Overview
overview
10Static
static
30bd57c625c...1b.exe
windows10-2004-x64
100e85c02906...31.exe
windows10-2004-x64
101ad22f7c20...da.exe
windows10-2004-x64
102f0934382a...84.exe
windows7-x64
102f0934382a...84.exe
windows10-2004-x64
10421c712a06...0d.exe
windows10-2004-x64
104958361c2a...c0.exe
windows10-2004-x64
104ee34ec273...69.exe
windows10-2004-x64
1054ae781e47...0d.exe
windows10-2004-x64
10597fd86cf2...51.exe
windows10-2004-x64
105af8e5b632...c7.exe
windows10-2004-x64
105edd2b7f66...17.exe
windows10-2004-x64
105eee268a87...c9.exe
windows10-2004-x64
1065a4c04d9e...25.exe
windows10-2004-x64
106d2e6d5049...21.exe
windows10-2004-x64
1077dcf40927...b4.exe
windows10-2004-x64
108c279e4e62...12.exe
windows10-2004-x64
108ee3fa55ce...d5.exe
windows10-2004-x64
108efb2f072c...7a.exe
windows10-2004-x64
10a717651d7f...a0.exe
windows10-2004-x64
10cecc5213e2...a1.exe
windows10-2004-x64
10Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:03
Static task
static1
Behavioral task
behavioral1
Sample
0bd57c625c8696f13dca81e807695648802ac535fabc2f383ee13c655c34c21b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0e85c029067c6b16235fdcf9b3b93f0b3aef80462a8991420b61166786a76d31.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1ad22f7c20ecd9c3f25fef51c4432f8d6609d2a5f951e6a29ab4a3a9b7d2ebda.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2f0934382aee1d9b657ffa98a2699fe864ed0a5bf8e1fc03bdcd479244e27b84.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
2f0934382aee1d9b657ffa98a2699fe864ed0a5bf8e1fc03bdcd479244e27b84.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
421c712a06e641733de7dc086abdc66469eef71d8cf926aa756f0f6910cd6a0d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
4958361c2a42ff04e4d71bc10a59d5ce9b6fae6d86deb588a01b229caeadf1c0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
4ee34ec273a7f43b89678eff087bf31e1b510415dcbb3ef6c8fcf0c06f036669.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
54ae781e479d4e60bdd8734270b33ab0db93c1543e6f477a3dcc2c93b42f7e0d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
597fd86cf22402c976ac13f554867cf010ab3d5c9bdcf8d817c66e620dce4751.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5af8e5b632a39ba2220e0edd14997e390e73614f2bbcd55986f62325da0e16c7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
5edd2b7f663bf0a7b691bb6245a12b15994b2b4ad9c92c369111de2c68731917.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
5eee268a879c07625d7394a82b7c1c9212c1bd08e2f22fd5b294cc02b2f31cc9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
6d2e6d5049e4da686813824edc4aa0a843fff13079a0a9399739fe64efcfd021.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
77dcf409276e0e91ce08daea19f8477d18c5dba52a0ecbb55c40bc98744973b4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
8c279e4e627a1cf50482f625b1ee518eae0ac11a42f443c27e6f6ee04c180212.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
8ee3fa55ceed18988822ea9dd7e193a1c7e306b0010f172aee42ec3ddd3b2cd5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
8efb2f072c814649d82dcf129f78158d28b7ec827dd8deeccf8e21e23771ae7a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
a717651d7fa6766bf2853b11671e7a5465fd6b8d88661bb92df08a819e765da0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
cecc5213e25a8a2dfe40b0f517d513ce319f2cdf28bcc26df3130a53a46d79a1.exe
Resource
win10v2004-20240508-en
General
-
Target
65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025.exe
-
Size
1.4MB
-
MD5
ce3a43f12f3f536a897ffe527cd1f10f
-
SHA1
8a4763f0a032b5c70846ba3c7da378a3482eac12
-
SHA256
65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025
-
SHA512
c3aad6a4a86b79b167a3989eb8d4cc6f75df354b805f8c160f8cb5dbe812144daf5d7bd07c36d3e12767adc8f8f554cfd4846599fe5f9524b9eb3e79fb407a1e
-
SSDEEP
24576:oyW34oUUWqSF+Ww//7tpefhOrb44GWpd0a0SJtD6K5SadD3F9G:vjjZoWw/ztUJ4E4GWz0hSKKtD3b
Malware Config
Extracted
redline
trush
77.91.124.82:19071
-
auth_value
c13814867cde8193679cd0cad2d774be
Extracted
amadey
3.89
fb0fb8
http://77.91.68.52
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
-
url_paths
/mac/index.php
Extracted
amadey
3.89
daf753
http://77.91.68.78
-
install_dir
cb378487cf
-
install_file
legota.exe
-
strings_key
f3785cbeef2013b6724eed349fd316ba
-
url_paths
/help/index.php
Signatures
-
Detect Mystic stealer payload 3 IoCs
Processes:
resource yara_rule behavioral14/memory/868-45-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family behavioral14/memory/868-48-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family behavioral14/memory/868-46-0x0000000000400000-0x000000000042F000-memory.dmp mystic_family -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral14/memory/2756-76-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral14/memory/4244-35-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t1573445.exelegota.exes6542297.exeexplonde.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation t1573445.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation s6542297.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation explonde.exe -
Executes dropped EXE 18 IoCs
Processes:
z3137575.exez1578254.exez0115334.exez4816729.exeq6620270.exer1227680.exes6542297.exeexplonde.exet1573445.exelegota.exeu6904932.exew0473678.exeexplonde.exelegota.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 1392 z3137575.exe 2924 z1578254.exe 1436 z0115334.exe 1028 z4816729.exe 4784 q6620270.exe 1648 r1227680.exe 8 s6542297.exe 1020 explonde.exe 4888 t1573445.exe 4228 legota.exe 1004 u6904932.exe 4264 w0473678.exe 2816 explonde.exe 1436 legota.exe 4904 explonde.exe 2656 legota.exe 1332 explonde.exe 876 legota.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z0115334.exez4816729.exe65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025.exez3137575.exez1578254.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z0115334.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z4816729.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3137575.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1578254.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q6620270.exer1227680.exeu6904932.exedescription pid process target process PID 4784 set thread context of 4244 4784 q6620270.exe AppLaunch.exe PID 1648 set thread context of 868 1648 r1227680.exe AppLaunch.exe PID 1004 set thread context of 2756 1004 u6904932.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3280 4784 WerFault.exe q6620270.exe 5056 1648 WerFault.exe r1227680.exe 4136 1004 WerFault.exe u6904932.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1748 schtasks.exe 436 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 2756 AppLaunch.exe 2756 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 2756 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025.exez3137575.exez1578254.exez0115334.exez4816729.exeq6620270.exer1227680.exes6542297.exeexplonde.exet1573445.execmd.exedescription pid process target process PID 2272 wrote to memory of 1392 2272 65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025.exe z3137575.exe PID 2272 wrote to memory of 1392 2272 65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025.exe z3137575.exe PID 2272 wrote to memory of 1392 2272 65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025.exe z3137575.exe PID 1392 wrote to memory of 2924 1392 z3137575.exe z1578254.exe PID 1392 wrote to memory of 2924 1392 z3137575.exe z1578254.exe PID 1392 wrote to memory of 2924 1392 z3137575.exe z1578254.exe PID 2924 wrote to memory of 1436 2924 z1578254.exe z0115334.exe PID 2924 wrote to memory of 1436 2924 z1578254.exe z0115334.exe PID 2924 wrote to memory of 1436 2924 z1578254.exe z0115334.exe PID 1436 wrote to memory of 1028 1436 z0115334.exe z4816729.exe PID 1436 wrote to memory of 1028 1436 z0115334.exe z4816729.exe PID 1436 wrote to memory of 1028 1436 z0115334.exe z4816729.exe PID 1028 wrote to memory of 4784 1028 z4816729.exe q6620270.exe PID 1028 wrote to memory of 4784 1028 z4816729.exe q6620270.exe PID 1028 wrote to memory of 4784 1028 z4816729.exe q6620270.exe PID 4784 wrote to memory of 2344 4784 q6620270.exe AppLaunch.exe PID 4784 wrote to memory of 2344 4784 q6620270.exe AppLaunch.exe PID 4784 wrote to memory of 2344 4784 q6620270.exe AppLaunch.exe PID 4784 wrote to memory of 4244 4784 q6620270.exe AppLaunch.exe PID 4784 wrote to memory of 4244 4784 q6620270.exe AppLaunch.exe PID 4784 wrote to memory of 4244 4784 q6620270.exe AppLaunch.exe PID 4784 wrote to memory of 4244 4784 q6620270.exe AppLaunch.exe PID 4784 wrote to memory of 4244 4784 q6620270.exe AppLaunch.exe PID 4784 wrote to memory of 4244 4784 q6620270.exe AppLaunch.exe PID 4784 wrote to memory of 4244 4784 q6620270.exe AppLaunch.exe PID 4784 wrote to memory of 4244 4784 q6620270.exe AppLaunch.exe PID 1028 wrote to memory of 1648 1028 z4816729.exe r1227680.exe PID 1028 wrote to memory of 1648 1028 z4816729.exe r1227680.exe PID 1028 wrote to memory of 1648 1028 z4816729.exe r1227680.exe PID 1648 wrote to memory of 868 1648 r1227680.exe AppLaunch.exe PID 1648 wrote to memory of 868 1648 r1227680.exe AppLaunch.exe PID 1648 wrote to memory of 868 1648 r1227680.exe AppLaunch.exe PID 1648 wrote to memory of 868 1648 r1227680.exe AppLaunch.exe PID 1648 wrote to memory of 868 1648 r1227680.exe AppLaunch.exe PID 1648 wrote to memory of 868 1648 r1227680.exe AppLaunch.exe PID 1648 wrote to memory of 868 1648 r1227680.exe AppLaunch.exe PID 1648 wrote to memory of 868 1648 r1227680.exe AppLaunch.exe PID 1648 wrote to memory of 868 1648 r1227680.exe AppLaunch.exe PID 1648 wrote to memory of 868 1648 r1227680.exe AppLaunch.exe PID 1436 wrote to memory of 8 1436 z0115334.exe s6542297.exe PID 1436 wrote to memory of 8 1436 z0115334.exe s6542297.exe PID 1436 wrote to memory of 8 1436 z0115334.exe s6542297.exe PID 8 wrote to memory of 1020 8 s6542297.exe explonde.exe PID 8 wrote to memory of 1020 8 s6542297.exe explonde.exe PID 8 wrote to memory of 1020 8 s6542297.exe explonde.exe PID 2924 wrote to memory of 4888 2924 z1578254.exe t1573445.exe PID 2924 wrote to memory of 4888 2924 z1578254.exe t1573445.exe PID 2924 wrote to memory of 4888 2924 z1578254.exe t1573445.exe PID 1020 wrote to memory of 1748 1020 explonde.exe schtasks.exe PID 1020 wrote to memory of 1748 1020 explonde.exe schtasks.exe PID 1020 wrote to memory of 1748 1020 explonde.exe schtasks.exe PID 1020 wrote to memory of 5000 1020 explonde.exe cmd.exe PID 1020 wrote to memory of 5000 1020 explonde.exe cmd.exe PID 1020 wrote to memory of 5000 1020 explonde.exe cmd.exe PID 4888 wrote to memory of 4228 4888 t1573445.exe legota.exe PID 4888 wrote to memory of 4228 4888 t1573445.exe legota.exe PID 4888 wrote to memory of 4228 4888 t1573445.exe legota.exe PID 5000 wrote to memory of 4776 5000 cmd.exe cmd.exe PID 5000 wrote to memory of 4776 5000 cmd.exe cmd.exe PID 5000 wrote to memory of 4776 5000 cmd.exe cmd.exe PID 1392 wrote to memory of 1004 1392 z3137575.exe u6904932.exe PID 1392 wrote to memory of 1004 1392 z3137575.exe u6904932.exe PID 1392 wrote to memory of 1004 1392 z3137575.exe u6904932.exe PID 5000 wrote to memory of 4316 5000 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025.exe"C:\Users\Admin\AppData\Local\Temp\65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3137575.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3137575.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1578254.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1578254.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0115334.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z0115334.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4816729.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z4816729.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6620270.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q6620270.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2344
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 1367⤵
- Program crash
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1227680.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1227680.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 1367⤵
- Program crash
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6542297.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s6542297.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F7⤵
- Creates scheduled task(s)
PID:1748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4776
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"8⤵PID:4316
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E8⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4976
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"8⤵PID:1932
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E8⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1573445.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t1573445.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:4228 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F6⤵
- Creates scheduled task(s)
PID:436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit6⤵PID:2732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3360
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"7⤵PID:3752
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E7⤵PID:4060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5116
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"7⤵PID:3032
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E7⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6904932.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u6904932.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1004 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1004 -s 5804⤵
- Program crash
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0473678.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0473678.exe2⤵
- Executes dropped EXE
PID:4264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4784 -ip 47841⤵PID:3652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1648 -ip 16481⤵PID:440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1004 -ip 10041⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:2816
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1436
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4904
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2656
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1332
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5d92fa7776f15463793be51e719c83f68
SHA12555f7fa8bf1cc9e0c1c1ad33c601494300be0bf
SHA256d3aa6169ac6095b3449e38312fa7d6370be801578203664afbd6e1fe7f5920ea
SHA5124ad669b6476b4aa407dbb17e11c9510ee423615827d57cff284e1466e1485f21e248e17b7c8964c177b5a5bee52f429d98f3e69f5b858046744163a4bc0e85ab
-
Filesize
1.3MB
MD52ad617131c213e200e2702670f791e01
SHA1f2fe46e73ec5971d2be77c517f9f601f1dfc8285
SHA25625f79b9c46c21d15073213e9ac6cbed8a514a78172260dcddaa0205c2e1e439f
SHA512dde89670d709efc4dee98ea1c5c89b0c7e24f886029fd1e099581b48e6fd29333e5cb8053e4b08cf4b579525d5c014322f36a4f721dcc6a0861e0d6350f0d18f
-
Filesize
899KB
MD5ecce04cc36e369dacb2c47ec61cc8f6f
SHA100ba309feb924b49480bb92043210b96703e472f
SHA2562b8f055d16908dc12ba1297cf1d9dffd67f83361b42a7cfbe94828a62700024c
SHA512420c4183e26bd960373162083d55b8353c7de20e6d275c59aa40f23caa0eb09a5bd90c5587589ee1505d540170363b9848bb28c24d0d230b9f823cc084157ccf
-
Filesize
953KB
MD50ffe1efe1178156987b2b1791c2d9ed5
SHA17fed902f3dafd238e5c07c81eecf9eaa58cfcdd6
SHA2565be3f41746c8ec1f8fcf72582efaac7e2cc74d3994a921f9620193232b7daa7b
SHA512167c362c8c9d3e82959e51d75ec252f0a79cd69074c413ab886b1b465614735ea91420bf7ab4b397b58cc34e0b81b0fe3979080cd448768d0937190569ee6b53
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
770KB
MD5ab0cc7eae4bcdaf2e4cf69afa2f3a789
SHA1b2a32752078889059070402a13dcb70f1a1f3e73
SHA256ca78b67ef330ed5afa3826df1b1a3093aabe2a84afd67fe4f0e8b2c034a568e0
SHA51229ae1b6e54a16d7c9a17b6ce1fab196539982b10b4d72f60cccdbdc205d2c746adb014203dedbce3cc1d140f9f6bd0a48f162f3ac0f7851a2bb64e687e6ccc6f
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
588KB
MD5c0e09a2958d5b65b3407a6be52b9edfd
SHA1ada6052e58e02a571f64a743207c1f8f9723a845
SHA2560264ec5c2987722ca504aa806e49f36fdaabd89c3a7f83c8c320b3ea68acb94b
SHA5123bea72e15d88d188d3ecd84ef76198a63853694e07da0af4ae28dad2b0d0d5c3f544b237167dc24733917d4008c103cfe180de8c7dda5e45b4b5bd6190802d14
-
Filesize
1.1MB
MD5df878f89693a6048a75ff937c1b4e1fb
SHA134ace115718b691b23a404b0527b09d1e0541827
SHA2568c00a28605afd0c619a54455423f35a269f29c74269e08ca31bb85e0e56937fd
SHA51207ad11c3f1825592e5d7101bc8aa8d6e1eb60d2ba7d9bcff47fd5f32ee6a1e15875329cc1d14ed0de52f42f71c37e22fdaf18e5152c0955273f3da0efb3f5bee
-
Filesize
1.1MB
MD56f7931901c67fb70b624c270413f6fd0
SHA1f572554c35f6e575e3471ff2adc5653c461eb9d2
SHA256b81595ce8fbb2fc86fad8323369473d011d92551c5d3ce5d24d276d88fc48f46
SHA5126adda936fb708bb40dd3c6d68f55704956fdbdd31fd11d2b2fbeb2cdcd1b25389e2471982bc993d8e667801a919f3c8ebb4878288919f0695d782f488a494ac6
-
Filesize
192KB
MD5d5d5852dc930eb859d49e7b375dd01d5
SHA1409e8b71a6376306d577b42b210a191640b29ecc
SHA25687f356f613cfb94a472cd1e67919262706912db1961a2eadebdebc2f0594525f
SHA512012d6c3093a295dd642c325e7db7d3ccd3f780d494f502dd33595fd1bda2ae3772232a094470d75f330f91a2ea31d57d1615fe2707535bf587a2d8b6693ef60e