Analysis
-
max time kernel
119s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 00:15
Static task
static1
General
-
Target
4b5f70e86565c2a0931d25f185360df238d7d74b1e05dc5dc801382e1d5f09bd.exe
-
Size
1.4MB
-
MD5
988c03a38097b83460b9cf5c563423f8
-
SHA1
d84040cd0c143b775ee4d0a0754840841980ac54
-
SHA256
4b5f70e86565c2a0931d25f185360df238d7d74b1e05dc5dc801382e1d5f09bd
-
SHA512
8014325746b1d7bb02a3222161854f096ac69944d61c449bd7a42edc91ea84937ec38ec8eeb8b6aa484200c0c5afb272cfa9b991c854e2a4b11c1abd3ae65f9d
-
SSDEEP
24576:XyrLhrRkD5I3D/d4tWy9Ij2RkXGx13kLRE2IhcRJn+GZyur7uW4AiHx3aA2hUKA:ixtkDWT/OtH4RmmNvdTZyur6TAKpB2hJ
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsAT69rP71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beHo99Ve82.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsAT69rP71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beHo99Ve82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beHo99Ve82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsAT69rP71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsAT69rP71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsAT69rP71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnIq81rO97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnIq81rO97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnIq81rO97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beHo99Ve82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnIq81rO97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beHo99Ve82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsAT69rP71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnIq81rO97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beHo99Ve82.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4464-183-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-184-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-186-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-188-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-190-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-192-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-194-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-196-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-198-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-200-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-202-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-204-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-206-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-208-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-210-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-213-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-216-0x0000000007340000-0x0000000007350000-memory.dmp family_redline behavioral1/memory/4464-217-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-219-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-221-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-223-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-225-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-227-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-229-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-231-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-233-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-235-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-237-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-239-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-241-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-243-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-245-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-247-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/4464-249-0x00000000072B0000-0x00000000072EE000-memory.dmp family_redline behavioral1/memory/2776-1554-0x0000000004900000-0x0000000004910000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation mnolyk.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation hk86MT67SM57.exe -
Executes dropped EXE 14 IoCs
pid Process 1992 ptQl9171GY.exe 4844 ptFz0293GL.exe 1152 ptar6631CY.exe 1984 ptps8528GS.exe 228 ptsS0177cz.exe 5080 beHo99Ve82.exe 4464 cubx18nq21.exe 3164 dsAT69rP71.exe 2776 fr84nl5425kz.exe 1264 gnIq81rO97.exe 4364 hk86MT67SM57.exe 3260 mnolyk.exe 1596 jxHi59Gg89.exe 2164 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 3608 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beHo99Ve82.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsAT69rP71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsAT69rP71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnIq81rO97.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptar6631CY.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptps8528GS.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptsS0177cz.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4b5f70e86565c2a0931d25f185360df238d7d74b1e05dc5dc801382e1d5f09bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptQl9171GY.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptFz0293GL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptFz0293GL.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptar6631CY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptsS0177cz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4b5f70e86565c2a0931d25f185360df238d7d74b1e05dc5dc801382e1d5f09bd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptQl9171GY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptps8528GS.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4808 4464 WerFault.exe 98 2384 3164 WerFault.exe 104 1556 2776 WerFault.exe 110 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4472 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5080 beHo99Ve82.exe 5080 beHo99Ve82.exe 4464 cubx18nq21.exe 4464 cubx18nq21.exe 3164 dsAT69rP71.exe 3164 dsAT69rP71.exe 2776 fr84nl5425kz.exe 2776 fr84nl5425kz.exe 1264 gnIq81rO97.exe 1264 gnIq81rO97.exe 1596 jxHi59Gg89.exe 1596 jxHi59Gg89.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 5080 beHo99Ve82.exe Token: SeDebugPrivilege 4464 cubx18nq21.exe Token: SeDebugPrivilege 3164 dsAT69rP71.exe Token: SeDebugPrivilege 2776 fr84nl5425kz.exe Token: SeDebugPrivilege 1264 gnIq81rO97.exe Token: SeDebugPrivilege 1596 jxHi59Gg89.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3228 wrote to memory of 1992 3228 4b5f70e86565c2a0931d25f185360df238d7d74b1e05dc5dc801382e1d5f09bd.exe 85 PID 3228 wrote to memory of 1992 3228 4b5f70e86565c2a0931d25f185360df238d7d74b1e05dc5dc801382e1d5f09bd.exe 85 PID 3228 wrote to memory of 1992 3228 4b5f70e86565c2a0931d25f185360df238d7d74b1e05dc5dc801382e1d5f09bd.exe 85 PID 1992 wrote to memory of 4844 1992 ptQl9171GY.exe 86 PID 1992 wrote to memory of 4844 1992 ptQl9171GY.exe 86 PID 1992 wrote to memory of 4844 1992 ptQl9171GY.exe 86 PID 4844 wrote to memory of 1152 4844 ptFz0293GL.exe 87 PID 4844 wrote to memory of 1152 4844 ptFz0293GL.exe 87 PID 4844 wrote to memory of 1152 4844 ptFz0293GL.exe 87 PID 1152 wrote to memory of 1984 1152 ptar6631CY.exe 88 PID 1152 wrote to memory of 1984 1152 ptar6631CY.exe 88 PID 1152 wrote to memory of 1984 1152 ptar6631CY.exe 88 PID 1984 wrote to memory of 228 1984 ptps8528GS.exe 89 PID 1984 wrote to memory of 228 1984 ptps8528GS.exe 89 PID 1984 wrote to memory of 228 1984 ptps8528GS.exe 89 PID 228 wrote to memory of 5080 228 ptsS0177cz.exe 90 PID 228 wrote to memory of 5080 228 ptsS0177cz.exe 90 PID 228 wrote to memory of 4464 228 ptsS0177cz.exe 98 PID 228 wrote to memory of 4464 228 ptsS0177cz.exe 98 PID 228 wrote to memory of 4464 228 ptsS0177cz.exe 98 PID 1984 wrote to memory of 3164 1984 ptps8528GS.exe 104 PID 1984 wrote to memory of 3164 1984 ptps8528GS.exe 104 PID 1984 wrote to memory of 3164 1984 ptps8528GS.exe 104 PID 1152 wrote to memory of 2776 1152 ptar6631CY.exe 110 PID 1152 wrote to memory of 2776 1152 ptar6631CY.exe 110 PID 1152 wrote to memory of 2776 1152 ptar6631CY.exe 110 PID 4844 wrote to memory of 1264 4844 ptFz0293GL.exe 113 PID 4844 wrote to memory of 1264 4844 ptFz0293GL.exe 113 PID 1992 wrote to memory of 4364 1992 ptQl9171GY.exe 114 PID 1992 wrote to memory of 4364 1992 ptQl9171GY.exe 114 PID 1992 wrote to memory of 4364 1992 ptQl9171GY.exe 114 PID 4364 wrote to memory of 3260 4364 hk86MT67SM57.exe 115 PID 4364 wrote to memory of 3260 4364 hk86MT67SM57.exe 115 PID 4364 wrote to memory of 3260 4364 hk86MT67SM57.exe 115 PID 3228 wrote to memory of 1596 3228 4b5f70e86565c2a0931d25f185360df238d7d74b1e05dc5dc801382e1d5f09bd.exe 116 PID 3228 wrote to memory of 1596 3228 4b5f70e86565c2a0931d25f185360df238d7d74b1e05dc5dc801382e1d5f09bd.exe 116 PID 3228 wrote to memory of 1596 3228 4b5f70e86565c2a0931d25f185360df238d7d74b1e05dc5dc801382e1d5f09bd.exe 116 PID 3260 wrote to memory of 4472 3260 mnolyk.exe 117 PID 3260 wrote to memory of 4472 3260 mnolyk.exe 117 PID 3260 wrote to memory of 4472 3260 mnolyk.exe 117 PID 3260 wrote to memory of 4144 3260 mnolyk.exe 119 PID 3260 wrote to memory of 4144 3260 mnolyk.exe 119 PID 3260 wrote to memory of 4144 3260 mnolyk.exe 119 PID 4144 wrote to memory of 3352 4144 cmd.exe 122 PID 4144 wrote to memory of 3352 4144 cmd.exe 122 PID 4144 wrote to memory of 3352 4144 cmd.exe 122 PID 4144 wrote to memory of 1384 4144 cmd.exe 121 PID 4144 wrote to memory of 1384 4144 cmd.exe 121 PID 4144 wrote to memory of 1384 4144 cmd.exe 121 PID 4144 wrote to memory of 1356 4144 cmd.exe 123 PID 4144 wrote to memory of 1356 4144 cmd.exe 123 PID 4144 wrote to memory of 1356 4144 cmd.exe 123 PID 4144 wrote to memory of 1160 4144 cmd.exe 124 PID 4144 wrote to memory of 1160 4144 cmd.exe 124 PID 4144 wrote to memory of 1160 4144 cmd.exe 124 PID 4144 wrote to memory of 1284 4144 cmd.exe 125 PID 4144 wrote to memory of 1284 4144 cmd.exe 125 PID 4144 wrote to memory of 1284 4144 cmd.exe 125 PID 4144 wrote to memory of 216 4144 cmd.exe 126 PID 4144 wrote to memory of 216 4144 cmd.exe 126 PID 4144 wrote to memory of 216 4144 cmd.exe 126 PID 3260 wrote to memory of 3608 3260 mnolyk.exe 129 PID 3260 wrote to memory of 3608 3260 mnolyk.exe 129 PID 3260 wrote to memory of 3608 3260 mnolyk.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b5f70e86565c2a0931d25f185360df238d7d74b1e05dc5dc801382e1d5f09bd.exe"C:\Users\Admin\AppData\Local\Temp\4b5f70e86565c2a0931d25f185360df238d7d74b1e05dc5dc801382e1d5f09bd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptQl9171GY.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptQl9171GY.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptFz0293GL.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptFz0293GL.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptar6631CY.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptar6631CY.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptps8528GS.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptps8528GS.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptsS0177cz.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptsS0177cz.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beHo99Ve82.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beHo99Ve82.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cubx18nq21.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cubx18nq21.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 14768⤵
- Program crash
PID:4808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsAT69rP71.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsAT69rP71.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3164 -s 10847⤵
- Program crash
PID:2384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr84nl5425kz.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr84nl5425kz.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 13086⤵
- Program crash
PID:1556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnIq81rO97.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnIq81rO97.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk86MT67SM57.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk86MT67SM57.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:4472
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:1384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:1356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1160
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:1284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:216
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3608
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxHi59Gg89.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxHi59Gg89.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4464 -ip 44641⤵PID:4968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3164 -ip 31641⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2776 -ip 27761⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:2164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5debdca86a45c81f03e2cfc403b13bfdf
SHA1aa91ebb4d4601eb8808dee9dbf61b36389019670
SHA256dcea7724248f894baff474d5903eb6805c32d587713f0a62594795290964465e
SHA512826b8e8355fed5a89bdd58e87edbdf47793c3b38062e72b8077cb38c7f50877e679a32fe5b18557f201b2ab1c7b8595dd4e2e76c9da4b4b5885d8d81984092b3
-
Filesize
240KB
MD5debdca86a45c81f03e2cfc403b13bfdf
SHA1aa91ebb4d4601eb8808dee9dbf61b36389019670
SHA256dcea7724248f894baff474d5903eb6805c32d587713f0a62594795290964465e
SHA512826b8e8355fed5a89bdd58e87edbdf47793c3b38062e72b8077cb38c7f50877e679a32fe5b18557f201b2ab1c7b8595dd4e2e76c9da4b4b5885d8d81984092b3
-
Filesize
240KB
MD5debdca86a45c81f03e2cfc403b13bfdf
SHA1aa91ebb4d4601eb8808dee9dbf61b36389019670
SHA256dcea7724248f894baff474d5903eb6805c32d587713f0a62594795290964465e
SHA512826b8e8355fed5a89bdd58e87edbdf47793c3b38062e72b8077cb38c7f50877e679a32fe5b18557f201b2ab1c7b8595dd4e2e76c9da4b4b5885d8d81984092b3
-
Filesize
240KB
MD5debdca86a45c81f03e2cfc403b13bfdf
SHA1aa91ebb4d4601eb8808dee9dbf61b36389019670
SHA256dcea7724248f894baff474d5903eb6805c32d587713f0a62594795290964465e
SHA512826b8e8355fed5a89bdd58e87edbdf47793c3b38062e72b8077cb38c7f50877e679a32fe5b18557f201b2ab1c7b8595dd4e2e76c9da4b4b5885d8d81984092b3
-
Filesize
176KB
MD574bf514d88176df1fe72915daf0fb98f
SHA11833f2992ded530711daefed196ec31a97b33bcc
SHA256c5b3ff059d41ae70118a437e0dc090702691794c2516986bc1e446f7421f25e5
SHA512386c9cc94b7535d36c73ebe1aacd71c2dd3b51337a0867890cf1db706abd364a5a7c81835c3b283bbf7c07e94c996d5ba88c4825a3bf324a3bc404c1ecae8565
-
Filesize
176KB
MD574bf514d88176df1fe72915daf0fb98f
SHA11833f2992ded530711daefed196ec31a97b33bcc
SHA256c5b3ff059d41ae70118a437e0dc090702691794c2516986bc1e446f7421f25e5
SHA512386c9cc94b7535d36c73ebe1aacd71c2dd3b51337a0867890cf1db706abd364a5a7c81835c3b283bbf7c07e94c996d5ba88c4825a3bf324a3bc404c1ecae8565
-
Filesize
1.2MB
MD563540d50aed336214dac3b29485fbc17
SHA1a11b6c29546ba1e2e4563e19f07225297c27a510
SHA25675ec6524b6ff87f9aa383ec07b0731c1c0ab40782aa38bac780fb63be9ab4031
SHA512e4b52a6bb45db205d292f52097e76097fd28aa8cb7a87716ed4994f1a820d2a6630c742ad324e21a718502b61768f52deb1e045f1893646e4c188573c8545008
-
Filesize
1.2MB
MD563540d50aed336214dac3b29485fbc17
SHA1a11b6c29546ba1e2e4563e19f07225297c27a510
SHA25675ec6524b6ff87f9aa383ec07b0731c1c0ab40782aa38bac780fb63be9ab4031
SHA512e4b52a6bb45db205d292f52097e76097fd28aa8cb7a87716ed4994f1a820d2a6630c742ad324e21a718502b61768f52deb1e045f1893646e4c188573c8545008
-
Filesize
240KB
MD5debdca86a45c81f03e2cfc403b13bfdf
SHA1aa91ebb4d4601eb8808dee9dbf61b36389019670
SHA256dcea7724248f894baff474d5903eb6805c32d587713f0a62594795290964465e
SHA512826b8e8355fed5a89bdd58e87edbdf47793c3b38062e72b8077cb38c7f50877e679a32fe5b18557f201b2ab1c7b8595dd4e2e76c9da4b4b5885d8d81984092b3
-
Filesize
240KB
MD5debdca86a45c81f03e2cfc403b13bfdf
SHA1aa91ebb4d4601eb8808dee9dbf61b36389019670
SHA256dcea7724248f894baff474d5903eb6805c32d587713f0a62594795290964465e
SHA512826b8e8355fed5a89bdd58e87edbdf47793c3b38062e72b8077cb38c7f50877e679a32fe5b18557f201b2ab1c7b8595dd4e2e76c9da4b4b5885d8d81984092b3
-
Filesize
1.0MB
MD58affa36c21e9566d5f6bcde58d040728
SHA1618358044b17702b880584122806e2249998cd90
SHA256ab5e1e1edb83df4ad486a82428ffa6617e931b884e28b273ff5272b57631735f
SHA5122139d47526c5a130f03797860d18a91d5645c23e11464206f2e3cca7fd4bba4e579494943c36a1242ae014cccc8f57c231ba45558b577719168637ca5b14a296
-
Filesize
1.0MB
MD58affa36c21e9566d5f6bcde58d040728
SHA1618358044b17702b880584122806e2249998cd90
SHA256ab5e1e1edb83df4ad486a82428ffa6617e931b884e28b273ff5272b57631735f
SHA5122139d47526c5a130f03797860d18a91d5645c23e11464206f2e3cca7fd4bba4e579494943c36a1242ae014cccc8f57c231ba45558b577719168637ca5b14a296
-
Filesize
15KB
MD574023176099b8153bdd104c0d745b169
SHA17e99818fbb0f0f51967d777b079049c2bf578d1b
SHA256074489e42e0c3ef8fdc8a81810d053b3c34784e333bb0093e30c9205f28afeb3
SHA512878a4051173f0e7455ff946319ef3d60db0c5126c8d36e328cb04ecb70a4ff3273ab8f86953146740ae825b165ce60fa5da4de4562b2d425164ba4276d8f8882
-
Filesize
15KB
MD574023176099b8153bdd104c0d745b169
SHA17e99818fbb0f0f51967d777b079049c2bf578d1b
SHA256074489e42e0c3ef8fdc8a81810d053b3c34784e333bb0093e30c9205f28afeb3
SHA512878a4051173f0e7455ff946319ef3d60db0c5126c8d36e328cb04ecb70a4ff3273ab8f86953146740ae825b165ce60fa5da4de4562b2d425164ba4276d8f8882
-
Filesize
968KB
MD5edc97b10c45d2dc72cab068a10cdf472
SHA16bbaeabc61561fab0d980593f27465b38f26c5c9
SHA256564967ce091d4b795d78aa211955871326384b8b00d4a03a5bb6b38e4d4a2bbe
SHA51277150b4a8d0aa0d86a9d13532fe5596404253196d1360dda3c2f7a1ff035633636c37624fd5f3c422c239c32629377467aefc3c90ed89e69d935eb525163cf77
-
Filesize
968KB
MD5edc97b10c45d2dc72cab068a10cdf472
SHA16bbaeabc61561fab0d980593f27465b38f26c5c9
SHA256564967ce091d4b795d78aa211955871326384b8b00d4a03a5bb6b38e4d4a2bbe
SHA51277150b4a8d0aa0d86a9d13532fe5596404253196d1360dda3c2f7a1ff035633636c37624fd5f3c422c239c32629377467aefc3c90ed89e69d935eb525163cf77
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
688KB
MD587385ab406cfb325bb7ae9d386ace983
SHA147b05ab2d71a860dd0873205690269c1b01eeef2
SHA25695e9ab83cf7a33a349b300e009e413528d047d5913abf8bf8b0443578fff473a
SHA512f06beca9c9da5ee1a15ae256d38d3e820185b81576443e6911d9e57074def5b76d1f80bdb32d69941dc0d0b94310193a97f703cea3e763caa62e07392eacdba4
-
Filesize
688KB
MD587385ab406cfb325bb7ae9d386ace983
SHA147b05ab2d71a860dd0873205690269c1b01eeef2
SHA25695e9ab83cf7a33a349b300e009e413528d047d5913abf8bf8b0443578fff473a
SHA512f06beca9c9da5ee1a15ae256d38d3e820185b81576443e6911d9e57074def5b76d1f80bdb32d69941dc0d0b94310193a97f703cea3e763caa62e07392eacdba4
-
Filesize
317KB
MD5c02fce88544bd53747eb1b6d61fa4b34
SHA1184314293d00304318797c00ed87955837437844
SHA256509960a8b79d67079aa3e9bab311fd539e9949cd75d5865f6a68770926951034
SHA5127a8d849b180527be277af24a03913b2a004d8d7aa6d227a62594ddbd64b62679c16faadce781090e28dc49da3af7894c54d1c0473d99e1c3d94ed7c7fac9916f
-
Filesize
317KB
MD5c02fce88544bd53747eb1b6d61fa4b34
SHA1184314293d00304318797c00ed87955837437844
SHA256509960a8b79d67079aa3e9bab311fd539e9949cd75d5865f6a68770926951034
SHA5127a8d849b180527be277af24a03913b2a004d8d7aa6d227a62594ddbd64b62679c16faadce781090e28dc49da3af7894c54d1c0473d99e1c3d94ed7c7fac9916f
-
Filesize
402KB
MD5f1a95153e9ccaf229519b8e3dac879ed
SHA197f6013bbee5f26909c547a2048709e533ad50b4
SHA256ba303b027646c54ad8829fa7d3d6c8ce003e5ec276936042c74fbdaf9baab294
SHA5125bdb2a682dbf0902a77167a655747fad3ae5edbadcd3620f52ea76f648b570ee640b87dfd04f11aaf22271fed0db2af51f5af7af0558112d5be2a9c82655d9f4
-
Filesize
402KB
MD5f1a95153e9ccaf229519b8e3dac879ed
SHA197f6013bbee5f26909c547a2048709e533ad50b4
SHA256ba303b027646c54ad8829fa7d3d6c8ce003e5ec276936042c74fbdaf9baab294
SHA5125bdb2a682dbf0902a77167a655747fad3ae5edbadcd3620f52ea76f648b570ee640b87dfd04f11aaf22271fed0db2af51f5af7af0558112d5be2a9c82655d9f4
-
Filesize
15KB
MD5cde99b9628e3cf2dc8df04704bc1d83a
SHA13e8291ff2fa81c17744e31b17f3da3768f5042aa
SHA2568f0c0bedb2777ca6de2eb222106177eaa902e2fecc9cc8df38318573cf27e301
SHA512673eaf029bfdb7096966d112a17c953217debe743908ab45ff9cde3cc205d1bb0968675b717fd0c18fa3fe74d3549ae211bb46f5d7fcc54cf768547ad5f2ba0c
-
Filesize
15KB
MD5cde99b9628e3cf2dc8df04704bc1d83a
SHA13e8291ff2fa81c17744e31b17f3da3768f5042aa
SHA2568f0c0bedb2777ca6de2eb222106177eaa902e2fecc9cc8df38318573cf27e301
SHA512673eaf029bfdb7096966d112a17c953217debe743908ab45ff9cde3cc205d1bb0968675b717fd0c18fa3fe74d3549ae211bb46f5d7fcc54cf768547ad5f2ba0c
-
Filesize
15KB
MD5cde99b9628e3cf2dc8df04704bc1d83a
SHA13e8291ff2fa81c17744e31b17f3da3768f5042aa
SHA2568f0c0bedb2777ca6de2eb222106177eaa902e2fecc9cc8df38318573cf27e301
SHA512673eaf029bfdb7096966d112a17c953217debe743908ab45ff9cde3cc205d1bb0968675b717fd0c18fa3fe74d3549ae211bb46f5d7fcc54cf768547ad5f2ba0c
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5