Overview
overview
10Static
static
31bd70f5afc...20.exe
windows10-2004-x64
1020d5ad811e...b7.exe
windows10-2004-x64
102ca6e4b470...97.exe
windows10-2004-x64
1030323f682e...18.exe
windows10-2004-x64
10426e1b8066...18.exe
windows10-2004-x64
1043ea4b5927...9e.exe
windows10-2004-x64
1044ba27c950...f2.exe
windows10-2004-x64
106e35231281...45.exe
windows10-2004-x64
107cac44d1ec...c4.exe
windows10-2004-x64
10823db2b88d...40.exe
windows10-2004-x64
10a884418225...db.exe
windows10-2004-x64
10c68d91a00f...d2.exe
windows10-2004-x64
10cabcad649e...d3.exe
windows7-x64
10cabcad649e...d3.exe
windows10-2004-x64
10cb4c64011d...ef.exe
windows10-2004-x64
10d55f431b8e...57.exe
windows10-2004-x64
10dea00ebf60...e0.exe
windows10-2004-x64
10e017c199a6...9b.exe
windows10-2004-x64
10e01acda385...7b.exe
windows10-2004-x64
10e46b62442d...14.exe
windows10-2004-x64
10ef7029b98b...78.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
1bd70f5afcc29724401d52710f012058d999560c75bde3fd609f66ffc0bd9720.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
20d5ad811e156e522c088718e9fad42c9719bbca8aa4b3f144c468550177d6b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2ca6e4b470413b98976384ac3e479028c30b8486b2ebb4a4dd8e4e2142faac97.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
30323f682e6a32aa6d849428448a5ebd9b9590ee3a331da4fd2f5934b4c13818.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
426e1b8066ed7b417a0887d9af5ab1436b8302f01a33910c8c64da68d5b06c18.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
43ea4b5927abdf60c2312374034e3b21c33a1082d31190027a6b747b84aef49e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
44ba27c950b0c14f429cb6252215fa6bdf9cb6c714a1890cbaae75274f91f4f2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6e352312813a28290ff0ff1a92702c185aae40663ba027e0a0c2d464d283d345.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
7cac44d1ecd3f5639f33ee135e671d1baab428e0ead20f5eae7b4d2be71debc4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
823db2b88de38daac96f8e746abe924341117f170be5cd8a57a2db86d001bc40.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
c68d91a00fd95a921391069a12b7eba5c82ab3db1e6c4d5868561527424cf5d2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
cabcad649e33f7f4e2ee71f0de68902c08004e3587dd364c97b12d067acbd6d3.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
cabcad649e33f7f4e2ee71f0de68902c08004e3587dd364c97b12d067acbd6d3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
cb4c64011df6d9448d6e9f657a89d6cc8dfd2b81fc8262bccfab2f05465c39ef.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
dea00ebf6034d535aea8f56cd6017972814dfb3374887346a9c9c8182c1110e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e017c199a693aee53fef17402d6258dee359f1092c5845f73d404e2646590b9b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e01acda3856cc169ddd84def2f4c60a6487d82da3d3c35333bff09986229bd7b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e46b62442d214e617c5a6224fef70a4e5ed02b730b85396408e198e85f21eb14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
ef7029b98b2432c74d1512668109e659b6f7e89d2d4469a291c54309ecec0878.exe
Resource
win10v2004-20240508-en
General
-
Target
e46b62442d214e617c5a6224fef70a4e5ed02b730b85396408e198e85f21eb14.exe
-
Size
1.0MB
-
MD5
6c03229d81fc567135786fbc627f7928
-
SHA1
ccd1f0b5ed2a01df2e350c08ea4753bca734eadf
-
SHA256
e46b62442d214e617c5a6224fef70a4e5ed02b730b85396408e198e85f21eb14
-
SHA512
88f008f2b3550b1a1acea62e3ad8e9500db30169267ef98ea167bf1601c5c784a363a7b384782fb6cccb6c0a0a2d7544ab5348fc81b6c1bd0cecab92ebf20080
-
SSDEEP
12288:8MrAy90oPXQxQoIyewS+wtFSvQM4yddHQiRXRVUS8MK0XwYT/GbktvfVQGuWi2bB:8yeQ7mHQixRyqK0LyE3u2QgL2ILFgM1
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
fb0fb8
http://77.91.68.52
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
-
url_paths
/mac/index.php
Extracted
amadey
3.89
daf753
http://77.91.68.78
-
install_dir
cb378487cf
-
install_file
legota.exe
-
strings_key
f3785cbeef2013b6724eed349fd316ba
-
url_paths
/help/index.php
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral20/memory/4024-42-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral20/memory/4024-40-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family behavioral20/memory/4024-39-0x0000000000400000-0x0000000000428000-memory.dmp mystic_family -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral20/memory/2864-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral20/memory/2296-46-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation t6728086.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation u6367247.exe Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 18 IoCs
pid Process 1220 z0314990.exe 2648 z0591564.exe 4936 z8288796.exe 3212 z1399077.exe 1296 q3777242.exe 1164 r0398736.exe 5020 s6234223.exe 2532 t6728086.exe 1856 explonde.exe 1700 u6367247.exe 2920 legota.exe 2212 w5783618.exe 4772 explonde.exe 3416 legota.exe 4912 explonde.exe 4628 legota.exe 4532 explonde.exe 3312 legota.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e46b62442d214e617c5a6224fef70a4e5ed02b730b85396408e198e85f21eb14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0314990.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z0591564.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z8288796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z1399077.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1296 set thread context of 2864 1296 q3777242.exe 91 PID 1164 set thread context of 4024 1164 r0398736.exe 99 PID 5020 set thread context of 2296 5020 s6234223.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2780 1296 WerFault.exe 88 1520 1164 WerFault.exe 97 1668 5020 WerFault.exe 102 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3340 schtasks.exe 844 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2864 AppLaunch.exe 2864 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2864 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 1220 2452 e46b62442d214e617c5a6224fef70a4e5ed02b730b85396408e198e85f21eb14.exe 83 PID 2452 wrote to memory of 1220 2452 e46b62442d214e617c5a6224fef70a4e5ed02b730b85396408e198e85f21eb14.exe 83 PID 2452 wrote to memory of 1220 2452 e46b62442d214e617c5a6224fef70a4e5ed02b730b85396408e198e85f21eb14.exe 83 PID 1220 wrote to memory of 2648 1220 z0314990.exe 84 PID 1220 wrote to memory of 2648 1220 z0314990.exe 84 PID 1220 wrote to memory of 2648 1220 z0314990.exe 84 PID 2648 wrote to memory of 4936 2648 z0591564.exe 85 PID 2648 wrote to memory of 4936 2648 z0591564.exe 85 PID 2648 wrote to memory of 4936 2648 z0591564.exe 85 PID 4936 wrote to memory of 3212 4936 z8288796.exe 87 PID 4936 wrote to memory of 3212 4936 z8288796.exe 87 PID 4936 wrote to memory of 3212 4936 z8288796.exe 87 PID 3212 wrote to memory of 1296 3212 z1399077.exe 88 PID 3212 wrote to memory of 1296 3212 z1399077.exe 88 PID 3212 wrote to memory of 1296 3212 z1399077.exe 88 PID 1296 wrote to memory of 2760 1296 q3777242.exe 90 PID 1296 wrote to memory of 2760 1296 q3777242.exe 90 PID 1296 wrote to memory of 2760 1296 q3777242.exe 90 PID 1296 wrote to memory of 2864 1296 q3777242.exe 91 PID 1296 wrote to memory of 2864 1296 q3777242.exe 91 PID 1296 wrote to memory of 2864 1296 q3777242.exe 91 PID 1296 wrote to memory of 2864 1296 q3777242.exe 91 PID 1296 wrote to memory of 2864 1296 q3777242.exe 91 PID 1296 wrote to memory of 2864 1296 q3777242.exe 91 PID 1296 wrote to memory of 2864 1296 q3777242.exe 91 PID 1296 wrote to memory of 2864 1296 q3777242.exe 91 PID 3212 wrote to memory of 1164 3212 z1399077.exe 97 PID 3212 wrote to memory of 1164 3212 z1399077.exe 97 PID 3212 wrote to memory of 1164 3212 z1399077.exe 97 PID 1164 wrote to memory of 4024 1164 r0398736.exe 99 PID 1164 wrote to memory of 4024 1164 r0398736.exe 99 PID 1164 wrote to memory of 4024 1164 r0398736.exe 99 PID 1164 wrote to memory of 4024 1164 r0398736.exe 99 PID 1164 wrote to memory of 4024 1164 r0398736.exe 99 PID 1164 wrote to memory of 4024 1164 r0398736.exe 99 PID 1164 wrote to memory of 4024 1164 r0398736.exe 99 PID 1164 wrote to memory of 4024 1164 r0398736.exe 99 PID 1164 wrote to memory of 4024 1164 r0398736.exe 99 PID 1164 wrote to memory of 4024 1164 r0398736.exe 99 PID 4936 wrote to memory of 5020 4936 z8288796.exe 102 PID 4936 wrote to memory of 5020 4936 z8288796.exe 102 PID 4936 wrote to memory of 5020 4936 z8288796.exe 102 PID 5020 wrote to memory of 2296 5020 s6234223.exe 104 PID 5020 wrote to memory of 2296 5020 s6234223.exe 104 PID 5020 wrote to memory of 2296 5020 s6234223.exe 104 PID 5020 wrote to memory of 2296 5020 s6234223.exe 104 PID 5020 wrote to memory of 2296 5020 s6234223.exe 104 PID 5020 wrote to memory of 2296 5020 s6234223.exe 104 PID 5020 wrote to memory of 2296 5020 s6234223.exe 104 PID 5020 wrote to memory of 2296 5020 s6234223.exe 104 PID 2648 wrote to memory of 2532 2648 z0591564.exe 107 PID 2648 wrote to memory of 2532 2648 z0591564.exe 107 PID 2648 wrote to memory of 2532 2648 z0591564.exe 107 PID 2532 wrote to memory of 1856 2532 t6728086.exe 108 PID 2532 wrote to memory of 1856 2532 t6728086.exe 108 PID 2532 wrote to memory of 1856 2532 t6728086.exe 108 PID 1220 wrote to memory of 1700 1220 z0314990.exe 109 PID 1220 wrote to memory of 1700 1220 z0314990.exe 109 PID 1220 wrote to memory of 1700 1220 z0314990.exe 109 PID 1856 wrote to memory of 3340 1856 explonde.exe 110 PID 1856 wrote to memory of 3340 1856 explonde.exe 110 PID 1856 wrote to memory of 3340 1856 explonde.exe 110 PID 1856 wrote to memory of 2328 1856 explonde.exe 112 PID 1856 wrote to memory of 2328 1856 explonde.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\e46b62442d214e617c5a6224fef70a4e5ed02b730b85396408e198e85f21eb14.exe"C:\Users\Admin\AppData\Local\Temp\e46b62442d214e617c5a6224fef70a4e5ed02b730b85396408e198e85f21eb14.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0314990.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0314990.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0591564.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z0591564.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8288796.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z8288796.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1399077.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1399077.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3777242.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3777242.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2760
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 6007⤵
- Program crash
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0398736.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0398736.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 1567⤵
- Program crash
PID:1520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6234223.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6234223.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 1486⤵
- Program crash
PID:1668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6728086.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t6728086.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:3340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:2328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:1140
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:1684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4880
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4436
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4360
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6367247.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6367247.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:2920 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:844
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:2292
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:4344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:1028
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5783618.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5783618.exe2⤵
- Executes dropped EXE
PID:2212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1296 -ip 12961⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1164 -ip 11641⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5020 -ip 50201⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4772
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3416
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4912
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4628
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4532
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:3312
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD5f109677dcca4d197eccb0f868b9d3c0c
SHA14d628e837a799738f9b035e3c01940534f7ee703
SHA256989666478605069d8affa868e21b7b14f5953544182236fc15d3d0e4af46c63a
SHA51237cd5f9ac544aedd3fc2c803b51ab1fbba83462b07196881811e8e099b414e15bfc1656320c47b70909487991c70a84994a8a61106a341675c225ae2b979f222
-
Filesize
964KB
MD5348f495681617d5188c0ee6d14112c4e
SHA16acb010beecaedaf58ce0ab01caed3781518aadb
SHA25625100e42ba58e4ede583a3e4e36c09cdb9f9194b010fd57f172cc1f0882465c2
SHA5127a103327245ef84b334bc7efe2061617f90b45477999685397bebe11378aeb1f1002d673c907cab0082f6b1d5128a2514f4cfaeb7179b58b932a9a6677a95bfd
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
782KB
MD51bab133595a2890969018c304c3f44b5
SHA1c4527a9a22ab5a2db0a9f8968a177514cc058af0
SHA2568d16b55cfe1b4326f4f6211d047acc08979371297ad7d3ff10f1b4801fbe9942
SHA512297f036ce8365201aeab2b45dfc6f84615ce7dc44f1a4d397d1e0b8b421d93df6b2651b80d7e07b95a09d5ce46c2e068024a74be2659122dc4de18b8a27790e1
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
599KB
MD50c6dbd2b5ee20eb4d7c4e817fe6a0248
SHA1030c57d203b7cf8d68238d4add7cb35bf2ea3640
SHA256066f709527550cc46550fc3fab0f00d25cb1e3ff705dcfca15ff646e06a65bba
SHA512274a067befbd6b5363e00ca66fbb856254d8d5cb310ee7015a64944e570354cd9747786b42eb2ff87c4db39da4c9b1015a1a08908331a80edeac5629b494803b
-
Filesize
380KB
MD5d0ce473bb66b7aecd1e52207d7bf7ad0
SHA18140b1dd3aa912457c8b9b205b618088d0df4e89
SHA2569fe852eb86534587293045f8b0cb0e362a223482e43549f87ce8f1c368d1898f
SHA512ec040327d666e4416db31b659d691226fe5b39370dbf3c9bd899e58afac557627bf46d593db499a5a8fd1d5306da86d778cfc5504fd85d6875fa445635994b65
-
Filesize
337KB
MD5568ad03e7d3d313a5d905d59bd2b287a
SHA1baa668bc7f0d1a067da3939978931f08a5f2599f
SHA256a6731a028347907b6a89f3748758fb00852d28d71d951b1fd061a30c8d7c878d
SHA512c2d2ca93d55a9d5d7a5efdb1e01dcf3fcdd029056f74c60d8c7cbb8e34c6edaca0046fec6754f694da6e571c9b6ac13a346cae43db636c897cf23b42bce1bf47
-
Filesize
217KB
MD55084587b783d972b4aa45647f3da131b
SHA1b56c58efe24531826da3ff313295c58ddc6b1314
SHA256deb0d7761a6e38584fac9b1a22b6d26efe85edc6e0c115e1999f4503cbcc4ee0
SHA512c5eba1aec7d3b3d6a130e73cd86df477f56c3496e8d5925dc01fc82e661bf4bbdb6e8985cbab1bae305b8bb582198f57abd2e07bad9534e0d497014049222792
-
Filesize
346KB
MD507fde6b1142b5ed94e1eee5acec4f438
SHA11557ed8a1f8e8ca8a53cbad2adb5b087c84ab581
SHA256e74cee163ea262850a9925f6ff1ee63415d0c26ee75b45f9395aa8c36c938b5d
SHA5120e91c2a62062e9d1f5ce2fad436956f39b117d7789da91fbc586539162f87842017157036cb1eab9910fbf5a014c146a1062bb8e880b90a7cd0c2ed25e409a1b