Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 02:42
Static task
static1
General
-
Target
5a1f0cbe6c61bf9d2e50e0a9af648c08e3847aa1ef5975a90f68510109d5c904.exe
-
Size
1.3MB
-
MD5
185b7ceac36a26f5790f95688027391b
-
SHA1
1bd0d3b5afbd67c93f1709a307c484e03ff60fae
-
SHA256
5a1f0cbe6c61bf9d2e50e0a9af648c08e3847aa1ef5975a90f68510109d5c904
-
SHA512
61874b6f39007dbfb0b96b29c5dc9bf8f982b09f26f33c9ff6d049028006d81c4fdb6c78a6447466e16365a26b42d5217f29b6e03436fd3acbbe64301dbfa013
-
SSDEEP
24576:nypOVd7t5rhBjVO2d5+KVZm5kvkRue6O1bJV0x3tsf4VIIr66FD:y4/55bZOEnZm5kk8enbngtsOIIrNF
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dswZ24Cc19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnUt35pc40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnUt35pc40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beDT43ar47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dswZ24Cc19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beDT43ar47.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dswZ24Cc19.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beDT43ar47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beDT43ar47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dswZ24Cc19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dswZ24Cc19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnUt35pc40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnUt35pc40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beDT43ar47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dswZ24Cc19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beDT43ar47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnUt35pc40.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/228-182-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-185-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-183-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-188-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-191-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-195-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-197-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-199-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-201-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-203-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-205-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-207-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-209-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-211-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-213-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-215-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-223-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-221-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-219-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-217-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-225-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-227-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-229-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-231-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-233-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-235-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-237-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-239-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-241-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-243-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-245-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-247-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/228-249-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation hk25rw10jB20.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 844 ptes8540Og.exe 1444 ptNd0644XW.exe 1364 ptvU9257lO.exe 1908 ptxC1626Av.exe 2984 ptWi1691dU.exe 1356 beDT43ar47.exe 228 cuAH42Et15.exe 5032 dswZ24Cc19.exe 1900 fr80UO4705eE.exe 3548 gnUt35pc40.exe 4220 hk25rw10jB20.exe 2996 mnolyk.exe 2568 jxNJ32CP31.exe 4256 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 1648 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beDT43ar47.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dswZ24Cc19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dswZ24Cc19.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnUt35pc40.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5a1f0cbe6c61bf9d2e50e0a9af648c08e3847aa1ef5975a90f68510109d5c904.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptes8540Og.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptNd0644XW.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptvU9257lO.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptxC1626Av.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptxC1626Av.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptWi1691dU.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5a1f0cbe6c61bf9d2e50e0a9af648c08e3847aa1ef5975a90f68510109d5c904.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptes8540Og.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptNd0644XW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptvU9257lO.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptWi1691dU.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 3712 228 WerFault.exe 93 4040 5032 WerFault.exe 98 4076 1900 WerFault.exe 103 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1356 beDT43ar47.exe 1356 beDT43ar47.exe 228 cuAH42Et15.exe 228 cuAH42Et15.exe 5032 dswZ24Cc19.exe 5032 dswZ24Cc19.exe 1900 fr80UO4705eE.exe 1900 fr80UO4705eE.exe 3548 gnUt35pc40.exe 3548 gnUt35pc40.exe 2568 jxNJ32CP31.exe 2568 jxNJ32CP31.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1356 beDT43ar47.exe Token: SeDebugPrivilege 228 cuAH42Et15.exe Token: SeDebugPrivilege 5032 dswZ24Cc19.exe Token: SeDebugPrivilege 1900 fr80UO4705eE.exe Token: SeDebugPrivilege 3548 gnUt35pc40.exe Token: SeDebugPrivilege 2568 jxNJ32CP31.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 844 1384 5a1f0cbe6c61bf9d2e50e0a9af648c08e3847aa1ef5975a90f68510109d5c904.exe 84 PID 1384 wrote to memory of 844 1384 5a1f0cbe6c61bf9d2e50e0a9af648c08e3847aa1ef5975a90f68510109d5c904.exe 84 PID 1384 wrote to memory of 844 1384 5a1f0cbe6c61bf9d2e50e0a9af648c08e3847aa1ef5975a90f68510109d5c904.exe 84 PID 844 wrote to memory of 1444 844 ptes8540Og.exe 85 PID 844 wrote to memory of 1444 844 ptes8540Og.exe 85 PID 844 wrote to memory of 1444 844 ptes8540Og.exe 85 PID 1444 wrote to memory of 1364 1444 ptNd0644XW.exe 86 PID 1444 wrote to memory of 1364 1444 ptNd0644XW.exe 86 PID 1444 wrote to memory of 1364 1444 ptNd0644XW.exe 86 PID 1364 wrote to memory of 1908 1364 ptvU9257lO.exe 87 PID 1364 wrote to memory of 1908 1364 ptvU9257lO.exe 87 PID 1364 wrote to memory of 1908 1364 ptvU9257lO.exe 87 PID 1908 wrote to memory of 2984 1908 ptxC1626Av.exe 88 PID 1908 wrote to memory of 2984 1908 ptxC1626Av.exe 88 PID 1908 wrote to memory of 2984 1908 ptxC1626Av.exe 88 PID 2984 wrote to memory of 1356 2984 ptWi1691dU.exe 89 PID 2984 wrote to memory of 1356 2984 ptWi1691dU.exe 89 PID 2984 wrote to memory of 228 2984 ptWi1691dU.exe 93 PID 2984 wrote to memory of 228 2984 ptWi1691dU.exe 93 PID 2984 wrote to memory of 228 2984 ptWi1691dU.exe 93 PID 1908 wrote to memory of 5032 1908 ptxC1626Av.exe 98 PID 1908 wrote to memory of 5032 1908 ptxC1626Av.exe 98 PID 1908 wrote to memory of 5032 1908 ptxC1626Av.exe 98 PID 1364 wrote to memory of 1900 1364 ptvU9257lO.exe 103 PID 1364 wrote to memory of 1900 1364 ptvU9257lO.exe 103 PID 1364 wrote to memory of 1900 1364 ptvU9257lO.exe 103 PID 1444 wrote to memory of 3548 1444 ptNd0644XW.exe 106 PID 1444 wrote to memory of 3548 1444 ptNd0644XW.exe 106 PID 844 wrote to memory of 4220 844 ptes8540Og.exe 114 PID 844 wrote to memory of 4220 844 ptes8540Og.exe 114 PID 844 wrote to memory of 4220 844 ptes8540Og.exe 114 PID 4220 wrote to memory of 2996 4220 hk25rw10jB20.exe 115 PID 4220 wrote to memory of 2996 4220 hk25rw10jB20.exe 115 PID 4220 wrote to memory of 2996 4220 hk25rw10jB20.exe 115 PID 1384 wrote to memory of 2568 1384 5a1f0cbe6c61bf9d2e50e0a9af648c08e3847aa1ef5975a90f68510109d5c904.exe 116 PID 1384 wrote to memory of 2568 1384 5a1f0cbe6c61bf9d2e50e0a9af648c08e3847aa1ef5975a90f68510109d5c904.exe 116 PID 1384 wrote to memory of 2568 1384 5a1f0cbe6c61bf9d2e50e0a9af648c08e3847aa1ef5975a90f68510109d5c904.exe 116 PID 2996 wrote to memory of 912 2996 mnolyk.exe 117 PID 2996 wrote to memory of 912 2996 mnolyk.exe 117 PID 2996 wrote to memory of 912 2996 mnolyk.exe 117 PID 2996 wrote to memory of 4820 2996 mnolyk.exe 119 PID 2996 wrote to memory of 4820 2996 mnolyk.exe 119 PID 2996 wrote to memory of 4820 2996 mnolyk.exe 119 PID 4820 wrote to memory of 4596 4820 cmd.exe 121 PID 4820 wrote to memory of 4596 4820 cmd.exe 121 PID 4820 wrote to memory of 4596 4820 cmd.exe 121 PID 4820 wrote to memory of 1008 4820 cmd.exe 122 PID 4820 wrote to memory of 1008 4820 cmd.exe 122 PID 4820 wrote to memory of 1008 4820 cmd.exe 122 PID 4820 wrote to memory of 2096 4820 cmd.exe 123 PID 4820 wrote to memory of 2096 4820 cmd.exe 123 PID 4820 wrote to memory of 2096 4820 cmd.exe 123 PID 4820 wrote to memory of 684 4820 cmd.exe 124 PID 4820 wrote to memory of 684 4820 cmd.exe 124 PID 4820 wrote to memory of 684 4820 cmd.exe 124 PID 4820 wrote to memory of 2192 4820 cmd.exe 125 PID 4820 wrote to memory of 2192 4820 cmd.exe 125 PID 4820 wrote to memory of 2192 4820 cmd.exe 125 PID 4820 wrote to memory of 4376 4820 cmd.exe 126 PID 4820 wrote to memory of 4376 4820 cmd.exe 126 PID 4820 wrote to memory of 4376 4820 cmd.exe 126 PID 2996 wrote to memory of 1648 2996 mnolyk.exe 128 PID 2996 wrote to memory of 1648 2996 mnolyk.exe 128 PID 2996 wrote to memory of 1648 2996 mnolyk.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a1f0cbe6c61bf9d2e50e0a9af648c08e3847aa1ef5975a90f68510109d5c904.exe"C:\Users\Admin\AppData\Local\Temp\5a1f0cbe6c61bf9d2e50e0a9af648c08e3847aa1ef5975a90f68510109d5c904.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptes8540Og.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptes8540Og.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptNd0644XW.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptNd0644XW.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptvU9257lO.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptvU9257lO.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptxC1626Av.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptxC1626Av.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptWi1691dU.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptWi1691dU.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beDT43ar47.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beDT43ar47.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuAH42Et15.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuAH42Et15.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 13168⤵
- Program crash
PID:3712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dswZ24Cc19.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dswZ24Cc19.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 10807⤵
- Program crash
PID:4040
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr80UO4705eE.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr80UO4705eE.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 13206⤵
- Program crash
PID:4076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnUt35pc40.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnUt35pc40.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk25rw10jB20.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk25rw10jB20.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:1008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:2096
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:2192
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:4376
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1648
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxNJ32CP31.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxNJ32CP31.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 228 -ip 2281⤵PID:1632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5032 -ip 50321⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1900 -ip 19001⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:4256
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5817356f5ce328a4e6f6fd234c1a1e117
SHA1c831881ba8444d691b8498b56150b7eaec15bb34
SHA256aa4b090bea5ec5eb0a6f7abbad8d4cfddb09dc066ca9ae67f07cb8b0f6576cd9
SHA512707f3e1a33206db22b6c0141207732cdf029367ed56c8c8d0d83bf24a33b096b74ee1fabba43fc1dcf4438083402e9b7594e8d6cbd75e0b3d6266cdcf55f14bc
-
Filesize
240KB
MD5817356f5ce328a4e6f6fd234c1a1e117
SHA1c831881ba8444d691b8498b56150b7eaec15bb34
SHA256aa4b090bea5ec5eb0a6f7abbad8d4cfddb09dc066ca9ae67f07cb8b0f6576cd9
SHA512707f3e1a33206db22b6c0141207732cdf029367ed56c8c8d0d83bf24a33b096b74ee1fabba43fc1dcf4438083402e9b7594e8d6cbd75e0b3d6266cdcf55f14bc
-
Filesize
240KB
MD5817356f5ce328a4e6f6fd234c1a1e117
SHA1c831881ba8444d691b8498b56150b7eaec15bb34
SHA256aa4b090bea5ec5eb0a6f7abbad8d4cfddb09dc066ca9ae67f07cb8b0f6576cd9
SHA512707f3e1a33206db22b6c0141207732cdf029367ed56c8c8d0d83bf24a33b096b74ee1fabba43fc1dcf4438083402e9b7594e8d6cbd75e0b3d6266cdcf55f14bc
-
Filesize
240KB
MD5817356f5ce328a4e6f6fd234c1a1e117
SHA1c831881ba8444d691b8498b56150b7eaec15bb34
SHA256aa4b090bea5ec5eb0a6f7abbad8d4cfddb09dc066ca9ae67f07cb8b0f6576cd9
SHA512707f3e1a33206db22b6c0141207732cdf029367ed56c8c8d0d83bf24a33b096b74ee1fabba43fc1dcf4438083402e9b7594e8d6cbd75e0b3d6266cdcf55f14bc
-
Filesize
176KB
MD52735114d3676afba730c45dffe7e404f
SHA1757cbd09e79bea53d4f59279d52f12552792308b
SHA256466dcfaad5662288c6b3dd92743434ef23160575f0e2b13db215d46ced89cac3
SHA51273e5827951f04f72b49a778addaf4f776d2ddf5b7f34427274a06573f4b1fb2c652ccc3fc678e01a03375d5d047b1fb03f5817577f72bbe35eb4a53e4b25d257
-
Filesize
176KB
MD52735114d3676afba730c45dffe7e404f
SHA1757cbd09e79bea53d4f59279d52f12552792308b
SHA256466dcfaad5662288c6b3dd92743434ef23160575f0e2b13db215d46ced89cac3
SHA51273e5827951f04f72b49a778addaf4f776d2ddf5b7f34427274a06573f4b1fb2c652ccc3fc678e01a03375d5d047b1fb03f5817577f72bbe35eb4a53e4b25d257
-
Filesize
1.2MB
MD577a0314a8b0c3290870f99b380c2bae9
SHA17999a8f74576911ef11b400eeb3a75e27da8f674
SHA25614eeaef4c4ca22b283fb70be36ddd488125e39da6ead5f11cf5fe8dfd1f24170
SHA5127f478975cbdf00c53223751fe035078b04f5494f7c0fb88328ab54c0f767d73389612b124f39302863a73fd5b4a2287c6c25847fb3ffee8704624ee49a20886f
-
Filesize
1.2MB
MD577a0314a8b0c3290870f99b380c2bae9
SHA17999a8f74576911ef11b400eeb3a75e27da8f674
SHA25614eeaef4c4ca22b283fb70be36ddd488125e39da6ead5f11cf5fe8dfd1f24170
SHA5127f478975cbdf00c53223751fe035078b04f5494f7c0fb88328ab54c0f767d73389612b124f39302863a73fd5b4a2287c6c25847fb3ffee8704624ee49a20886f
-
Filesize
240KB
MD5817356f5ce328a4e6f6fd234c1a1e117
SHA1c831881ba8444d691b8498b56150b7eaec15bb34
SHA256aa4b090bea5ec5eb0a6f7abbad8d4cfddb09dc066ca9ae67f07cb8b0f6576cd9
SHA512707f3e1a33206db22b6c0141207732cdf029367ed56c8c8d0d83bf24a33b096b74ee1fabba43fc1dcf4438083402e9b7594e8d6cbd75e0b3d6266cdcf55f14bc
-
Filesize
240KB
MD5817356f5ce328a4e6f6fd234c1a1e117
SHA1c831881ba8444d691b8498b56150b7eaec15bb34
SHA256aa4b090bea5ec5eb0a6f7abbad8d4cfddb09dc066ca9ae67f07cb8b0f6576cd9
SHA512707f3e1a33206db22b6c0141207732cdf029367ed56c8c8d0d83bf24a33b096b74ee1fabba43fc1dcf4438083402e9b7594e8d6cbd75e0b3d6266cdcf55f14bc
-
Filesize
1019KB
MD5ebf69f55db15720c4de60f8aa214cf10
SHA101c67c48a6eb85a4aef642f1ce43a25fe00d39ac
SHA2566573630afa1942d4ff7618858ac26e7a4ebc354dccd309b3606f4348dd297043
SHA5128b7c9cc69fa1c03c235d75b9cb5a51d12be76528a9c72c1d441a4f1cd68a11b8205d49d62907cf93eea4ec28245dfd1506b227ca491e431f854c6173ac8daad8
-
Filesize
1019KB
MD5ebf69f55db15720c4de60f8aa214cf10
SHA101c67c48a6eb85a4aef642f1ce43a25fe00d39ac
SHA2566573630afa1942d4ff7618858ac26e7a4ebc354dccd309b3606f4348dd297043
SHA5128b7c9cc69fa1c03c235d75b9cb5a51d12be76528a9c72c1d441a4f1cd68a11b8205d49d62907cf93eea4ec28245dfd1506b227ca491e431f854c6173ac8daad8
-
Filesize
15KB
MD5c8da767166dbd2f115c8c7bd007a7df0
SHA1f423d2a2373ec4956797193651dd004b19c8f502
SHA25655b77d1608a1d006b3f9d10c12ecbe081888af27b3f8e64b245b0f092ed4dc08
SHA512c5f12113cff8ec19cccc4a694d10c8178c738fae2d96e3afd55e53bcec016b07ff887b62242ee3be2d4bdd8c279e74733f11905e77171c3726c7d87cd93eabdb
-
Filesize
15KB
MD5c8da767166dbd2f115c8c7bd007a7df0
SHA1f423d2a2373ec4956797193651dd004b19c8f502
SHA25655b77d1608a1d006b3f9d10c12ecbe081888af27b3f8e64b245b0f092ed4dc08
SHA512c5f12113cff8ec19cccc4a694d10c8178c738fae2d96e3afd55e53bcec016b07ff887b62242ee3be2d4bdd8c279e74733f11905e77171c3726c7d87cd93eabdb
-
Filesize
917KB
MD5a60880cf2de8056c9c5760bf11ca2834
SHA12e9345d16dd3ce5348b06a421af36a3eb55c6f1e
SHA2562a31d8233fc18272e991aa2fe2bb682270925e5bf43276b9f4dc087db6cf129b
SHA512381b4f299ad90da0c3bb1a814afcea6c311c57c10c8c3c79fbe3ab2143cd442dfdfd20bbf6cee45888923faca7dd343f0c8ec7aa8f87e2338c7ff48c1a9844e7
-
Filesize
917KB
MD5a60880cf2de8056c9c5760bf11ca2834
SHA12e9345d16dd3ce5348b06a421af36a3eb55c6f1e
SHA2562a31d8233fc18272e991aa2fe2bb682270925e5bf43276b9f4dc087db6cf129b
SHA512381b4f299ad90da0c3bb1a814afcea6c311c57c10c8c3c79fbe3ab2143cd442dfdfd20bbf6cee45888923faca7dd343f0c8ec7aa8f87e2338c7ff48c1a9844e7
-
Filesize
377KB
MD58240ae7f59fb434977686a2040ea62e9
SHA1c0fe02012d46dc9e12c388dd75cab32643708a18
SHA256230a7452b0db2ecd65ee767d852990ff9cb94f65c485e3a68faa4bcb11b52605
SHA51278c782edce8e3cdb57624f3be1bc69976691e1a1938b46214bde842b9cc02966be80872c7ae4093d8154c62fe9de20e2cfdf532feae5dfe647ba0d748777c96b
-
Filesize
377KB
MD58240ae7f59fb434977686a2040ea62e9
SHA1c0fe02012d46dc9e12c388dd75cab32643708a18
SHA256230a7452b0db2ecd65ee767d852990ff9cb94f65c485e3a68faa4bcb11b52605
SHA51278c782edce8e3cdb57624f3be1bc69976691e1a1938b46214bde842b9cc02966be80872c7ae4093d8154c62fe9de20e2cfdf532feae5dfe647ba0d748777c96b
-
Filesize
690KB
MD5d3b25d249fdfa5d88d3a5ca82b86fad5
SHA164ebc28a0145c6ba281aa54e430097dd44e05df4
SHA256047f9f6d8f1e8b46798b5cb9072c68472b8ec90714947a94bfc30c366e601f6f
SHA512a7d2319cdf586557a2e42f20314a7d460e8a4dcd9512e329906dd198b475d1012261d30fd4245e8cc9607a4acc2ef7239e7eebe63e43cdb5883d197afdcd4764
-
Filesize
690KB
MD5d3b25d249fdfa5d88d3a5ca82b86fad5
SHA164ebc28a0145c6ba281aa54e430097dd44e05df4
SHA256047f9f6d8f1e8b46798b5cb9072c68472b8ec90714947a94bfc30c366e601f6f
SHA512a7d2319cdf586557a2e42f20314a7d460e8a4dcd9512e329906dd198b475d1012261d30fd4245e8cc9607a4acc2ef7239e7eebe63e43cdb5883d197afdcd4764
-
Filesize
320KB
MD5e1655aef9cfb74b480c4d268a7cb995f
SHA14b2e8f41aaa83a3a9a2532be8581c0c7e8a2ce41
SHA256bbe1a817d5e60a660547f620aee0f5547aa35f0d801830d80d49cad1bdbf3958
SHA512a833a9f10e7e74f58081666d3af1b26ba535d5ad67bbe8b83a1a23268b23945671b0c0462127cce20cf7d8ccd312f5c8aae63f3c439d115d01f09a1338c61ec5
-
Filesize
320KB
MD5e1655aef9cfb74b480c4d268a7cb995f
SHA14b2e8f41aaa83a3a9a2532be8581c0c7e8a2ce41
SHA256bbe1a817d5e60a660547f620aee0f5547aa35f0d801830d80d49cad1bdbf3958
SHA512a833a9f10e7e74f58081666d3af1b26ba535d5ad67bbe8b83a1a23268b23945671b0c0462127cce20cf7d8ccd312f5c8aae63f3c439d115d01f09a1338c61ec5
-
Filesize
403KB
MD575632cb0f6127a564750878caf0d30f2
SHA12dab778459cd3983e1a6ca3b15d2e8ac02c2b3dc
SHA256ad945f65fb514988b225230ec940acf50744263bf297668ae5eb0f4dfeff7924
SHA512db0ab25a8669bee16877fa696de141131f8be5e4515677cefa9bcae42912883fd1a70c4a37c793876266b6c672051c43b98b8caf6763d40766f5ed6783f7a303
-
Filesize
403KB
MD575632cb0f6127a564750878caf0d30f2
SHA12dab778459cd3983e1a6ca3b15d2e8ac02c2b3dc
SHA256ad945f65fb514988b225230ec940acf50744263bf297668ae5eb0f4dfeff7924
SHA512db0ab25a8669bee16877fa696de141131f8be5e4515677cefa9bcae42912883fd1a70c4a37c793876266b6c672051c43b98b8caf6763d40766f5ed6783f7a303
-
Filesize
15KB
MD5ab2fe1c374dd8e9280ce16b9d124091f
SHA1e7238069d0ad6160c76854c349e7b648cccd0e5f
SHA25684b3ff10effda1a85bdd490b5b375c4bb0e3862fcea8661f488e8274b31ed4c6
SHA512cb54048e6b3cd0038cf31499d4bb2582040bb1f604053c26057f4437b4924b7cb67d39031f46a0fe7cf578c88dcedd3a1717799778d887a0c4d3588e4b65949d
-
Filesize
15KB
MD5ab2fe1c374dd8e9280ce16b9d124091f
SHA1e7238069d0ad6160c76854c349e7b648cccd0e5f
SHA25684b3ff10effda1a85bdd490b5b375c4bb0e3862fcea8661f488e8274b31ed4c6
SHA512cb54048e6b3cd0038cf31499d4bb2582040bb1f604053c26057f4437b4924b7cb67d39031f46a0fe7cf578c88dcedd3a1717799778d887a0c4d3588e4b65949d
-
Filesize
15KB
MD5ab2fe1c374dd8e9280ce16b9d124091f
SHA1e7238069d0ad6160c76854c349e7b648cccd0e5f
SHA25684b3ff10effda1a85bdd490b5b375c4bb0e3862fcea8661f488e8274b31ed4c6
SHA512cb54048e6b3cd0038cf31499d4bb2582040bb1f604053c26057f4437b4924b7cb67d39031f46a0fe7cf578c88dcedd3a1717799778d887a0c4d3588e4b65949d
-
Filesize
377KB
MD58240ae7f59fb434977686a2040ea62e9
SHA1c0fe02012d46dc9e12c388dd75cab32643708a18
SHA256230a7452b0db2ecd65ee767d852990ff9cb94f65c485e3a68faa4bcb11b52605
SHA51278c782edce8e3cdb57624f3be1bc69976691e1a1938b46214bde842b9cc02966be80872c7ae4093d8154c62fe9de20e2cfdf532feae5dfe647ba0d748777c96b
-
Filesize
377KB
MD58240ae7f59fb434977686a2040ea62e9
SHA1c0fe02012d46dc9e12c388dd75cab32643708a18
SHA256230a7452b0db2ecd65ee767d852990ff9cb94f65c485e3a68faa4bcb11b52605
SHA51278c782edce8e3cdb57624f3be1bc69976691e1a1938b46214bde842b9cc02966be80872c7ae4093d8154c62fe9de20e2cfdf532feae5dfe647ba0d748777c96b
-
Filesize
377KB
MD58240ae7f59fb434977686a2040ea62e9
SHA1c0fe02012d46dc9e12c388dd75cab32643708a18
SHA256230a7452b0db2ecd65ee767d852990ff9cb94f65c485e3a68faa4bcb11b52605
SHA51278c782edce8e3cdb57624f3be1bc69976691e1a1938b46214bde842b9cc02966be80872c7ae4093d8154c62fe9de20e2cfdf532feae5dfe647ba0d748777c96b
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5