Analysis
-
max time kernel
111s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2023 07:46
Static task
static1
Behavioral task
behavioral1
Sample
413f2d21e656ca5d875fff0d6447288b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
413f2d21e656ca5d875fff0d6447288b.exe
Resource
win10v2004-20230220-en
General
-
Target
413f2d21e656ca5d875fff0d6447288b.exe
-
Size
1.1MB
-
MD5
413f2d21e656ca5d875fff0d6447288b
-
SHA1
53741e0ab007c260dc193c51d92575cb99daacc5
-
SHA256
feeca3d000aeaa547592798acf95885a114950754d17964b39a7d4c02db1039d
-
SHA512
cd6913081f086d532aededf4d54d8dfb79bb651b124af6f6507ddf7c3449bceaf4f0e37a286c4cca21890cb1ad63a9d3dfbe5d402cce6e2b508b7aaa6cf04743
-
SSDEEP
24576:ryEiIzXB3iyr3f/yUPhmRHS1MFuMct2dg4WhqDss:em7B3ie33NPhqFxctDG
Malware Config
Extracted
redline
rodik
193.233.20.23:4124
-
auth_value
59b6e22e7cfd9b5fa0c99d1942f7c85d
Extracted
amadey
3.67
193.233.20.15/dF30Hn4m/index.php
Signatures
-
Processes:
iny21Cm.exemkl25Nd.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iny21Cm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mkl25Nd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mkl25Nd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mkl25Nd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection mkl25Nd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mkl25Nd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mkl25Nd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iny21Cm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iny21Cm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iny21Cm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iny21Cm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iny21Cm.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral2/memory/312-168-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-171-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-169-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-176-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-179-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-181-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-183-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-185-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-187-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-189-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-191-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-193-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-195-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-197-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-199-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-201-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-203-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-205-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-207-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-209-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-211-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-213-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-215-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-217-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-219-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-221-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-223-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-225-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-229-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-231-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-227-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-233-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-235-0x0000000004C70000-0x0000000004CAF000-memory.dmp family_redline behavioral2/memory/312-1085-0x00000000072E0000-0x00000000072F0000-memory.dmp family_redline behavioral2/memory/1260-2052-0x0000000004AE0000-0x0000000004AF0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rcW31Tq61.exemnolyk.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation rcW31Tq61.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 10 IoCs
Processes:
smz89Ic16.exesVZ00FB07.exesra99tZ89.exeiny21Cm.exekib36qY.exemkl25Nd.exenGk75Mx90.exercW31Tq61.exemnolyk.exemnolyk.exepid process 584 smz89Ic16.exe 2016 sVZ00FB07.exe 2156 sra99tZ89.exe 4724 iny21Cm.exe 312 kib36qY.exe 332 mkl25Nd.exe 1260 nGk75Mx90.exe 1788 rcW31Tq61.exe 3612 mnolyk.exe 4216 mnolyk.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 384 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
iny21Cm.exemkl25Nd.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iny21Cm.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mkl25Nd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mkl25Nd.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
smz89Ic16.exesVZ00FB07.exesra99tZ89.exe413f2d21e656ca5d875fff0d6447288b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" smz89Ic16.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sVZ00FB07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sVZ00FB07.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce sra99tZ89.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" sra99tZ89.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 413f2d21e656ca5d875fff0d6447288b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 413f2d21e656ca5d875fff0d6447288b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce smz89Ic16.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 732 312 WerFault.exe kib36qY.exe 3760 332 WerFault.exe mkl25Nd.exe 2340 1260 WerFault.exe nGk75Mx90.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
iny21Cm.exekib36qY.exemkl25Nd.exenGk75Mx90.exepid process 4724 iny21Cm.exe 4724 iny21Cm.exe 312 kib36qY.exe 312 kib36qY.exe 332 mkl25Nd.exe 332 mkl25Nd.exe 1260 nGk75Mx90.exe 1260 nGk75Mx90.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
iny21Cm.exekib36qY.exemkl25Nd.exenGk75Mx90.exedescription pid process Token: SeDebugPrivilege 4724 iny21Cm.exe Token: SeDebugPrivilege 312 kib36qY.exe Token: SeDebugPrivilege 332 mkl25Nd.exe Token: SeDebugPrivilege 1260 nGk75Mx90.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
413f2d21e656ca5d875fff0d6447288b.exesmz89Ic16.exesVZ00FB07.exesra99tZ89.exercW31Tq61.exemnolyk.execmd.exedescription pid process target process PID 4484 wrote to memory of 584 4484 413f2d21e656ca5d875fff0d6447288b.exe smz89Ic16.exe PID 4484 wrote to memory of 584 4484 413f2d21e656ca5d875fff0d6447288b.exe smz89Ic16.exe PID 4484 wrote to memory of 584 4484 413f2d21e656ca5d875fff0d6447288b.exe smz89Ic16.exe PID 584 wrote to memory of 2016 584 smz89Ic16.exe sVZ00FB07.exe PID 584 wrote to memory of 2016 584 smz89Ic16.exe sVZ00FB07.exe PID 584 wrote to memory of 2016 584 smz89Ic16.exe sVZ00FB07.exe PID 2016 wrote to memory of 2156 2016 sVZ00FB07.exe sra99tZ89.exe PID 2016 wrote to memory of 2156 2016 sVZ00FB07.exe sra99tZ89.exe PID 2016 wrote to memory of 2156 2016 sVZ00FB07.exe sra99tZ89.exe PID 2156 wrote to memory of 4724 2156 sra99tZ89.exe iny21Cm.exe PID 2156 wrote to memory of 4724 2156 sra99tZ89.exe iny21Cm.exe PID 2156 wrote to memory of 312 2156 sra99tZ89.exe kib36qY.exe PID 2156 wrote to memory of 312 2156 sra99tZ89.exe kib36qY.exe PID 2156 wrote to memory of 312 2156 sra99tZ89.exe kib36qY.exe PID 2016 wrote to memory of 332 2016 sVZ00FB07.exe mkl25Nd.exe PID 2016 wrote to memory of 332 2016 sVZ00FB07.exe mkl25Nd.exe PID 2016 wrote to memory of 332 2016 sVZ00FB07.exe mkl25Nd.exe PID 584 wrote to memory of 1260 584 smz89Ic16.exe nGk75Mx90.exe PID 584 wrote to memory of 1260 584 smz89Ic16.exe nGk75Mx90.exe PID 584 wrote to memory of 1260 584 smz89Ic16.exe nGk75Mx90.exe PID 4484 wrote to memory of 1788 4484 413f2d21e656ca5d875fff0d6447288b.exe rcW31Tq61.exe PID 4484 wrote to memory of 1788 4484 413f2d21e656ca5d875fff0d6447288b.exe rcW31Tq61.exe PID 4484 wrote to memory of 1788 4484 413f2d21e656ca5d875fff0d6447288b.exe rcW31Tq61.exe PID 1788 wrote to memory of 3612 1788 rcW31Tq61.exe mnolyk.exe PID 1788 wrote to memory of 3612 1788 rcW31Tq61.exe mnolyk.exe PID 1788 wrote to memory of 3612 1788 rcW31Tq61.exe mnolyk.exe PID 3612 wrote to memory of 3476 3612 mnolyk.exe schtasks.exe PID 3612 wrote to memory of 3476 3612 mnolyk.exe schtasks.exe PID 3612 wrote to memory of 3476 3612 mnolyk.exe schtasks.exe PID 3612 wrote to memory of 236 3612 mnolyk.exe cmd.exe PID 3612 wrote to memory of 236 3612 mnolyk.exe cmd.exe PID 3612 wrote to memory of 236 3612 mnolyk.exe cmd.exe PID 236 wrote to memory of 924 236 cmd.exe cmd.exe PID 236 wrote to memory of 924 236 cmd.exe cmd.exe PID 236 wrote to memory of 924 236 cmd.exe cmd.exe PID 236 wrote to memory of 3684 236 cmd.exe cacls.exe PID 236 wrote to memory of 3684 236 cmd.exe cacls.exe PID 236 wrote to memory of 3684 236 cmd.exe cacls.exe PID 236 wrote to memory of 2080 236 cmd.exe cacls.exe PID 236 wrote to memory of 2080 236 cmd.exe cacls.exe PID 236 wrote to memory of 2080 236 cmd.exe cacls.exe PID 236 wrote to memory of 680 236 cmd.exe cmd.exe PID 236 wrote to memory of 680 236 cmd.exe cmd.exe PID 236 wrote to memory of 680 236 cmd.exe cmd.exe PID 236 wrote to memory of 3652 236 cmd.exe cacls.exe PID 236 wrote to memory of 3652 236 cmd.exe cacls.exe PID 236 wrote to memory of 3652 236 cmd.exe cacls.exe PID 236 wrote to memory of 3312 236 cmd.exe cacls.exe PID 236 wrote to memory of 3312 236 cmd.exe cacls.exe PID 236 wrote to memory of 3312 236 cmd.exe cacls.exe PID 3612 wrote to memory of 384 3612 mnolyk.exe rundll32.exe PID 3612 wrote to memory of 384 3612 mnolyk.exe rundll32.exe PID 3612 wrote to memory of 384 3612 mnolyk.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\413f2d21e656ca5d875fff0d6447288b.exe"C:\Users\Admin\AppData\Local\Temp\413f2d21e656ca5d875fff0d6447288b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\smz89Ic16.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\smz89Ic16.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sVZ00FB07.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sVZ00FB07.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sra99tZ89.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sra99tZ89.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\iny21Cm.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\iny21Cm.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kib36qY.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kib36qY.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 312 -s 11766⤵
- Program crash
PID:732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mkl25Nd.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mkl25Nd.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 332 -s 10845⤵
- Program crash
PID:3760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nGk75Mx90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nGk75Mx90.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1260 -s 19164⤵
- Program crash
PID:2340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rcW31Tq61.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rcW31Tq61.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe" /F4⤵
- Creates scheduled task(s)
PID:3476
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4f9dd6f8a7" /P "Admin:N"&&CACLS "..\4f9dd6f8a7" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"5⤵PID:3684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E5⤵PID:2080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:680
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:N"5⤵PID:3652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:R" /E5⤵PID:3312
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 312 -ip 3121⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 332 -ip 3321⤵PID:3868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 1260 -ip 12601⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe1⤵
- Executes dropped EXE
PID:4216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5fe5442d749cd85c84e95aa4215485a11
SHA1e9f3dcce2c92321739648ff32fc2bdb362afa30a
SHA256570109eba035848ef06561c95290c06b11ca5615782fcde1630b378b60656bc3
SHA512565517543a9308baba63634fb4775b3e5d55be2702a8af9b7f4136bd176d9c02423fc4591744552b43bf848390d9c4d082415570a8779fda20ccd7ceb1348356
-
Filesize
239KB
MD5fe5442d749cd85c84e95aa4215485a11
SHA1e9f3dcce2c92321739648ff32fc2bdb362afa30a
SHA256570109eba035848ef06561c95290c06b11ca5615782fcde1630b378b60656bc3
SHA512565517543a9308baba63634fb4775b3e5d55be2702a8af9b7f4136bd176d9c02423fc4591744552b43bf848390d9c4d082415570a8779fda20ccd7ceb1348356
-
Filesize
239KB
MD5fe5442d749cd85c84e95aa4215485a11
SHA1e9f3dcce2c92321739648ff32fc2bdb362afa30a
SHA256570109eba035848ef06561c95290c06b11ca5615782fcde1630b378b60656bc3
SHA512565517543a9308baba63634fb4775b3e5d55be2702a8af9b7f4136bd176d9c02423fc4591744552b43bf848390d9c4d082415570a8779fda20ccd7ceb1348356
-
Filesize
239KB
MD5fe5442d749cd85c84e95aa4215485a11
SHA1e9f3dcce2c92321739648ff32fc2bdb362afa30a
SHA256570109eba035848ef06561c95290c06b11ca5615782fcde1630b378b60656bc3
SHA512565517543a9308baba63634fb4775b3e5d55be2702a8af9b7f4136bd176d9c02423fc4591744552b43bf848390d9c4d082415570a8779fda20ccd7ceb1348356
-
Filesize
239KB
MD5fe5442d749cd85c84e95aa4215485a11
SHA1e9f3dcce2c92321739648ff32fc2bdb362afa30a
SHA256570109eba035848ef06561c95290c06b11ca5615782fcde1630b378b60656bc3
SHA512565517543a9308baba63634fb4775b3e5d55be2702a8af9b7f4136bd176d9c02423fc4591744552b43bf848390d9c4d082415570a8779fda20ccd7ceb1348356
-
Filesize
239KB
MD5fe5442d749cd85c84e95aa4215485a11
SHA1e9f3dcce2c92321739648ff32fc2bdb362afa30a
SHA256570109eba035848ef06561c95290c06b11ca5615782fcde1630b378b60656bc3
SHA512565517543a9308baba63634fb4775b3e5d55be2702a8af9b7f4136bd176d9c02423fc4591744552b43bf848390d9c4d082415570a8779fda20ccd7ceb1348356
-
Filesize
962KB
MD5be3686b0767c13a4fee96ed82e683d77
SHA1c23211cd77f6856bfc0b28b0d7be9329e9e112d7
SHA256c0ce38a3f35e619dd0e57e5abb1e8c4b2200ce732c86a55c31df673b072d4dcd
SHA51254f8dcba755dca3f24b3a7ac54673320f8fbf77a44135a1a7f1e9288120d67fbc5524873a625ab15a4c2b1e610e36b2b5bc05614db84f586618e0ca137773cfa
-
Filesize
962KB
MD5be3686b0767c13a4fee96ed82e683d77
SHA1c23211cd77f6856bfc0b28b0d7be9329e9e112d7
SHA256c0ce38a3f35e619dd0e57e5abb1e8c4b2200ce732c86a55c31df673b072d4dcd
SHA51254f8dcba755dca3f24b3a7ac54673320f8fbf77a44135a1a7f1e9288120d67fbc5524873a625ab15a4c2b1e610e36b2b5bc05614db84f586618e0ca137773cfa
-
Filesize
344KB
MD533f7a8a830b6f71569fe84d90c995211
SHA1ff85b25988e83baa5c1b274c55d37fec1d372551
SHA25699f78854c29d1125cf28e474d1da61aa2e8a3f68c28dcefec345ee39be0f1ea3
SHA51290f0c014d9139b13b6aad785c3e58933c353af2f961f41b872a6cecda926db5e61d4f78a4db8c392a637ecf5831e97c7ece93f41ab3730327dd2154581993f23
-
Filesize
344KB
MD533f7a8a830b6f71569fe84d90c995211
SHA1ff85b25988e83baa5c1b274c55d37fec1d372551
SHA25699f78854c29d1125cf28e474d1da61aa2e8a3f68c28dcefec345ee39be0f1ea3
SHA51290f0c014d9139b13b6aad785c3e58933c353af2f961f41b872a6cecda926db5e61d4f78a4db8c392a637ecf5831e97c7ece93f41ab3730327dd2154581993f23
-
Filesize
684KB
MD59342ae833d7ccdacf077501e08964240
SHA1d7925e70ffbb66cb7040c0737ae1c7bf27e5ccf6
SHA256e88f13434f3ea0590ec7dc9ef419b216578c07bd28ba2a81ce9bfaec12898f60
SHA512223a1ba53a75d9de86a3f15ef5369ea81cdf76bf9749601e4aa785eaeed8ce3f89f928676aba177b266d7d752dbd873ded0ad3d397fb23d3bcb3a9ada8b111da
-
Filesize
684KB
MD59342ae833d7ccdacf077501e08964240
SHA1d7925e70ffbb66cb7040c0737ae1c7bf27e5ccf6
SHA256e88f13434f3ea0590ec7dc9ef419b216578c07bd28ba2a81ce9bfaec12898f60
SHA512223a1ba53a75d9de86a3f15ef5369ea81cdf76bf9749601e4aa785eaeed8ce3f89f928676aba177b266d7d752dbd873ded0ad3d397fb23d3bcb3a9ada8b111da
-
Filesize
285KB
MD5651c8de2c842222f48c74fb0715f3c6f
SHA1e44a7175b5764c0725bdf56d323b1def32de7b4e
SHA256c94c4c986988c2d336aac0ddce64bde2eb6d4c00fcfd5dfa63f639e8977fa0f9
SHA5125098233d1f25b37efcd5f433c9d157f9e49b3139bc9125100244ef68eb0e7ddcfe2b5b38b09d07b940d516142a86c54fb99701b6f60b0816c9a98703c53d1820
-
Filesize
285KB
MD5651c8de2c842222f48c74fb0715f3c6f
SHA1e44a7175b5764c0725bdf56d323b1def32de7b4e
SHA256c94c4c986988c2d336aac0ddce64bde2eb6d4c00fcfd5dfa63f639e8977fa0f9
SHA5125098233d1f25b37efcd5f433c9d157f9e49b3139bc9125100244ef68eb0e7ddcfe2b5b38b09d07b940d516142a86c54fb99701b6f60b0816c9a98703c53d1820
-
Filesize
400KB
MD52349d99436c45db5501873b4e1910f23
SHA1992a3977338f06de6c4b0c977570440ea5ae0e82
SHA256d313b34f625513f8c48dc58fb425feda4debc387c6f7bf40575297a2ace3d106
SHA51253a66bbae1bcdeaa09cdb2f0f344bf78672be4ade855661bb737c7e859309f3582842f6eb82e51202a6a659e7e58ec98fa28f887370380f8069a7a1ed98d48a5
-
Filesize
400KB
MD52349d99436c45db5501873b4e1910f23
SHA1992a3977338f06de6c4b0c977570440ea5ae0e82
SHA256d313b34f625513f8c48dc58fb425feda4debc387c6f7bf40575297a2ace3d106
SHA51253a66bbae1bcdeaa09cdb2f0f344bf78672be4ade855661bb737c7e859309f3582842f6eb82e51202a6a659e7e58ec98fa28f887370380f8069a7a1ed98d48a5
-
Filesize
11KB
MD5ef36915953487fc84279c436635d4a3a
SHA1f3ee5b10c606a9f3e63f88c965992d754d68902b
SHA256d8e291ba4a960ff4548551080729d200655eab4fba46bb8cf2300876cd764f4a
SHA512700b0de9cda6a6381b79533af1e7ff74e510cc43c613e40f8889804f7e25ac50be365190861b68d4cc2323ce025b486b8582c8eabb05010bcc7734e4ae5ab7eb
-
Filesize
11KB
MD5ef36915953487fc84279c436635d4a3a
SHA1f3ee5b10c606a9f3e63f88c965992d754d68902b
SHA256d8e291ba4a960ff4548551080729d200655eab4fba46bb8cf2300876cd764f4a
SHA512700b0de9cda6a6381b79533af1e7ff74e510cc43c613e40f8889804f7e25ac50be365190861b68d4cc2323ce025b486b8582c8eabb05010bcc7734e4ae5ab7eb
-
Filesize
344KB
MD533f7a8a830b6f71569fe84d90c995211
SHA1ff85b25988e83baa5c1b274c55d37fec1d372551
SHA25699f78854c29d1125cf28e474d1da61aa2e8a3f68c28dcefec345ee39be0f1ea3
SHA51290f0c014d9139b13b6aad785c3e58933c353af2f961f41b872a6cecda926db5e61d4f78a4db8c392a637ecf5831e97c7ece93f41ab3730327dd2154581993f23
-
Filesize
344KB
MD533f7a8a830b6f71569fe84d90c995211
SHA1ff85b25988e83baa5c1b274c55d37fec1d372551
SHA25699f78854c29d1125cf28e474d1da61aa2e8a3f68c28dcefec345ee39be0f1ea3
SHA51290f0c014d9139b13b6aad785c3e58933c353af2f961f41b872a6cecda926db5e61d4f78a4db8c392a637ecf5831e97c7ece93f41ab3730327dd2154581993f23
-
Filesize
344KB
MD533f7a8a830b6f71569fe84d90c995211
SHA1ff85b25988e83baa5c1b274c55d37fec1d372551
SHA25699f78854c29d1125cf28e474d1da61aa2e8a3f68c28dcefec345ee39be0f1ea3
SHA51290f0c014d9139b13b6aad785c3e58933c353af2f961f41b872a6cecda926db5e61d4f78a4db8c392a637ecf5831e97c7ece93f41ab3730327dd2154581993f23
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5