Overview
overview
10Static
static
30237b61e61...e4.exe
windows7-x64
30237b61e61...e4.exe
windows10-2004-x64
100cbf9c5b59...f9.exe
windows10-2004-x64
100edb945c8d...dd.exe
windows10-2004-x64
1013ca0bbb32...3f.exe
windows10-2004-x64
101465a638f9...f2.exe
windows10-2004-x64
101b0729839d...dd.exe
windows10-2004-x64
1027bf431b08...9f.exe
windows10-2004-x64
1034b8fdeeaf...27.exe
windows10-2004-x64
10488c7cb3b3...18.exe
windows10-2004-x64
104bc64c0375...75.exe
windows10-2004-x64
104f85c3e4ec...fe.exe
windows10-2004-x64
1055b18033bb...53.exe
windows7-x64
355b18033bb...53.exe
windows10-2004-x64
1060e7e1ac00...07.exe
windows10-2004-x64
10979a97cb16...99.exe
windows10-2004-x64
10b3eb736a5d...9f.exe
windows10-2004-x64
10d57352b171...d0.exe
windows10-2004-x64
10d62f03a558...b6.exe
windows10-2004-x64
10e72a6e51db...6d.exe
windows10-2004-x64
10f5c9c18cca...6b.exe
windows10-2004-x64
10fdb9b25099...78.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 12:11
Static task
static1
Behavioral task
behavioral1
Sample
0237b61e61fe845c052d94e1696f694fd1c69b55134971372a39facd025272e4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0237b61e61fe845c052d94e1696f694fd1c69b55134971372a39facd025272e4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
0cbf9c5b5986e5ea6119fe8fc3da31af9c240982a4a7cfed5ca9fb56c4d768f9.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
13ca0bbb3221adeaf830fc435756121e64e03f342fec62e30bcd13f7d5c1083f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
1465a638f9237c41616fc372bd66b6e66553baab8af20a969337be53108abaf2.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
1b0729839d14f565e8de6c35f683e4cf6c401cc652ea06fe9d0da0c95e9abadd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
27bf431b08d40bcbf5b763154e97f70f0745d6072ffe1d77d49e6cc8d3181c9f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
34b8fdeeafe15c31ab10314949d8d534bca5cfd6995d47dbab8b3506a2847a27.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
488c7cb3b3ae680032b59617bf38fb807c934eab7717cda13ee71996311ea718.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
4bc64c0375f3ffea0f45741a1f4ed6af4f66e8f13084960da4aeb003e9f45675.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
4f85c3e4ec4db9780db30f402a82cf4f34e6d0a934cf7eb35d8bdb58e46d06fe.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
55b18033bb16a6ebd933d4b24c7828c19ea0ec0937cbb06be066053c204d9753.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
55b18033bb16a6ebd933d4b24c7828c19ea0ec0937cbb06be066053c204d9753.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
60e7e1ac00410438a148bcba6a92dbac02c94531491c577d988a49e9c281cf07.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
979a97cb16762728856ff5dd929cb625d1673048544e092731742005342da799.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
b3eb736a5d62ca99c3bb61ab1572ce044dd3f3d33a0f83509bfc2cb1204b0b9f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
d57352b17144065c6fd05a0807532115ba9622e99b096ac4432dd312359b06d0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
d62f03a5584e3ca2265a79bdd4e0fb0add3d0412b01568178f46f8dcecf881b6.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e72a6e51dbac1e6313459eab1ffc1832d973b0fd23fe10aba5acdee9ba028f6d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
f5c9c18ccaa6f832b0b5e79345b5442c799774303bf84ea96f45d3c21b2a1f6b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
fdb9b250992b8c5988cfe05d255d96db5dd1d7a3ac4959de26b8546038f10c78.exe
Resource
win10v2004-20240508-en
General
-
Target
0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe
-
Size
755KB
-
MD5
053c3c8e722fa47bd2838b181c048d4f
-
SHA1
45a6adcdfc9dd036ca7edae5af73dfb8f51fb4fb
-
SHA256
0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd
-
SHA512
776b7eda980d98638096e170736cdfe4622e8fd2f6c8dda2c661c738ee201fcf4a048156f159b7dd3649713338e7e683a87bb9cf69115c02b630b4c68480835c
-
SSDEEP
12288:QMrhy90cINZiNM09CQ+yMCpfb5nIyt7s0zv4kma32U6yWy7P3RvcBLMxC++B+dGK:hyxI2uyMgN7sEmaLRx3cJ+dn
Malware Config
Extracted
redline
genda
77.91.124.55:19071
Extracted
amadey
3.89
http://77.91.124.1
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
-
url_paths
/theme/index.php
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral4/memory/3544-27-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral4/memory/3544-30-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral4/memory/3544-28-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q6134869.exe healer behavioral4/memory/4892-21-0x0000000000BD0000-0x0000000000BDA000-memory.dmp healer -
Processes:
q6134869.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection q6134869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q6134869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q6134869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q6134869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q6134869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q6134869.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/2292-34-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t0352074.exeexplothe.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation t0352074.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation explothe.exe -
Executes dropped EXE 9 IoCs
Processes:
z7768946.exez9327222.exeq6134869.exer8873344.exes5765129.exet0352074.exeexplothe.exeexplothe.exeexplothe.exepid process 3408 z7768946.exe 3108 z9327222.exe 4892 q6134869.exe 3116 r8873344.exe 5592 s5765129.exe 5956 t0352074.exe 660 explothe.exe 2912 explothe.exe 5348 explothe.exe -
Processes:
q6134869.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" q6134869.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exez7768946.exez9327222.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7768946.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z9327222.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
r8873344.exes5765129.exedescription pid process target process PID 3116 set thread context of 3544 3116 r8873344.exe AppLaunch.exe PID 5592 set thread context of 2292 5592 s5765129.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5548 3116 WerFault.exe r8873344.exe 756 5592 WerFault.exe s5765129.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
q6134869.exepid process 4892 q6134869.exe 4892 q6134869.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
q6134869.exedescription pid process Token: SeDebugPrivilege 4892 q6134869.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exez7768946.exez9327222.exer8873344.exes5765129.exet0352074.exeexplothe.execmd.exedescription pid process target process PID 4804 wrote to memory of 3408 4804 0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe z7768946.exe PID 4804 wrote to memory of 3408 4804 0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe z7768946.exe PID 4804 wrote to memory of 3408 4804 0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe z7768946.exe PID 3408 wrote to memory of 3108 3408 z7768946.exe z9327222.exe PID 3408 wrote to memory of 3108 3408 z7768946.exe z9327222.exe PID 3408 wrote to memory of 3108 3408 z7768946.exe z9327222.exe PID 3108 wrote to memory of 4892 3108 z9327222.exe q6134869.exe PID 3108 wrote to memory of 4892 3108 z9327222.exe q6134869.exe PID 3108 wrote to memory of 3116 3108 z9327222.exe r8873344.exe PID 3108 wrote to memory of 3116 3108 z9327222.exe r8873344.exe PID 3108 wrote to memory of 3116 3108 z9327222.exe r8873344.exe PID 3116 wrote to memory of 3544 3116 r8873344.exe AppLaunch.exe PID 3116 wrote to memory of 3544 3116 r8873344.exe AppLaunch.exe PID 3116 wrote to memory of 3544 3116 r8873344.exe AppLaunch.exe PID 3116 wrote to memory of 3544 3116 r8873344.exe AppLaunch.exe PID 3116 wrote to memory of 3544 3116 r8873344.exe AppLaunch.exe PID 3116 wrote to memory of 3544 3116 r8873344.exe AppLaunch.exe PID 3116 wrote to memory of 3544 3116 r8873344.exe AppLaunch.exe PID 3116 wrote to memory of 3544 3116 r8873344.exe AppLaunch.exe PID 3116 wrote to memory of 3544 3116 r8873344.exe AppLaunch.exe PID 3116 wrote to memory of 3544 3116 r8873344.exe AppLaunch.exe PID 3408 wrote to memory of 5592 3408 z7768946.exe s5765129.exe PID 3408 wrote to memory of 5592 3408 z7768946.exe s5765129.exe PID 3408 wrote to memory of 5592 3408 z7768946.exe s5765129.exe PID 5592 wrote to memory of 1004 5592 s5765129.exe AppLaunch.exe PID 5592 wrote to memory of 1004 5592 s5765129.exe AppLaunch.exe PID 5592 wrote to memory of 1004 5592 s5765129.exe AppLaunch.exe PID 5592 wrote to memory of 2292 5592 s5765129.exe AppLaunch.exe PID 5592 wrote to memory of 2292 5592 s5765129.exe AppLaunch.exe PID 5592 wrote to memory of 2292 5592 s5765129.exe AppLaunch.exe PID 5592 wrote to memory of 2292 5592 s5765129.exe AppLaunch.exe PID 5592 wrote to memory of 2292 5592 s5765129.exe AppLaunch.exe PID 5592 wrote to memory of 2292 5592 s5765129.exe AppLaunch.exe PID 5592 wrote to memory of 2292 5592 s5765129.exe AppLaunch.exe PID 5592 wrote to memory of 2292 5592 s5765129.exe AppLaunch.exe PID 4804 wrote to memory of 5956 4804 0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe t0352074.exe PID 4804 wrote to memory of 5956 4804 0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe t0352074.exe PID 4804 wrote to memory of 5956 4804 0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe t0352074.exe PID 5956 wrote to memory of 660 5956 t0352074.exe explothe.exe PID 5956 wrote to memory of 660 5956 t0352074.exe explothe.exe PID 5956 wrote to memory of 660 5956 t0352074.exe explothe.exe PID 660 wrote to memory of 448 660 explothe.exe schtasks.exe PID 660 wrote to memory of 448 660 explothe.exe schtasks.exe PID 660 wrote to memory of 448 660 explothe.exe schtasks.exe PID 660 wrote to memory of 2720 660 explothe.exe cmd.exe PID 660 wrote to memory of 2720 660 explothe.exe cmd.exe PID 660 wrote to memory of 2720 660 explothe.exe cmd.exe PID 2720 wrote to memory of 3496 2720 cmd.exe cmd.exe PID 2720 wrote to memory of 3496 2720 cmd.exe cmd.exe PID 2720 wrote to memory of 3496 2720 cmd.exe cmd.exe PID 2720 wrote to memory of 3212 2720 cmd.exe cacls.exe PID 2720 wrote to memory of 3212 2720 cmd.exe cacls.exe PID 2720 wrote to memory of 3212 2720 cmd.exe cacls.exe PID 2720 wrote to memory of 1352 2720 cmd.exe cacls.exe PID 2720 wrote to memory of 1352 2720 cmd.exe cacls.exe PID 2720 wrote to memory of 1352 2720 cmd.exe cacls.exe PID 2720 wrote to memory of 1684 2720 cmd.exe cmd.exe PID 2720 wrote to memory of 1684 2720 cmd.exe cmd.exe PID 2720 wrote to memory of 1684 2720 cmd.exe cmd.exe PID 2720 wrote to memory of 2872 2720 cmd.exe cacls.exe PID 2720 wrote to memory of 2872 2720 cmd.exe cacls.exe PID 2720 wrote to memory of 2872 2720 cmd.exe cacls.exe PID 2720 wrote to memory of 3700 2720 cmd.exe cacls.exe PID 2720 wrote to memory of 3700 2720 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe"C:\Users\Admin\AppData\Local\Temp\0edb945c8dd154bc423c54a58705917964bbfb8f0391f3350b75f33df5c740dd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7768946.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7768946.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9327222.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9327222.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q6134869.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q6134869.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r8873344.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r8873344.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵PID:3544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 5925⤵
- Program crash
PID:5548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5765129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s5765129.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5592 -s 5884⤵
- Program crash
PID:756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t0352074.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t0352074.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5956 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F4⤵
- Creates scheduled task(s)
PID:448
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"5⤵PID:3212
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E5⤵PID:1352
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"5⤵PID:2872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E5⤵PID:3700
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3116 -ip 31161⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 5592 -ip 55921⤵PID:5436
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:2912
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:5348
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD54bd59a6b3207f99fc3435baf3c22bc4e
SHA1ae90587beed289f177f4143a8380ba27109d0a6f
SHA25608e33db08288da47bbbe3a8d65a59e8536b05c464ba91dc66e08f9abd245e236
SHA512ca7517384a5449145a819e45445ff9bbcb27ea1b9e2a63c13ef12e256475e0ccbf05031b5ab5cb83a24b2cdd37d425cc7b9044c660098d39f47f05e95bbb6324
-
Filesize
572KB
MD5356b87f7e7d1119be9f7c887741a938b
SHA1cecc1ad33fe7b36014f02b4fa44f515fd3249bf5
SHA256ec316cbf3c14217146a8ba824b3c65ab244912ea81788f99b6cffb0ace82e471
SHA512e3ff0d16b7e1e701ce3da63036330f68d852a81404eb978ce939c3f1901d6348898da229820e1937536a403dd5071174de1968d1d6df8a3f492dd82b40512c44
-
Filesize
386KB
MD5d73886be4345e34cf4827fcb8a957cf4
SHA1e1462c50683d4d0f8ec398ca1f9c8b62e1866823
SHA256903ccb7a02e5c7b90cda143c57520d0ce32aff1859d47037c5c8763a7fe4365e
SHA5129fa8e869eae791339743ce8950cf6baf99bab5e269284c667e04e8e9e46dd9868c0ff63a99cb8c4ec6aa9a845fd08875c1ddec4a717b1405b321b966aaa015d0
-
Filesize
309KB
MD52e4905aa800b199a194675fdfafc8b49
SHA1f69b4fea9097cb4dc4d9185f4712afd347d0ee29
SHA25678c46ce26624335d86d10014a51f6544018bcf6ffac94e3caa7d22984db07c59
SHA512f550939e3880d94f29eb3e5d6537ea9ccb18f2a6e49a151822dfdf978515cadbc5f25d3518c0ae289a84cf341be95fec092ccf8e503105a75e2737f985234e76
-
Filesize
11KB
MD566233842cc4c6ffb85b56e67fece2373
SHA1b38277717a66492ca9aa822ba760d26940bc5767
SHA256d8d32c4b550eeb5c689f1424191f48be89b07453b0ca5753f4d19a544ebc0123
SHA5128c7029f9079df2a839eb402c80b8656800ff07a5341930bc5f04494c1ae6777e35644c350ec6a45ffba4c34d1168416ed9ac9c351022241ef5371b08eff2c809
-
Filesize
304KB
MD56fadd5e3de013d724ef45f2c1b157bcb
SHA16b826a70b3e01eb42b1cffecc6593d42adb10ddd
SHA2564287e0b896754410651c0f7d0dec9e7d290d0b2b1cc38c5605f5920192424c85
SHA512f4478bc5b1d71edc48e495f4f35ff6167ac02ac5f2a433b4c2eec57b6afce0e62fc832ce021f87eb80b4e16f7b1cb71daac2467a336801f56eb2dbbc19e91758