Analysis
-
max time kernel
124s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/03/2023, 00:21
Static task
static1
General
-
Target
6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002.exe
-
Size
1.4MB
-
MD5
7a2e71a96335b24792985c095814e06d
-
SHA1
0707752e093590bbd192649146a892e008179f0a
-
SHA256
6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002
-
SHA512
297b236c952ea757778f2fcecd32d7068717a198f2fc67ac01676b22a6e84ce0b77b594c2df57c9247f50306a6b3bfad7d211b41b92f8fea19885155c7a14eb2
-
SSDEEP
24576:Xyo8pt7JVCtkdW7GaTWk1Ej9HY2bVumErU2k46HSzPI3T3B:io8pVup71T3wHXb9y5JzPw
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsum62Rf50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnOC61QJ20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnOC61QJ20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beBY50UZ76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsum62Rf50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnOC61QJ20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsum62Rf50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnOC61QJ20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beBY50UZ76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnOC61QJ20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beBY50UZ76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsum62Rf50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsum62Rf50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beBY50UZ76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beBY50UZ76.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/2912-171-0x00000000070E0000-0x0000000007126000-memory.dmp family_redline behavioral1/memory/2912-173-0x0000000007160000-0x00000000071A4000-memory.dmp family_redline behavioral1/memory/2912-176-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-177-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-179-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-181-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-183-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-185-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-187-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-189-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-191-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-193-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-195-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-197-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-199-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-201-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-203-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-205-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-207-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-209-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-211-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-213-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-215-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-217-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-219-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-221-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-223-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-225-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-227-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-229-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-231-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-233-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-235-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-237-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/2912-239-0x0000000007160000-0x000000000719E000-memory.dmp family_redline behavioral1/memory/3236-1337-0x0000000007390000-0x00000000073A0000-memory.dmp family_redline -
Executes dropped EXE 14 IoCs
pid Process 3012 ptEW2586ua.exe 4068 ptof3456fb.exe 3444 ptlW7196JR.exe 4176 ptkL9732Lo.exe 1536 ptUH5771yf.exe 4008 beBY50UZ76.exe 2912 cuMK07tS84.exe 3804 dsum62Rf50.exe 3236 fr63sc4446ZP.exe 4376 gnOC61QJ20.exe 4400 hk64JX34SU37.exe 4980 mnolyk.exe 5004 jxqm62sL15.exe 868 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 316 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnOC61QJ20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beBY50UZ76.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsum62Rf50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsum62Rf50.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptUH5771yf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptlW7196JR.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptkL9732Lo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptkL9732Lo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptUH5771yf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptlW7196JR.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptEW2586ua.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptEW2586ua.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptof3456fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptof3456fb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4008 beBY50UZ76.exe 4008 beBY50UZ76.exe 2912 cuMK07tS84.exe 2912 cuMK07tS84.exe 3804 dsum62Rf50.exe 3804 dsum62Rf50.exe 3236 fr63sc4446ZP.exe 3236 fr63sc4446ZP.exe 4376 gnOC61QJ20.exe 4376 gnOC61QJ20.exe 5004 jxqm62sL15.exe 5004 jxqm62sL15.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4008 beBY50UZ76.exe Token: SeDebugPrivilege 2912 cuMK07tS84.exe Token: SeDebugPrivilege 3804 dsum62Rf50.exe Token: SeDebugPrivilege 3236 fr63sc4446ZP.exe Token: SeDebugPrivilege 4376 gnOC61QJ20.exe Token: SeDebugPrivilege 5004 jxqm62sL15.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3012 2572 6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002.exe 66 PID 2572 wrote to memory of 3012 2572 6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002.exe 66 PID 2572 wrote to memory of 3012 2572 6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002.exe 66 PID 3012 wrote to memory of 4068 3012 ptEW2586ua.exe 67 PID 3012 wrote to memory of 4068 3012 ptEW2586ua.exe 67 PID 3012 wrote to memory of 4068 3012 ptEW2586ua.exe 67 PID 4068 wrote to memory of 3444 4068 ptof3456fb.exe 68 PID 4068 wrote to memory of 3444 4068 ptof3456fb.exe 68 PID 4068 wrote to memory of 3444 4068 ptof3456fb.exe 68 PID 3444 wrote to memory of 4176 3444 ptlW7196JR.exe 69 PID 3444 wrote to memory of 4176 3444 ptlW7196JR.exe 69 PID 3444 wrote to memory of 4176 3444 ptlW7196JR.exe 69 PID 4176 wrote to memory of 1536 4176 ptkL9732Lo.exe 70 PID 4176 wrote to memory of 1536 4176 ptkL9732Lo.exe 70 PID 4176 wrote to memory of 1536 4176 ptkL9732Lo.exe 70 PID 1536 wrote to memory of 4008 1536 ptUH5771yf.exe 71 PID 1536 wrote to memory of 4008 1536 ptUH5771yf.exe 71 PID 1536 wrote to memory of 2912 1536 ptUH5771yf.exe 72 PID 1536 wrote to memory of 2912 1536 ptUH5771yf.exe 72 PID 1536 wrote to memory of 2912 1536 ptUH5771yf.exe 72 PID 4176 wrote to memory of 3804 4176 ptkL9732Lo.exe 74 PID 4176 wrote to memory of 3804 4176 ptkL9732Lo.exe 74 PID 4176 wrote to memory of 3804 4176 ptkL9732Lo.exe 74 PID 3444 wrote to memory of 3236 3444 ptlW7196JR.exe 75 PID 3444 wrote to memory of 3236 3444 ptlW7196JR.exe 75 PID 3444 wrote to memory of 3236 3444 ptlW7196JR.exe 75 PID 4068 wrote to memory of 4376 4068 ptof3456fb.exe 76 PID 4068 wrote to memory of 4376 4068 ptof3456fb.exe 76 PID 3012 wrote to memory of 4400 3012 ptEW2586ua.exe 77 PID 3012 wrote to memory of 4400 3012 ptEW2586ua.exe 77 PID 3012 wrote to memory of 4400 3012 ptEW2586ua.exe 77 PID 4400 wrote to memory of 4980 4400 hk64JX34SU37.exe 78 PID 4400 wrote to memory of 4980 4400 hk64JX34SU37.exe 78 PID 4400 wrote to memory of 4980 4400 hk64JX34SU37.exe 78 PID 2572 wrote to memory of 5004 2572 6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002.exe 79 PID 2572 wrote to memory of 5004 2572 6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002.exe 79 PID 2572 wrote to memory of 5004 2572 6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002.exe 79 PID 4980 wrote to memory of 5092 4980 mnolyk.exe 80 PID 4980 wrote to memory of 5092 4980 mnolyk.exe 80 PID 4980 wrote to memory of 5092 4980 mnolyk.exe 80 PID 4980 wrote to memory of 2784 4980 mnolyk.exe 82 PID 4980 wrote to memory of 2784 4980 mnolyk.exe 82 PID 4980 wrote to memory of 2784 4980 mnolyk.exe 82 PID 2784 wrote to memory of 3380 2784 cmd.exe 84 PID 2784 wrote to memory of 3380 2784 cmd.exe 84 PID 2784 wrote to memory of 3380 2784 cmd.exe 84 PID 2784 wrote to memory of 5056 2784 cmd.exe 85 PID 2784 wrote to memory of 5056 2784 cmd.exe 85 PID 2784 wrote to memory of 5056 2784 cmd.exe 85 PID 2784 wrote to memory of 828 2784 cmd.exe 86 PID 2784 wrote to memory of 828 2784 cmd.exe 86 PID 2784 wrote to memory of 828 2784 cmd.exe 86 PID 2784 wrote to memory of 4308 2784 cmd.exe 87 PID 2784 wrote to memory of 4308 2784 cmd.exe 87 PID 2784 wrote to memory of 4308 2784 cmd.exe 87 PID 2784 wrote to memory of 4544 2784 cmd.exe 88 PID 2784 wrote to memory of 4544 2784 cmd.exe 88 PID 2784 wrote to memory of 4544 2784 cmd.exe 88 PID 2784 wrote to memory of 4272 2784 cmd.exe 89 PID 2784 wrote to memory of 4272 2784 cmd.exe 89 PID 2784 wrote to memory of 4272 2784 cmd.exe 89 PID 4980 wrote to memory of 316 4980 mnolyk.exe 91 PID 4980 wrote to memory of 316 4980 mnolyk.exe 91 PID 4980 wrote to memory of 316 4980 mnolyk.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002.exe"C:\Users\Admin\AppData\Local\Temp\6a15ff2867cb0ec43d7f082a8b2d0c91f932403df84eee8dd56ac0f538848002.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptEW2586ua.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptEW2586ua.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptof3456fb.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptof3456fb.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptlW7196JR.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptlW7196JR.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptkL9732Lo.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptkL9732Lo.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptUH5771yf.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptUH5771yf.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beBY50UZ76.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beBY50UZ76.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuMK07tS84.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuMK07tS84.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsum62Rf50.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsum62Rf50.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr63sc4446ZP.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr63sc4446ZP.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnOC61QJ20.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnOC61QJ20.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk64JX34SU37.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk64JX34SU37.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:5092
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3380
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:5056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:828
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4308
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:4544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:4272
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:316
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxqm62sL15.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxqm62sL15.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD59634810e333c6001fc9f2b3d409326ed
SHA1db72d8e5d2135666aa7ee9019b9744d15ffcf643
SHA256940f3cfad11cf9cb08500a975a0d585a9814d52774e2d94c5fe763e57e2faf3d
SHA512700b1b933d35c87c6f2bf8943a7c33852a76e550c41f4b7010f2c27e75f2a49efa704d63904749ca3ca5924285240bd968bb2ece84d265647f392b1682e29d9e
-
Filesize
240KB
MD59634810e333c6001fc9f2b3d409326ed
SHA1db72d8e5d2135666aa7ee9019b9744d15ffcf643
SHA256940f3cfad11cf9cb08500a975a0d585a9814d52774e2d94c5fe763e57e2faf3d
SHA512700b1b933d35c87c6f2bf8943a7c33852a76e550c41f4b7010f2c27e75f2a49efa704d63904749ca3ca5924285240bd968bb2ece84d265647f392b1682e29d9e
-
Filesize
240KB
MD59634810e333c6001fc9f2b3d409326ed
SHA1db72d8e5d2135666aa7ee9019b9744d15ffcf643
SHA256940f3cfad11cf9cb08500a975a0d585a9814d52774e2d94c5fe763e57e2faf3d
SHA512700b1b933d35c87c6f2bf8943a7c33852a76e550c41f4b7010f2c27e75f2a49efa704d63904749ca3ca5924285240bd968bb2ece84d265647f392b1682e29d9e
-
Filesize
240KB
MD59634810e333c6001fc9f2b3d409326ed
SHA1db72d8e5d2135666aa7ee9019b9744d15ffcf643
SHA256940f3cfad11cf9cb08500a975a0d585a9814d52774e2d94c5fe763e57e2faf3d
SHA512700b1b933d35c87c6f2bf8943a7c33852a76e550c41f4b7010f2c27e75f2a49efa704d63904749ca3ca5924285240bd968bb2ece84d265647f392b1682e29d9e
-
Filesize
176KB
MD525190035d83f5f1cbb78d2f8c4739941
SHA1c204ebd69996ad0941c2a4437e9cb20e582890f9
SHA2564ea03e4313f32df8bbc0bd9882db31091c8a681274d009d293c258d74c0a9131
SHA512394979797ad5b7ca08d2256ceeee2d26eee5e399be083adbfa494445809f723105ad45af18c1f5317c40a114799b2a887a0a7916e010e8362d7e3716b3a0ca70
-
Filesize
176KB
MD525190035d83f5f1cbb78d2f8c4739941
SHA1c204ebd69996ad0941c2a4437e9cb20e582890f9
SHA2564ea03e4313f32df8bbc0bd9882db31091c8a681274d009d293c258d74c0a9131
SHA512394979797ad5b7ca08d2256ceeee2d26eee5e399be083adbfa494445809f723105ad45af18c1f5317c40a114799b2a887a0a7916e010e8362d7e3716b3a0ca70
-
Filesize
1.2MB
MD59c2945cdcf3893de566e669146e351ff
SHA196af2cd9748756ce8db069471cb92052992383e5
SHA25622f87214b4761825a20f2ff7912dbddc254f8556f0d27f5c9d427aef284fdd85
SHA512763fd53b85984d9afcce8b651e6fa5cc49df650699f1829f519800bb20c43620bdb4221b476385079cd2923ed01335099f5ba54ae3cce1a741dc4fa213a5eddb
-
Filesize
1.2MB
MD59c2945cdcf3893de566e669146e351ff
SHA196af2cd9748756ce8db069471cb92052992383e5
SHA25622f87214b4761825a20f2ff7912dbddc254f8556f0d27f5c9d427aef284fdd85
SHA512763fd53b85984d9afcce8b651e6fa5cc49df650699f1829f519800bb20c43620bdb4221b476385079cd2923ed01335099f5ba54ae3cce1a741dc4fa213a5eddb
-
Filesize
240KB
MD59634810e333c6001fc9f2b3d409326ed
SHA1db72d8e5d2135666aa7ee9019b9744d15ffcf643
SHA256940f3cfad11cf9cb08500a975a0d585a9814d52774e2d94c5fe763e57e2faf3d
SHA512700b1b933d35c87c6f2bf8943a7c33852a76e550c41f4b7010f2c27e75f2a49efa704d63904749ca3ca5924285240bd968bb2ece84d265647f392b1682e29d9e
-
Filesize
240KB
MD59634810e333c6001fc9f2b3d409326ed
SHA1db72d8e5d2135666aa7ee9019b9744d15ffcf643
SHA256940f3cfad11cf9cb08500a975a0d585a9814d52774e2d94c5fe763e57e2faf3d
SHA512700b1b933d35c87c6f2bf8943a7c33852a76e550c41f4b7010f2c27e75f2a49efa704d63904749ca3ca5924285240bd968bb2ece84d265647f392b1682e29d9e
-
Filesize
1.0MB
MD5b458ea11c8eb6b409bd732b82669e1ff
SHA1e8d3bff8c10cbcd0f3bab0387b4bd254636f9598
SHA256850721b341131d486610f2a2b9cf2029b7a4f0cca860ffdef0d8a0ec4dc1cca3
SHA512622f036e71d9d3b5af766b37cb1ee0d31f26bae631d07dd6d01521bd3052d70a8b384a40047fa689a59a5178925fd2fee690e4e2fec1f49611fff06504b1a87c
-
Filesize
1.0MB
MD5b458ea11c8eb6b409bd732b82669e1ff
SHA1e8d3bff8c10cbcd0f3bab0387b4bd254636f9598
SHA256850721b341131d486610f2a2b9cf2029b7a4f0cca860ffdef0d8a0ec4dc1cca3
SHA512622f036e71d9d3b5af766b37cb1ee0d31f26bae631d07dd6d01521bd3052d70a8b384a40047fa689a59a5178925fd2fee690e4e2fec1f49611fff06504b1a87c
-
Filesize
15KB
MD580a5287d69f1f716baf9bcc059e8ad2b
SHA1bbe6305ca45e33d94d0025e8f299c779df2f5c6b
SHA2561c65e4cc1e56d893dfc920a605736eefcc42f1a5edc143d1e8e94fe43bdb42f9
SHA512f39a669eb751c4bb58fc4ef7a63135bef8cb238840e114fc60a9b41ce92ef0f0390a0a4aac30194f2dc94a7ed692c2aaab3657c6ad1d92bccb03d4ab2baf716a
-
Filesize
15KB
MD580a5287d69f1f716baf9bcc059e8ad2b
SHA1bbe6305ca45e33d94d0025e8f299c779df2f5c6b
SHA2561c65e4cc1e56d893dfc920a605736eefcc42f1a5edc143d1e8e94fe43bdb42f9
SHA512f39a669eb751c4bb58fc4ef7a63135bef8cb238840e114fc60a9b41ce92ef0f0390a0a4aac30194f2dc94a7ed692c2aaab3657c6ad1d92bccb03d4ab2baf716a
-
Filesize
969KB
MD537ed8a5a8df5055887225489cb01f8e6
SHA125abbe851c6f6a4ee6250b96696109c8c7a379c4
SHA256b5fea39dc2d1ed34856c264612fd3b82e447db0f90e9825b3d95f5d5b08e04c8
SHA51232f30c9d6ac440ba22082c12eb9b62266b2a64e7b9526e39daa27d0f2f6d2972b42bd09077707d24ce47ec665626c816b498de288f32cf97b7ddc4197528794b
-
Filesize
969KB
MD537ed8a5a8df5055887225489cb01f8e6
SHA125abbe851c6f6a4ee6250b96696109c8c7a379c4
SHA256b5fea39dc2d1ed34856c264612fd3b82e447db0f90e9825b3d95f5d5b08e04c8
SHA51232f30c9d6ac440ba22082c12eb9b62266b2a64e7b9526e39daa27d0f2f6d2972b42bd09077707d24ce47ec665626c816b498de288f32cf97b7ddc4197528794b
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
689KB
MD5ea5e831902b6e2ebdd1ed6f2ea5f2eaa
SHA159ab0b7ff4f428a42f10263b7416e6bb0c2d4a22
SHA256bc980f592cbfcc98631bb76781dd552847d3e6adeae80defd330f8a87d5f21c4
SHA51297f6b26c55c31db181ae010b50beb431b7b66427f8c0537d8a85bfa2b06a83cd686c8de29b31a227df808644bed2da79fa56fd638a21ed614bf48b1dad1b0e28
-
Filesize
689KB
MD5ea5e831902b6e2ebdd1ed6f2ea5f2eaa
SHA159ab0b7ff4f428a42f10263b7416e6bb0c2d4a22
SHA256bc980f592cbfcc98631bb76781dd552847d3e6adeae80defd330f8a87d5f21c4
SHA51297f6b26c55c31db181ae010b50beb431b7b66427f8c0537d8a85bfa2b06a83cd686c8de29b31a227df808644bed2da79fa56fd638a21ed614bf48b1dad1b0e28
-
Filesize
317KB
MD5c02fce88544bd53747eb1b6d61fa4b34
SHA1184314293d00304318797c00ed87955837437844
SHA256509960a8b79d67079aa3e9bab311fd539e9949cd75d5865f6a68770926951034
SHA5127a8d849b180527be277af24a03913b2a004d8d7aa6d227a62594ddbd64b62679c16faadce781090e28dc49da3af7894c54d1c0473d99e1c3d94ed7c7fac9916f
-
Filesize
317KB
MD5c02fce88544bd53747eb1b6d61fa4b34
SHA1184314293d00304318797c00ed87955837437844
SHA256509960a8b79d67079aa3e9bab311fd539e9949cd75d5865f6a68770926951034
SHA5127a8d849b180527be277af24a03913b2a004d8d7aa6d227a62594ddbd64b62679c16faadce781090e28dc49da3af7894c54d1c0473d99e1c3d94ed7c7fac9916f
-
Filesize
404KB
MD55772cb2c386f8f3a3b9c9d0c7fd507e1
SHA17cfe172f90cab066dfb802146176095b82e3d013
SHA25600dbaf0b4e6a88fd03c4525c2f28dd1957d95c7d91fdde95eec8a046bdb78e5e
SHA51200f231b6861458ccc09c4abdc3e2b852f09a99d9799f61b62d97cca353b238443a7f13c43735b247bdf9edea015d38de4c352437edd9631a697f7653e9fef4b2
-
Filesize
404KB
MD55772cb2c386f8f3a3b9c9d0c7fd507e1
SHA17cfe172f90cab066dfb802146176095b82e3d013
SHA25600dbaf0b4e6a88fd03c4525c2f28dd1957d95c7d91fdde95eec8a046bdb78e5e
SHA51200f231b6861458ccc09c4abdc3e2b852f09a99d9799f61b62d97cca353b238443a7f13c43735b247bdf9edea015d38de4c352437edd9631a697f7653e9fef4b2
-
Filesize
15KB
MD5a848a04578f1da01120b20171e259741
SHA1b1ebf78adbbf0a09d508db55dfdf10d8ac18ec92
SHA256223a47470d797fe10be9d8cc24adbe2a82218af4ff747078b5eda0502add6568
SHA5127c395958da7277a5e6cf318af28e83a81c786abaab3a138de05c5e7298c067c95ded9449f9f07ab2db4c7008798488933abd2e96217ec6e39c32156cd67cce2b
-
Filesize
15KB
MD5a848a04578f1da01120b20171e259741
SHA1b1ebf78adbbf0a09d508db55dfdf10d8ac18ec92
SHA256223a47470d797fe10be9d8cc24adbe2a82218af4ff747078b5eda0502add6568
SHA5127c395958da7277a5e6cf318af28e83a81c786abaab3a138de05c5e7298c067c95ded9449f9f07ab2db4c7008798488933abd2e96217ec6e39c32156cd67cce2b
-
Filesize
15KB
MD5a848a04578f1da01120b20171e259741
SHA1b1ebf78adbbf0a09d508db55dfdf10d8ac18ec92
SHA256223a47470d797fe10be9d8cc24adbe2a82218af4ff747078b5eda0502add6568
SHA5127c395958da7277a5e6cf318af28e83a81c786abaab3a138de05c5e7298c067c95ded9449f9f07ab2db4c7008798488933abd2e96217ec6e39c32156cd67cce2b
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
376KB
MD551d83e219f7908c47e000ced515c41c5
SHA149860bcc7802e33498d0010de530f67573577ce1
SHA256556b654b17afba716bb4859376467fc708829ff6c5b5a9c9e18e40a133b6b37d
SHA512a9e0b625653af5ee0e90b91344ca01928888279b9936647c0f655ff3dd67fb2fa36067ad7e78ad8d2ecb78ec25926d31c541a97db72dc72b366188c163ee71f4
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78