Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 12:30
Static task
static1
Behavioral task
behavioral1
Sample
16e7bd18a832754eb336a6e3a33d07fb730fe0ce936e432effe3e6a5a51161ff.exe
Resource
win7-20230831-en
General
-
Target
16e7bd18a832754eb336a6e3a33d07fb730fe0ce936e432effe3e6a5a51161ff.exe
-
Size
1.1MB
-
MD5
5a2086550c2d8379bb93222c2f112dd6
-
SHA1
294a00609d261102a69a2aecf30bde3375dd7fea
-
SHA256
16e7bd18a832754eb336a6e3a33d07fb730fe0ce936e432effe3e6a5a51161ff
-
SHA512
b25c8a05fa176ccb47de9cdddc06f58639fb9a5da3a738712769b70d87d3619a912aa8c4ff29dd836352f4f126ebf6a24fb1eedebdf9fe21c22b12d6301c7749
-
SSDEEP
24576:qyVhX5WfBP2REQrALsJHGwsCqccmobbfSTT+E4xzl3SVyPlOH:xVFyQifcHGTCqccmeGt4zly2l
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/424-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/424-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/424-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/424-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3216-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t4100794.exeexplonde.exeu3608059.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t4100794.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u3608059.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z0819502.exez7971626.exez5865792.exez5563973.exeq7898956.exer9680009.exes8944201.exet4100794.exeexplonde.exeu3608059.exelegota.exew5648123.exelegota.exeexplonde.exelegota.exeexplonde.exepid process 5096 z0819502.exe 1972 z7971626.exe 2268 z5865792.exe 4840 z5563973.exe 720 q7898956.exe 3428 r9680009.exe 2952 s8944201.exe 3888 t4100794.exe 4580 explonde.exe 3424 u3608059.exe 4100 legota.exe 2776 w5648123.exe 1260 legota.exe 1512 explonde.exe 4656 legota.exe 3244 explonde.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1172 rundll32.exe 4080 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z5563973.exe16e7bd18a832754eb336a6e3a33d07fb730fe0ce936e432effe3e6a5a51161ff.exez0819502.exez7971626.exez5865792.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z5563973.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16e7bd18a832754eb336a6e3a33d07fb730fe0ce936e432effe3e6a5a51161ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0819502.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7971626.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z5865792.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q7898956.exer9680009.exes8944201.exedescription pid process target process PID 720 set thread context of 3216 720 q7898956.exe AppLaunch.exe PID 3428 set thread context of 424 3428 r9680009.exe AppLaunch.exe PID 2952 set thread context of 3468 2952 s8944201.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2032 720 WerFault.exe q7898956.exe 4680 3428 WerFault.exe r9680009.exe 2360 424 WerFault.exe AppLaunch.exe 1388 2952 WerFault.exe s8944201.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1956 schtasks.exe 396 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 3216 AppLaunch.exe 3216 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3216 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
16e7bd18a832754eb336a6e3a33d07fb730fe0ce936e432effe3e6a5a51161ff.exez0819502.exez7971626.exez5865792.exez5563973.exeq7898956.exer9680009.exes8944201.exet4100794.exeexplonde.execmd.exedescription pid process target process PID 4604 wrote to memory of 5096 4604 16e7bd18a832754eb336a6e3a33d07fb730fe0ce936e432effe3e6a5a51161ff.exe z0819502.exe PID 4604 wrote to memory of 5096 4604 16e7bd18a832754eb336a6e3a33d07fb730fe0ce936e432effe3e6a5a51161ff.exe z0819502.exe PID 4604 wrote to memory of 5096 4604 16e7bd18a832754eb336a6e3a33d07fb730fe0ce936e432effe3e6a5a51161ff.exe z0819502.exe PID 5096 wrote to memory of 1972 5096 z0819502.exe z7971626.exe PID 5096 wrote to memory of 1972 5096 z0819502.exe z7971626.exe PID 5096 wrote to memory of 1972 5096 z0819502.exe z7971626.exe PID 1972 wrote to memory of 2268 1972 z7971626.exe z5865792.exe PID 1972 wrote to memory of 2268 1972 z7971626.exe z5865792.exe PID 1972 wrote to memory of 2268 1972 z7971626.exe z5865792.exe PID 2268 wrote to memory of 4840 2268 z5865792.exe z5563973.exe PID 2268 wrote to memory of 4840 2268 z5865792.exe z5563973.exe PID 2268 wrote to memory of 4840 2268 z5865792.exe z5563973.exe PID 4840 wrote to memory of 720 4840 z5563973.exe q7898956.exe PID 4840 wrote to memory of 720 4840 z5563973.exe q7898956.exe PID 4840 wrote to memory of 720 4840 z5563973.exe q7898956.exe PID 720 wrote to memory of 3216 720 q7898956.exe AppLaunch.exe PID 720 wrote to memory of 3216 720 q7898956.exe AppLaunch.exe PID 720 wrote to memory of 3216 720 q7898956.exe AppLaunch.exe PID 720 wrote to memory of 3216 720 q7898956.exe AppLaunch.exe PID 720 wrote to memory of 3216 720 q7898956.exe AppLaunch.exe PID 720 wrote to memory of 3216 720 q7898956.exe AppLaunch.exe PID 720 wrote to memory of 3216 720 q7898956.exe AppLaunch.exe PID 720 wrote to memory of 3216 720 q7898956.exe AppLaunch.exe PID 4840 wrote to memory of 3428 4840 z5563973.exe r9680009.exe PID 4840 wrote to memory of 3428 4840 z5563973.exe r9680009.exe PID 4840 wrote to memory of 3428 4840 z5563973.exe r9680009.exe PID 3428 wrote to memory of 424 3428 r9680009.exe AppLaunch.exe PID 3428 wrote to memory of 424 3428 r9680009.exe AppLaunch.exe PID 3428 wrote to memory of 424 3428 r9680009.exe AppLaunch.exe PID 3428 wrote to memory of 424 3428 r9680009.exe AppLaunch.exe PID 3428 wrote to memory of 424 3428 r9680009.exe AppLaunch.exe PID 3428 wrote to memory of 424 3428 r9680009.exe AppLaunch.exe PID 3428 wrote to memory of 424 3428 r9680009.exe AppLaunch.exe PID 3428 wrote to memory of 424 3428 r9680009.exe AppLaunch.exe PID 3428 wrote to memory of 424 3428 r9680009.exe AppLaunch.exe PID 3428 wrote to memory of 424 3428 r9680009.exe AppLaunch.exe PID 2268 wrote to memory of 2952 2268 z5865792.exe s8944201.exe PID 2268 wrote to memory of 2952 2268 z5865792.exe s8944201.exe PID 2268 wrote to memory of 2952 2268 z5865792.exe s8944201.exe PID 2952 wrote to memory of 3468 2952 s8944201.exe AppLaunch.exe PID 2952 wrote to memory of 3468 2952 s8944201.exe AppLaunch.exe PID 2952 wrote to memory of 3468 2952 s8944201.exe AppLaunch.exe PID 2952 wrote to memory of 3468 2952 s8944201.exe AppLaunch.exe PID 2952 wrote to memory of 3468 2952 s8944201.exe AppLaunch.exe PID 2952 wrote to memory of 3468 2952 s8944201.exe AppLaunch.exe PID 2952 wrote to memory of 3468 2952 s8944201.exe AppLaunch.exe PID 2952 wrote to memory of 3468 2952 s8944201.exe AppLaunch.exe PID 1972 wrote to memory of 3888 1972 z7971626.exe t4100794.exe PID 1972 wrote to memory of 3888 1972 z7971626.exe t4100794.exe PID 1972 wrote to memory of 3888 1972 z7971626.exe t4100794.exe PID 3888 wrote to memory of 4580 3888 t4100794.exe explonde.exe PID 3888 wrote to memory of 4580 3888 t4100794.exe explonde.exe PID 3888 wrote to memory of 4580 3888 t4100794.exe explonde.exe PID 4580 wrote to memory of 1956 4580 explonde.exe schtasks.exe PID 4580 wrote to memory of 1956 4580 explonde.exe schtasks.exe PID 4580 wrote to memory of 1956 4580 explonde.exe schtasks.exe PID 4580 wrote to memory of 3324 4580 explonde.exe cmd.exe PID 4580 wrote to memory of 3324 4580 explonde.exe cmd.exe PID 4580 wrote to memory of 3324 4580 explonde.exe cmd.exe PID 5096 wrote to memory of 3424 5096 z0819502.exe u3608059.exe PID 5096 wrote to memory of 3424 5096 z0819502.exe u3608059.exe PID 5096 wrote to memory of 3424 5096 z0819502.exe u3608059.exe PID 3324 wrote to memory of 3728 3324 cmd.exe cmd.exe PID 3324 wrote to memory of 3728 3324 cmd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16e7bd18a832754eb336a6e3a33d07fb730fe0ce936e432effe3e6a5a51161ff.exe"C:\Users\Admin\AppData\Local\Temp\16e7bd18a832754eb336a6e3a33d07fb730fe0ce936e432effe3e6a5a51161ff.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0819502.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0819502.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7971626.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7971626.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5865792.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5865792.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5563973.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5563973.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7898956.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7898956.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 720 -s 5687⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9680009.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9680009.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 5647⤵
- Program crash
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 5408⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8944201.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8944201.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 5926⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4100794.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4100794.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3608059.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3608059.exe3⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5648123.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5648123.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 720 -ip 7201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3428 -ip 34281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 424 -ip 4241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2952 -ip 29521⤵
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5648123.exeFilesize
22KB
MD5acc26bc0825aa30e54abb9a8864c8fc5
SHA175a61c8b23a7d8419b4daf394994db4f3faa759d
SHA25612f5a9a55333994c5eb5fd83b37e77d154e242c3ba0378ed7c948bc717b91c9f
SHA512bfddbc48d942cbca1d39cf9c7df228b3f60d6be1430c43f59bce50679677f33513d60ceeae99f40ce68f0cb6f604d2f13b74237a86fb1af63887e6046f981dc0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5648123.exeFilesize
22KB
MD5acc26bc0825aa30e54abb9a8864c8fc5
SHA175a61c8b23a7d8419b4daf394994db4f3faa759d
SHA25612f5a9a55333994c5eb5fd83b37e77d154e242c3ba0378ed7c948bc717b91c9f
SHA512bfddbc48d942cbca1d39cf9c7df228b3f60d6be1430c43f59bce50679677f33513d60ceeae99f40ce68f0cb6f604d2f13b74237a86fb1af63887e6046f981dc0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0819502.exeFilesize
998KB
MD5957c87e5375585c8f93aa3f010a1bec2
SHA1afe48e1e586dfba16e2f09c5a29d8f379c9f8ce9
SHA2563bc646354896ff35a257b61bd4f1824b9348261155a30e0079b422df493123a9
SHA512e3a27810c04cbf366cca166e392135865803e6c668a24c4678f663b44bd2aa18cdfd6346806d3129beb876757703a7a938752ae9d12f074e8c64ad30f23fc4e3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0819502.exeFilesize
998KB
MD5957c87e5375585c8f93aa3f010a1bec2
SHA1afe48e1e586dfba16e2f09c5a29d8f379c9f8ce9
SHA2563bc646354896ff35a257b61bd4f1824b9348261155a30e0079b422df493123a9
SHA512e3a27810c04cbf366cca166e392135865803e6c668a24c4678f663b44bd2aa18cdfd6346806d3129beb876757703a7a938752ae9d12f074e8c64ad30f23fc4e3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3608059.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3608059.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7971626.exeFilesize
815KB
MD50b8db40e96f07c6289d3c2df8e330bb2
SHA10cfe062ebd3c8c8e285e15baa283b85ba6106efb
SHA25654bff0861fe022447015cf8063f09570a0a9958c05e5d7168893a53e34e84d3a
SHA51216c181ae8f1914c2c8113e220296949ec35201e62d2ba50c55e322b7a78f1ec1437e8e72b4e3eb443bbf6a0fc7fa87afab596d3623d32b8150e3ce8e95e252bd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7971626.exeFilesize
815KB
MD50b8db40e96f07c6289d3c2df8e330bb2
SHA10cfe062ebd3c8c8e285e15baa283b85ba6106efb
SHA25654bff0861fe022447015cf8063f09570a0a9958c05e5d7168893a53e34e84d3a
SHA51216c181ae8f1914c2c8113e220296949ec35201e62d2ba50c55e322b7a78f1ec1437e8e72b4e3eb443bbf6a0fc7fa87afab596d3623d32b8150e3ce8e95e252bd
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4100794.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4100794.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5865792.exeFilesize
632KB
MD59a3bb8e0cbb3344d761904ab1e983a23
SHA18fe7018f21e475fecdc64cdd3a4708395c296490
SHA2562b30c79ea9f70928d09aafddbab691348d41b0f951056a0f9337da3c8545003e
SHA5124af8c0b3ca8d8f02a07fefb02960cb969bb076f439b096d4d1da471e706f57245300f605981a91e9b59331be0b47cdeddb17cf9f7765c4091969e646a086a82b
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5865792.exeFilesize
632KB
MD59a3bb8e0cbb3344d761904ab1e983a23
SHA18fe7018f21e475fecdc64cdd3a4708395c296490
SHA2562b30c79ea9f70928d09aafddbab691348d41b0f951056a0f9337da3c8545003e
SHA5124af8c0b3ca8d8f02a07fefb02960cb969bb076f439b096d4d1da471e706f57245300f605981a91e9b59331be0b47cdeddb17cf9f7765c4091969e646a086a82b
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8944201.exeFilesize
413KB
MD5267e33971988bbd6dec32f9fb682db77
SHA1ec39cf61bb366a210e7ebd9b31f60d97532e286d
SHA2561aaa84209a2e68fc44d316d3fc97a5a95b35009c693677d85fd780df851c2871
SHA5124c68dd318b496dc19ac1dc91b43bb3cf7eaa7e2b4a189bdf43278e1b3b49593cd477063729a48b42a758aeff0619c00b81d16ab1b2d0bfbbec32fbe9012aa95e
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8944201.exeFilesize
413KB
MD5267e33971988bbd6dec32f9fb682db77
SHA1ec39cf61bb366a210e7ebd9b31f60d97532e286d
SHA2561aaa84209a2e68fc44d316d3fc97a5a95b35009c693677d85fd780df851c2871
SHA5124c68dd318b496dc19ac1dc91b43bb3cf7eaa7e2b4a189bdf43278e1b3b49593cd477063729a48b42a758aeff0619c00b81d16ab1b2d0bfbbec32fbe9012aa95e
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5563973.exeFilesize
354KB
MD52437b2eff177934f524e8c1af2404af3
SHA108fc22c66018decf92ca8f7166e329fda6938fd5
SHA256d4871e05a99e57f0da2a87ea7379fe2cf5d93e040df0d3dca95105da4e99ce8a
SHA51232de9acd44002afd3ac100adcfeb9c156d2a7b7bb6c455a1ffdecd78aa5b424d6197d6c442a4d111c2f31cf29ce8ac567c3779231978ff7fb836ef00dd42da80
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z5563973.exeFilesize
354KB
MD52437b2eff177934f524e8c1af2404af3
SHA108fc22c66018decf92ca8f7166e329fda6938fd5
SHA256d4871e05a99e57f0da2a87ea7379fe2cf5d93e040df0d3dca95105da4e99ce8a
SHA51232de9acd44002afd3ac100adcfeb9c156d2a7b7bb6c455a1ffdecd78aa5b424d6197d6c442a4d111c2f31cf29ce8ac567c3779231978ff7fb836ef00dd42da80
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7898956.exeFilesize
250KB
MD5fe9ffa001fd1ca05e2f4133abc6c3c5d
SHA10df2d11f2b02d07f916d65dcd13c2fc81d45b732
SHA256c586345778d8774143a3d163fd4f0a01762e03033ae79a94af5517a334415357
SHA5123cb42d42ba6e35433e27ed174fd4488d038174475f68d10f6b570f8bff606a93f92aaaa46142ab6d3ac0c57f902eec619c1f24c97e579a8a0e1b8ce39c7b9424
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7898956.exeFilesize
250KB
MD5fe9ffa001fd1ca05e2f4133abc6c3c5d
SHA10df2d11f2b02d07f916d65dcd13c2fc81d45b732
SHA256c586345778d8774143a3d163fd4f0a01762e03033ae79a94af5517a334415357
SHA5123cb42d42ba6e35433e27ed174fd4488d038174475f68d10f6b570f8bff606a93f92aaaa46142ab6d3ac0c57f902eec619c1f24c97e579a8a0e1b8ce39c7b9424
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9680009.exeFilesize
379KB
MD5562cfa1d079be39b3d28ed3013339513
SHA1e4073c229f937dd575e5144d4f14265a488a8acb
SHA25679b8ef06520e65fbef6f23bf6e94534da0a68f4a3fa3e5af7d83dfd6d4d7aa63
SHA512b5f1d9bd54500d0e997312e469adf040806d98bb74c3e8c61ad600f4c5914f4087cca870ca8ca3ffe9e0e9a18166cfb28452a934f882439b68c5b9f528813acf
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r9680009.exeFilesize
379KB
MD5562cfa1d079be39b3d28ed3013339513
SHA1e4073c229f937dd575e5144d4f14265a488a8acb
SHA25679b8ef06520e65fbef6f23bf6e94534da0a68f4a3fa3e5af7d83dfd6d4d7aa63
SHA512b5f1d9bd54500d0e997312e469adf040806d98bb74c3e8c61ad600f4c5914f4087cca870ca8ca3ffe9e0e9a18166cfb28452a934f882439b68c5b9f528813acf
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0
-
memory/424-42-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/424-44-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/424-41-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/424-40-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3216-86-0x0000000074480000-0x0000000074C30000-memory.dmpFilesize
7.7MB
-
memory/3216-36-0x0000000074480000-0x0000000074C30000-memory.dmpFilesize
7.7MB
-
memory/3216-35-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/3216-84-0x0000000074480000-0x0000000074C30000-memory.dmpFilesize
7.7MB
-
memory/3468-63-0x0000000004F90000-0x0000000004FA0000-memory.dmpFilesize
64KB
-
memory/3468-67-0x0000000005160000-0x000000000519C000-memory.dmpFilesize
240KB
-
memory/3468-62-0x0000000005100000-0x0000000005112000-memory.dmpFilesize
72KB
-
memory/3468-87-0x0000000074480000-0x0000000074C30000-memory.dmpFilesize
7.7MB
-
memory/3468-61-0x00000000051F0000-0x00000000052FA000-memory.dmpFilesize
1.0MB
-
memory/3468-57-0x0000000005700000-0x0000000005D18000-memory.dmpFilesize
6.1MB
-
memory/3468-50-0x00000000028E0000-0x00000000028E6000-memory.dmpFilesize
24KB
-
memory/3468-49-0x0000000074480000-0x0000000074C30000-memory.dmpFilesize
7.7MB
-
memory/3468-48-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3468-83-0x00000000051A0000-0x00000000051EC000-memory.dmpFilesize
304KB
-
memory/3468-88-0x0000000004F90000-0x0000000004FA0000-memory.dmpFilesize
64KB