Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 02:15
Static task
static1
General
-
Target
e8d6ec0d086386faf8f2520a250729df64dfafd38f13746a8971b3a7661b6b6e.exe
-
Size
1.4MB
-
MD5
4810307e38eca3845ded2b103a68cb68
-
SHA1
62462aba270a5f63ef404d2d8917f282352a8b38
-
SHA256
e8d6ec0d086386faf8f2520a250729df64dfafd38f13746a8971b3a7661b6b6e
-
SHA512
31761bf13029f8be133040c84cd79d7197036546e6f4fc168b22fa8d7adc6cd0b59727637aef1a0a91c6e8bba189f86db0d733eedd0d8e03a838065231511f49
-
SSDEEP
24576:ty4spPs/FIBz1d/kcdoeXaa1du0M9/GSd/1bDs720EbSYc4K11PYWWju40S0:IZhoFy1GhkaXbGA9bD22pbSY+1PY5
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beHG45ud81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsWC67gS26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnPr63Km59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beHG45ud81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beHG45ud81.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsWC67gS26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsWC67gS26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsWC67gS26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsWC67gS26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnPr63Km59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnPr63Km59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnPr63Km59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beHG45ud81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beHG45ud81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beHG45ud81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsWC67gS26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnPr63Km59.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/4744-183-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-184-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-186-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-188-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-190-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-192-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-194-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-198-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-196-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-200-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-202-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-204-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-210-0x00000000073D0000-0x00000000073E0000-memory.dmp family_redline behavioral1/memory/4744-206-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-211-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-213-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-215-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-217-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-219-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-221-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-223-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-225-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-227-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-229-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-231-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-233-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-235-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-237-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-239-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-241-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-243-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-245-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-247-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/4744-249-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation hk66ij78uS88.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 13 IoCs
pid Process 2628 ptIt2849LJ.exe 1636 ptyx6194sP.exe 2716 pthT6577oB.exe 432 ptpW2525gx.exe 3064 ptJp4790Ur.exe 2584 beHG45ud81.exe 4744 cuzk60jA22.exe 932 dsWC67gS26.exe 3660 fr19II6282vX.exe 3788 gnPr63Km59.exe 4356 hk66ij78uS88.exe 4712 mnolyk.exe 4316 jxnq66ow89.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beHG45ud81.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsWC67gS26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsWC67gS26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnPr63Km59.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptpW2525gx.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e8d6ec0d086386faf8f2520a250729df64dfafd38f13746a8971b3a7661b6b6e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8d6ec0d086386faf8f2520a250729df64dfafd38f13746a8971b3a7661b6b6e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptIt2849LJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptyx6194sP.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pthT6577oB.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pthT6577oB.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptpW2525gx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptJp4790Ur.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptIt2849LJ.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptyx6194sP.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptJp4790Ur.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4760 4744 WerFault.exe 94 1476 932 WerFault.exe 105 3416 3660 WerFault.exe 108 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2584 beHG45ud81.exe 2584 beHG45ud81.exe 4744 cuzk60jA22.exe 4744 cuzk60jA22.exe 932 dsWC67gS26.exe 932 dsWC67gS26.exe 3660 fr19II6282vX.exe 3660 fr19II6282vX.exe 3788 gnPr63Km59.exe 3788 gnPr63Km59.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2584 beHG45ud81.exe Token: SeDebugPrivilege 4744 cuzk60jA22.exe Token: SeDebugPrivilege 932 dsWC67gS26.exe Token: SeDebugPrivilege 3660 fr19II6282vX.exe Token: SeDebugPrivilege 3788 gnPr63Km59.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2628 1712 e8d6ec0d086386faf8f2520a250729df64dfafd38f13746a8971b3a7661b6b6e.exe 84 PID 1712 wrote to memory of 2628 1712 e8d6ec0d086386faf8f2520a250729df64dfafd38f13746a8971b3a7661b6b6e.exe 84 PID 1712 wrote to memory of 2628 1712 e8d6ec0d086386faf8f2520a250729df64dfafd38f13746a8971b3a7661b6b6e.exe 84 PID 2628 wrote to memory of 1636 2628 ptIt2849LJ.exe 85 PID 2628 wrote to memory of 1636 2628 ptIt2849LJ.exe 85 PID 2628 wrote to memory of 1636 2628 ptIt2849LJ.exe 85 PID 1636 wrote to memory of 2716 1636 ptyx6194sP.exe 86 PID 1636 wrote to memory of 2716 1636 ptyx6194sP.exe 86 PID 1636 wrote to memory of 2716 1636 ptyx6194sP.exe 86 PID 2716 wrote to memory of 432 2716 pthT6577oB.exe 87 PID 2716 wrote to memory of 432 2716 pthT6577oB.exe 87 PID 2716 wrote to memory of 432 2716 pthT6577oB.exe 87 PID 432 wrote to memory of 3064 432 ptpW2525gx.exe 88 PID 432 wrote to memory of 3064 432 ptpW2525gx.exe 88 PID 432 wrote to memory of 3064 432 ptpW2525gx.exe 88 PID 3064 wrote to memory of 2584 3064 ptJp4790Ur.exe 89 PID 3064 wrote to memory of 2584 3064 ptJp4790Ur.exe 89 PID 3064 wrote to memory of 4744 3064 ptJp4790Ur.exe 94 PID 3064 wrote to memory of 4744 3064 ptJp4790Ur.exe 94 PID 3064 wrote to memory of 4744 3064 ptJp4790Ur.exe 94 PID 432 wrote to memory of 932 432 ptpW2525gx.exe 105 PID 432 wrote to memory of 932 432 ptpW2525gx.exe 105 PID 432 wrote to memory of 932 432 ptpW2525gx.exe 105 PID 2716 wrote to memory of 3660 2716 pthT6577oB.exe 108 PID 2716 wrote to memory of 3660 2716 pthT6577oB.exe 108 PID 2716 wrote to memory of 3660 2716 pthT6577oB.exe 108 PID 1636 wrote to memory of 3788 1636 ptyx6194sP.exe 118 PID 1636 wrote to memory of 3788 1636 ptyx6194sP.exe 118 PID 2628 wrote to memory of 4356 2628 ptIt2849LJ.exe 120 PID 2628 wrote to memory of 4356 2628 ptIt2849LJ.exe 120 PID 2628 wrote to memory of 4356 2628 ptIt2849LJ.exe 120 PID 4356 wrote to memory of 4712 4356 hk66ij78uS88.exe 121 PID 4356 wrote to memory of 4712 4356 hk66ij78uS88.exe 121 PID 4356 wrote to memory of 4712 4356 hk66ij78uS88.exe 121 PID 1712 wrote to memory of 4316 1712 e8d6ec0d086386faf8f2520a250729df64dfafd38f13746a8971b3a7661b6b6e.exe 122 PID 1712 wrote to memory of 4316 1712 e8d6ec0d086386faf8f2520a250729df64dfafd38f13746a8971b3a7661b6b6e.exe 122 PID 1712 wrote to memory of 4316 1712 e8d6ec0d086386faf8f2520a250729df64dfafd38f13746a8971b3a7661b6b6e.exe 122 PID 4712 wrote to memory of 3896 4712 mnolyk.exe 123 PID 4712 wrote to memory of 3896 4712 mnolyk.exe 123 PID 4712 wrote to memory of 3896 4712 mnolyk.exe 123 PID 4712 wrote to memory of 2780 4712 mnolyk.exe 125 PID 4712 wrote to memory of 2780 4712 mnolyk.exe 125 PID 4712 wrote to memory of 2780 4712 mnolyk.exe 125 PID 2780 wrote to memory of 3924 2780 cmd.exe 128 PID 2780 wrote to memory of 3924 2780 cmd.exe 128 PID 2780 wrote to memory of 3924 2780 cmd.exe 128 PID 2780 wrote to memory of 636 2780 cmd.exe 129 PID 2780 wrote to memory of 636 2780 cmd.exe 129 PID 2780 wrote to memory of 636 2780 cmd.exe 129 PID 2780 wrote to memory of 3576 2780 cmd.exe 130 PID 2780 wrote to memory of 3576 2780 cmd.exe 130 PID 2780 wrote to memory of 3576 2780 cmd.exe 130 PID 2780 wrote to memory of 2144 2780 cmd.exe 131 PID 2780 wrote to memory of 2144 2780 cmd.exe 131 PID 2780 wrote to memory of 2144 2780 cmd.exe 131 PID 2780 wrote to memory of 3140 2780 cmd.exe 132 PID 2780 wrote to memory of 3140 2780 cmd.exe 132 PID 2780 wrote to memory of 3140 2780 cmd.exe 132 PID 2780 wrote to memory of 1504 2780 cmd.exe 133 PID 2780 wrote to memory of 1504 2780 cmd.exe 133 PID 2780 wrote to memory of 1504 2780 cmd.exe 133
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8d6ec0d086386faf8f2520a250729df64dfafd38f13746a8971b3a7661b6b6e.exe"C:\Users\Admin\AppData\Local\Temp\e8d6ec0d086386faf8f2520a250729df64dfafd38f13746a8971b3a7661b6b6e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptIt2849LJ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptIt2849LJ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptyx6194sP.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptyx6194sP.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pthT6577oB.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pthT6577oB.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptpW2525gx.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptpW2525gx.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptJp4790Ur.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptJp4790Ur.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beHG45ud81.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beHG45ud81.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuzk60jA22.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuzk60jA22.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 19288⤵
- Program crash
PID:4760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsWC67gS26.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsWC67gS26.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 10847⤵
- Program crash
PID:1476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr19II6282vX.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr19II6282vX.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 18126⤵
- Program crash
PID:3416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnPr63Km59.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnPr63Km59.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk66ij78uS88.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk66ij78uS88.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:3896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:3576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2144
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:3140
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:1504
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxnq66ow89.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxnq66ow89.exe2⤵
- Executes dropped EXE
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4744 -ip 47441⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 932 -ip 9321⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3660 -ip 36601⤵PID:4520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD54125006175a599aa18148474f10729d5
SHA15de90e7821df79e41fa7defd161b06f2fc80e7ea
SHA256b2c3100aaf19831e3e5927466ce1dc37968bf08f912b4724313c2507c8c88795
SHA512adb51b51e42db9310687f3e3641688ba1e63f260430ff9bee6c8f5acc6d400bf0e57cdfa1e67c053e3dbdad8c8a23da4cc3ffc4f82b424b3d84a8c18ecc5622c
-
Filesize
240KB
MD54125006175a599aa18148474f10729d5
SHA15de90e7821df79e41fa7defd161b06f2fc80e7ea
SHA256b2c3100aaf19831e3e5927466ce1dc37968bf08f912b4724313c2507c8c88795
SHA512adb51b51e42db9310687f3e3641688ba1e63f260430ff9bee6c8f5acc6d400bf0e57cdfa1e67c053e3dbdad8c8a23da4cc3ffc4f82b424b3d84a8c18ecc5622c
-
Filesize
240KB
MD54125006175a599aa18148474f10729d5
SHA15de90e7821df79e41fa7defd161b06f2fc80e7ea
SHA256b2c3100aaf19831e3e5927466ce1dc37968bf08f912b4724313c2507c8c88795
SHA512adb51b51e42db9310687f3e3641688ba1e63f260430ff9bee6c8f5acc6d400bf0e57cdfa1e67c053e3dbdad8c8a23da4cc3ffc4f82b424b3d84a8c18ecc5622c
-
Filesize
176KB
MD5d54fe06a309149032aa71d41fb1b9afb
SHA1688ba6284433508d655f5e78b613ba54cd83d338
SHA2560ea685d52a0e9ab7415c6338a376040b9a38bd2f4e15c502db72b7330b8dbc1c
SHA512369f5cb02d4e30eab05d4e2969991340e641df5da59d43924d54e2f1b1a30d9f8b494393c9565dae7b8271cc1d39aa1bdca2b1cf8f0bd1224e6fdc77714db709
-
Filesize
176KB
MD5d54fe06a309149032aa71d41fb1b9afb
SHA1688ba6284433508d655f5e78b613ba54cd83d338
SHA2560ea685d52a0e9ab7415c6338a376040b9a38bd2f4e15c502db72b7330b8dbc1c
SHA512369f5cb02d4e30eab05d4e2969991340e641df5da59d43924d54e2f1b1a30d9f8b494393c9565dae7b8271cc1d39aa1bdca2b1cf8f0bd1224e6fdc77714db709
-
Filesize
1.2MB
MD5a3eee781d5b2d8c59a19d95b79484af4
SHA12b11d4f08e3547dedabb9faf233db931da1286c7
SHA2562e6c179355883f88ceab0f252c6b2b49b64d7d69237bf4460d890a6260fa2a61
SHA5121cc4c7f49de0f419055c93ea52a57dc7b9bd5cda4169099220fcd8e34b2956e8278b7ca765daa970524933e93b6856fba918e0aeb45c7432a046b8539b2e3aed
-
Filesize
1.2MB
MD5a3eee781d5b2d8c59a19d95b79484af4
SHA12b11d4f08e3547dedabb9faf233db931da1286c7
SHA2562e6c179355883f88ceab0f252c6b2b49b64d7d69237bf4460d890a6260fa2a61
SHA5121cc4c7f49de0f419055c93ea52a57dc7b9bd5cda4169099220fcd8e34b2956e8278b7ca765daa970524933e93b6856fba918e0aeb45c7432a046b8539b2e3aed
-
Filesize
240KB
MD54125006175a599aa18148474f10729d5
SHA15de90e7821df79e41fa7defd161b06f2fc80e7ea
SHA256b2c3100aaf19831e3e5927466ce1dc37968bf08f912b4724313c2507c8c88795
SHA512adb51b51e42db9310687f3e3641688ba1e63f260430ff9bee6c8f5acc6d400bf0e57cdfa1e67c053e3dbdad8c8a23da4cc3ffc4f82b424b3d84a8c18ecc5622c
-
Filesize
240KB
MD54125006175a599aa18148474f10729d5
SHA15de90e7821df79e41fa7defd161b06f2fc80e7ea
SHA256b2c3100aaf19831e3e5927466ce1dc37968bf08f912b4724313c2507c8c88795
SHA512adb51b51e42db9310687f3e3641688ba1e63f260430ff9bee6c8f5acc6d400bf0e57cdfa1e67c053e3dbdad8c8a23da4cc3ffc4f82b424b3d84a8c18ecc5622c
-
Filesize
1.0MB
MD5e720e06936d2a17a60d3e1bd268a30ff
SHA176b84cfc33a50533126d9cae2c20f092f56efdae
SHA25636846a5c0425b4ca41ce273e3b887bbd159a483382909fc857847ecfb9e7e80b
SHA512189ede76eb28e7746f5e624a6cbb9b31ee81ee15118eda84db6ad95ebe98f9b67518d4ad51b97250d99def49d838e9e61f3f28ab539e0239c61d3d6c9a037de3
-
Filesize
1.0MB
MD5e720e06936d2a17a60d3e1bd268a30ff
SHA176b84cfc33a50533126d9cae2c20f092f56efdae
SHA25636846a5c0425b4ca41ce273e3b887bbd159a483382909fc857847ecfb9e7e80b
SHA512189ede76eb28e7746f5e624a6cbb9b31ee81ee15118eda84db6ad95ebe98f9b67518d4ad51b97250d99def49d838e9e61f3f28ab539e0239c61d3d6c9a037de3
-
Filesize
15KB
MD56f63d2536a49fc38c22d1e2a87a6fa4c
SHA1f590e9a17e6dc17b626be1d35769d5f4b8817ee7
SHA256f2ba94f87e838a2beb93afc4916f7277026da19b1ec1cb8d1a275853bc46237a
SHA51221ea2394cc9ecdd44be73550260600f098a17416fe3cc9ee5f6decf1d920f93f66697c15937a2db28340e4a10c4b2437759ad7b96477a0c66b7d4a1205f67269
-
Filesize
15KB
MD56f63d2536a49fc38c22d1e2a87a6fa4c
SHA1f590e9a17e6dc17b626be1d35769d5f4b8817ee7
SHA256f2ba94f87e838a2beb93afc4916f7277026da19b1ec1cb8d1a275853bc46237a
SHA51221ea2394cc9ecdd44be73550260600f098a17416fe3cc9ee5f6decf1d920f93f66697c15937a2db28340e4a10c4b2437759ad7b96477a0c66b7d4a1205f67269
-
Filesize
971KB
MD50c33c51643fcfb10186bc6681111e58a
SHA1aa77e068a1a6f14469b64527f4025b546f68366c
SHA256d18e59d963bd498bbad10b6226c1159e801136cae7381c0af8f6437e8e0761fe
SHA512ecf740409db5dfed61cb6290387a028cfc96be67f780d41abedbedb3099298672a4f8de251b40843c945d1e3688f318d3713d3fe32fb5d86c196b7798a2a1f1b
-
Filesize
971KB
MD50c33c51643fcfb10186bc6681111e58a
SHA1aa77e068a1a6f14469b64527f4025b546f68366c
SHA256d18e59d963bd498bbad10b6226c1159e801136cae7381c0af8f6437e8e0761fe
SHA512ecf740409db5dfed61cb6290387a028cfc96be67f780d41abedbedb3099298672a4f8de251b40843c945d1e3688f318d3713d3fe32fb5d86c196b7798a2a1f1b
-
Filesize
378KB
MD50699a3dd8a0bfbef309a3c474b22b56d
SHA18f8218184e8f28b14b8a3d5f828e28b9d8cd40a8
SHA2560fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178
SHA5126dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd
-
Filesize
378KB
MD50699a3dd8a0bfbef309a3c474b22b56d
SHA18f8218184e8f28b14b8a3d5f828e28b9d8cd40a8
SHA2560fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178
SHA5126dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd
-
Filesize
690KB
MD5ee7ab76c8d36bf9782b363d45db9bae1
SHA1a8ac0ff05f6bce81b9a0ea3b160473aaae922c13
SHA256f293f1f11c85699e452d52837795f237cccf71c33e2696a343e9687a45418dcd
SHA512cea07dfea812bc971b4664a1bc39a92cf256436fbef5a4e9d9b80676c05793f5c22db75eb361b58fbe44a6ca44984aa6c360e5f0c27043e6bceef325ceacbb31
-
Filesize
690KB
MD5ee7ab76c8d36bf9782b363d45db9bae1
SHA1a8ac0ff05f6bce81b9a0ea3b160473aaae922c13
SHA256f293f1f11c85699e452d52837795f237cccf71c33e2696a343e9687a45418dcd
SHA512cea07dfea812bc971b4664a1bc39a92cf256436fbef5a4e9d9b80676c05793f5c22db75eb361b58fbe44a6ca44984aa6c360e5f0c27043e6bceef325ceacbb31
-
Filesize
320KB
MD5887d5f3f25f82ef4ec073a39f3050594
SHA10f0d0e2f3b7d8b61dffab0d347d81740dfe956d8
SHA256f253180eaa3ade6c077fe6af72f5146029ff4d27a93debfe7f66507aa8739c65
SHA512bf6ab835d6f35063d6d499b18a60581b97c894e9a524da4b60008765a9853b29f0594c6fdca718b64cd5799a7b0fea1c115d21662bf90ff4dd67083d289cc81d
-
Filesize
320KB
MD5887d5f3f25f82ef4ec073a39f3050594
SHA10f0d0e2f3b7d8b61dffab0d347d81740dfe956d8
SHA256f253180eaa3ade6c077fe6af72f5146029ff4d27a93debfe7f66507aa8739c65
SHA512bf6ab835d6f35063d6d499b18a60581b97c894e9a524da4b60008765a9853b29f0594c6fdca718b64cd5799a7b0fea1c115d21662bf90ff4dd67083d289cc81d
-
Filesize
403KB
MD57596c3895233f75ef77066646be26c99
SHA1402b4da9a7b07a632d4d416ff6d704e1c2888596
SHA25616ad1e7c65829b4137e4915d4681014e90f2d9508d040bf13f2fca4b2e9a9dae
SHA512513d9a01d2a66f6cb9b116caca2e97c8d1d555af8047e49181120c51286b4206fd6b9e5e52f53b14f72b00a33c19971439c8bad62de37b006ba38f9d862ddf93
-
Filesize
403KB
MD57596c3895233f75ef77066646be26c99
SHA1402b4da9a7b07a632d4d416ff6d704e1c2888596
SHA25616ad1e7c65829b4137e4915d4681014e90f2d9508d040bf13f2fca4b2e9a9dae
SHA512513d9a01d2a66f6cb9b116caca2e97c8d1d555af8047e49181120c51286b4206fd6b9e5e52f53b14f72b00a33c19971439c8bad62de37b006ba38f9d862ddf93
-
Filesize
15KB
MD5b74aff952156113ed590248f4592bbfc
SHA1079b654081f014911261b610dcaafdfefc3dec2a
SHA2564abc7f23d057e01508923c5095d0a2771887c657094e06e25a84c6e8569835f3
SHA512c6b198709ad045b041c5d87ae340c4b616e36f319d4598ebe2fce328a12fe0fff19271a1345696ef65e8eb6ed92e83e419f60c4f827387eb87cce82386cc82c9
-
Filesize
15KB
MD5b74aff952156113ed590248f4592bbfc
SHA1079b654081f014911261b610dcaafdfefc3dec2a
SHA2564abc7f23d057e01508923c5095d0a2771887c657094e06e25a84c6e8569835f3
SHA512c6b198709ad045b041c5d87ae340c4b616e36f319d4598ebe2fce328a12fe0fff19271a1345696ef65e8eb6ed92e83e419f60c4f827387eb87cce82386cc82c9
-
Filesize
15KB
MD5b74aff952156113ed590248f4592bbfc
SHA1079b654081f014911261b610dcaafdfefc3dec2a
SHA2564abc7f23d057e01508923c5095d0a2771887c657094e06e25a84c6e8569835f3
SHA512c6b198709ad045b041c5d87ae340c4b616e36f319d4598ebe2fce328a12fe0fff19271a1345696ef65e8eb6ed92e83e419f60c4f827387eb87cce82386cc82c9
-
Filesize
378KB
MD50699a3dd8a0bfbef309a3c474b22b56d
SHA18f8218184e8f28b14b8a3d5f828e28b9d8cd40a8
SHA2560fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178
SHA5126dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd
-
Filesize
378KB
MD50699a3dd8a0bfbef309a3c474b22b56d
SHA18f8218184e8f28b14b8a3d5f828e28b9d8cd40a8
SHA2560fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178
SHA5126dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd
-
Filesize
378KB
MD50699a3dd8a0bfbef309a3c474b22b56d
SHA18f8218184e8f28b14b8a3d5f828e28b9d8cd40a8
SHA2560fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178
SHA5126dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd