Analysis
-
max time kernel
300s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
05/11/2023, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
0894e9f826f0067a6d6a8845074529d7aab98ac2106e580463fcc2526e8c2b1b.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
0894e9f826f0067a6d6a8845074529d7aab98ac2106e580463fcc2526e8c2b1b.exe
Resource
win10-20231020-en
General
-
Target
0894e9f826f0067a6d6a8845074529d7aab98ac2106e580463fcc2526e8c2b1b.exe
-
Size
1.8MB
-
MD5
654a680c834eb9f3a73f73b1ff7b8eed
-
SHA1
19cc65a0252c0520488884e36f0e0280ae3c6939
-
SHA256
0894e9f826f0067a6d6a8845074529d7aab98ac2106e580463fcc2526e8c2b1b
-
SHA512
24ba1db6229502e9080901fc7794feb2a387516a810c6c2060f23f5916c6210e9fc23cc2bc6345d938e395120ea4abebfb65f1e8922abde3b0232b80a650b55e
-
SSDEEP
49152:Xyx4LEHFWrwcCTTij3Q51hkJ4inCK3CdIWJc7M:iALMcCSjohHNIf
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
plost
77.91.124.86:19084
Extracted
amadey
3.89
http://77.91.124.1/theme/index.php
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3292-71-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 17 IoCs
pid Process 3316 QE5wt98.exe 5028 MD3aU43.exe 2244 rj8zS64.exe 3824 kP9Tn15.exe 2228 JI9TD75.exe 2156 1BN19FO5.exe 2052 2PH1623.exe 1396 3Qt45HW.exe 2776 4VT749fk.exe 4968 5Rc1fE2.exe 3600 explothe.exe 2432 6nf9rr6.exe 3576 7Hq9rJ10.exe 4372 explothe.exe 3752 explothe.exe 3464 explothe.exe 1380 explothe.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" QE5wt98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" MD3aU43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" rj8zS64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" kP9Tn15.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" JI9TD75.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0894e9f826f0067a6d6a8845074529d7aab98ac2106e580463fcc2526e8c2b1b.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2156 set thread context of 3252 2156 1BN19FO5.exe 78 PID 2052 set thread context of 4880 2052 2PH1623.exe 81 PID 2776 set thread context of 3292 2776 4VT749fk.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 820 4880 WerFault.exe 81 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Qt45HW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Qt45HW.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3Qt45HW.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1396 3Qt45HW.exe 1396 3Qt45HW.exe 3252 AppLaunch.exe 3252 AppLaunch.exe 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found 3220 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3220 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1396 3Qt45HW.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 3252 AppLaunch.exe Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found Token: SeShutdownPrivilege 3220 Process not Found Token: SeCreatePagefilePrivilege 3220 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2212 wrote to memory of 3316 2212 0894e9f826f0067a6d6a8845074529d7aab98ac2106e580463fcc2526e8c2b1b.exe 71 PID 2212 wrote to memory of 3316 2212 0894e9f826f0067a6d6a8845074529d7aab98ac2106e580463fcc2526e8c2b1b.exe 71 PID 2212 wrote to memory of 3316 2212 0894e9f826f0067a6d6a8845074529d7aab98ac2106e580463fcc2526e8c2b1b.exe 71 PID 3316 wrote to memory of 5028 3316 QE5wt98.exe 72 PID 3316 wrote to memory of 5028 3316 QE5wt98.exe 72 PID 3316 wrote to memory of 5028 3316 QE5wt98.exe 72 PID 5028 wrote to memory of 2244 5028 MD3aU43.exe 73 PID 5028 wrote to memory of 2244 5028 MD3aU43.exe 73 PID 5028 wrote to memory of 2244 5028 MD3aU43.exe 73 PID 2244 wrote to memory of 3824 2244 rj8zS64.exe 74 PID 2244 wrote to memory of 3824 2244 rj8zS64.exe 74 PID 2244 wrote to memory of 3824 2244 rj8zS64.exe 74 PID 3824 wrote to memory of 2228 3824 kP9Tn15.exe 75 PID 3824 wrote to memory of 2228 3824 kP9Tn15.exe 75 PID 3824 wrote to memory of 2228 3824 kP9Tn15.exe 75 PID 2228 wrote to memory of 2156 2228 JI9TD75.exe 76 PID 2228 wrote to memory of 2156 2228 JI9TD75.exe 76 PID 2228 wrote to memory of 2156 2228 JI9TD75.exe 76 PID 2156 wrote to memory of 4508 2156 1BN19FO5.exe 77 PID 2156 wrote to memory of 4508 2156 1BN19FO5.exe 77 PID 2156 wrote to memory of 4508 2156 1BN19FO5.exe 77 PID 2156 wrote to memory of 3252 2156 1BN19FO5.exe 78 PID 2156 wrote to memory of 3252 2156 1BN19FO5.exe 78 PID 2156 wrote to memory of 3252 2156 1BN19FO5.exe 78 PID 2156 wrote to memory of 3252 2156 1BN19FO5.exe 78 PID 2156 wrote to memory of 3252 2156 1BN19FO5.exe 78 PID 2156 wrote to memory of 3252 2156 1BN19FO5.exe 78 PID 2156 wrote to memory of 3252 2156 1BN19FO5.exe 78 PID 2156 wrote to memory of 3252 2156 1BN19FO5.exe 78 PID 2228 wrote to memory of 2052 2228 JI9TD75.exe 79 PID 2228 wrote to memory of 2052 2228 JI9TD75.exe 79 PID 2228 wrote to memory of 2052 2228 JI9TD75.exe 79 PID 2052 wrote to memory of 4444 2052 2PH1623.exe 80 PID 2052 wrote to memory of 4444 2052 2PH1623.exe 80 PID 2052 wrote to memory of 4444 2052 2PH1623.exe 80 PID 2052 wrote to memory of 4880 2052 2PH1623.exe 81 PID 2052 wrote to memory of 4880 2052 2PH1623.exe 81 PID 2052 wrote to memory of 4880 2052 2PH1623.exe 81 PID 2052 wrote to memory of 4880 2052 2PH1623.exe 81 PID 2052 wrote to memory of 4880 2052 2PH1623.exe 81 PID 2052 wrote to memory of 4880 2052 2PH1623.exe 81 PID 2052 wrote to memory of 4880 2052 2PH1623.exe 81 PID 2052 wrote to memory of 4880 2052 2PH1623.exe 81 PID 2052 wrote to memory of 4880 2052 2PH1623.exe 81 PID 2052 wrote to memory of 4880 2052 2PH1623.exe 81 PID 3824 wrote to memory of 1396 3824 kP9Tn15.exe 82 PID 3824 wrote to memory of 1396 3824 kP9Tn15.exe 82 PID 3824 wrote to memory of 1396 3824 kP9Tn15.exe 82 PID 2244 wrote to memory of 2776 2244 rj8zS64.exe 85 PID 2244 wrote to memory of 2776 2244 rj8zS64.exe 85 PID 2244 wrote to memory of 2776 2244 rj8zS64.exe 85 PID 2776 wrote to memory of 3292 2776 4VT749fk.exe 86 PID 2776 wrote to memory of 3292 2776 4VT749fk.exe 86 PID 2776 wrote to memory of 3292 2776 4VT749fk.exe 86 PID 2776 wrote to memory of 3292 2776 4VT749fk.exe 86 PID 2776 wrote to memory of 3292 2776 4VT749fk.exe 86 PID 2776 wrote to memory of 3292 2776 4VT749fk.exe 86 PID 2776 wrote to memory of 3292 2776 4VT749fk.exe 86 PID 2776 wrote to memory of 3292 2776 4VT749fk.exe 86 PID 5028 wrote to memory of 4968 5028 MD3aU43.exe 87 PID 5028 wrote to memory of 4968 5028 MD3aU43.exe 87 PID 5028 wrote to memory of 4968 5028 MD3aU43.exe 87 PID 4968 wrote to memory of 3600 4968 5Rc1fE2.exe 88 PID 4968 wrote to memory of 3600 4968 5Rc1fE2.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0894e9f826f0067a6d6a8845074529d7aab98ac2106e580463fcc2526e8c2b1b.exe"C:\Users\Admin\AppData\Local\Temp\0894e9f826f0067a6d6a8845074529d7aab98ac2106e580463fcc2526e8c2b1b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QE5wt98.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QE5wt98.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\MD3aU43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\MD3aU43.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rj8zS64.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rj8zS64.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kP9Tn15.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kP9Tn15.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\JI9TD75.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\JI9TD75.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1BN19FO5.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1BN19FO5.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:4508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2PH1623.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2PH1623.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:4444
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4880 -s 5689⤵
- Program crash
PID:820
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Qt45HW.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3Qt45HW.exe6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1396
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4VT749fk.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4VT749fk.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5Rc1fE2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5Rc1fE2.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Executes dropped EXE
PID:3600 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:3628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:2308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4248
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:1636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:204
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:752
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6nf9rr6.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6nf9rr6.exe3⤵
- Executes dropped EXE
PID:2432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7Hq9rJ10.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7Hq9rJ10.exe2⤵
- Executes dropped EXE
PID:3576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\is64.bat" "3⤵PID:2924
-
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4372
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3752
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3464
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1380
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD50385e3b02b8cc26a56708f5d7ad4fda3
SHA1726aded8c300e3ce90005492902266dedd76a324
SHA2567beb4afa32368d11d52324e6249028761dc621c121ff7b5ece80ffdc5afb83cf
SHA5122842dfc44a0f42207de27b2611fe34717f6cd664bc0c81ae88d415e107d975932c6e606c4d030df9e6c4864b3dcb9700bd6a1ce3630e4871802135cdec86df2b
-
Filesize
72KB
MD50385e3b02b8cc26a56708f5d7ad4fda3
SHA1726aded8c300e3ce90005492902266dedd76a324
SHA2567beb4afa32368d11d52324e6249028761dc621c121ff7b5ece80ffdc5afb83cf
SHA5122842dfc44a0f42207de27b2611fe34717f6cd664bc0c81ae88d415e107d975932c6e606c4d030df9e6c4864b3dcb9700bd6a1ce3630e4871802135cdec86df2b
-
Filesize
1.7MB
MD5c4ae6445f8033cc716acf0a4342288fa
SHA1124056dccf4a193287a89dad6554b60118ad8d39
SHA256b5d77a4b884e1bed1e90e70d07c9ad23b83f253d5e327e69a61ed30ea79f63f9
SHA512638da44bebfee3fe16052d1d45f7c31ccb73f49b3ba4c23f34c7cabb3ba43b897db2ba09c7e08e430e8f99f8c6f94a065b279e5064bc9903a1f393eaada11d05
-
Filesize
1.7MB
MD5c4ae6445f8033cc716acf0a4342288fa
SHA1124056dccf4a193287a89dad6554b60118ad8d39
SHA256b5d77a4b884e1bed1e90e70d07c9ad23b83f253d5e327e69a61ed30ea79f63f9
SHA512638da44bebfee3fe16052d1d45f7c31ccb73f49b3ba4c23f34c7cabb3ba43b897db2ba09c7e08e430e8f99f8c6f94a065b279e5064bc9903a1f393eaada11d05
-
Filesize
181KB
MD57454f0810bf5ef8a50d25566d6b165b6
SHA1fa3e6cfba57861c611f26a86287c2107387377d2
SHA2569c5902b52f845e83bf4f08aaba4d780edd649c6deb5f65ce53a4f4cd9a9747de
SHA512003477a6b8a89b9122252f913a53d4b8ac95097f14a9823e1c89702ffd334a85bc4953504768a75b261bf2782b109d1b8e720b334cef0b506306a578b71183eb
-
Filesize
181KB
MD57454f0810bf5ef8a50d25566d6b165b6
SHA1fa3e6cfba57861c611f26a86287c2107387377d2
SHA2569c5902b52f845e83bf4f08aaba4d780edd649c6deb5f65ce53a4f4cd9a9747de
SHA512003477a6b8a89b9122252f913a53d4b8ac95097f14a9823e1c89702ffd334a85bc4953504768a75b261bf2782b109d1b8e720b334cef0b506306a578b71183eb
-
Filesize
1.5MB
MD56482fe15d112f04ba140c7feafdc3835
SHA19d702f0fa416910e5060355db17095a0d027b7de
SHA256ecf0416c81373f9afab348397e23d59345b7d4ab3a89b0598848d3c5ef9b0e38
SHA512f7797c81eeb119b27a2ee75a7a0db8b695b7a1b5f3533a39937a03cf20e6f0e6c87119cdc3d7593c8ae8bf4c03be857589bc328baab1647f4e2ca8d1efaa8db7
-
Filesize
1.5MB
MD56482fe15d112f04ba140c7feafdc3835
SHA19d702f0fa416910e5060355db17095a0d027b7de
SHA256ecf0416c81373f9afab348397e23d59345b7d4ab3a89b0598848d3c5ef9b0e38
SHA512f7797c81eeb119b27a2ee75a7a0db8b695b7a1b5f3533a39937a03cf20e6f0e6c87119cdc3d7593c8ae8bf4c03be857589bc328baab1647f4e2ca8d1efaa8db7
-
Filesize
222KB
MD5dbb35c4bd0ef3af62dfca1a68995f6ba
SHA1f9463574847ad0b98626610dd273a591bdd1f7db
SHA256ffbe582cb068399f76008ca29794ff4797d38998462190f62eab80c3c6a5060d
SHA5121315bda0ead2add83f5455e8fa22a127b5f9d4c0db1747bc6f0244457342597da4e9e7ca5b1a1daf89f3619bb4cd92f6acd252e9926e14766ac734010136edc6
-
Filesize
222KB
MD5dbb35c4bd0ef3af62dfca1a68995f6ba
SHA1f9463574847ad0b98626610dd273a591bdd1f7db
SHA256ffbe582cb068399f76008ca29794ff4797d38998462190f62eab80c3c6a5060d
SHA5121315bda0ead2add83f5455e8fa22a127b5f9d4c0db1747bc6f0244457342597da4e9e7ca5b1a1daf89f3619bb4cd92f6acd252e9926e14766ac734010136edc6
-
Filesize
1.3MB
MD525eda5d87b10dcfa6ff54acf4ce3908a
SHA1ebc9a3d347aca4b2a959a2e43e8fb01e84ce630f
SHA2563ca367160b499ffdac5ea3d4157769f2481c2568bf0bf4c789aeded3e66b8a0c
SHA512a289cdf868491caa52ef167294562cd967e000e2f72e9383ecd8bd8f85923886441acc2769a5a465d1dc0f262c593c0b83cd7b36e4b9dc2b6cbbd0fb465a3c3b
-
Filesize
1.3MB
MD525eda5d87b10dcfa6ff54acf4ce3908a
SHA1ebc9a3d347aca4b2a959a2e43e8fb01e84ce630f
SHA2563ca367160b499ffdac5ea3d4157769f2481c2568bf0bf4c789aeded3e66b8a0c
SHA512a289cdf868491caa52ef167294562cd967e000e2f72e9383ecd8bd8f85923886441acc2769a5a465d1dc0f262c593c0b83cd7b36e4b9dc2b6cbbd0fb465a3c3b
-
Filesize
1.9MB
MD5730ec4132da8c3f5da7ddb66640d998e
SHA1d1b64c7aa78afaac7170945ffbb8a74af5483c84
SHA256029540664283f728896893e07de71beca51ef0e1edfcce5b54d0d0b1b16dcb18
SHA51231d78bd0396ae6aa7d3b65142254ba86524ceb7c9db0cd3285171e708208353b5c27adb7be97a6ede937f6e33133b2e1407eed3972176e36ffcfb6408092ea9e
-
Filesize
1.9MB
MD5730ec4132da8c3f5da7ddb66640d998e
SHA1d1b64c7aa78afaac7170945ffbb8a74af5483c84
SHA256029540664283f728896893e07de71beca51ef0e1edfcce5b54d0d0b1b16dcb18
SHA51231d78bd0396ae6aa7d3b65142254ba86524ceb7c9db0cd3285171e708208353b5c27adb7be97a6ede937f6e33133b2e1407eed3972176e36ffcfb6408092ea9e
-
Filesize
782KB
MD51ed1084ad30fdce4b010b1528e521fa9
SHA12f590c1711f04d897790e6111fb3ddf81e62fffe
SHA25634b7aef77b796fbacc7d55dbed461383c393d91eb81bdb378b3e531fa593956a
SHA512f71eab2e473e0aa844a057ad5d1f00049546edf3ca2aff353456a7757d194c0cc594dccd1428ce2ced56f18fad1e5434f80637cfd7fd8fd4a39624b65c55e565
-
Filesize
782KB
MD51ed1084ad30fdce4b010b1528e521fa9
SHA12f590c1711f04d897790e6111fb3ddf81e62fffe
SHA25634b7aef77b796fbacc7d55dbed461383c393d91eb81bdb378b3e531fa593956a
SHA512f71eab2e473e0aa844a057ad5d1f00049546edf3ca2aff353456a7757d194c0cc594dccd1428ce2ced56f18fad1e5434f80637cfd7fd8fd4a39624b65c55e565
-
Filesize
31KB
MD581b72a32ef61e14f1d9860e84dc420a9
SHA139b722bcc035d86afaa76469fbf4ca5383619715
SHA256d6d2344afc0f57d17f28fac3ef22c6c4577bd93d29e9e57235da863ae6fccd34
SHA5123fafd9e5a76605582ce107c7f8574013878ef40642e28adfd85576f4f65781e3da54a5e5c5c408815bcf4327d21da268f84e5ba388adb1f84f83d868ef21d8f6
-
Filesize
31KB
MD581b72a32ef61e14f1d9860e84dc420a9
SHA139b722bcc035d86afaa76469fbf4ca5383619715
SHA256d6d2344afc0f57d17f28fac3ef22c6c4577bd93d29e9e57235da863ae6fccd34
SHA5123fafd9e5a76605582ce107c7f8574013878ef40642e28adfd85576f4f65781e3da54a5e5c5c408815bcf4327d21da268f84e5ba388adb1f84f83d868ef21d8f6
-
Filesize
658KB
MD56f300bbbdda35519d348aef39c7c01e4
SHA1a6ceb1317b88700cf282e0b22a6e0fd7f73833cb
SHA256957e156db3f5d02bf2c3863fb92aa01e97aba097031b82169084022e36aa518c
SHA512a7ce851fcacf3be4bc69091e8d78195ceb66ec3b1a3c6f9ffe2d612320533f9d81da00abab97252094e1b1a3ea02c55a02befaa2b3ae58a6d20fb38c0c6783bf
-
Filesize
658KB
MD56f300bbbdda35519d348aef39c7c01e4
SHA1a6ceb1317b88700cf282e0b22a6e0fd7f73833cb
SHA256957e156db3f5d02bf2c3863fb92aa01e97aba097031b82169084022e36aa518c
SHA512a7ce851fcacf3be4bc69091e8d78195ceb66ec3b1a3c6f9ffe2d612320533f9d81da00abab97252094e1b1a3ea02c55a02befaa2b3ae58a6d20fb38c0c6783bf
-
Filesize
1.6MB
MD567ef8f2eb4949d5db808da267d40b010
SHA1ed0d887ff9d074367f34a6aa281d3dd59bf87438
SHA25636a0770908eb7c6e730cd0b928dc6c97b2de372767c55292940fae7ee23eb50b
SHA512a71628b2049a4887a914151d8c68538dbc310270b13ab52672a33a1d841b86f7ee36b5adf942b23e92600694800cb059c053c5dea1c77e6da7a0ae58aa52c9f0
-
Filesize
1.6MB
MD567ef8f2eb4949d5db808da267d40b010
SHA1ed0d887ff9d074367f34a6aa281d3dd59bf87438
SHA25636a0770908eb7c6e730cd0b928dc6c97b2de372767c55292940fae7ee23eb50b
SHA512a71628b2049a4887a914151d8c68538dbc310270b13ab52672a33a1d841b86f7ee36b5adf942b23e92600694800cb059c053c5dea1c77e6da7a0ae58aa52c9f0
-
Filesize
1.8MB
MD564309252cd2b9cd86db027a1d455ccf8
SHA18c0048a67f6fc9cdfe27d1e11ec6337a26b12639
SHA256d6bbd0ed0c114d616d20cb595ca35379c33865d5f7238730fa5e46db7d9443b5
SHA512d9f3384544b1502d363c173639ff0c9ad0d77cf0b56c19fbdf78ba9c4d95cf1172d9d45d1fd61bedc0d025f95d56a124fd783d206e51f61743c6a4baf73d51c4
-
Filesize
1.8MB
MD564309252cd2b9cd86db027a1d455ccf8
SHA18c0048a67f6fc9cdfe27d1e11ec6337a26b12639
SHA256d6bbd0ed0c114d616d20cb595ca35379c33865d5f7238730fa5e46db7d9443b5
SHA512d9f3384544b1502d363c173639ff0c9ad0d77cf0b56c19fbdf78ba9c4d95cf1172d9d45d1fd61bedc0d025f95d56a124fd783d206e51f61743c6a4baf73d51c4
-
Filesize
222KB
MD5dbb35c4bd0ef3af62dfca1a68995f6ba
SHA1f9463574847ad0b98626610dd273a591bdd1f7db
SHA256ffbe582cb068399f76008ca29794ff4797d38998462190f62eab80c3c6a5060d
SHA5121315bda0ead2add83f5455e8fa22a127b5f9d4c0db1747bc6f0244457342597da4e9e7ca5b1a1daf89f3619bb4cd92f6acd252e9926e14766ac734010136edc6
-
Filesize
222KB
MD5dbb35c4bd0ef3af62dfca1a68995f6ba
SHA1f9463574847ad0b98626610dd273a591bdd1f7db
SHA256ffbe582cb068399f76008ca29794ff4797d38998462190f62eab80c3c6a5060d
SHA5121315bda0ead2add83f5455e8fa22a127b5f9d4c0db1747bc6f0244457342597da4e9e7ca5b1a1daf89f3619bb4cd92f6acd252e9926e14766ac734010136edc6
-
Filesize
222KB
MD5dbb35c4bd0ef3af62dfca1a68995f6ba
SHA1f9463574847ad0b98626610dd273a591bdd1f7db
SHA256ffbe582cb068399f76008ca29794ff4797d38998462190f62eab80c3c6a5060d
SHA5121315bda0ead2add83f5455e8fa22a127b5f9d4c0db1747bc6f0244457342597da4e9e7ca5b1a1daf89f3619bb4cd92f6acd252e9926e14766ac734010136edc6
-
Filesize
222KB
MD5dbb35c4bd0ef3af62dfca1a68995f6ba
SHA1f9463574847ad0b98626610dd273a591bdd1f7db
SHA256ffbe582cb068399f76008ca29794ff4797d38998462190f62eab80c3c6a5060d
SHA5121315bda0ead2add83f5455e8fa22a127b5f9d4c0db1747bc6f0244457342597da4e9e7ca5b1a1daf89f3619bb4cd92f6acd252e9926e14766ac734010136edc6
-
Filesize
222KB
MD5dbb35c4bd0ef3af62dfca1a68995f6ba
SHA1f9463574847ad0b98626610dd273a591bdd1f7db
SHA256ffbe582cb068399f76008ca29794ff4797d38998462190f62eab80c3c6a5060d
SHA5121315bda0ead2add83f5455e8fa22a127b5f9d4c0db1747bc6f0244457342597da4e9e7ca5b1a1daf89f3619bb4cd92f6acd252e9926e14766ac734010136edc6
-
Filesize
222KB
MD5dbb35c4bd0ef3af62dfca1a68995f6ba
SHA1f9463574847ad0b98626610dd273a591bdd1f7db
SHA256ffbe582cb068399f76008ca29794ff4797d38998462190f62eab80c3c6a5060d
SHA5121315bda0ead2add83f5455e8fa22a127b5f9d4c0db1747bc6f0244457342597da4e9e7ca5b1a1daf89f3619bb4cd92f6acd252e9926e14766ac734010136edc6
-
Filesize
222KB
MD5dbb35c4bd0ef3af62dfca1a68995f6ba
SHA1f9463574847ad0b98626610dd273a591bdd1f7db
SHA256ffbe582cb068399f76008ca29794ff4797d38998462190f62eab80c3c6a5060d
SHA5121315bda0ead2add83f5455e8fa22a127b5f9d4c0db1747bc6f0244457342597da4e9e7ca5b1a1daf89f3619bb4cd92f6acd252e9926e14766ac734010136edc6
-
Filesize
181B
MD5225edee1d46e0a80610db26b275d72fb
SHA1ce206abf11aaf19278b72f5021cc64b1b427b7e8
SHA256e1befb57d724c9dc760cf42d7e0609212b22faeb2dc0c3ffe2fbd7134ff69559
SHA5124f01a2a248a1322cb690b7395b818d2780e46f4884e59f1ab96125d642b6358eea97c7fad6023ef17209b218daa9c88d15ea2b92f124ecb8434c0c7b4a710504