Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/03/2023, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe
Resource
win10v2004-20230220-en
General
-
Target
234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe
-
Size
1.1MB
-
MD5
0b40969e72a4dfd32110a8627fe8ef9e
-
SHA1
c39532bc3fbe15738f39a59af3a4a35825019dd0
-
SHA256
234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db
-
SHA512
bc5f93fb5b48347448ec393269233b1f08ab33d71f28cd859d9a1e32311364cf3ea8816cf35be8a48859919178dca29f0a1fedc10906a30c72c9ce4855fba4a9
-
SSDEEP
24576:eyKibSWKaFdUoVlynQ2y4hRqoXg9jzVnH+FSp4G:tvbSonUoXz2JGoXg9jqSp4
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rf97CI92lz04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iLV05fU07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mrv00cF00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mrv00cF00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rf97CI92lz04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iLV05fU07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mrv00cF00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rf97CI92lz04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rf97CI92lz04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rf97CI92lz04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iLV05fU07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mrv00cF00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iLV05fU07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mrv00cF00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iLV05fU07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iLV05fU07.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 40 IoCs
resource yara_rule behavioral1/memory/980-113-0x0000000004B40000-0x0000000004B86000-memory.dmp family_redline behavioral1/memory/980-114-0x0000000004B80000-0x0000000004BC4000-memory.dmp family_redline behavioral1/memory/980-115-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-116-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-118-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-120-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-124-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-122-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-130-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-128-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-126-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-134-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-132-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-136-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-140-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-142-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-138-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-146-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-152-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-150-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-148-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-156-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-154-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-158-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-160-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-162-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-164-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-168-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-166-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-174-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-172-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-170-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-178-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-176-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-180-0x0000000004B80000-0x0000000004BBE000-memory.dmp family_redline behavioral1/memory/980-1023-0x0000000004B00000-0x0000000004B40000-memory.dmp family_redline behavioral1/memory/1008-1081-0x00000000022E0000-0x0000000002326000-memory.dmp family_redline behavioral1/memory/1008-1523-0x0000000002320000-0x0000000002360000-memory.dmp family_redline behavioral1/memory/1008-1990-0x0000000002320000-0x0000000002360000-memory.dmp family_redline behavioral1/memory/1008-1993-0x0000000002320000-0x0000000002360000-memory.dmp family_redline -
Executes dropped EXE 10 IoCs
pid Process 2016 vmTM87rS10.exe 668 vmhg05pT33.exe 572 vmuC91ng39.exe 1708 vmfO74PK26.exe 1112 iLV05fU07.exe 980 kED40Px55.exe 1796 mrv00cF00.exe 1008 nxN41Zj47.exe 1248 rf97CI92lz04.exe 884 sv03LA60Gx04.exe -
Loads dropped DLL 21 IoCs
pid Process 1108 234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe 2016 vmTM87rS10.exe 2016 vmTM87rS10.exe 668 vmhg05pT33.exe 668 vmhg05pT33.exe 572 vmuC91ng39.exe 572 vmuC91ng39.exe 1708 vmfO74PK26.exe 1708 vmfO74PK26.exe 1708 vmfO74PK26.exe 1708 vmfO74PK26.exe 980 kED40Px55.exe 572 vmuC91ng39.exe 572 vmuC91ng39.exe 1796 mrv00cF00.exe 668 vmhg05pT33.exe 668 vmhg05pT33.exe 1008 nxN41Zj47.exe 2016 vmTM87rS10.exe 1108 234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe 884 sv03LA60Gx04.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features iLV05fU07.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iLV05fU07.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features mrv00cF00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mrv00cF00.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rf97CI92lz04.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vmfO74PK26.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmTM87rS10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmTM87rS10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vmhg05pT33.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmfO74PK26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmhg05pT33.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmuC91ng39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" vmuC91ng39.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1112 iLV05fU07.exe 1112 iLV05fU07.exe 980 kED40Px55.exe 980 kED40Px55.exe 1796 mrv00cF00.exe 1796 mrv00cF00.exe 1008 nxN41Zj47.exe 1008 nxN41Zj47.exe 1248 rf97CI92lz04.exe 1248 rf97CI92lz04.exe 884 sv03LA60Gx04.exe 884 sv03LA60Gx04.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1112 iLV05fU07.exe Token: SeDebugPrivilege 980 kED40Px55.exe Token: SeDebugPrivilege 1796 mrv00cF00.exe Token: SeDebugPrivilege 1008 nxN41Zj47.exe Token: SeDebugPrivilege 1248 rf97CI92lz04.exe Token: SeDebugPrivilege 884 sv03LA60Gx04.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1108 wrote to memory of 2016 1108 234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe 27 PID 1108 wrote to memory of 2016 1108 234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe 27 PID 1108 wrote to memory of 2016 1108 234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe 27 PID 1108 wrote to memory of 2016 1108 234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe 27 PID 1108 wrote to memory of 2016 1108 234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe 27 PID 1108 wrote to memory of 2016 1108 234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe 27 PID 1108 wrote to memory of 2016 1108 234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe 27 PID 2016 wrote to memory of 668 2016 vmTM87rS10.exe 28 PID 2016 wrote to memory of 668 2016 vmTM87rS10.exe 28 PID 2016 wrote to memory of 668 2016 vmTM87rS10.exe 28 PID 2016 wrote to memory of 668 2016 vmTM87rS10.exe 28 PID 2016 wrote to memory of 668 2016 vmTM87rS10.exe 28 PID 2016 wrote to memory of 668 2016 vmTM87rS10.exe 28 PID 2016 wrote to memory of 668 2016 vmTM87rS10.exe 28 PID 668 wrote to memory of 572 668 vmhg05pT33.exe 29 PID 668 wrote to memory of 572 668 vmhg05pT33.exe 29 PID 668 wrote to memory of 572 668 vmhg05pT33.exe 29 PID 668 wrote to memory of 572 668 vmhg05pT33.exe 29 PID 668 wrote to memory of 572 668 vmhg05pT33.exe 29 PID 668 wrote to memory of 572 668 vmhg05pT33.exe 29 PID 668 wrote to memory of 572 668 vmhg05pT33.exe 29 PID 572 wrote to memory of 1708 572 vmuC91ng39.exe 30 PID 572 wrote to memory of 1708 572 vmuC91ng39.exe 30 PID 572 wrote to memory of 1708 572 vmuC91ng39.exe 30 PID 572 wrote to memory of 1708 572 vmuC91ng39.exe 30 PID 572 wrote to memory of 1708 572 vmuC91ng39.exe 30 PID 572 wrote to memory of 1708 572 vmuC91ng39.exe 30 PID 572 wrote to memory of 1708 572 vmuC91ng39.exe 30 PID 1708 wrote to memory of 1112 1708 vmfO74PK26.exe 31 PID 1708 wrote to memory of 1112 1708 vmfO74PK26.exe 31 PID 1708 wrote to memory of 1112 1708 vmfO74PK26.exe 31 PID 1708 wrote to memory of 1112 1708 vmfO74PK26.exe 31 PID 1708 wrote to memory of 1112 1708 vmfO74PK26.exe 31 PID 1708 wrote to memory of 1112 1708 vmfO74PK26.exe 31 PID 1708 wrote to memory of 1112 1708 vmfO74PK26.exe 31 PID 1708 wrote to memory of 980 1708 vmfO74PK26.exe 32 PID 1708 wrote to memory of 980 1708 vmfO74PK26.exe 32 PID 1708 wrote to memory of 980 1708 vmfO74PK26.exe 32 PID 1708 wrote to memory of 980 1708 vmfO74PK26.exe 32 PID 1708 wrote to memory of 980 1708 vmfO74PK26.exe 32 PID 1708 wrote to memory of 980 1708 vmfO74PK26.exe 32 PID 1708 wrote to memory of 980 1708 vmfO74PK26.exe 32 PID 572 wrote to memory of 1796 572 vmuC91ng39.exe 34 PID 572 wrote to memory of 1796 572 vmuC91ng39.exe 34 PID 572 wrote to memory of 1796 572 vmuC91ng39.exe 34 PID 572 wrote to memory of 1796 572 vmuC91ng39.exe 34 PID 572 wrote to memory of 1796 572 vmuC91ng39.exe 34 PID 572 wrote to memory of 1796 572 vmuC91ng39.exe 34 PID 572 wrote to memory of 1796 572 vmuC91ng39.exe 34 PID 668 wrote to memory of 1008 668 vmhg05pT33.exe 35 PID 668 wrote to memory of 1008 668 vmhg05pT33.exe 35 PID 668 wrote to memory of 1008 668 vmhg05pT33.exe 35 PID 668 wrote to memory of 1008 668 vmhg05pT33.exe 35 PID 668 wrote to memory of 1008 668 vmhg05pT33.exe 35 PID 668 wrote to memory of 1008 668 vmhg05pT33.exe 35 PID 668 wrote to memory of 1008 668 vmhg05pT33.exe 35 PID 2016 wrote to memory of 1248 2016 vmTM87rS10.exe 36 PID 2016 wrote to memory of 1248 2016 vmTM87rS10.exe 36 PID 2016 wrote to memory of 1248 2016 vmTM87rS10.exe 36 PID 2016 wrote to memory of 1248 2016 vmTM87rS10.exe 36 PID 2016 wrote to memory of 1248 2016 vmTM87rS10.exe 36 PID 2016 wrote to memory of 1248 2016 vmTM87rS10.exe 36 PID 2016 wrote to memory of 1248 2016 vmTM87rS10.exe 36 PID 1108 wrote to memory of 884 1108 234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe"C:\Users\Admin\AppData\Local\Temp\234e1c863e17a930cc683f3892bf794dc810fa2c7649dfddd8899fb51a3c13db.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmTM87rS10.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmTM87rS10.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmhg05pT33.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmhg05pT33.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmuC91ng39.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmuC91ng39.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmfO74PK26.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmfO74PK26.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iLV05fU07.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iLV05fU07.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kED40Px55.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kED40Px55.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mrv00cF00.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mrv00cF00.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxN41Zj47.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nxN41Zj47.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rf97CI92lz04.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rf97CI92lz04.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sv03LA60Gx04.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sv03LA60Gx04.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:884
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD508f1d0c03618e93f9817e6643d25d4e1
SHA1f64f41a902393074fe5f185a67b0b4d4e7935441
SHA256f16826580dcbea79547222cfed8ec8727a509978b00311cd6c0f7ac1221a0dda
SHA51229a2c193eff9350267978a47dc23d8fc7aabcc102868916c251d0b8d12b28c23f52ac45c014b1215296d7010f278cc9bdb471f43a79a385f94d8d77d53d1ab7b
-
Filesize
175KB
MD508f1d0c03618e93f9817e6643d25d4e1
SHA1f64f41a902393074fe5f185a67b0b4d4e7935441
SHA256f16826580dcbea79547222cfed8ec8727a509978b00311cd6c0f7ac1221a0dda
SHA51229a2c193eff9350267978a47dc23d8fc7aabcc102868916c251d0b8d12b28c23f52ac45c014b1215296d7010f278cc9bdb471f43a79a385f94d8d77d53d1ab7b
-
Filesize
978KB
MD50eaaf99fff13b54e7589fe0374073527
SHA19d8bc6380fc6242b9c407825f07118351ade0ec3
SHA256342cfbf0d4a685aae1b1f4383c5295799f9dd16c5b3bfad11e9a9844ae69e87e
SHA5123e58504cf540dc3e47bc2da019559ba72962aa41c2abb8289d3d01aec83f2214ef2dae111f3a04f7bdfb49e459a055ef559aace2af1c936b8182df546eb80c7e
-
Filesize
978KB
MD50eaaf99fff13b54e7589fe0374073527
SHA19d8bc6380fc6242b9c407825f07118351ade0ec3
SHA256342cfbf0d4a685aae1b1f4383c5295799f9dd16c5b3bfad11e9a9844ae69e87e
SHA5123e58504cf540dc3e47bc2da019559ba72962aa41c2abb8289d3d01aec83f2214ef2dae111f3a04f7bdfb49e459a055ef559aace2af1c936b8182df546eb80c7e
-
Filesize
11KB
MD567fa991e464adb0cbe6c4c01090ebf8d
SHA15e1b375b08191834298fd3c669e1b66d9a8dfc96
SHA2566f9f7a745538518d1f3909b8717dcff1b63f3267803dfc8acd15077265a9e6f6
SHA512e810061e11b3b21fee8b6d624190fb4ae6a17a802bcf669fd6553233210e37df46a1e42d393839032fe530c1c05bb6c1ae3aa1b85adbf8e01464a0f18a86f5f8
-
Filesize
11KB
MD567fa991e464adb0cbe6c4c01090ebf8d
SHA15e1b375b08191834298fd3c669e1b66d9a8dfc96
SHA2566f9f7a745538518d1f3909b8717dcff1b63f3267803dfc8acd15077265a9e6f6
SHA512e810061e11b3b21fee8b6d624190fb4ae6a17a802bcf669fd6553233210e37df46a1e42d393839032fe530c1c05bb6c1ae3aa1b85adbf8e01464a0f18a86f5f8
-
Filesize
882KB
MD561eb0c918cf0e1c959f2a97f97b1ad00
SHA1c91e2350ff648f0e42dc302106fb2d8784eb1d22
SHA25688406d533a88d780f25dd5ab79a0650658d19ad3b8b77c1075b2b2b1dc4e34b7
SHA512c842759aa6dc5e3212ba8326fb1ea5931ff7541a5973e10d7ef09cde9af109ddcfaa8355602499d861c6827f042c58aa427a61567b0c108965cbce8048a2764f
-
Filesize
882KB
MD561eb0c918cf0e1c959f2a97f97b1ad00
SHA1c91e2350ff648f0e42dc302106fb2d8784eb1d22
SHA25688406d533a88d780f25dd5ab79a0650658d19ad3b8b77c1075b2b2b1dc4e34b7
SHA512c842759aa6dc5e3212ba8326fb1ea5931ff7541a5973e10d7ef09cde9af109ddcfaa8355602499d861c6827f042c58aa427a61567b0c108965cbce8048a2764f
-
Filesize
303KB
MD5a1f3354a99b35edf172a95b90afbc9b1
SHA18b02f77b82ec8b005aacb5bd87f50f6ceee0052f
SHA2562565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a
SHA512f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e
-
Filesize
303KB
MD5a1f3354a99b35edf172a95b90afbc9b1
SHA18b02f77b82ec8b005aacb5bd87f50f6ceee0052f
SHA2562565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a
SHA512f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e
-
Filesize
658KB
MD5e0d14c6393cc7e0c114527463360be33
SHA1dca35f05ba3e19aa63cedcf870d3ff395b4dce76
SHA2561af0cc408d49fa0b7071b0d78961dcc794dfb01db68bb75163f79c277f2663bc
SHA51286604216967bab685b2c7bd0fa4f102be646344be50009d373e5d7a20ede9571719fe0add8849eab6dbf8df3a2cd9dfa69495ccf0dc34fd5b17378be291c0114
-
Filesize
658KB
MD5e0d14c6393cc7e0c114527463360be33
SHA1dca35f05ba3e19aa63cedcf870d3ff395b4dce76
SHA2561af0cc408d49fa0b7071b0d78961dcc794dfb01db68bb75163f79c277f2663bc
SHA51286604216967bab685b2c7bd0fa4f102be646344be50009d373e5d7a20ede9571719fe0add8849eab6dbf8df3a2cd9dfa69495ccf0dc34fd5b17378be291c0114
-
Filesize
245KB
MD55334eab571f52b8ab7f0e610f7df9831
SHA1f2022927de6a6eeb88b9a0a95896e664b9133a0f
SHA2569658e5d60c861c5eb465a0c7fdd57d15c0c0bb73e3b699879a83162caa69f7e5
SHA5123d0106388a6730d86b2a8365572b5a26b1c5d0abcd1218de9f61f45467617b04a4acc7fcf670879bced39957a778599ecfd95ead5a601695206d378571216664
-
Filesize
245KB
MD55334eab571f52b8ab7f0e610f7df9831
SHA1f2022927de6a6eeb88b9a0a95896e664b9133a0f
SHA2569658e5d60c861c5eb465a0c7fdd57d15c0c0bb73e3b699879a83162caa69f7e5
SHA5123d0106388a6730d86b2a8365572b5a26b1c5d0abcd1218de9f61f45467617b04a4acc7fcf670879bced39957a778599ecfd95ead5a601695206d378571216664
-
Filesize
245KB
MD55334eab571f52b8ab7f0e610f7df9831
SHA1f2022927de6a6eeb88b9a0a95896e664b9133a0f
SHA2569658e5d60c861c5eb465a0c7fdd57d15c0c0bb73e3b699879a83162caa69f7e5
SHA5123d0106388a6730d86b2a8365572b5a26b1c5d0abcd1218de9f61f45467617b04a4acc7fcf670879bced39957a778599ecfd95ead5a601695206d378571216664
-
Filesize
387KB
MD5cb7ef661452715e82d90e74ede4421d9
SHA1b62a28bbb9378339504cbc45ecbd639e18559eae
SHA25602c927c4103ab6e88d697d4beef0ab434c36b444778a7759d2df443a114069fc
SHA51286381694a97aedb5a2a9316a27237cbde1fbe181f3b5257e55d154ade677b751e2cf213996ce25d6a0ac7901fd83bed27f9c188f064ec3dfe3433fc538a71188
-
Filesize
387KB
MD5cb7ef661452715e82d90e74ede4421d9
SHA1b62a28bbb9378339504cbc45ecbd639e18559eae
SHA25602c927c4103ab6e88d697d4beef0ab434c36b444778a7759d2df443a114069fc
SHA51286381694a97aedb5a2a9316a27237cbde1fbe181f3b5257e55d154ade677b751e2cf213996ce25d6a0ac7901fd83bed27f9c188f064ec3dfe3433fc538a71188
-
Filesize
11KB
MD577e9b29a0a32549aa24c2ae2b1d71bf4
SHA1b6e145f586e69c19974efb89a9490efa7f82c6bc
SHA2564228657b24c3bac980858f252272a6e3181f45d225a7d2247dfd35fc9c4abeee
SHA5129d0d4e57b9c7a470e3ea7e6c74897fbd33fc7d38a389126c3049a4265f39b45da6ee23fc08975d1be67b8f528a90ca94e8b4daaea881c43a7a9a0cc1eb772d42
-
Filesize
11KB
MD577e9b29a0a32549aa24c2ae2b1d71bf4
SHA1b6e145f586e69c19974efb89a9490efa7f82c6bc
SHA2564228657b24c3bac980858f252272a6e3181f45d225a7d2247dfd35fc9c4abeee
SHA5129d0d4e57b9c7a470e3ea7e6c74897fbd33fc7d38a389126c3049a4265f39b45da6ee23fc08975d1be67b8f528a90ca94e8b4daaea881c43a7a9a0cc1eb772d42
-
Filesize
11KB
MD577e9b29a0a32549aa24c2ae2b1d71bf4
SHA1b6e145f586e69c19974efb89a9490efa7f82c6bc
SHA2564228657b24c3bac980858f252272a6e3181f45d225a7d2247dfd35fc9c4abeee
SHA5129d0d4e57b9c7a470e3ea7e6c74897fbd33fc7d38a389126c3049a4265f39b45da6ee23fc08975d1be67b8f528a90ca94e8b4daaea881c43a7a9a0cc1eb772d42
-
Filesize
303KB
MD5a1f3354a99b35edf172a95b90afbc9b1
SHA18b02f77b82ec8b005aacb5bd87f50f6ceee0052f
SHA2562565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a
SHA512f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e
-
Filesize
303KB
MD5a1f3354a99b35edf172a95b90afbc9b1
SHA18b02f77b82ec8b005aacb5bd87f50f6ceee0052f
SHA2562565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a
SHA512f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e
-
Filesize
303KB
MD5a1f3354a99b35edf172a95b90afbc9b1
SHA18b02f77b82ec8b005aacb5bd87f50f6ceee0052f
SHA2562565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a
SHA512f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e
-
Filesize
175KB
MD508f1d0c03618e93f9817e6643d25d4e1
SHA1f64f41a902393074fe5f185a67b0b4d4e7935441
SHA256f16826580dcbea79547222cfed8ec8727a509978b00311cd6c0f7ac1221a0dda
SHA51229a2c193eff9350267978a47dc23d8fc7aabcc102868916c251d0b8d12b28c23f52ac45c014b1215296d7010f278cc9bdb471f43a79a385f94d8d77d53d1ab7b
-
Filesize
175KB
MD508f1d0c03618e93f9817e6643d25d4e1
SHA1f64f41a902393074fe5f185a67b0b4d4e7935441
SHA256f16826580dcbea79547222cfed8ec8727a509978b00311cd6c0f7ac1221a0dda
SHA51229a2c193eff9350267978a47dc23d8fc7aabcc102868916c251d0b8d12b28c23f52ac45c014b1215296d7010f278cc9bdb471f43a79a385f94d8d77d53d1ab7b
-
Filesize
978KB
MD50eaaf99fff13b54e7589fe0374073527
SHA19d8bc6380fc6242b9c407825f07118351ade0ec3
SHA256342cfbf0d4a685aae1b1f4383c5295799f9dd16c5b3bfad11e9a9844ae69e87e
SHA5123e58504cf540dc3e47bc2da019559ba72962aa41c2abb8289d3d01aec83f2214ef2dae111f3a04f7bdfb49e459a055ef559aace2af1c936b8182df546eb80c7e
-
Filesize
978KB
MD50eaaf99fff13b54e7589fe0374073527
SHA19d8bc6380fc6242b9c407825f07118351ade0ec3
SHA256342cfbf0d4a685aae1b1f4383c5295799f9dd16c5b3bfad11e9a9844ae69e87e
SHA5123e58504cf540dc3e47bc2da019559ba72962aa41c2abb8289d3d01aec83f2214ef2dae111f3a04f7bdfb49e459a055ef559aace2af1c936b8182df546eb80c7e
-
Filesize
11KB
MD567fa991e464adb0cbe6c4c01090ebf8d
SHA15e1b375b08191834298fd3c669e1b66d9a8dfc96
SHA2566f9f7a745538518d1f3909b8717dcff1b63f3267803dfc8acd15077265a9e6f6
SHA512e810061e11b3b21fee8b6d624190fb4ae6a17a802bcf669fd6553233210e37df46a1e42d393839032fe530c1c05bb6c1ae3aa1b85adbf8e01464a0f18a86f5f8
-
Filesize
882KB
MD561eb0c918cf0e1c959f2a97f97b1ad00
SHA1c91e2350ff648f0e42dc302106fb2d8784eb1d22
SHA25688406d533a88d780f25dd5ab79a0650658d19ad3b8b77c1075b2b2b1dc4e34b7
SHA512c842759aa6dc5e3212ba8326fb1ea5931ff7541a5973e10d7ef09cde9af109ddcfaa8355602499d861c6827f042c58aa427a61567b0c108965cbce8048a2764f
-
Filesize
882KB
MD561eb0c918cf0e1c959f2a97f97b1ad00
SHA1c91e2350ff648f0e42dc302106fb2d8784eb1d22
SHA25688406d533a88d780f25dd5ab79a0650658d19ad3b8b77c1075b2b2b1dc4e34b7
SHA512c842759aa6dc5e3212ba8326fb1ea5931ff7541a5973e10d7ef09cde9af109ddcfaa8355602499d861c6827f042c58aa427a61567b0c108965cbce8048a2764f
-
Filesize
303KB
MD5a1f3354a99b35edf172a95b90afbc9b1
SHA18b02f77b82ec8b005aacb5bd87f50f6ceee0052f
SHA2562565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a
SHA512f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e
-
Filesize
303KB
MD5a1f3354a99b35edf172a95b90afbc9b1
SHA18b02f77b82ec8b005aacb5bd87f50f6ceee0052f
SHA2562565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a
SHA512f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e
-
Filesize
303KB
MD5a1f3354a99b35edf172a95b90afbc9b1
SHA18b02f77b82ec8b005aacb5bd87f50f6ceee0052f
SHA2562565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a
SHA512f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e
-
Filesize
658KB
MD5e0d14c6393cc7e0c114527463360be33
SHA1dca35f05ba3e19aa63cedcf870d3ff395b4dce76
SHA2561af0cc408d49fa0b7071b0d78961dcc794dfb01db68bb75163f79c277f2663bc
SHA51286604216967bab685b2c7bd0fa4f102be646344be50009d373e5d7a20ede9571719fe0add8849eab6dbf8df3a2cd9dfa69495ccf0dc34fd5b17378be291c0114
-
Filesize
658KB
MD5e0d14c6393cc7e0c114527463360be33
SHA1dca35f05ba3e19aa63cedcf870d3ff395b4dce76
SHA2561af0cc408d49fa0b7071b0d78961dcc794dfb01db68bb75163f79c277f2663bc
SHA51286604216967bab685b2c7bd0fa4f102be646344be50009d373e5d7a20ede9571719fe0add8849eab6dbf8df3a2cd9dfa69495ccf0dc34fd5b17378be291c0114
-
Filesize
245KB
MD55334eab571f52b8ab7f0e610f7df9831
SHA1f2022927de6a6eeb88b9a0a95896e664b9133a0f
SHA2569658e5d60c861c5eb465a0c7fdd57d15c0c0bb73e3b699879a83162caa69f7e5
SHA5123d0106388a6730d86b2a8365572b5a26b1c5d0abcd1218de9f61f45467617b04a4acc7fcf670879bced39957a778599ecfd95ead5a601695206d378571216664
-
Filesize
245KB
MD55334eab571f52b8ab7f0e610f7df9831
SHA1f2022927de6a6eeb88b9a0a95896e664b9133a0f
SHA2569658e5d60c861c5eb465a0c7fdd57d15c0c0bb73e3b699879a83162caa69f7e5
SHA5123d0106388a6730d86b2a8365572b5a26b1c5d0abcd1218de9f61f45467617b04a4acc7fcf670879bced39957a778599ecfd95ead5a601695206d378571216664
-
Filesize
245KB
MD55334eab571f52b8ab7f0e610f7df9831
SHA1f2022927de6a6eeb88b9a0a95896e664b9133a0f
SHA2569658e5d60c861c5eb465a0c7fdd57d15c0c0bb73e3b699879a83162caa69f7e5
SHA5123d0106388a6730d86b2a8365572b5a26b1c5d0abcd1218de9f61f45467617b04a4acc7fcf670879bced39957a778599ecfd95ead5a601695206d378571216664
-
Filesize
387KB
MD5cb7ef661452715e82d90e74ede4421d9
SHA1b62a28bbb9378339504cbc45ecbd639e18559eae
SHA25602c927c4103ab6e88d697d4beef0ab434c36b444778a7759d2df443a114069fc
SHA51286381694a97aedb5a2a9316a27237cbde1fbe181f3b5257e55d154ade677b751e2cf213996ce25d6a0ac7901fd83bed27f9c188f064ec3dfe3433fc538a71188
-
Filesize
387KB
MD5cb7ef661452715e82d90e74ede4421d9
SHA1b62a28bbb9378339504cbc45ecbd639e18559eae
SHA25602c927c4103ab6e88d697d4beef0ab434c36b444778a7759d2df443a114069fc
SHA51286381694a97aedb5a2a9316a27237cbde1fbe181f3b5257e55d154ade677b751e2cf213996ce25d6a0ac7901fd83bed27f9c188f064ec3dfe3433fc538a71188
-
Filesize
11KB
MD577e9b29a0a32549aa24c2ae2b1d71bf4
SHA1b6e145f586e69c19974efb89a9490efa7f82c6bc
SHA2564228657b24c3bac980858f252272a6e3181f45d225a7d2247dfd35fc9c4abeee
SHA5129d0d4e57b9c7a470e3ea7e6c74897fbd33fc7d38a389126c3049a4265f39b45da6ee23fc08975d1be67b8f528a90ca94e8b4daaea881c43a7a9a0cc1eb772d42
-
Filesize
303KB
MD5a1f3354a99b35edf172a95b90afbc9b1
SHA18b02f77b82ec8b005aacb5bd87f50f6ceee0052f
SHA2562565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a
SHA512f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e
-
Filesize
303KB
MD5a1f3354a99b35edf172a95b90afbc9b1
SHA18b02f77b82ec8b005aacb5bd87f50f6ceee0052f
SHA2562565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a
SHA512f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e
-
Filesize
303KB
MD5a1f3354a99b35edf172a95b90afbc9b1
SHA18b02f77b82ec8b005aacb5bd87f50f6ceee0052f
SHA2562565aca55567f1c548f5135c387bdc75999836cb072d0896c040947bef8e852a
SHA512f189af079f9f9de1861b03a2e15c9dac741929cdb115937973270e9ffbf65e64b2a19ebc277f1f9aa10a42e4f83abed0a5c9bb4bfc86c66102c09575771ef40e