Analysis
-
max time kernel
142s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 00:11
Static task
static1
General
-
Target
0cee611402d5892d76d0b3bb1a4e1d0fdacb43058b4c189c9b06e5dca5c51af8.exe
-
Size
1.4MB
-
MD5
2c0ceca9bd278ba013c7b5b2dfc1398b
-
SHA1
88d21579201a8776e30707495e71a4eb42c2c237
-
SHA256
0cee611402d5892d76d0b3bb1a4e1d0fdacb43058b4c189c9b06e5dca5c51af8
-
SHA512
ef03977ec2a4d6163758fdf3dca50343216018312a088f9922e31c5646cb3a53a78c99c2718cbee514715c69fa2aae62df6d6a58131e456e45e1fdc5e9109f14
-
SSDEEP
24576:Sy6BxqWXsHIJFq3BZZ6w3auQ4x2lzcTWREydPLeV0g5zfcT1gSP/8lu3wR0tj:56BxqzIFq3l2uxIzB9A1o+SP/8lu3IG
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.15/dF30Hn4m/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iPj57fZ54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iPj57fZ54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mjo52Af49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mjo52Af49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rdo35DL62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iPj57fZ54.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection mjo52Af49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mjo52Af49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rdo35DL62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iPj57fZ54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mjo52Af49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rdo35DL62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iPj57fZ54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iPj57fZ54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mjo52Af49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rdo35DL62.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rdo35DL62.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/4484-186-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-187-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-189-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-191-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-193-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-195-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-197-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-199-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-201-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-203-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-205-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-207-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-209-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-211-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-213-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-215-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-217-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-219-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-221-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-223-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-225-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-227-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-229-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-231-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-233-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-235-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-237-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-239-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-241-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-243-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-245-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-247-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/4484-249-0x0000000004D30000-0x0000000004D6E000-memory.dmp family_redline behavioral1/memory/956-1733-0x00000000071D0000-0x00000000071E0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation sf01Zo75EB71.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 15 IoCs
pid Process 3656 vmBo94pd20.exe 2020 vmqR70po64.exe 1320 vmLs12Dh27.exe 216 vmyE14Dz59.exe 2084 vmxN47UI39.exe 4580 iPj57fZ54.exe 4484 kUO80Ih79.exe 1144 mjo52Af49.exe 956 nay85PI00.exe 1504 rdo35DL62.exe 3828 sf01Zo75EB71.exe 2488 mnolyk.exe 4192 tv42Ip84vu04.exe 3388 mnolyk.exe 4776 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2640 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iPj57fZ54.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mjo52Af49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mjo52Af49.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rdo35DL62.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0cee611402d5892d76d0b3bb1a4e1d0fdacb43058b4c189c9b06e5dca5c51af8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmBo94pd20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vmqR70po64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" vmLs12Dh27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vmyE14Dz59.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmxN47UI39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0cee611402d5892d76d0b3bb1a4e1d0fdacb43058b4c189c9b06e5dca5c51af8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmBo94pd20.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmqR70po64.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmLs12Dh27.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmyE14Dz59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" vmxN47UI39.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1592 4484 WerFault.exe 94 4612 1144 WerFault.exe 98 2764 956 WerFault.exe 109 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4580 iPj57fZ54.exe 4580 iPj57fZ54.exe 4484 kUO80Ih79.exe 4484 kUO80Ih79.exe 1144 mjo52Af49.exe 1144 mjo52Af49.exe 956 nay85PI00.exe 956 nay85PI00.exe 1504 rdo35DL62.exe 1504 rdo35DL62.exe 4192 tv42Ip84vu04.exe 4192 tv42Ip84vu04.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4580 iPj57fZ54.exe Token: SeDebugPrivilege 4484 kUO80Ih79.exe Token: SeDebugPrivilege 1144 mjo52Af49.exe Token: SeDebugPrivilege 956 nay85PI00.exe Token: SeDebugPrivilege 1504 rdo35DL62.exe Token: SeDebugPrivilege 4192 tv42Ip84vu04.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3656 2572 0cee611402d5892d76d0b3bb1a4e1d0fdacb43058b4c189c9b06e5dca5c51af8.exe 85 PID 2572 wrote to memory of 3656 2572 0cee611402d5892d76d0b3bb1a4e1d0fdacb43058b4c189c9b06e5dca5c51af8.exe 85 PID 2572 wrote to memory of 3656 2572 0cee611402d5892d76d0b3bb1a4e1d0fdacb43058b4c189c9b06e5dca5c51af8.exe 85 PID 3656 wrote to memory of 2020 3656 vmBo94pd20.exe 86 PID 3656 wrote to memory of 2020 3656 vmBo94pd20.exe 86 PID 3656 wrote to memory of 2020 3656 vmBo94pd20.exe 86 PID 2020 wrote to memory of 1320 2020 vmqR70po64.exe 87 PID 2020 wrote to memory of 1320 2020 vmqR70po64.exe 87 PID 2020 wrote to memory of 1320 2020 vmqR70po64.exe 87 PID 1320 wrote to memory of 216 1320 vmLs12Dh27.exe 88 PID 1320 wrote to memory of 216 1320 vmLs12Dh27.exe 88 PID 1320 wrote to memory of 216 1320 vmLs12Dh27.exe 88 PID 216 wrote to memory of 2084 216 vmyE14Dz59.exe 89 PID 216 wrote to memory of 2084 216 vmyE14Dz59.exe 89 PID 216 wrote to memory of 2084 216 vmyE14Dz59.exe 89 PID 2084 wrote to memory of 4580 2084 vmxN47UI39.exe 90 PID 2084 wrote to memory of 4580 2084 vmxN47UI39.exe 90 PID 2084 wrote to memory of 4484 2084 vmxN47UI39.exe 94 PID 2084 wrote to memory of 4484 2084 vmxN47UI39.exe 94 PID 2084 wrote to memory of 4484 2084 vmxN47UI39.exe 94 PID 216 wrote to memory of 1144 216 vmyE14Dz59.exe 98 PID 216 wrote to memory of 1144 216 vmyE14Dz59.exe 98 PID 216 wrote to memory of 1144 216 vmyE14Dz59.exe 98 PID 1320 wrote to memory of 956 1320 vmLs12Dh27.exe 109 PID 1320 wrote to memory of 956 1320 vmLs12Dh27.exe 109 PID 1320 wrote to memory of 956 1320 vmLs12Dh27.exe 109 PID 2020 wrote to memory of 1504 2020 vmqR70po64.exe 112 PID 2020 wrote to memory of 1504 2020 vmqR70po64.exe 112 PID 3656 wrote to memory of 3828 3656 vmBo94pd20.exe 113 PID 3656 wrote to memory of 3828 3656 vmBo94pd20.exe 113 PID 3656 wrote to memory of 3828 3656 vmBo94pd20.exe 113 PID 3828 wrote to memory of 2488 3828 sf01Zo75EB71.exe 114 PID 3828 wrote to memory of 2488 3828 sf01Zo75EB71.exe 114 PID 3828 wrote to memory of 2488 3828 sf01Zo75EB71.exe 114 PID 2572 wrote to memory of 4192 2572 0cee611402d5892d76d0b3bb1a4e1d0fdacb43058b4c189c9b06e5dca5c51af8.exe 115 PID 2572 wrote to memory of 4192 2572 0cee611402d5892d76d0b3bb1a4e1d0fdacb43058b4c189c9b06e5dca5c51af8.exe 115 PID 2572 wrote to memory of 4192 2572 0cee611402d5892d76d0b3bb1a4e1d0fdacb43058b4c189c9b06e5dca5c51af8.exe 115 PID 2488 wrote to memory of 1376 2488 mnolyk.exe 116 PID 2488 wrote to memory of 1376 2488 mnolyk.exe 116 PID 2488 wrote to memory of 1376 2488 mnolyk.exe 116 PID 2488 wrote to memory of 2580 2488 mnolyk.exe 118 PID 2488 wrote to memory of 2580 2488 mnolyk.exe 118 PID 2488 wrote to memory of 2580 2488 mnolyk.exe 118 PID 2580 wrote to memory of 312 2580 cmd.exe 120 PID 2580 wrote to memory of 312 2580 cmd.exe 120 PID 2580 wrote to memory of 312 2580 cmd.exe 120 PID 2580 wrote to memory of 2716 2580 cmd.exe 121 PID 2580 wrote to memory of 2716 2580 cmd.exe 121 PID 2580 wrote to memory of 2716 2580 cmd.exe 121 PID 2580 wrote to memory of 4976 2580 cmd.exe 122 PID 2580 wrote to memory of 4976 2580 cmd.exe 122 PID 2580 wrote to memory of 4976 2580 cmd.exe 122 PID 2580 wrote to memory of 3336 2580 cmd.exe 123 PID 2580 wrote to memory of 3336 2580 cmd.exe 123 PID 2580 wrote to memory of 3336 2580 cmd.exe 123 PID 2580 wrote to memory of 3240 2580 cmd.exe 124 PID 2580 wrote to memory of 3240 2580 cmd.exe 124 PID 2580 wrote to memory of 3240 2580 cmd.exe 124 PID 2580 wrote to memory of 3532 2580 cmd.exe 125 PID 2580 wrote to memory of 3532 2580 cmd.exe 125 PID 2580 wrote to memory of 3532 2580 cmd.exe 125 PID 2488 wrote to memory of 2640 2488 mnolyk.exe 128 PID 2488 wrote to memory of 2640 2488 mnolyk.exe 128 PID 2488 wrote to memory of 2640 2488 mnolyk.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cee611402d5892d76d0b3bb1a4e1d0fdacb43058b4c189c9b06e5dca5c51af8.exe"C:\Users\Admin\AppData\Local\Temp\0cee611402d5892d76d0b3bb1a4e1d0fdacb43058b4c189c9b06e5dca5c51af8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmBo94pd20.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmBo94pd20.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmqR70po64.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmqR70po64.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmLs12Dh27.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmLs12Dh27.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmyE14Dz59.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmyE14Dz59.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmxN47UI39.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmxN47UI39.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iPj57fZ54.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iPj57fZ54.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kUO80Ih79.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kUO80Ih79.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 19368⤵
- Program crash
PID:1592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\mjo52Af49.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\mjo52Af49.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 10807⤵
- Program crash
PID:4612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nay85PI00.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nay85PI00.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 13486⤵
- Program crash
PID:2764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rdo35DL62.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rdo35DL62.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf01Zo75EB71.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf01Zo75EB71.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:1376
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4f9dd6f8a7" /P "Admin:N"&&CACLS "..\4f9dd6f8a7" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:312
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:2716
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:4976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:N"6⤵PID:3240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:R" /E6⤵PID:3532
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2640
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv42Ip84vu04.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv42Ip84vu04.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4484 -ip 44841⤵PID:656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1144 -ip 11441⤵PID:644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 956 -ip 9561⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe1⤵
- Executes dropped EXE
PID:3388
-
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe1⤵
- Executes dropped EXE
PID:4776
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD504c62f901de98d9803fb345db8350f73
SHA14d4ea683cac46886e0a419b85311ea756e74b6ef
SHA2566705d461d6bbf4010e8713219c5aac2858112a42b1c4abf9d1cf32e4baa0c622
SHA512cd8de8615740cb1d09cd09bcdf5ad896c73e38e1177e9a90099798cf0d64e2d6c39155c40966237996945995df39adbe3723de620bc909b17c07c3546f5a0f78
-
Filesize
240KB
MD504c62f901de98d9803fb345db8350f73
SHA14d4ea683cac46886e0a419b85311ea756e74b6ef
SHA2566705d461d6bbf4010e8713219c5aac2858112a42b1c4abf9d1cf32e4baa0c622
SHA512cd8de8615740cb1d09cd09bcdf5ad896c73e38e1177e9a90099798cf0d64e2d6c39155c40966237996945995df39adbe3723de620bc909b17c07c3546f5a0f78
-
Filesize
240KB
MD504c62f901de98d9803fb345db8350f73
SHA14d4ea683cac46886e0a419b85311ea756e74b6ef
SHA2566705d461d6bbf4010e8713219c5aac2858112a42b1c4abf9d1cf32e4baa0c622
SHA512cd8de8615740cb1d09cd09bcdf5ad896c73e38e1177e9a90099798cf0d64e2d6c39155c40966237996945995df39adbe3723de620bc909b17c07c3546f5a0f78
-
Filesize
240KB
MD504c62f901de98d9803fb345db8350f73
SHA14d4ea683cac46886e0a419b85311ea756e74b6ef
SHA2566705d461d6bbf4010e8713219c5aac2858112a42b1c4abf9d1cf32e4baa0c622
SHA512cd8de8615740cb1d09cd09bcdf5ad896c73e38e1177e9a90099798cf0d64e2d6c39155c40966237996945995df39adbe3723de620bc909b17c07c3546f5a0f78
-
Filesize
240KB
MD504c62f901de98d9803fb345db8350f73
SHA14d4ea683cac46886e0a419b85311ea756e74b6ef
SHA2566705d461d6bbf4010e8713219c5aac2858112a42b1c4abf9d1cf32e4baa0c622
SHA512cd8de8615740cb1d09cd09bcdf5ad896c73e38e1177e9a90099798cf0d64e2d6c39155c40966237996945995df39adbe3723de620bc909b17c07c3546f5a0f78
-
Filesize
176KB
MD5a3990a8cfab666accc99b04c170b71ab
SHA11530d107d6d3c47052bc80473ce1e1fadcec18b2
SHA256392d479943737af0d07b9a29a91e8d28c88ad9e590c8898a7a45929ba09889d6
SHA512db44910b0d9cce147476c52a184ee5248251ac828ca75cb6be6ca22427bcee3a6ad2a0084483af3a12c27dec24d8db5fbc389794a641019e8189b5460588aaa1
-
Filesize
176KB
MD5a3990a8cfab666accc99b04c170b71ab
SHA11530d107d6d3c47052bc80473ce1e1fadcec18b2
SHA256392d479943737af0d07b9a29a91e8d28c88ad9e590c8898a7a45929ba09889d6
SHA512db44910b0d9cce147476c52a184ee5248251ac828ca75cb6be6ca22427bcee3a6ad2a0084483af3a12c27dec24d8db5fbc389794a641019e8189b5460588aaa1
-
Filesize
1.2MB
MD5ee82c58bdbe55c986494840e2a772255
SHA16e3931c933cfa9ebb3d0bad47fbd062f9adcc609
SHA256db17bbad90979409dd1b8ad2c38cc379d26360ee73e508a41e0538713fb700d8
SHA512fa73d8c27e1acd2a3672c0c7bfd32856ddcda9e36f83fa458dae5a48d5f05ad2ac694b089750c91a034b28b552c8d68e51e3d6f36fb3303a436f5ad4428b5e6e
-
Filesize
1.2MB
MD5ee82c58bdbe55c986494840e2a772255
SHA16e3931c933cfa9ebb3d0bad47fbd062f9adcc609
SHA256db17bbad90979409dd1b8ad2c38cc379d26360ee73e508a41e0538713fb700d8
SHA512fa73d8c27e1acd2a3672c0c7bfd32856ddcda9e36f83fa458dae5a48d5f05ad2ac694b089750c91a034b28b552c8d68e51e3d6f36fb3303a436f5ad4428b5e6e
-
Filesize
240KB
MD504c62f901de98d9803fb345db8350f73
SHA14d4ea683cac46886e0a419b85311ea756e74b6ef
SHA2566705d461d6bbf4010e8713219c5aac2858112a42b1c4abf9d1cf32e4baa0c622
SHA512cd8de8615740cb1d09cd09bcdf5ad896c73e38e1177e9a90099798cf0d64e2d6c39155c40966237996945995df39adbe3723de620bc909b17c07c3546f5a0f78
-
Filesize
240KB
MD504c62f901de98d9803fb345db8350f73
SHA14d4ea683cac46886e0a419b85311ea756e74b6ef
SHA2566705d461d6bbf4010e8713219c5aac2858112a42b1c4abf9d1cf32e4baa0c622
SHA512cd8de8615740cb1d09cd09bcdf5ad896c73e38e1177e9a90099798cf0d64e2d6c39155c40966237996945995df39adbe3723de620bc909b17c07c3546f5a0f78
-
Filesize
1.0MB
MD5d44f290ea5fd188085bc0a80d101409b
SHA1181335e17145169dcd16ee88ca6b6efc092523ba
SHA256347e705a4911585fa8c36cb632e78e713f8c5f4a9cf405f14f35ea4e29f1baf9
SHA51233f85ece146d6b26c3d20e031935734685523577ae826a5dd825b20683e867f811d45691bf8fe84d6cf0b4461a0d545c6154788c6ee2a5a2c6e5d03ad60ffed3
-
Filesize
1.0MB
MD5d44f290ea5fd188085bc0a80d101409b
SHA1181335e17145169dcd16ee88ca6b6efc092523ba
SHA256347e705a4911585fa8c36cb632e78e713f8c5f4a9cf405f14f35ea4e29f1baf9
SHA51233f85ece146d6b26c3d20e031935734685523577ae826a5dd825b20683e867f811d45691bf8fe84d6cf0b4461a0d545c6154788c6ee2a5a2c6e5d03ad60ffed3
-
Filesize
15KB
MD53070eb43e303ccb2731cffa0be7ed1f6
SHA18ba136fb79d13f78d1f476b0bc701e8f64a559d3
SHA25639f105e2a8915f3ac500a72b1df9cef42259c2698a9f486702ce4670ea298f2b
SHA51271f8621e61e1182b602e6bd55963ccfc01d7eb0eb217a0a437fdeae72a0caf1848cf1898ba8ca19b56f85bfe9eeb2fe5a3053c9654655c36051539000a68164e
-
Filesize
15KB
MD53070eb43e303ccb2731cffa0be7ed1f6
SHA18ba136fb79d13f78d1f476b0bc701e8f64a559d3
SHA25639f105e2a8915f3ac500a72b1df9cef42259c2698a9f486702ce4670ea298f2b
SHA51271f8621e61e1182b602e6bd55963ccfc01d7eb0eb217a0a437fdeae72a0caf1848cf1898ba8ca19b56f85bfe9eeb2fe5a3053c9654655c36051539000a68164e
-
Filesize
967KB
MD5b2d0ec23c38e2546d10a51bf71992aac
SHA114ab5e6120ad1af32f05f8643a0dacc011ba460a
SHA256c66cbcb97a891b42a1b798f3437c40436d6cd402541d9fced89c83752d05d4b7
SHA51212059fbff6c30323a2d3d5736ed95e054c2a2677783f0df4e8de0e493aa1568b33c1199ffb59148af7d3addf92caa59ab11c371082ab8c2749eb04b650bc2349
-
Filesize
967KB
MD5b2d0ec23c38e2546d10a51bf71992aac
SHA114ab5e6120ad1af32f05f8643a0dacc011ba460a
SHA256c66cbcb97a891b42a1b798f3437c40436d6cd402541d9fced89c83752d05d4b7
SHA51212059fbff6c30323a2d3d5736ed95e054c2a2677783f0df4e8de0e493aa1568b33c1199ffb59148af7d3addf92caa59ab11c371082ab8c2749eb04b650bc2349
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
687KB
MD5e4c489856333a47171080b0613ae8fac
SHA1ba846fe7b91f38471378e168a812dc290ba90634
SHA256b0af26c4743b3ae033d4581ac9bd5ef47bbc36ddadff8aab4c6d8ea9cdfa900c
SHA512a46e0024c930c28ce523f1c97e506ced27af19cd6dad8659466688197da06412d2fe706f10afb064d9ff824299e12df65f735eeb7efad8eabe2d04058ed06f06
-
Filesize
687KB
MD5e4c489856333a47171080b0613ae8fac
SHA1ba846fe7b91f38471378e168a812dc290ba90634
SHA256b0af26c4743b3ae033d4581ac9bd5ef47bbc36ddadff8aab4c6d8ea9cdfa900c
SHA512a46e0024c930c28ce523f1c97e506ced27af19cd6dad8659466688197da06412d2fe706f10afb064d9ff824299e12df65f735eeb7efad8eabe2d04058ed06f06
-
Filesize
317KB
MD5c02fce88544bd53747eb1b6d61fa4b34
SHA1184314293d00304318797c00ed87955837437844
SHA256509960a8b79d67079aa3e9bab311fd539e9949cd75d5865f6a68770926951034
SHA5127a8d849b180527be277af24a03913b2a004d8d7aa6d227a62594ddbd64b62679c16faadce781090e28dc49da3af7894c54d1c0473d99e1c3d94ed7c7fac9916f
-
Filesize
317KB
MD5c02fce88544bd53747eb1b6d61fa4b34
SHA1184314293d00304318797c00ed87955837437844
SHA256509960a8b79d67079aa3e9bab311fd539e9949cd75d5865f6a68770926951034
SHA5127a8d849b180527be277af24a03913b2a004d8d7aa6d227a62594ddbd64b62679c16faadce781090e28dc49da3af7894c54d1c0473d99e1c3d94ed7c7fac9916f
-
Filesize
402KB
MD56f6d124ec75f36d5c96441c2ea6b1174
SHA1fa91ec265956ebb234141047279910eab0261189
SHA256015f1dfca61a630be592693c0f2b151616ce2eaf403c15fe79cd3f3c6aa23267
SHA512a177e03b54ca329f3560653f4049d2e81194db8b9981aa3d3242a4dae8b9d89f20e3b282f44355f9f1c2a7657e74e72dc8eb0e795880aec8b853d4813f8ba193
-
Filesize
402KB
MD56f6d124ec75f36d5c96441c2ea6b1174
SHA1fa91ec265956ebb234141047279910eab0261189
SHA256015f1dfca61a630be592693c0f2b151616ce2eaf403c15fe79cd3f3c6aa23267
SHA512a177e03b54ca329f3560653f4049d2e81194db8b9981aa3d3242a4dae8b9d89f20e3b282f44355f9f1c2a7657e74e72dc8eb0e795880aec8b853d4813f8ba193
-
Filesize
15KB
MD5413be5bb8b3de7c9b32cebfa8cb6bcd0
SHA19c6b970f666e9d23230eb7bb79febb5a3f106529
SHA256deab638d6a6824c374cfb3fc3c33085ed50b3db2ab1effaedcbe496471b678eb
SHA5125b2a9e900a36c6de049b5651fcf2269d3c9f8977ea7bf9cc47c3ee0c4c3c6d583a4802a038f0ac527075e0722c7d1cb3fda39aaecee450c56686af0a915033b8
-
Filesize
15KB
MD5413be5bb8b3de7c9b32cebfa8cb6bcd0
SHA19c6b970f666e9d23230eb7bb79febb5a3f106529
SHA256deab638d6a6824c374cfb3fc3c33085ed50b3db2ab1effaedcbe496471b678eb
SHA5125b2a9e900a36c6de049b5651fcf2269d3c9f8977ea7bf9cc47c3ee0c4c3c6d583a4802a038f0ac527075e0722c7d1cb3fda39aaecee450c56686af0a915033b8
-
Filesize
15KB
MD5413be5bb8b3de7c9b32cebfa8cb6bcd0
SHA19c6b970f666e9d23230eb7bb79febb5a3f106529
SHA256deab638d6a6824c374cfb3fc3c33085ed50b3db2ab1effaedcbe496471b678eb
SHA5125b2a9e900a36c6de049b5651fcf2269d3c9f8977ea7bf9cc47c3ee0c4c3c6d583a4802a038f0ac527075e0722c7d1cb3fda39aaecee450c56686af0a915033b8
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5