Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 14:19
Static task
static1
Behavioral task
behavioral1
Sample
f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91.exe
Resource
win7-20230831-en
General
-
Target
f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91.exe
-
Size
1.1MB
-
MD5
3f94676e00374ae781e69b04049d1ff4
-
SHA1
a6282217b7e5bb1efe1c673a0f18b911fb80abe7
-
SHA256
f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91
-
SHA512
b8064916a0546f6284590e82b22877ea83a20a40fe05f19e87c19641e9579af6cec0570a20275421418c76ed33f3c6669c27f0189f92adc848ec92b71373b03e
-
SSDEEP
24576:oyfcMwX/ay+dJgltkV4LRZ1iji0SxU6Y69e9x75:vfPncWGnW4d4
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/1532-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1532-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1532-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/1532-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4244-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation t6594172.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation u2654974.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation explonde.exe -
Executes dropped EXE 18 IoCs
pid Process 3280 z6073791.exe 1360 z4702916.exe 3676 z5928004.exe 3884 z3480721.exe 1820 q1965363.exe 1480 r8362344.exe 4224 s7337836.exe 5048 t6594172.exe 4920 explonde.exe 4088 u2654974.exe 1692 legota.exe 4944 w6149167.exe 4908 explonde.exe 2220 legota.exe 2784 explonde.exe 4716 legota.exe 4592 explonde.exe 4180 legota.exe -
Loads dropped DLL 2 IoCs
pid Process 2440 rundll32.exe 1068 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z3480721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6073791.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4702916.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z5928004.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1820 set thread context of 4244 1820 q1965363.exe 89 PID 1480 set thread context of 1532 1480 r8362344.exe 96 PID 4224 set thread context of 1628 4224 s7337836.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3620 1820 WerFault.exe 88 2200 1480 WerFault.exe 93 3364 1532 WerFault.exe 96 1764 4224 WerFault.exe 102 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3716 schtasks.exe 1716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4244 AppLaunch.exe 4244 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4244 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4444 wrote to memory of 3280 4444 f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91.exe 83 PID 4444 wrote to memory of 3280 4444 f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91.exe 83 PID 4444 wrote to memory of 3280 4444 f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91.exe 83 PID 3280 wrote to memory of 1360 3280 z6073791.exe 84 PID 3280 wrote to memory of 1360 3280 z6073791.exe 84 PID 3280 wrote to memory of 1360 3280 z6073791.exe 84 PID 1360 wrote to memory of 3676 1360 z4702916.exe 85 PID 1360 wrote to memory of 3676 1360 z4702916.exe 85 PID 1360 wrote to memory of 3676 1360 z4702916.exe 85 PID 3676 wrote to memory of 3884 3676 z5928004.exe 87 PID 3676 wrote to memory of 3884 3676 z5928004.exe 87 PID 3676 wrote to memory of 3884 3676 z5928004.exe 87 PID 3884 wrote to memory of 1820 3884 z3480721.exe 88 PID 3884 wrote to memory of 1820 3884 z3480721.exe 88 PID 3884 wrote to memory of 1820 3884 z3480721.exe 88 PID 1820 wrote to memory of 4244 1820 q1965363.exe 89 PID 1820 wrote to memory of 4244 1820 q1965363.exe 89 PID 1820 wrote to memory of 4244 1820 q1965363.exe 89 PID 1820 wrote to memory of 4244 1820 q1965363.exe 89 PID 1820 wrote to memory of 4244 1820 q1965363.exe 89 PID 1820 wrote to memory of 4244 1820 q1965363.exe 89 PID 1820 wrote to memory of 4244 1820 q1965363.exe 89 PID 1820 wrote to memory of 4244 1820 q1965363.exe 89 PID 3884 wrote to memory of 1480 3884 z3480721.exe 93 PID 3884 wrote to memory of 1480 3884 z3480721.exe 93 PID 3884 wrote to memory of 1480 3884 z3480721.exe 93 PID 1480 wrote to memory of 1532 1480 r8362344.exe 96 PID 1480 wrote to memory of 1532 1480 r8362344.exe 96 PID 1480 wrote to memory of 1532 1480 r8362344.exe 96 PID 1480 wrote to memory of 1532 1480 r8362344.exe 96 PID 1480 wrote to memory of 1532 1480 r8362344.exe 96 PID 1480 wrote to memory of 1532 1480 r8362344.exe 96 PID 1480 wrote to memory of 1532 1480 r8362344.exe 96 PID 1480 wrote to memory of 1532 1480 r8362344.exe 96 PID 1480 wrote to memory of 1532 1480 r8362344.exe 96 PID 1480 wrote to memory of 1532 1480 r8362344.exe 96 PID 3676 wrote to memory of 4224 3676 z5928004.exe 102 PID 3676 wrote to memory of 4224 3676 z5928004.exe 102 PID 3676 wrote to memory of 4224 3676 z5928004.exe 102 PID 4224 wrote to memory of 1612 4224 s7337836.exe 104 PID 4224 wrote to memory of 1612 4224 s7337836.exe 104 PID 4224 wrote to memory of 1612 4224 s7337836.exe 104 PID 4224 wrote to memory of 4668 4224 s7337836.exe 105 PID 4224 wrote to memory of 4668 4224 s7337836.exe 105 PID 4224 wrote to memory of 4668 4224 s7337836.exe 105 PID 4224 wrote to memory of 1628 4224 s7337836.exe 106 PID 4224 wrote to memory of 1628 4224 s7337836.exe 106 PID 4224 wrote to memory of 1628 4224 s7337836.exe 106 PID 4224 wrote to memory of 1628 4224 s7337836.exe 106 PID 4224 wrote to memory of 1628 4224 s7337836.exe 106 PID 4224 wrote to memory of 1628 4224 s7337836.exe 106 PID 4224 wrote to memory of 1628 4224 s7337836.exe 106 PID 4224 wrote to memory of 1628 4224 s7337836.exe 106 PID 1360 wrote to memory of 5048 1360 z4702916.exe 109 PID 1360 wrote to memory of 5048 1360 z4702916.exe 109 PID 1360 wrote to memory of 5048 1360 z4702916.exe 109 PID 5048 wrote to memory of 4920 5048 t6594172.exe 111 PID 5048 wrote to memory of 4920 5048 t6594172.exe 111 PID 5048 wrote to memory of 4920 5048 t6594172.exe 111 PID 3280 wrote to memory of 4088 3280 z6073791.exe 112 PID 3280 wrote to memory of 4088 3280 z6073791.exe 112 PID 3280 wrote to memory of 4088 3280 z6073791.exe 112 PID 4088 wrote to memory of 1692 4088 u2654974.exe 113 PID 4088 wrote to memory of 1692 4088 u2654974.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91.exe"C:\Users\Admin\AppData\Local\Temp\f419c343298df025683321e3d987f93298d1fb038245f6c69d3bb19a7016db91.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6073791.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6073791.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702916.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4702916.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5928004.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5928004.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3480721.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z3480721.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q1965363.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 5927⤵
- Program crash
PID:3620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8362344.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8362344.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 5408⤵
- Program crash
PID:3364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 5647⤵
- Program crash
PID:2200
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7337836.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7337836.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4668
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 6126⤵
- Program crash
PID:1764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6594172.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6594172.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:4920 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:3716
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:2152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:4076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:2368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4048
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4356
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:460
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2440
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u2654974.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u2654974.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:1716
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:2732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:3372
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:3484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:3200
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:3860
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1068
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6149167.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6149167.exe2⤵
- Executes dropped EXE
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1820 -ip 18201⤵PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1480 -ip 14801⤵PID:3336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1532 -ip 15321⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4224 -ip 42241⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4908
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2220
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:2784
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4716
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4592
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4180
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5bf2ac69a9e281eda315aeb44d1a87ce9
SHA19a9e852cee8ce4d68f6cc9bfb1cdeed92f3dca04
SHA256ac0c6a662487db9beee715cd99feec7beeeb435c1a61e92a4df30da11ff50eb5
SHA512979aba1883f450b8d71e5e342bd25319b3c0d6ad6e7b6e8f51cc600c99bad416dd48a1883ce92573f18c63dc397720aabaa0c1e28e22afb4b9895ffe5b96a3d4
-
Filesize
21KB
MD5bf2ac69a9e281eda315aeb44d1a87ce9
SHA19a9e852cee8ce4d68f6cc9bfb1cdeed92f3dca04
SHA256ac0c6a662487db9beee715cd99feec7beeeb435c1a61e92a4df30da11ff50eb5
SHA512979aba1883f450b8d71e5e342bd25319b3c0d6ad6e7b6e8f51cc600c99bad416dd48a1883ce92573f18c63dc397720aabaa0c1e28e22afb4b9895ffe5b96a3d4
-
Filesize
998KB
MD513e90dafab3e28efc838e4b44f54e928
SHA1fb6f79e12b45765dbb4fe1ea288bb220a8291477
SHA25626fc7f415f67423fa9dc5d72b9ac50ca1ccfc90d5a26732eae248ff35f5ea403
SHA5122ff628290ad8b88dea3412394f3c1ab91e276bc9952efb01deaa64fd841968dfd71baa0b8b278585ea1361f426a218d71e6be40193519222ef17407b1dbb941a
-
Filesize
998KB
MD513e90dafab3e28efc838e4b44f54e928
SHA1fb6f79e12b45765dbb4fe1ea288bb220a8291477
SHA25626fc7f415f67423fa9dc5d72b9ac50ca1ccfc90d5a26732eae248ff35f5ea403
SHA5122ff628290ad8b88dea3412394f3c1ab91e276bc9952efb01deaa64fd841968dfd71baa0b8b278585ea1361f426a218d71e6be40193519222ef17407b1dbb941a
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
815KB
MD5ad3fe513a7375c4a17c843d5dec64d3f
SHA19da6c6a193270dedc454ed1f6873d77efb21345f
SHA256dd425ed82bc05bbe310484edae71463c1b0b6b3f4c1a980a479468fafef1f58f
SHA512cd3330e00370fced2948bb174a8d8c13d8420018f817e318426f985de16acf23e2a3d0df3869118b3fcfaf266cfae4bf25cda31ed387fe6ae220378136dc6515
-
Filesize
815KB
MD5ad3fe513a7375c4a17c843d5dec64d3f
SHA19da6c6a193270dedc454ed1f6873d77efb21345f
SHA256dd425ed82bc05bbe310484edae71463c1b0b6b3f4c1a980a479468fafef1f58f
SHA512cd3330e00370fced2948bb174a8d8c13d8420018f817e318426f985de16acf23e2a3d0df3869118b3fcfaf266cfae4bf25cda31ed387fe6ae220378136dc6515
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
632KB
MD531d4362b4a30ea8a45f8df38fde96d01
SHA1fa87ad7b8204eee8eb6067836ee7a4a526b76b2f
SHA256c2322f2cb69d6f5545d07dfabd79eedf9ba1af7c712aa33c0db41a990ea38451
SHA5122bf806e9eabae21e032a215706066e7966633f1f574aee75b3f5e635983a5bef3b93438580cf76a76707b634ef57bde6bea818f66093e57cd0eaf1d57a944525
-
Filesize
632KB
MD531d4362b4a30ea8a45f8df38fde96d01
SHA1fa87ad7b8204eee8eb6067836ee7a4a526b76b2f
SHA256c2322f2cb69d6f5545d07dfabd79eedf9ba1af7c712aa33c0db41a990ea38451
SHA5122bf806e9eabae21e032a215706066e7966633f1f574aee75b3f5e635983a5bef3b93438580cf76a76707b634ef57bde6bea818f66093e57cd0eaf1d57a944525
-
Filesize
413KB
MD50b88a582f7fde92a7e67350119b99e8a
SHA128a23addc14c5a7c07a4dc301d41f4ec678b8ca7
SHA25644804cb44ba43a1a044a562960ebd705de78b4a7f6d35a4fac4c9e1252304174
SHA5127fa50094bc36f2861b151f1bd2284602c6eb4439074dc6ed4cd8e4425c7c6bc7bc4cd3e1500df7291e059ef3d0c1eeea4535971bd403c1917cecb412952eccbb
-
Filesize
413KB
MD50b88a582f7fde92a7e67350119b99e8a
SHA128a23addc14c5a7c07a4dc301d41f4ec678b8ca7
SHA25644804cb44ba43a1a044a562960ebd705de78b4a7f6d35a4fac4c9e1252304174
SHA5127fa50094bc36f2861b151f1bd2284602c6eb4439074dc6ed4cd8e4425c7c6bc7bc4cd3e1500df7291e059ef3d0c1eeea4535971bd403c1917cecb412952eccbb
-
Filesize
354KB
MD50dbd17e665dbe7817d8869f09e6051fa
SHA17c479f5fb921f18cfd66be52a64ea253d6b4c9b8
SHA2563103ad5b37fd56700607510a0ea673d58d610d53494b9a25e0bcb3ec1826d001
SHA51221a831efc351bef650289fc61f43a2747dfa8eea9670359f059ff4fff27dfa97b325d5c7ff6640569dfb4fbfe1f40e5081ab752015da0772bd0eb7b0a0ab0651
-
Filesize
354KB
MD50dbd17e665dbe7817d8869f09e6051fa
SHA17c479f5fb921f18cfd66be52a64ea253d6b4c9b8
SHA2563103ad5b37fd56700607510a0ea673d58d610d53494b9a25e0bcb3ec1826d001
SHA51221a831efc351bef650289fc61f43a2747dfa8eea9670359f059ff4fff27dfa97b325d5c7ff6640569dfb4fbfe1f40e5081ab752015da0772bd0eb7b0a0ab0651
-
Filesize
250KB
MD5f95d4f9e01fd938ebce691a35ab368ad
SHA11351232decbbc30ccc639d08cd87d948d0051b44
SHA25692fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab
SHA512c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1
-
Filesize
250KB
MD5f95d4f9e01fd938ebce691a35ab368ad
SHA11351232decbbc30ccc639d08cd87d948d0051b44
SHA25692fa9e210c527cf27edba622468b4eb1bc117eaca78767596d017a36c4d20aab
SHA512c7637736750bc48a268a476d452332e7cbe4b7a00ffa20a31f537b1060ea061c5e155c8aa60ca7317a8ea9182108996b0932807c05097b59b7b07a71801a7fa1
-
Filesize
379KB
MD5b3feb54fabe9e0ef2e1e1cf04825ff53
SHA1887215aa86838a00425b0c959ce6e45da2315c3a
SHA25612328d9b7352956bb94bd5b9269b0227fde7bf6282fb3a8d0b3b264f4d2a811b
SHA5120f20539afd6b067542686b2af03ee72142faa817758cdd84819a6f78222d5383d716f412d27936b9f26ca0dc19f44d9acce52bace8e3fb326ed0159509832588
-
Filesize
379KB
MD5b3feb54fabe9e0ef2e1e1cf04825ff53
SHA1887215aa86838a00425b0c959ce6e45da2315c3a
SHA25612328d9b7352956bb94bd5b9269b0227fde7bf6282fb3a8d0b3b264f4d2a811b
SHA5120f20539afd6b067542686b2af03ee72142faa817758cdd84819a6f78222d5383d716f412d27936b9f26ca0dc19f44d9acce52bace8e3fb326ed0159509832588
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0