Overview
overview
10Static
static
30bd57c625c...1b.exe
windows10-2004-x64
100e85c02906...31.exe
windows10-2004-x64
101ad22f7c20...da.exe
windows10-2004-x64
102f0934382a...84.exe
windows7-x64
102f0934382a...84.exe
windows10-2004-x64
10421c712a06...0d.exe
windows10-2004-x64
104958361c2a...c0.exe
windows10-2004-x64
104ee34ec273...69.exe
windows10-2004-x64
1054ae781e47...0d.exe
windows10-2004-x64
10597fd86cf2...51.exe
windows10-2004-x64
105af8e5b632...c7.exe
windows10-2004-x64
105edd2b7f66...17.exe
windows10-2004-x64
105eee268a87...c9.exe
windows10-2004-x64
1065a4c04d9e...25.exe
windows10-2004-x64
106d2e6d5049...21.exe
windows10-2004-x64
1077dcf40927...b4.exe
windows10-2004-x64
108c279e4e62...12.exe
windows10-2004-x64
108ee3fa55ce...d5.exe
windows10-2004-x64
108efb2f072c...7a.exe
windows10-2004-x64
10a717651d7f...a0.exe
windows10-2004-x64
10cecc5213e2...a1.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:03
Static task
static1
Behavioral task
behavioral1
Sample
0bd57c625c8696f13dca81e807695648802ac535fabc2f383ee13c655c34c21b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0e85c029067c6b16235fdcf9b3b93f0b3aef80462a8991420b61166786a76d31.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1ad22f7c20ecd9c3f25fef51c4432f8d6609d2a5f951e6a29ab4a3a9b7d2ebda.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2f0934382aee1d9b657ffa98a2699fe864ed0a5bf8e1fc03bdcd479244e27b84.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
2f0934382aee1d9b657ffa98a2699fe864ed0a5bf8e1fc03bdcd479244e27b84.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
421c712a06e641733de7dc086abdc66469eef71d8cf926aa756f0f6910cd6a0d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
4958361c2a42ff04e4d71bc10a59d5ce9b6fae6d86deb588a01b229caeadf1c0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
4ee34ec273a7f43b89678eff087bf31e1b510415dcbb3ef6c8fcf0c06f036669.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
54ae781e479d4e60bdd8734270b33ab0db93c1543e6f477a3dcc2c93b42f7e0d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
597fd86cf22402c976ac13f554867cf010ab3d5c9bdcf8d817c66e620dce4751.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
5af8e5b632a39ba2220e0edd14997e390e73614f2bbcd55986f62325da0e16c7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
5edd2b7f663bf0a7b691bb6245a12b15994b2b4ad9c92c369111de2c68731917.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
5eee268a879c07625d7394a82b7c1c9212c1bd08e2f22fd5b294cc02b2f31cc9.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
65a4c04d9eef0d0db884e244647345959a2f576dab0d856bc052140c13b17025.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
6d2e6d5049e4da686813824edc4aa0a843fff13079a0a9399739fe64efcfd021.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
77dcf409276e0e91ce08daea19f8477d18c5dba52a0ecbb55c40bc98744973b4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
8c279e4e627a1cf50482f625b1ee518eae0ac11a42f443c27e6f6ee04c180212.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral18
Sample
8ee3fa55ceed18988822ea9dd7e193a1c7e306b0010f172aee42ec3ddd3b2cd5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
8efb2f072c814649d82dcf129f78158d28b7ec827dd8deeccf8e21e23771ae7a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
a717651d7fa6766bf2853b11671e7a5465fd6b8d88661bb92df08a819e765da0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
cecc5213e25a8a2dfe40b0f517d513ce319f2cdf28bcc26df3130a53a46d79a1.exe
Resource
win10v2004-20240508-en
General
-
Target
54ae781e479d4e60bdd8734270b33ab0db93c1543e6f477a3dcc2c93b42f7e0d.exe
-
Size
1.8MB
-
MD5
d078d93742d71acc505a75d0db9ff581
-
SHA1
0c5593e415e6cf86bd2498902b29ee53068919c9
-
SHA256
54ae781e479d4e60bdd8734270b33ab0db93c1543e6f477a3dcc2c93b42f7e0d
-
SHA512
26ca1e093147c7ac45420008bb26c94173e1f68eccfa5e67a94fd4da11990e3597cc48ea9bb3b08047c9d7767e1df18c23376e99517de282ca2e1ac328d6b6d8
-
SSDEEP
49152:SMdBDQOVJVm/9av1a8Pk4sixuPpeOnw+/MQ:hd6OVJVm/Ev5k44PpeOw+/MQ
Malware Config
Extracted
redline
plost
77.91.124.86:19084
Extracted
amadey
3.89
04d170
http://77.91.124.1
-
install_dir
fefffe8cea
-
install_file
explothe.exe
-
strings_key
36a96139c1118a354edf72b1080d4b2f
-
url_paths
/theme/index.php
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral9/memory/4704-46-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral9/memory/4704-49-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral9/memory/4704-47-0x0000000000400000-0x0000000000433000-memory.dmp mystic_family behavioral9/files/0x00070000000233e9-74.dat mystic_family -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral9/memory/4920-58-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 5fF0KX1.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation explothe.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 7OO0fE80.exe -
Executes dropped EXE 16 IoCs
pid Process 2472 lj8nC08.exe 4492 up4bA81.exe 2852 Yx6Ra04.exe 1216 Xj1OJ97.exe 3200 Zk1VD30.exe 4368 1jz24nc8.exe 1404 2dH4822.exe 2360 3af12kl.exe 4400 4ye870dL.exe 2040 5fF0KX1.exe 1040 explothe.exe 4612 6JH5Np1.exe 1880 7OO0fE80.exe 4228 explothe.exe 1812 explothe.exe 3980 explothe.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" lj8nC08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" up4bA81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Yx6Ra04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" Xj1OJ97.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" Zk1VD30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 54ae781e479d4e60bdd8734270b33ab0db93c1543e6f477a3dcc2c93b42f7e0d.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4368 set thread context of 2788 4368 1jz24nc8.exe 90 PID 1404 set thread context of 4704 1404 2dH4822.exe 92 PID 4400 set thread context of 4920 4400 4ye870dL.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3af12kl.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3af12kl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3af12kl.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2788 AppLaunch.exe 2788 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2788 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 2472 3660 54ae781e479d4e60bdd8734270b33ab0db93c1543e6f477a3dcc2c93b42f7e0d.exe 82 PID 3660 wrote to memory of 2472 3660 54ae781e479d4e60bdd8734270b33ab0db93c1543e6f477a3dcc2c93b42f7e0d.exe 82 PID 3660 wrote to memory of 2472 3660 54ae781e479d4e60bdd8734270b33ab0db93c1543e6f477a3dcc2c93b42f7e0d.exe 82 PID 2472 wrote to memory of 4492 2472 lj8nC08.exe 83 PID 2472 wrote to memory of 4492 2472 lj8nC08.exe 83 PID 2472 wrote to memory of 4492 2472 lj8nC08.exe 83 PID 4492 wrote to memory of 2852 4492 up4bA81.exe 84 PID 4492 wrote to memory of 2852 4492 up4bA81.exe 84 PID 4492 wrote to memory of 2852 4492 up4bA81.exe 84 PID 2852 wrote to memory of 1216 2852 Yx6Ra04.exe 85 PID 2852 wrote to memory of 1216 2852 Yx6Ra04.exe 85 PID 2852 wrote to memory of 1216 2852 Yx6Ra04.exe 85 PID 1216 wrote to memory of 3200 1216 Xj1OJ97.exe 86 PID 1216 wrote to memory of 3200 1216 Xj1OJ97.exe 86 PID 1216 wrote to memory of 3200 1216 Xj1OJ97.exe 86 PID 3200 wrote to memory of 4368 3200 Zk1VD30.exe 87 PID 3200 wrote to memory of 4368 3200 Zk1VD30.exe 87 PID 3200 wrote to memory of 4368 3200 Zk1VD30.exe 87 PID 4368 wrote to memory of 3160 4368 1jz24nc8.exe 88 PID 4368 wrote to memory of 3160 4368 1jz24nc8.exe 88 PID 4368 wrote to memory of 3160 4368 1jz24nc8.exe 88 PID 4368 wrote to memory of 1308 4368 1jz24nc8.exe 89 PID 4368 wrote to memory of 1308 4368 1jz24nc8.exe 89 PID 4368 wrote to memory of 1308 4368 1jz24nc8.exe 89 PID 4368 wrote to memory of 2788 4368 1jz24nc8.exe 90 PID 4368 wrote to memory of 2788 4368 1jz24nc8.exe 90 PID 4368 wrote to memory of 2788 4368 1jz24nc8.exe 90 PID 4368 wrote to memory of 2788 4368 1jz24nc8.exe 90 PID 4368 wrote to memory of 2788 4368 1jz24nc8.exe 90 PID 4368 wrote to memory of 2788 4368 1jz24nc8.exe 90 PID 4368 wrote to memory of 2788 4368 1jz24nc8.exe 90 PID 4368 wrote to memory of 2788 4368 1jz24nc8.exe 90 PID 3200 wrote to memory of 1404 3200 Zk1VD30.exe 91 PID 3200 wrote to memory of 1404 3200 Zk1VD30.exe 91 PID 3200 wrote to memory of 1404 3200 Zk1VD30.exe 91 PID 1404 wrote to memory of 4704 1404 2dH4822.exe 92 PID 1404 wrote to memory of 4704 1404 2dH4822.exe 92 PID 1404 wrote to memory of 4704 1404 2dH4822.exe 92 PID 1404 wrote to memory of 4704 1404 2dH4822.exe 92 PID 1404 wrote to memory of 4704 1404 2dH4822.exe 92 PID 1404 wrote to memory of 4704 1404 2dH4822.exe 92 PID 1404 wrote to memory of 4704 1404 2dH4822.exe 92 PID 1404 wrote to memory of 4704 1404 2dH4822.exe 92 PID 1404 wrote to memory of 4704 1404 2dH4822.exe 92 PID 1404 wrote to memory of 4704 1404 2dH4822.exe 92 PID 1216 wrote to memory of 2360 1216 Xj1OJ97.exe 93 PID 1216 wrote to memory of 2360 1216 Xj1OJ97.exe 93 PID 1216 wrote to memory of 2360 1216 Xj1OJ97.exe 93 PID 2852 wrote to memory of 4400 2852 Yx6Ra04.exe 94 PID 2852 wrote to memory of 4400 2852 Yx6Ra04.exe 94 PID 2852 wrote to memory of 4400 2852 Yx6Ra04.exe 94 PID 4400 wrote to memory of 4920 4400 4ye870dL.exe 95 PID 4400 wrote to memory of 4920 4400 4ye870dL.exe 95 PID 4400 wrote to memory of 4920 4400 4ye870dL.exe 95 PID 4400 wrote to memory of 4920 4400 4ye870dL.exe 95 PID 4400 wrote to memory of 4920 4400 4ye870dL.exe 95 PID 4400 wrote to memory of 4920 4400 4ye870dL.exe 95 PID 4400 wrote to memory of 4920 4400 4ye870dL.exe 95 PID 4400 wrote to memory of 4920 4400 4ye870dL.exe 95 PID 4492 wrote to memory of 2040 4492 up4bA81.exe 96 PID 4492 wrote to memory of 2040 4492 up4bA81.exe 96 PID 4492 wrote to memory of 2040 4492 up4bA81.exe 96 PID 2040 wrote to memory of 1040 2040 5fF0KX1.exe 97 PID 2040 wrote to memory of 1040 2040 5fF0KX1.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\54ae781e479d4e60bdd8734270b33ab0db93c1543e6f477a3dcc2c93b42f7e0d.exe"C:\Users\Admin\AppData\Local\Temp\54ae781e479d4e60bdd8734270b33ab0db93c1543e6f477a3dcc2c93b42f7e0d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lj8nC08.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lj8nC08.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\up4bA81.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\up4bA81.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Yx6Ra04.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Yx6Ra04.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Xj1OJ97.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\Xj1OJ97.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Zk1VD30.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\Zk1VD30.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1jz24nc8.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\1jz24nc8.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:3160
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:1308
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2dH4822.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\2dH4822.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"8⤵PID:4704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3af12kl.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\3af12kl.exe6⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2360
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4ye870dL.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\4ye870dL.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5fF0KX1.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\5fF0KX1.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1040 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explothe.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe" /F6⤵
- Creates scheduled task(s)
PID:5044
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explothe.exe" /P "Admin:N"&&CACLS "explothe.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:2488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:N"7⤵PID:1760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explothe.exe" /P "Admin:R" /E7⤵PID:3836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1948
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:3108
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:4748
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6JH5Np1.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\6JH5Np1.exe3⤵
- Executes dropped EXE
PID:4612
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7OO0fE80.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\7OO0fE80.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\is64.bat" "3⤵PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:4228
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:1812
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explothe.exe1⤵
- Executes dropped EXE
PID:3980
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5960982add17dd6cce2a2c89c28651cc4
SHA1bd9cb356a4849785884c6de26840962409baa3f5
SHA25641825b07c10d0e7c7cf552d1c810d7a1ab6d18ee03ba157d4580cf425df1a79e
SHA512ebc64a053be47021f84c0ebcbf3a83659026dc80e3a0de008773f254ad99ca980021f2a0475e646ead186513e6ad331e59f876ce6cbe03bd318e7bd84f3b8062
-
Filesize
1.7MB
MD5f4c6fa15d260c73d54773b1a6da2a6e7
SHA1256b5012758dc98421e803d5a1e85bd121fb79ef
SHA256950c630cd323bda7cf993d42e37766658c619c87de7041fc741a7f6a16f2e7e1
SHA512ff67b2ff7d2d0da83e9eb29ff72a85b47cfa475e9a87159a00fda2e28b4fcfa7b82638dc8370d3940d7adc82e7bc8ac61ba7130a9bbdc5888ff27d83ef60c419
-
Filesize
181KB
MD5bb68aa97ad22baca21a874b2f9c43d32
SHA1a0aab33541da58aeba9174c7381c437e18e6963c
SHA2565f49f1dfd6d6c23bd6b4cb774cb804aeea3b11807407bdafc952c7c3b8c612a6
SHA512572f076330bb095a2407f2fa2b2ffe1153e94d36d33f14063f89d5f956cddc607d85c58a055a7bb16d8efdf974472e1d0860792f0bba05b95162e4f8a1d9f7b7
-
Filesize
1.5MB
MD56f69a4fce80a437a8f6efba1b24089a3
SHA1b0d29f24c98259a21cd221f774caeaa1c5895df2
SHA2560f3387e77cc4ee590016828e636348e8a5dc8ec0449fca3727bfeeace2132136
SHA512e00565904644cba139c92096717c5c13f1ce3d5319d8c9f02f5e55249b1fc1d59aba6011c838924faa9368e28a12ca9e43f1ceecc1c20d345d40e84f9217f01c
-
Filesize
222KB
MD597089ec5d840e66f071ad40455eca735
SHA19fe89b8002e0af1ed229ce8f5037b89229d7d8b5
SHA25664a4aaeb3079edd7d7829993ec6846b0c996d755b2cf669c1f806aae705fb590
SHA5123b734dc46e8c9c20c3e87c957e7aef7c2702f77ca05f333354b1d3d65601951705fc49746d38476e0f8c909e201379ecb12f87d47f55be398d31ce2effce9b99
-
Filesize
1.3MB
MD58260f4e8cb66eaa408b65415308b3cca
SHA1240020252a7087230e8e5b1fadebe9e4645be19c
SHA256561d6789455196ffe434d011f038cae37c29c280c0c959353396f21d93af1891
SHA51264b955c330eba6edc262eb1086462f4c4efee4a98d334cb86b069be774705cc1c3450345f9612c45318dddecf5c50448031902044a1cfdaefaafe4aadfdf46ab
-
Filesize
1.9MB
MD57cb0363bd13697a4ae722ccfbde21261
SHA1b16f2b0f0129d3b0367cbda9db809ce974a95971
SHA2566957bd7e9f0dfb45c1bdb2a9dac13f3ceaf0aaf1246cda0ab377d827d71ecd1c
SHA512bb73e4d8c8bf946d443a76f1f4a7248aa2e3a7b2cc00f14dc2dae1a27ca4fa782e4926d4aab1fbfb0385227d36074c71587c7ddafddb1672775b21a7d35524e3
-
Filesize
782KB
MD58220501a90833980bbccb4e44b544c02
SHA1a3bf2564cdc3848acad873bbcbafe9639794cc31
SHA256f43753b66c453b54ece2f1f330a79a3458b4ef9205363dc8791d8574d0e164a8
SHA51211cc82dda0543e1677715a9763974b45df1e7adab05a732e5a631da0898f27e70891b6f1c1fbd878a15f053c840499d4fa6a8552a932faf9cd90907a5ad5f036
-
Filesize
31KB
MD58b0428649643d8607332135b01d97669
SHA1c95e4cbcb2b23bc1f9351a15eb3ebd66ef5fbb9b
SHA256da850199fa02043c530895f0aaaed7617aa0bd91c43f7596a7d463cc5b7f73eb
SHA512c237264c6414fb82e2b425995bb537ad438ee02500b48fd25105cdc2783d756988ceaafbf88b5f89f4e0f72b571f388235e1112d541cdeca155b034522209b71
-
Filesize
658KB
MD5ac8fabb87612fd2bfd4d6de52a52eca4
SHA1305a7d46ed2a1d2a27d502aaf2b1d58bd3e126d4
SHA25629b8d74adbd001d3db83db6a806c716a5b839a6cbbc23c42f9b3ac8a6c72396e
SHA512f5d7c83366e83b30c7a6081faf93bfa284c1b520c3314d60ad9b4a504fb5b7f19d79fdb363e6286d8916642667d86f5c1b5da13f64a20bd6d1effeec7139bded
-
Filesize
1.6MB
MD59b723ea42fcf074d73ca426d494c0ac8
SHA10e2ac958340c1ca0597011a683c1685581dbda15
SHA2563447be9d66eeeb195f24535a92ce422ee2ce17c791ea351864a4611d38982f8b
SHA51222c0421e2f39e2b1a74fce0e60541d098d94260aa936dd1ecfd435d03663fc1634b28d67c18efd4b1b47da5efba465d8bd649a80d5912544ffd51404f6b9a199
-
Filesize
1.8MB
MD57854374d80c37e3a60016cba1be50eaa
SHA166ae6eb3f59ea18cc47f0884d7bcaf945f58698a
SHA256b1a5dafcd2d9fbf53a3978bc30dcfcedc393f7f15eb91775c2ea1ae35a8c376d
SHA5127281375e33a771cbbf6595b0d8eb7cb03bb74dda062a6918eb436c98760af6548643d2ecaa97234107fc3876f29c6ceb7fbc25b2367a29e262f31f9dc7b54aa9
-
Filesize
181B
MD5225edee1d46e0a80610db26b275d72fb
SHA1ce206abf11aaf19278b72f5021cc64b1b427b7e8
SHA256e1befb57d724c9dc760cf42d7e0609212b22faeb2dc0c3ffe2fbd7134ff69559
SHA5124f01a2a248a1322cb690b7395b818d2780e46f4884e59f1ab96125d642b6358eea97c7fad6023ef17209b218daa9c88d15ea2b92f124ecb8434c0c7b4a710504
-
Filesize
3B
MD5a5ea0ad9260b1550a14cc58d2c39b03d
SHA1f0aedf295071ed34ab8c6a7692223d22b6a19841
SHA256f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04
SHA5127c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74