacf57af8d7b664da95837f8142f674c243c18c9345650698eeb7b4011a7bc3d1923b5e92c8acafa30407ac850b59aae884f0a55575d5796b15707d719ee1bb9
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
778KB
MD580f35325252d4b02fef3c0ba2548c0da
SHA19402eede340a1c659a33b360d77f60245252934e
SHA2566e07b28b83bfffce99d0101f2d10b2860839271dfa1388413ba93aaffa48065a
SHA512adf14c25447e92c8381b515e54537f7aa7b4b784233a73d14493a5465628709b4869f1d6783238745704b29cfb4e4dcf5e4866e4623991260c6d76f304441587
-
Filesize
778KB
MD580f35325252d4b02fef3c0ba2548c0da
SHA19402eede340a1c659a33b360d77f60245252934e
SHA2566e07b28b83bfffce99d0101f2d10b2860839271dfa1388413ba93aaffa48065a
SHA512adf14c25447e92c8381b515e54537f7aa7b4b784233a73d14493a5465628709b4869f1d6783238745704b29cfb4e4dcf5e4866e4623991260c6d76f304441587
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
595KB
MD57e635b5b9dc2250c31150031fa3c307b
SHA1e05dff9872a5ef02c11805b2fe833c6579285229
SHA256aef20fc804e7ac24e20eaed1c93e17791663a5255b48cee128f68686b9c6b8a3
SHA512143a7913ab5e5167290410dddfdcf5391c233f2d18dafb244cdcd31ebd90e2955138da568f7027e325271d6ccb1946b95b230663b0165f2fabc1f5b9f2c81cbb
-
Filesize
595KB
MD57e635b5b9dc2250c31150031fa3c307b
SHA1e05dff9872a5ef02c11805b2fe833c6579285229
SHA256aef20fc804e7ac24e20eaed1c93e17791663a5255b48cee128f68686b9c6b8a3
SHA512143a7913ab5e5167290410dddfdcf5391c233f2d18dafb244cdcd31ebd90e2955138da568f7027e325271d6ccb1946b95b230663b0165f2fabc1f5b9f2c81cbb
-
Filesize
384KB
MD568054229ec3d6102836d42acf0a77562
SHA1a663a606e572ef56a7f69d9c7bf327819ae4c390
SHA2564c1206747006d7839a43153cfeb5f999005bcf6f49d687b36e3b850eb5965b10
SHA5129cff494a867208df80339570dce2c56f6e57b88a6049d27abcab6973b713670efd7670298e614bca0c8ddf973a25afafb7e51c5925f1520972830023c17ef783
-
Filesize
384KB
MD568054229ec3d6102836d42acf0a77562
SHA1a663a606e572ef56a7f69d9c7bf327819ae4c390
SHA2564c1206747006d7839a43153cfeb5f999005bcf6f49d687b36e3b850eb5965b10
SHA5129cff494a867208df80339570dce2c56f6e57b88a6049d27abcab6973b713670efd7670298e614bca0c8ddf973a25afafb7e51c5925f1520972830023c17ef783
-
Filesize
334KB
MD5481034cefe958c638c0027d83779b3b3
SHA139f5740e7d459ac9bb86c610d9292100a298471c
SHA25673486204b06ea4495e702971c004581c05e57c7857b52610dff89c261e03aefb
SHA512f5793186496763368155ad9aa3ae1ce8f4b801deab742262feac31fb43a04b1c3d8ca9842a60d797c24ae88046ba00ce852ab2d343958e02aba0e08aa9f310e0
-
Filesize
334KB
MD5481034cefe958c638c0027d83779b3b3
SHA139f5740e7d459ac9bb86c610d9292100a298471c
SHA25673486204b06ea4495e702971c004581c05e57c7857b52610dff89c261e03aefb
SHA512f5793186496763368155ad9aa3ae1ce8f4b801deab742262feac31fb43a04b1c3d8ca9842a60d797c24ae88046ba00ce852ab2d343958e02aba0e08aa9f310e0
-
Filesize
221KB
MD5b4724fd46cde84f3e1a1ab38f5ef9d0e
SHA1c90a2d707c88b05e10968481c5d90a42ca838928
SHA25674892e50063a00f4e09536f6485eabe1b1fba652d38ce9e3daf9684fb2d5d27b
SHA512894ae77ced03a2e8728117c0c552521c5f1dc82a0c1406376d02236c9ea385d536ef0833b09f3a006bcf545f1526d38aed24cb75fbef37f997db359ff00d40fb
-
Filesize
221KB
MD5b4724fd46cde84f3e1a1ab38f5ef9d0e
SHA1c90a2d707c88b05e10968481c5d90a42ca838928
SHA25674892e50063a00f4e09536f6485eabe1b1fba652d38ce9e3daf9684fb2d5d27b
SHA512894ae77ced03a2e8728117c0c552521c5f1dc82a0c1406376d02236c9ea385d536ef0833b09f3a006bcf545f1526d38aed24cb75fbef37f997db359ff00d40fb
-
Filesize
350KB
MD50a7e2b362007af3baa332f8ef627fa85
SHA1ba63efdbcbb45c427a91fa1a2b59e05d768705de
SHA256b007d64df343238a00279933b41ea72f4d8d1c1d37538ab3673f5848708b3454
SHA51207d3907197cd0c2c82cb82e4bb1f757ea667357e51c83c8a7e5a064e1dedaf652c94665f32f525740fec6905286f15ba5570ba1d37efd3a62f449232a9643b01
-
Filesize
350KB
MD50a7e2b362007af3baa332f8ef627fa85
SHA1ba63efdbcbb45c427a91fa1a2b59e05d768705de
SHA256b007d64df343238a00279933b41ea72f4d8d1c1d37538ab3673f5848708b3454
SHA51207d3907197cd0c2c82cb82e4bb1f757ea667357e51c83c8a7e5a064e1dedaf652c94665f32f525740fec6905286f15ba5570ba1d37efd3a62f449232a9643b01
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0