Analysis
-
max time kernel
142s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 23:48
Static task
static1
General
-
Target
91aa4b474ed6239b658d3c0e519524b7ec2cb54619deeeafbf9630f01a177256.exe
-
Size
1.3MB
-
MD5
44a187363b948f21280faf05e7b3a41e
-
SHA1
5632c9adbd1e934f22228aeddefa6780b3500fb5
-
SHA256
91aa4b474ed6239b658d3c0e519524b7ec2cb54619deeeafbf9630f01a177256
-
SHA512
795c02f97a23154f1597db900b1d448512521d6de0db9fbfa97268e8e02fdde29cda491976dd7b2293afba631fddaea717d74232bbccec074cdfbfc657a9bfdf
-
SSDEEP
24576:+y9oVXwVjwcj2US5n9MIIX0oKFFQwgHPnK3+BfBmyAa0cMGKL9xuUxGrZ1:N9yXwJBjVIIXlKjQRvK3+BfSctkvw
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beRW68Lk83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsao54nh95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beRW68Lk83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beRW68Lk83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beRW68Lk83.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsao54nh95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsao54nh95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnNd74tD65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beRW68Lk83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsao54nh95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsao54nh95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnNd74tD65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beRW68Lk83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsao54nh95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnNd74tD65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnNd74tD65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnNd74tD65.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/4456-186-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-187-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-189-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-191-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-195-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-193-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-197-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-199-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-201-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-203-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-205-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-207-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-209-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-211-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-213-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-215-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-217-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-219-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-221-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-223-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-225-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-229-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-227-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-231-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-233-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-235-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-237-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-239-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-241-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-243-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-245-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-247-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4456-249-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4752-2065-0x0000000002440000-0x0000000002450000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation hk93Ht28zX23.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 1276 ptfa7730vQ.exe 4320 ptlF0064nV.exe 652 ptZp8813pH.exe 4392 ptcY8509wc.exe 1572 ptSd4709vu.exe 3380 beRW68Lk83.exe 4456 cunk35rW98.exe 4972 dsao54nh95.exe 4752 fr47py7171fG.exe 4644 gnNd74tD65.exe 3388 hk93Ht28zX23.exe 5096 mnolyk.exe 4664 jxhr40sP14.exe 4704 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 3872 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beRW68Lk83.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsao54nh95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsao54nh95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnNd74tD65.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptZp8813pH.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptSd4709vu.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 91aa4b474ed6239b658d3c0e519524b7ec2cb54619deeeafbf9630f01a177256.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptfa7730vQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptlF0064nV.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptZp8813pH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptcY8509wc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptSd4709vu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 91aa4b474ed6239b658d3c0e519524b7ec2cb54619deeeafbf9630f01a177256.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptfa7730vQ.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptlF0064nV.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptcY8509wc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 860 4456 WerFault.exe 95 1240 4972 WerFault.exe 101 2708 4752 WerFault.exe 104 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3380 beRW68Lk83.exe 3380 beRW68Lk83.exe 4456 cunk35rW98.exe 4456 cunk35rW98.exe 4972 dsao54nh95.exe 4972 dsao54nh95.exe 4752 fr47py7171fG.exe 4752 fr47py7171fG.exe 4644 gnNd74tD65.exe 4644 gnNd74tD65.exe 4664 jxhr40sP14.exe 4664 jxhr40sP14.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3380 beRW68Lk83.exe Token: SeDebugPrivilege 4456 cunk35rW98.exe Token: SeDebugPrivilege 4972 dsao54nh95.exe Token: SeDebugPrivilege 4752 fr47py7171fG.exe Token: SeDebugPrivilege 4644 gnNd74tD65.exe Token: SeDebugPrivilege 4664 jxhr40sP14.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1276 1792 91aa4b474ed6239b658d3c0e519524b7ec2cb54619deeeafbf9630f01a177256.exe 84 PID 1792 wrote to memory of 1276 1792 91aa4b474ed6239b658d3c0e519524b7ec2cb54619deeeafbf9630f01a177256.exe 84 PID 1792 wrote to memory of 1276 1792 91aa4b474ed6239b658d3c0e519524b7ec2cb54619deeeafbf9630f01a177256.exe 84 PID 1276 wrote to memory of 4320 1276 ptfa7730vQ.exe 85 PID 1276 wrote to memory of 4320 1276 ptfa7730vQ.exe 85 PID 1276 wrote to memory of 4320 1276 ptfa7730vQ.exe 85 PID 4320 wrote to memory of 652 4320 ptlF0064nV.exe 86 PID 4320 wrote to memory of 652 4320 ptlF0064nV.exe 86 PID 4320 wrote to memory of 652 4320 ptlF0064nV.exe 86 PID 652 wrote to memory of 4392 652 ptZp8813pH.exe 87 PID 652 wrote to memory of 4392 652 ptZp8813pH.exe 87 PID 652 wrote to memory of 4392 652 ptZp8813pH.exe 87 PID 4392 wrote to memory of 1572 4392 ptcY8509wc.exe 88 PID 4392 wrote to memory of 1572 4392 ptcY8509wc.exe 88 PID 4392 wrote to memory of 1572 4392 ptcY8509wc.exe 88 PID 1572 wrote to memory of 3380 1572 ptSd4709vu.exe 89 PID 1572 wrote to memory of 3380 1572 ptSd4709vu.exe 89 PID 1572 wrote to memory of 4456 1572 ptSd4709vu.exe 95 PID 1572 wrote to memory of 4456 1572 ptSd4709vu.exe 95 PID 1572 wrote to memory of 4456 1572 ptSd4709vu.exe 95 PID 4392 wrote to memory of 4972 4392 ptcY8509wc.exe 101 PID 4392 wrote to memory of 4972 4392 ptcY8509wc.exe 101 PID 4392 wrote to memory of 4972 4392 ptcY8509wc.exe 101 PID 652 wrote to memory of 4752 652 ptZp8813pH.exe 104 PID 652 wrote to memory of 4752 652 ptZp8813pH.exe 104 PID 652 wrote to memory of 4752 652 ptZp8813pH.exe 104 PID 4320 wrote to memory of 4644 4320 ptlF0064nV.exe 107 PID 4320 wrote to memory of 4644 4320 ptlF0064nV.exe 107 PID 1276 wrote to memory of 3388 1276 ptfa7730vQ.exe 109 PID 1276 wrote to memory of 3388 1276 ptfa7730vQ.exe 109 PID 1276 wrote to memory of 3388 1276 ptfa7730vQ.exe 109 PID 3388 wrote to memory of 5096 3388 hk93Ht28zX23.exe 110 PID 3388 wrote to memory of 5096 3388 hk93Ht28zX23.exe 110 PID 3388 wrote to memory of 5096 3388 hk93Ht28zX23.exe 110 PID 1792 wrote to memory of 4664 1792 91aa4b474ed6239b658d3c0e519524b7ec2cb54619deeeafbf9630f01a177256.exe 111 PID 1792 wrote to memory of 4664 1792 91aa4b474ed6239b658d3c0e519524b7ec2cb54619deeeafbf9630f01a177256.exe 111 PID 1792 wrote to memory of 4664 1792 91aa4b474ed6239b658d3c0e519524b7ec2cb54619deeeafbf9630f01a177256.exe 111 PID 5096 wrote to memory of 4732 5096 mnolyk.exe 112 PID 5096 wrote to memory of 4732 5096 mnolyk.exe 112 PID 5096 wrote to memory of 4732 5096 mnolyk.exe 112 PID 5096 wrote to memory of 3340 5096 mnolyk.exe 114 PID 5096 wrote to memory of 3340 5096 mnolyk.exe 114 PID 5096 wrote to memory of 3340 5096 mnolyk.exe 114 PID 3340 wrote to memory of 4468 3340 cmd.exe 116 PID 3340 wrote to memory of 4468 3340 cmd.exe 116 PID 3340 wrote to memory of 4468 3340 cmd.exe 116 PID 3340 wrote to memory of 1152 3340 cmd.exe 117 PID 3340 wrote to memory of 1152 3340 cmd.exe 117 PID 3340 wrote to memory of 1152 3340 cmd.exe 117 PID 3340 wrote to memory of 1632 3340 cmd.exe 118 PID 3340 wrote to memory of 1632 3340 cmd.exe 118 PID 3340 wrote to memory of 1632 3340 cmd.exe 118 PID 3340 wrote to memory of 2960 3340 cmd.exe 119 PID 3340 wrote to memory of 2960 3340 cmd.exe 119 PID 3340 wrote to memory of 2960 3340 cmd.exe 119 PID 3340 wrote to memory of 4612 3340 cmd.exe 120 PID 3340 wrote to memory of 4612 3340 cmd.exe 120 PID 3340 wrote to memory of 4612 3340 cmd.exe 120 PID 3340 wrote to memory of 3024 3340 cmd.exe 121 PID 3340 wrote to memory of 3024 3340 cmd.exe 121 PID 3340 wrote to memory of 3024 3340 cmd.exe 121 PID 5096 wrote to memory of 3872 5096 mnolyk.exe 129 PID 5096 wrote to memory of 3872 5096 mnolyk.exe 129 PID 5096 wrote to memory of 3872 5096 mnolyk.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\91aa4b474ed6239b658d3c0e519524b7ec2cb54619deeeafbf9630f01a177256.exe"C:\Users\Admin\AppData\Local\Temp\91aa4b474ed6239b658d3c0e519524b7ec2cb54619deeeafbf9630f01a177256.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptfa7730vQ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptfa7730vQ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptlF0064nV.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptlF0064nV.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptZp8813pH.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptZp8813pH.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptcY8509wc.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptcY8509wc.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptSd4709vu.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptSd4709vu.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beRW68Lk83.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beRW68Lk83.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cunk35rW98.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cunk35rW98.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 16648⤵
- Program crash
PID:860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsao54nh95.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsao54nh95.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 10807⤵
- Program crash
PID:1240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr47py7171fG.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr47py7171fG.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 18606⤵
- Program crash
PID:2708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnNd74tD65.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnNd74tD65.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk93Ht28zX23.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk93Ht28zX23.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:4732
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4468
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:1152
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:1632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:4612
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:3024
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3872
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxhr40sP14.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxhr40sP14.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4456 -ip 44561⤵PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4972 -ip 49721⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4752 -ip 47521⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:4704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD58d0ada8f280d442ea60fa8a5baff4a65
SHA1bea38f4cb184054ae12485df386a21a3b5ada229
SHA2562c0f0733a5d0fd7204c6ccf0bd042a502b585bb7b905934cfe1f24885e23c904
SHA512a4f880764ec4c0938ec27f4b6b772e2c3861a9083440aeaf766ddb30c284f78071d09e66f31676bf996a97dfdf127702e4a717ce1fc2e69cecd755625387dad8
-
Filesize
239KB
MD58d0ada8f280d442ea60fa8a5baff4a65
SHA1bea38f4cb184054ae12485df386a21a3b5ada229
SHA2562c0f0733a5d0fd7204c6ccf0bd042a502b585bb7b905934cfe1f24885e23c904
SHA512a4f880764ec4c0938ec27f4b6b772e2c3861a9083440aeaf766ddb30c284f78071d09e66f31676bf996a97dfdf127702e4a717ce1fc2e69cecd755625387dad8
-
Filesize
239KB
MD58d0ada8f280d442ea60fa8a5baff4a65
SHA1bea38f4cb184054ae12485df386a21a3b5ada229
SHA2562c0f0733a5d0fd7204c6ccf0bd042a502b585bb7b905934cfe1f24885e23c904
SHA512a4f880764ec4c0938ec27f4b6b772e2c3861a9083440aeaf766ddb30c284f78071d09e66f31676bf996a97dfdf127702e4a717ce1fc2e69cecd755625387dad8
-
Filesize
239KB
MD58d0ada8f280d442ea60fa8a5baff4a65
SHA1bea38f4cb184054ae12485df386a21a3b5ada229
SHA2562c0f0733a5d0fd7204c6ccf0bd042a502b585bb7b905934cfe1f24885e23c904
SHA512a4f880764ec4c0938ec27f4b6b772e2c3861a9083440aeaf766ddb30c284f78071d09e66f31676bf996a97dfdf127702e4a717ce1fc2e69cecd755625387dad8
-
Filesize
175KB
MD589382087b00dfbc54d6b606ce0bde209
SHA1c382ec5c1938575ba7f9722a412461ef82409af6
SHA25630fb623f205105e7b6605fc3b7d13cc45f355dd4acd3cec453e7bd1f188a1dc7
SHA51258b6997ce0dae29fa3a65366cc886018c7400f291b6eef9ab56fb51c96a8196a74f3418e139a76db04894f2e2ab0257f77e646139e9ee4d679e26cd2a2aee9a1
-
Filesize
175KB
MD589382087b00dfbc54d6b606ce0bde209
SHA1c382ec5c1938575ba7f9722a412461ef82409af6
SHA25630fb623f205105e7b6605fc3b7d13cc45f355dd4acd3cec453e7bd1f188a1dc7
SHA51258b6997ce0dae29fa3a65366cc886018c7400f291b6eef9ab56fb51c96a8196a74f3418e139a76db04894f2e2ab0257f77e646139e9ee4d679e26cd2a2aee9a1
-
Filesize
1.2MB
MD501b11a9ff5ae66b503a2e29b3846a8dc
SHA1ff70bac7fd2675ec2af781ab4eeb70e48d7d650b
SHA25697ba8c5104e936dab04a291f204f367cca1dc359bb360c0d31840142c11bc804
SHA5122839dc8140135551b8799bf1d3cec74844230b66d012a3c8bbc5dfaf101cc41d31d105240870d517e8ed8d75602997cee2d4872408c8ebc2b3749943ea866cc1
-
Filesize
1.2MB
MD501b11a9ff5ae66b503a2e29b3846a8dc
SHA1ff70bac7fd2675ec2af781ab4eeb70e48d7d650b
SHA25697ba8c5104e936dab04a291f204f367cca1dc359bb360c0d31840142c11bc804
SHA5122839dc8140135551b8799bf1d3cec74844230b66d012a3c8bbc5dfaf101cc41d31d105240870d517e8ed8d75602997cee2d4872408c8ebc2b3749943ea866cc1
-
Filesize
239KB
MD58d0ada8f280d442ea60fa8a5baff4a65
SHA1bea38f4cb184054ae12485df386a21a3b5ada229
SHA2562c0f0733a5d0fd7204c6ccf0bd042a502b585bb7b905934cfe1f24885e23c904
SHA512a4f880764ec4c0938ec27f4b6b772e2c3861a9083440aeaf766ddb30c284f78071d09e66f31676bf996a97dfdf127702e4a717ce1fc2e69cecd755625387dad8
-
Filesize
239KB
MD58d0ada8f280d442ea60fa8a5baff4a65
SHA1bea38f4cb184054ae12485df386a21a3b5ada229
SHA2562c0f0733a5d0fd7204c6ccf0bd042a502b585bb7b905934cfe1f24885e23c904
SHA512a4f880764ec4c0938ec27f4b6b772e2c3861a9083440aeaf766ddb30c284f78071d09e66f31676bf996a97dfdf127702e4a717ce1fc2e69cecd755625387dad8
-
Filesize
995KB
MD5f7dca8e00b9bea59c3c767b994daca6f
SHA1e97d9b6d1b0b816e35f3c9d1059690a67ebc203f
SHA2567c58d28eb1e249e4da9bf03abf2dbbfd52dc867c6fba9f0a09dd00b64cc96109
SHA5128548edd044b7807827ac351d3b94002249e44f114054222f2eafcbbe7bdf2443995ff23fdff37d9b858dbef19de857cbc151195a3b92f64f3c375972baffc847
-
Filesize
995KB
MD5f7dca8e00b9bea59c3c767b994daca6f
SHA1e97d9b6d1b0b816e35f3c9d1059690a67ebc203f
SHA2567c58d28eb1e249e4da9bf03abf2dbbfd52dc867c6fba9f0a09dd00b64cc96109
SHA5128548edd044b7807827ac351d3b94002249e44f114054222f2eafcbbe7bdf2443995ff23fdff37d9b858dbef19de857cbc151195a3b92f64f3c375972baffc847
-
Filesize
11KB
MD567fa991e464adb0cbe6c4c01090ebf8d
SHA15e1b375b08191834298fd3c669e1b66d9a8dfc96
SHA2566f9f7a745538518d1f3909b8717dcff1b63f3267803dfc8acd15077265a9e6f6
SHA512e810061e11b3b21fee8b6d624190fb4ae6a17a802bcf669fd6553233210e37df46a1e42d393839032fe530c1c05bb6c1ae3aa1b85adbf8e01464a0f18a86f5f8
-
Filesize
11KB
MD567fa991e464adb0cbe6c4c01090ebf8d
SHA15e1b375b08191834298fd3c669e1b66d9a8dfc96
SHA2566f9f7a745538518d1f3909b8717dcff1b63f3267803dfc8acd15077265a9e6f6
SHA512e810061e11b3b21fee8b6d624190fb4ae6a17a802bcf669fd6553233210e37df46a1e42d393839032fe530c1c05bb6c1ae3aa1b85adbf8e01464a0f18a86f5f8
-
Filesize
892KB
MD5e37e803f25c29afa3a75be880165d8fe
SHA18a497df0704ad5971f424cadaaacd5ed7de70131
SHA2565c481b1c480fbedfd8ae3be1a71542ab7f86abf6d6dcac6f99a207acf554bdce
SHA512627fa36729fd3f1323953cd51ec803be786aed2a43c387318f995d3269d9dea57d411a8f0e220fca5ed5b5b00322f453b8114693d3d43a492619e05819e6e798
-
Filesize
892KB
MD5e37e803f25c29afa3a75be880165d8fe
SHA18a497df0704ad5971f424cadaaacd5ed7de70131
SHA2565c481b1c480fbedfd8ae3be1a71542ab7f86abf6d6dcac6f99a207acf554bdce
SHA512627fa36729fd3f1323953cd51ec803be786aed2a43c387318f995d3269d9dea57d411a8f0e220fca5ed5b5b00322f453b8114693d3d43a492619e05819e6e798
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
666KB
MD5484ef847919341534574aa7f32b74b68
SHA15908da829b8a5995b781f38dea9d30955914efff
SHA25618af48712478cd04b923588606a5dbdb7bdb8f8450d0236a948b5bf0d1e63317
SHA5126f6f5ad0ff657903c90689158ccd5c0eb2253113c6ea5535289d77c6ecbfdb1e921624c49655b531cac18ef55f7617dd3cae53997ed3a30e09a5360adb4e0817
-
Filesize
666KB
MD5484ef847919341534574aa7f32b74b68
SHA15908da829b8a5995b781f38dea9d30955914efff
SHA25618af48712478cd04b923588606a5dbdb7bdb8f8450d0236a948b5bf0d1e63317
SHA5126f6f5ad0ff657903c90689158ccd5c0eb2253113c6ea5535289d77c6ecbfdb1e921624c49655b531cac18ef55f7617dd3cae53997ed3a30e09a5360adb4e0817
-
Filesize
246KB
MD5507d6ec6d7a5a7af2977e0a7f8e8d480
SHA12640fc4ec86dbe93a161f085be5748ae910700b4
SHA256cd820dff6ac4db86f20d40b750d50211c3a02d6b47d5f40c2550a426caa680a7
SHA5126d06c09a0c67086f34e25902bf62e79e8e4edde77a1b11649f67b7bdbb89bec756774e6c646884e6dcf31096e5a6068abcbd7581d1ed40ae52231489e55b2d8d
-
Filesize
246KB
MD5507d6ec6d7a5a7af2977e0a7f8e8d480
SHA12640fc4ec86dbe93a161f085be5748ae910700b4
SHA256cd820dff6ac4db86f20d40b750d50211c3a02d6b47d5f40c2550a426caa680a7
SHA5126d06c09a0c67086f34e25902bf62e79e8e4edde77a1b11649f67b7bdbb89bec756774e6c646884e6dcf31096e5a6068abcbd7581d1ed40ae52231489e55b2d8d
-
Filesize
391KB
MD59bcb57647554df62b616590fcf814ae3
SHA159af351dbbef07cf8f2ad77e303d5c196c13410b
SHA256c1ffc318acf462738cc30c5ffcd02a3079d7b3c9b4234ba3e0fd18ac6d0d77db
SHA512ada4f6014de7bcf762fdba61820ca55a3f40a2b531f918adcb523c4ad11f2bc34854cc90670531e5ec87824059e96906a5f116c1a7ca1e65118da98ffb7d89bd
-
Filesize
391KB
MD59bcb57647554df62b616590fcf814ae3
SHA159af351dbbef07cf8f2ad77e303d5c196c13410b
SHA256c1ffc318acf462738cc30c5ffcd02a3079d7b3c9b4234ba3e0fd18ac6d0d77db
SHA512ada4f6014de7bcf762fdba61820ca55a3f40a2b531f918adcb523c4ad11f2bc34854cc90670531e5ec87824059e96906a5f116c1a7ca1e65118da98ffb7d89bd
-
Filesize
11KB
MD577e9b29a0a32549aa24c2ae2b1d71bf4
SHA1b6e145f586e69c19974efb89a9490efa7f82c6bc
SHA2564228657b24c3bac980858f252272a6e3181f45d225a7d2247dfd35fc9c4abeee
SHA5129d0d4e57b9c7a470e3ea7e6c74897fbd33fc7d38a389126c3049a4265f39b45da6ee23fc08975d1be67b8f528a90ca94e8b4daaea881c43a7a9a0cc1eb772d42
-
Filesize
11KB
MD577e9b29a0a32549aa24c2ae2b1d71bf4
SHA1b6e145f586e69c19974efb89a9490efa7f82c6bc
SHA2564228657b24c3bac980858f252272a6e3181f45d225a7d2247dfd35fc9c4abeee
SHA5129d0d4e57b9c7a470e3ea7e6c74897fbd33fc7d38a389126c3049a4265f39b45da6ee23fc08975d1be67b8f528a90ca94e8b4daaea881c43a7a9a0cc1eb772d42
-
Filesize
11KB
MD577e9b29a0a32549aa24c2ae2b1d71bf4
SHA1b6e145f586e69c19974efb89a9490efa7f82c6bc
SHA2564228657b24c3bac980858f252272a6e3181f45d225a7d2247dfd35fc9c4abeee
SHA5129d0d4e57b9c7a470e3ea7e6c74897fbd33fc7d38a389126c3049a4265f39b45da6ee23fc08975d1be67b8f528a90ca94e8b4daaea881c43a7a9a0cc1eb772d42
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
304KB
MD5a562213cf445eaaf665759f35b4e91c2
SHA1c37cb42d6b01cb56f0528499c8cb2d801176bf45
SHA256457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3
SHA5126944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5