Overview
overview
10Static
static
32ae72cafa8...de.exe
windows10-2004-x64
102d225565e0...be.exe
windows10-2004-x64
105f94dabf69...6d.exe
windows10-2004-x64
1065296f4680...95.exe
windows7-x64
365296f4680...95.exe
windows10-2004-x64
107618ddb9e4...07.exe
windows10-2004-x64
108865ec3f94...5a.exe
windows10-2004-x64
108d796a364d...e4.exe
windows10-2004-x64
10aabdc92d30...96.exe
windows10-2004-x64
10bae99364dc...55.exe
windows10-2004-x64
10cc35c0b2bc...24.exe
windows10-2004-x64
10d63c4114c3...86.exe
windows10-2004-x64
10d65bb810cc...a7.exe
windows10-2004-x64
10d764830962...c8.exe
windows10-2004-x64
10d9124df1a4...d1.exe
windows10-2004-x64
10e1564be8f1...ad.exe
windows10-2004-x64
10e7ee230707...d5.exe
windows10-2004-x64
10e8a7f5f2b3...4b.exe
windows10-2004-x64
10e8bf7b5c22...96.exe
windows10-2004-x64
10eb214d5f58...c6.exe
windows10-2004-x64
10edacb614f4...95.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
2ae72cafa8f21759370b4609f21d845fbedad29052bfdacb21408b021b7ef6de.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
2d225565e090ae7f3ebf2de337fac7a1658473382e87c3cef7cac8a13b7f5ebe.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
5f94dabf691f3432b26ad16c1f7ecb24292db785b9562faeb1131ea9306e6a6d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
65296f468099ebcd60c98ae5a6f7f005a227427a05eda0790e32e2f0c0061d95.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
65296f468099ebcd60c98ae5a6f7f005a227427a05eda0790e32e2f0c0061d95.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
7618ddb9e4a4f8eb9facccaca5f824467c35a2b211a133dc5f4f30148b77b907.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
8865ec3f949ea2778d72427ba8f147c8a4182420bdfdbe11b0a8b53c48b0a95a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8d796a364d2a62b12d9a28d63b8503f41de8f9257083f87c02feecdb89c729e4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
aabdc92d3092215c39aff5ff3cdd7b86a2827e8ddaa5a11c8ac53332bfd6fa96.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
cc35c0b2bc4afaa3e56d0b585ddf1928790ef237331a245ad0eb919b4e8c2524.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
d63c4114c36e73dd975c0cc4a3dc67316e090266f64cd492ec17a7dabcdbe686.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
d65bb810ccd243a6f5edda6c97b9e2e03e46b6306aca9415c3ae84a27a61a7a7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
d76483096202fb3172705ac386f325854d2d6409275d9bbde9e10e329832b2c8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
d9124df1a48c55317dd58c4ab328c969efa7a2d673ba2134c19648e01de841d1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
e1564be8f124041c0c125d9557c302f4631504d0048e1c1f41b6abfb473ebbad.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e7ee230707772fd1bd9dd07f526c692dfe119bca41b2113cadfcd511a5416cd5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e8a7f5f2b344eb468a91c59dbe8699a08d71f9b708a1134c8948cf194516594b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
e8bf7b5c22a787af15a42638894b8f1eccc3320134f42f09939f4932df0cc796.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
eb214d5f5806ec4617c2b7cde5e3a5beb5a3c254a391dee7605decfe13174bc6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
edacb614f4d4ad4a3dd9e9d5ad37ba56d1e7d49ddad0b14ca3ce632b0a820f95.exe
Resource
win10v2004-20240508-en
General
-
Target
bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe
-
Size
1.3MB
-
MD5
7529bdfa5dbc18c1f73f6606e98b4e9b
-
SHA1
a1523edacc0dc68672d5b912f6f8b41b2001efd1
-
SHA256
bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855
-
SHA512
3efa3ad436d23115d1affb20d5d73700bae8279dc173bfa33fbf59a18486592d8eac38308409ea061f4715c273511ebb1975297f32d7e889a2582adcda11557b
-
SSDEEP
24576:aysk1sNnbCUxNG+VA/YgX/4vmG5BvPTDS63rPUEQ/WLcJP:hsk1sNbPxNHy/YC5UvPHBrJQ/M
Malware Config
Extracted
redline
trush
77.91.124.82:19071
-
auth_value
c13814867cde8193679cd0cad2d774be
Extracted
amadey
3.89
fb0fb8
http://77.91.68.52
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
-
url_paths
/mac/index.php
Extracted
amadey
3.89
daf753
http://77.91.68.78
-
install_dir
cb378487cf
-
install_file
legota.exe
-
strings_key
f3785cbeef2013b6724eed349fd316ba
-
url_paths
/help/index.php
Signatures
-
Detect Mystic stealer payload 3 IoCs
resource yara_rule behavioral10/memory/4460-38-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family behavioral10/memory/4460-36-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family behavioral10/memory/4460-35-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral10/memory/4676-76-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral10/memory/4540-42-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation s8052440.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation t5993025.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
pid Process 2012 z4434292.exe 4068 z8224704.exe 1776 z9693896.exe 3136 z9260949.exe 4792 q2715406.exe 5048 r7392010.exe 2820 s8052440.exe 1644 explonde.exe 1700 t5993025.exe 3700 legota.exe 2352 u2859580.exe 1100 w6588431.exe 1232 explonde.exe 4668 legota.exe 1028 explonde.exe 4580 legota.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4434292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8224704.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z9693896.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z9260949.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4792 set thread context of 4460 4792 q2715406.exe 92 PID 5048 set thread context of 4540 5048 r7392010.exe 102 PID 2352 set thread context of 4676 2352 u2859580.exe 133 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2464 4792 WerFault.exe 88 4688 5048 WerFault.exe 96 3996 2352 WerFault.exe 114 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3152 schtasks.exe 4560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4676 AppLaunch.exe 4676 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4676 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2012 1420 bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe 83 PID 1420 wrote to memory of 2012 1420 bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe 83 PID 1420 wrote to memory of 2012 1420 bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe 83 PID 2012 wrote to memory of 4068 2012 z4434292.exe 84 PID 2012 wrote to memory of 4068 2012 z4434292.exe 84 PID 2012 wrote to memory of 4068 2012 z4434292.exe 84 PID 4068 wrote to memory of 1776 4068 z8224704.exe 85 PID 4068 wrote to memory of 1776 4068 z8224704.exe 85 PID 4068 wrote to memory of 1776 4068 z8224704.exe 85 PID 1776 wrote to memory of 3136 1776 z9693896.exe 86 PID 1776 wrote to memory of 3136 1776 z9693896.exe 86 PID 1776 wrote to memory of 3136 1776 z9693896.exe 86 PID 3136 wrote to memory of 4792 3136 z9260949.exe 88 PID 3136 wrote to memory of 4792 3136 z9260949.exe 88 PID 3136 wrote to memory of 4792 3136 z9260949.exe 88 PID 4792 wrote to memory of 4460 4792 q2715406.exe 92 PID 4792 wrote to memory of 4460 4792 q2715406.exe 92 PID 4792 wrote to memory of 4460 4792 q2715406.exe 92 PID 4792 wrote to memory of 4460 4792 q2715406.exe 92 PID 4792 wrote to memory of 4460 4792 q2715406.exe 92 PID 4792 wrote to memory of 4460 4792 q2715406.exe 92 PID 4792 wrote to memory of 4460 4792 q2715406.exe 92 PID 4792 wrote to memory of 4460 4792 q2715406.exe 92 PID 4792 wrote to memory of 4460 4792 q2715406.exe 92 PID 4792 wrote to memory of 4460 4792 q2715406.exe 92 PID 3136 wrote to memory of 5048 3136 z9260949.exe 96 PID 3136 wrote to memory of 5048 3136 z9260949.exe 96 PID 3136 wrote to memory of 5048 3136 z9260949.exe 96 PID 5048 wrote to memory of 3332 5048 r7392010.exe 100 PID 5048 wrote to memory of 3332 5048 r7392010.exe 100 PID 5048 wrote to memory of 3332 5048 r7392010.exe 100 PID 5048 wrote to memory of 448 5048 r7392010.exe 101 PID 5048 wrote to memory of 448 5048 r7392010.exe 101 PID 5048 wrote to memory of 448 5048 r7392010.exe 101 PID 5048 wrote to memory of 4540 5048 r7392010.exe 102 PID 5048 wrote to memory of 4540 5048 r7392010.exe 102 PID 5048 wrote to memory of 4540 5048 r7392010.exe 102 PID 5048 wrote to memory of 4540 5048 r7392010.exe 102 PID 5048 wrote to memory of 4540 5048 r7392010.exe 102 PID 5048 wrote to memory of 4540 5048 r7392010.exe 102 PID 5048 wrote to memory of 4540 5048 r7392010.exe 102 PID 5048 wrote to memory of 4540 5048 r7392010.exe 102 PID 1776 wrote to memory of 2820 1776 z9693896.exe 105 PID 1776 wrote to memory of 2820 1776 z9693896.exe 105 PID 1776 wrote to memory of 2820 1776 z9693896.exe 105 PID 2820 wrote to memory of 1644 2820 s8052440.exe 106 PID 2820 wrote to memory of 1644 2820 s8052440.exe 106 PID 2820 wrote to memory of 1644 2820 s8052440.exe 106 PID 4068 wrote to memory of 1700 4068 z8224704.exe 107 PID 4068 wrote to memory of 1700 4068 z8224704.exe 107 PID 4068 wrote to memory of 1700 4068 z8224704.exe 107 PID 1644 wrote to memory of 3152 1644 explonde.exe 108 PID 1644 wrote to memory of 3152 1644 explonde.exe 108 PID 1644 wrote to memory of 3152 1644 explonde.exe 108 PID 1644 wrote to memory of 1496 1644 explonde.exe 109 PID 1644 wrote to memory of 1496 1644 explonde.exe 109 PID 1644 wrote to memory of 1496 1644 explonde.exe 109 PID 1700 wrote to memory of 3700 1700 t5993025.exe 112 PID 1700 wrote to memory of 3700 1700 t5993025.exe 112 PID 1700 wrote to memory of 3700 1700 t5993025.exe 112 PID 1496 wrote to memory of 4268 1496 cmd.exe 113 PID 1496 wrote to memory of 4268 1496 cmd.exe 113 PID 1496 wrote to memory of 4268 1496 cmd.exe 113 PID 2012 wrote to memory of 2352 2012 z4434292.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe"C:\Users\Admin\AppData\Local\Temp\bae99364dcd24884412ebf95baa476884b86666b0891ad8f7c642d1e72901855.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4434292.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4434292.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8224704.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8224704.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9693896.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9693896.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9260949.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z9260949.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2715406.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q2715406.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 1567⤵
- Program crash
PID:2464
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7392010.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r7392010.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:3332
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 5687⤵
- Program crash
PID:4688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8052440.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s8052440.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F7⤵
- Creates scheduled task(s)
PID:3152
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4268
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"8⤵PID:2972
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E8⤵PID:1844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"8⤵PID:3920
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E8⤵PID:4600
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5993025.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t5993025.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:3700 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F6⤵
- Creates scheduled task(s)
PID:4560
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit6⤵PID:3344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:264
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"7⤵PID:516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E7⤵PID:1272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3908
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"7⤵PID:3476
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E7⤵PID:4420
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u2859580.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u2859580.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2352 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 1364⤵
- Program crash
PID:3996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6588431.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6588431.exe2⤵
- Executes dropped EXE
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4792 -ip 47921⤵PID:2028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 5048 -ip 50481⤵PID:2268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2352 -ip 23521⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1232
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4668
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1028
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:4580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD58d74032230087ca95f59ad912fd13da0
SHA1b40b094ba995c156e2bb36f6337a63133a21a82e
SHA256ad5cd2bce6b31853eff91be4d7a93d61f1c399bb74b9a259a49b00fc09346e77
SHA512f346c712f13708cd329ba8487a175823316f108f9b3cb1bd64c1b522a24bb118dd2508497129352048add45423b242722f791597d2a8662231ffe902d92896dc
-
Filesize
1.2MB
MD5c35245433aa0737ec0abe53bade9fabc
SHA1353e5fc83d0c04448260ab0a5a777cac48a4b4f8
SHA25645637df89793caff5c97aa461b0840fe64bf78ca076b32b66ed1f98179e7eda7
SHA512e3ed0562d0848208618a4cc89fefa9bfce832732c440f6f0cac472a0933254ec4e20fe4c71540497fddd17ef37bc0c71ea7bc5eb644cd6f52507d79318e84b45
-
Filesize
861KB
MD5c8e6b5a0dcbfea40d9258abc35f44d62
SHA104a23d2e6d95167eab063395efdfc0587f93982f
SHA25681a1a268668faf4d41746eca6fef423e405402d66f7d274a87ec3f9fd2ed5fbd
SHA512374aea9bf311f66279ad0e3b34e8bd8ce55873d98b6edca5af5063930746758ae1cff42b6e383edfb0059c725a075c7c74ce19bd0cd937555d0c1d5812c8feef
-
Filesize
929KB
MD504d62a2b6f9db7784b216994dac2f9b3
SHA150e543eba1dc4e482c1b47f1b5d759270b88e20e
SHA25630969f074952eb6b13d551045929cedd2eb5db93a858001c7e998f56814128df
SHA51217707470a39ed0440e8066792200399dccd424eeb4aa636dcc70f8fcfdab2ebee1a651bee841358c030d5aaaa0f76638acfe7b26ab1a999283a3badf7d2c3754
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
746KB
MD5676b3a2e8cbc8ccc86171a173ba9cdbe
SHA1f9a3710d54cb85517da68724b33bb85fb482a75f
SHA25614f490f39beaa57dc0395a3841e7547777e2a4707e8d69b15082ec1ac75012db
SHA512d3ccbc85e8927d871263fd0dc5e7109e9aea7c83bfbd147ebee133e6d39468a3605ad66d10df073dc19c43ad924b800e49250a0591894439350d7e4dcd9f1450
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
564KB
MD5e870b09503361c3646b4b0cb39a4ecb0
SHA1db118e2f1af0c49d43d10bd8d490df07ccde2195
SHA256b05153494e3b18b6c776aaca50be294a5e32f6a357c1e049aae2bb712d443a20
SHA512cf1842a7ea63c051c62f309801f4233cdcb5d4b731c85342e901cdc962198fe729106b9bb108a6a5613f11f04f25395eb61ca3717b92e32b86d25e3e5f3c67bc
-
Filesize
1.0MB
MD5365c377af634038759c0c86797e404c3
SHA10b609acc8fa094ac3f89680711b8caa8b5589623
SHA2565d22e1d1819740edeeae24d93d70211e7672d2de3228889a673ecdd959e4cc9d
SHA5122fc9f586cf7fde9ade48e7d90528e458a85568497946c746d88ab827aa101f637320b70ba5f6d645f1b36fbfc06119db3b2ac09a13ea97e9f98b9f0b0bebac47
-
Filesize
1.0MB
MD5dc0ec4b1d3a518bb751b9752b2c91e0e
SHA1bda1f4702e48ddcf3fc1638d9cf6d703a8c4c0ba
SHA256d2c7805fa3f4dc3ef6275f3e2aa8d94f15d84fa2bf5566f6e5199d047c9ce665
SHA5123674f290e2c025d72d18b9d070f4c1dc20c30e33d382501cfdcddeda19312f4471247d18b4c4718ccda9054a56add6e608e3a0b407854f6f2b417a570c48552e