Analysis
-
max time kernel
116s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 02:16
Static task
static1
General
-
Target
c1754a44c27a5ac43ec0fd23dee34aec945981770690ef2e645868d3088489e3.exe
-
Size
1.4MB
-
MD5
9eb5be184b6847d6f09a35d5efdc309e
-
SHA1
cb7275d5bbc0b30ad00228c91999066247391c2b
-
SHA256
c1754a44c27a5ac43ec0fd23dee34aec945981770690ef2e645868d3088489e3
-
SHA512
3c90ff942e90bfff49d1d0a515dd902535fd8b6b0650182ce6ab47d48cfb52529a8b169e54833014b46459152161ff17525ff51ad6c92a9f902760644e34fcff
-
SSDEEP
24576:vyFgVm8FXMOTy+QMjcdHKYiFqXwg9xregf3I32w6Wc+kt:6Fg3y++Ga4g/Zd+
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.15/dF30Hn4m/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection inG71ZM09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rIM07Pk43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rIM07Pk43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rIM07Pk43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mXk64Rw80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mXk64Rw80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" inG71ZM09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" inG71ZM09.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection mXk64Rw80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mXk64Rw80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" inG71ZM09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" inG71ZM09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mXk64Rw80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rIM07Pk43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" inG71ZM09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mXk64Rw80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rIM07Pk43.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/1384-183-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-184-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-186-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-188-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-190-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-192-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-194-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-198-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-196-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-202-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-204-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-206-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-208-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-210-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-212-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-214-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-216-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-218-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-220-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-222-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-224-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-226-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-228-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-230-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-232-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-234-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-238-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-236-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-240-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-242-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-244-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-246-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-248-0x0000000004C10000-0x0000000004C4E000-memory.dmp family_redline behavioral1/memory/1384-1099-0x0000000004C00000-0x0000000004C10000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation sf06nE32jX89.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 4124 vmJG77tt48.exe 1768 vmIC59aE00.exe 3232 vmeZ41EC79.exe 216 vmyA87ko12.exe 4848 vmib59YV17.exe 1056 inG71ZM09.exe 1384 krY93DV06.exe 3328 mXk64Rw80.exe 3468 nGW10ax32.exe 2480 rIM07Pk43.exe 5112 sf06nE32jX89.exe 4296 mnolyk.exe 2684 tv95wY49LA55.exe 396 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 1780 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" inG71ZM09.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mXk64Rw80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mXk64Rw80.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rIM07Pk43.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmyA87ko12.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmib59YV17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" vmib59YV17.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c1754a44c27a5ac43ec0fd23dee34aec945981770690ef2e645868d3088489e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1754a44c27a5ac43ec0fd23dee34aec945981770690ef2e645868d3088489e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmJG77tt48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vmIC59aE00.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" vmeZ41EC79.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmJG77tt48.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmIC59aE00.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmeZ41EC79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vmyA87ko12.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4020 1384 WerFault.exe 95 556 3328 WerFault.exe 99 2084 3468 WerFault.exe 104 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1056 inG71ZM09.exe 1056 inG71ZM09.exe 1384 krY93DV06.exe 1384 krY93DV06.exe 3328 mXk64Rw80.exe 3328 mXk64Rw80.exe 3468 nGW10ax32.exe 3468 nGW10ax32.exe 2480 rIM07Pk43.exe 2480 rIM07Pk43.exe 2684 tv95wY49LA55.exe 2684 tv95wY49LA55.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1056 inG71ZM09.exe Token: SeDebugPrivilege 1384 krY93DV06.exe Token: SeDebugPrivilege 3328 mXk64Rw80.exe Token: SeDebugPrivilege 3468 nGW10ax32.exe Token: SeDebugPrivilege 2480 rIM07Pk43.exe Token: SeDebugPrivilege 2684 tv95wY49LA55.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 4124 4216 c1754a44c27a5ac43ec0fd23dee34aec945981770690ef2e645868d3088489e3.exe 86 PID 4216 wrote to memory of 4124 4216 c1754a44c27a5ac43ec0fd23dee34aec945981770690ef2e645868d3088489e3.exe 86 PID 4216 wrote to memory of 4124 4216 c1754a44c27a5ac43ec0fd23dee34aec945981770690ef2e645868d3088489e3.exe 86 PID 4124 wrote to memory of 1768 4124 vmJG77tt48.exe 87 PID 4124 wrote to memory of 1768 4124 vmJG77tt48.exe 87 PID 4124 wrote to memory of 1768 4124 vmJG77tt48.exe 87 PID 1768 wrote to memory of 3232 1768 vmIC59aE00.exe 88 PID 1768 wrote to memory of 3232 1768 vmIC59aE00.exe 88 PID 1768 wrote to memory of 3232 1768 vmIC59aE00.exe 88 PID 3232 wrote to memory of 216 3232 vmeZ41EC79.exe 89 PID 3232 wrote to memory of 216 3232 vmeZ41EC79.exe 89 PID 3232 wrote to memory of 216 3232 vmeZ41EC79.exe 89 PID 216 wrote to memory of 4848 216 vmyA87ko12.exe 90 PID 216 wrote to memory of 4848 216 vmyA87ko12.exe 90 PID 216 wrote to memory of 4848 216 vmyA87ko12.exe 90 PID 4848 wrote to memory of 1056 4848 vmib59YV17.exe 91 PID 4848 wrote to memory of 1056 4848 vmib59YV17.exe 91 PID 4848 wrote to memory of 1384 4848 vmib59YV17.exe 95 PID 4848 wrote to memory of 1384 4848 vmib59YV17.exe 95 PID 4848 wrote to memory of 1384 4848 vmib59YV17.exe 95 PID 216 wrote to memory of 3328 216 vmyA87ko12.exe 99 PID 216 wrote to memory of 3328 216 vmyA87ko12.exe 99 PID 216 wrote to memory of 3328 216 vmyA87ko12.exe 99 PID 3232 wrote to memory of 3468 3232 vmeZ41EC79.exe 104 PID 3232 wrote to memory of 3468 3232 vmeZ41EC79.exe 104 PID 3232 wrote to memory of 3468 3232 vmeZ41EC79.exe 104 PID 1768 wrote to memory of 2480 1768 vmIC59aE00.exe 116 PID 1768 wrote to memory of 2480 1768 vmIC59aE00.exe 116 PID 4124 wrote to memory of 5112 4124 vmJG77tt48.exe 117 PID 4124 wrote to memory of 5112 4124 vmJG77tt48.exe 117 PID 4124 wrote to memory of 5112 4124 vmJG77tt48.exe 117 PID 5112 wrote to memory of 4296 5112 sf06nE32jX89.exe 118 PID 5112 wrote to memory of 4296 5112 sf06nE32jX89.exe 118 PID 5112 wrote to memory of 4296 5112 sf06nE32jX89.exe 118 PID 4216 wrote to memory of 2684 4216 c1754a44c27a5ac43ec0fd23dee34aec945981770690ef2e645868d3088489e3.exe 119 PID 4216 wrote to memory of 2684 4216 c1754a44c27a5ac43ec0fd23dee34aec945981770690ef2e645868d3088489e3.exe 119 PID 4216 wrote to memory of 2684 4216 c1754a44c27a5ac43ec0fd23dee34aec945981770690ef2e645868d3088489e3.exe 119 PID 4296 wrote to memory of 956 4296 mnolyk.exe 120 PID 4296 wrote to memory of 956 4296 mnolyk.exe 120 PID 4296 wrote to memory of 956 4296 mnolyk.exe 120 PID 4296 wrote to memory of 4912 4296 mnolyk.exe 122 PID 4296 wrote to memory of 4912 4296 mnolyk.exe 122 PID 4296 wrote to memory of 4912 4296 mnolyk.exe 122 PID 4912 wrote to memory of 224 4912 cmd.exe 124 PID 4912 wrote to memory of 224 4912 cmd.exe 124 PID 4912 wrote to memory of 224 4912 cmd.exe 124 PID 4912 wrote to memory of 4308 4912 cmd.exe 125 PID 4912 wrote to memory of 4308 4912 cmd.exe 125 PID 4912 wrote to memory of 4308 4912 cmd.exe 125 PID 4912 wrote to memory of 4940 4912 cmd.exe 126 PID 4912 wrote to memory of 4940 4912 cmd.exe 126 PID 4912 wrote to memory of 4940 4912 cmd.exe 126 PID 4912 wrote to memory of 3816 4912 cmd.exe 127 PID 4912 wrote to memory of 3816 4912 cmd.exe 127 PID 4912 wrote to memory of 3816 4912 cmd.exe 127 PID 4912 wrote to memory of 2592 4912 cmd.exe 128 PID 4912 wrote to memory of 2592 4912 cmd.exe 128 PID 4912 wrote to memory of 2592 4912 cmd.exe 128 PID 4912 wrote to memory of 5104 4912 cmd.exe 129 PID 4912 wrote to memory of 5104 4912 cmd.exe 129 PID 4912 wrote to memory of 5104 4912 cmd.exe 129 PID 4296 wrote to memory of 1780 4296 mnolyk.exe 132 PID 4296 wrote to memory of 1780 4296 mnolyk.exe 132 PID 4296 wrote to memory of 1780 4296 mnolyk.exe 132
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1754a44c27a5ac43ec0fd23dee34aec945981770690ef2e645868d3088489e3.exe"C:\Users\Admin\AppData\Local\Temp\c1754a44c27a5ac43ec0fd23dee34aec945981770690ef2e645868d3088489e3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmJG77tt48.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmJG77tt48.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmIC59aE00.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmIC59aE00.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmeZ41EC79.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmeZ41EC79.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmyA87ko12.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmyA87ko12.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmib59YV17.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmib59YV17.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\inG71ZM09.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\inG71ZM09.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\krY93DV06.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\krY93DV06.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 13368⤵
- Program crash
PID:4020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\mXk64Rw80.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\mXk64Rw80.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3328 -s 10847⤵
- Program crash
PID:556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nGW10ax32.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nGW10ax32.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 13326⤵
- Program crash
PID:2084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rIM07Pk43.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rIM07Pk43.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf06nE32jX89.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf06nE32jX89.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4f9dd6f8a7" /P "Admin:N"&&CACLS "..\4f9dd6f8a7" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:224
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:4308
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:4940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3816
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:N"6⤵PID:2592
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:R" /E6⤵PID:5104
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1780
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv95wY49LA55.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv95wY49LA55.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1384 -ip 13841⤵PID:1032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3328 -ip 33281⤵PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3468 -ip 34681⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe1⤵
- Executes dropped EXE
PID:396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD52e9b22cf7222ec85aa995a2ede7d9fe6
SHA1b8532a9977503bb42c744037e57325a6a20eef74
SHA256742eba1dff41bf001c230970576d6e5c64c53abf245e4940b0b65d6014796711
SHA5121c75d470c5398e6f62d84440a5841a32cb94ce15d61dc0545e9bcdd320e1877e9c29a757e8c2488b52e2d84c92ae461b02f52c2efc594b8a05f1565bce7cee41
-
Filesize
240KB
MD52e9b22cf7222ec85aa995a2ede7d9fe6
SHA1b8532a9977503bb42c744037e57325a6a20eef74
SHA256742eba1dff41bf001c230970576d6e5c64c53abf245e4940b0b65d6014796711
SHA5121c75d470c5398e6f62d84440a5841a32cb94ce15d61dc0545e9bcdd320e1877e9c29a757e8c2488b52e2d84c92ae461b02f52c2efc594b8a05f1565bce7cee41
-
Filesize
240KB
MD52e9b22cf7222ec85aa995a2ede7d9fe6
SHA1b8532a9977503bb42c744037e57325a6a20eef74
SHA256742eba1dff41bf001c230970576d6e5c64c53abf245e4940b0b65d6014796711
SHA5121c75d470c5398e6f62d84440a5841a32cb94ce15d61dc0545e9bcdd320e1877e9c29a757e8c2488b52e2d84c92ae461b02f52c2efc594b8a05f1565bce7cee41
-
Filesize
240KB
MD52e9b22cf7222ec85aa995a2ede7d9fe6
SHA1b8532a9977503bb42c744037e57325a6a20eef74
SHA256742eba1dff41bf001c230970576d6e5c64c53abf245e4940b0b65d6014796711
SHA5121c75d470c5398e6f62d84440a5841a32cb94ce15d61dc0545e9bcdd320e1877e9c29a757e8c2488b52e2d84c92ae461b02f52c2efc594b8a05f1565bce7cee41
-
Filesize
176KB
MD5204deb06c081cabed58914bd290989e6
SHA15e113cb3206bc7b1aa17d474ee45ced8192d2346
SHA2563c05abb48cf069f7edaa51f578766ee440a700712244e854b089a7272f946109
SHA512278b0ce2d4b18595c58818726abd2f2ce0648257b7f1f289b94c516e087c2f359fa6ff91af328d642cf2f0b8517345715bd1913e4fb2baeb8234d88b55f759c1
-
Filesize
176KB
MD5204deb06c081cabed58914bd290989e6
SHA15e113cb3206bc7b1aa17d474ee45ced8192d2346
SHA2563c05abb48cf069f7edaa51f578766ee440a700712244e854b089a7272f946109
SHA512278b0ce2d4b18595c58818726abd2f2ce0648257b7f1f289b94c516e087c2f359fa6ff91af328d642cf2f0b8517345715bd1913e4fb2baeb8234d88b55f759c1
-
Filesize
1.2MB
MD5efb607e3b12e49023f6839f72a8c8d90
SHA1863098c3ba56e2de0f55c8e33ee011b7dcbc5222
SHA2564084e7bc4ec9c49900af8be337f5c67e479e2827ce76ed88ca213eacc8fdc8a3
SHA512a468bd183ed7a9cb916f0b4056d1c240f3e7f072bf97e5add13ac6f7b52dd656af8f7faa12ce84aba4f3acb49371c238bcefed110a0ba90640c56466b13a9b06
-
Filesize
1.2MB
MD5efb607e3b12e49023f6839f72a8c8d90
SHA1863098c3ba56e2de0f55c8e33ee011b7dcbc5222
SHA2564084e7bc4ec9c49900af8be337f5c67e479e2827ce76ed88ca213eacc8fdc8a3
SHA512a468bd183ed7a9cb916f0b4056d1c240f3e7f072bf97e5add13ac6f7b52dd656af8f7faa12ce84aba4f3acb49371c238bcefed110a0ba90640c56466b13a9b06
-
Filesize
240KB
MD52e9b22cf7222ec85aa995a2ede7d9fe6
SHA1b8532a9977503bb42c744037e57325a6a20eef74
SHA256742eba1dff41bf001c230970576d6e5c64c53abf245e4940b0b65d6014796711
SHA5121c75d470c5398e6f62d84440a5841a32cb94ce15d61dc0545e9bcdd320e1877e9c29a757e8c2488b52e2d84c92ae461b02f52c2efc594b8a05f1565bce7cee41
-
Filesize
240KB
MD52e9b22cf7222ec85aa995a2ede7d9fe6
SHA1b8532a9977503bb42c744037e57325a6a20eef74
SHA256742eba1dff41bf001c230970576d6e5c64c53abf245e4940b0b65d6014796711
SHA5121c75d470c5398e6f62d84440a5841a32cb94ce15d61dc0545e9bcdd320e1877e9c29a757e8c2488b52e2d84c92ae461b02f52c2efc594b8a05f1565bce7cee41
-
Filesize
1.0MB
MD50a0f17d2a99ac879bc25146711ea0ea1
SHA114cfa510a7614c100f511ff5d9f8e19db681139a
SHA2560118ebbf5e109da578844f8bc391474581385f7b9e1a2d60c68692cb6de2093c
SHA5128e7ecbf2d9d4eea2a42c3d25daeeadd0f7cd5f5a7cd1ce9a7fc3273afb6be37e3a0d72a94dc688d9e96d1e9d8f5b8bb94967f1a44d56a28e7f9af37cc5571c65
-
Filesize
1.0MB
MD50a0f17d2a99ac879bc25146711ea0ea1
SHA114cfa510a7614c100f511ff5d9f8e19db681139a
SHA2560118ebbf5e109da578844f8bc391474581385f7b9e1a2d60c68692cb6de2093c
SHA5128e7ecbf2d9d4eea2a42c3d25daeeadd0f7cd5f5a7cd1ce9a7fc3273afb6be37e3a0d72a94dc688d9e96d1e9d8f5b8bb94967f1a44d56a28e7f9af37cc5571c65
-
Filesize
15KB
MD5edbc7fbfe034541cf3839acba689af0b
SHA16607bc99b1534556f7281368bd6cc8ba718eb410
SHA256fde8d7587bad0fea0a575867326ddafd8c00d2e7313c8ff00d1b5d9a99bf14e3
SHA5128e1dfc673e7f267418fdf1f8877cd452d8b232ba4fbb559724d6befc41b3ee4eb723f5286c37f51ef8179fad4d1899d3fb958fcb6587319bce39d7f680af6362
-
Filesize
15KB
MD5edbc7fbfe034541cf3839acba689af0b
SHA16607bc99b1534556f7281368bd6cc8ba718eb410
SHA256fde8d7587bad0fea0a575867326ddafd8c00d2e7313c8ff00d1b5d9a99bf14e3
SHA5128e1dfc673e7f267418fdf1f8877cd452d8b232ba4fbb559724d6befc41b3ee4eb723f5286c37f51ef8179fad4d1899d3fb958fcb6587319bce39d7f680af6362
-
Filesize
971KB
MD538220f64251ce73004e3340a5ffc66f6
SHA1eff7d6e4272857c3cdb1f61e7c1e4bc29fa3a4ba
SHA2569fb13d145dea806f0cdd38088ee8805f2f6782554af70546486667819eac87d0
SHA512f42313c084af38a1446c2d21550c86f1b3937e5271605f6d3d61d46e85f36e2dd158842ad1c20095c2fc5d79a8302a30ea83fbf73d7f236a773b7ec21c4c0fc6
-
Filesize
971KB
MD538220f64251ce73004e3340a5ffc66f6
SHA1eff7d6e4272857c3cdb1f61e7c1e4bc29fa3a4ba
SHA2569fb13d145dea806f0cdd38088ee8805f2f6782554af70546486667819eac87d0
SHA512f42313c084af38a1446c2d21550c86f1b3937e5271605f6d3d61d46e85f36e2dd158842ad1c20095c2fc5d79a8302a30ea83fbf73d7f236a773b7ec21c4c0fc6
-
Filesize
378KB
MD50699a3dd8a0bfbef309a3c474b22b56d
SHA18f8218184e8f28b14b8a3d5f828e28b9d8cd40a8
SHA2560fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178
SHA5126dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd
-
Filesize
378KB
MD50699a3dd8a0bfbef309a3c474b22b56d
SHA18f8218184e8f28b14b8a3d5f828e28b9d8cd40a8
SHA2560fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178
SHA5126dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd
-
Filesize
690KB
MD5b56825131a1e3644ddc28fc27102022a
SHA1e4d90ed554051472e03c0fe22cca7f8b0aaf78d5
SHA256fdb18bbb889daaee06f92c47cc4a7370e71f8226bad94ed8807ee42489f05ee3
SHA5124d9be530a5bc3bc8d15878944c4d6abd9dde0d1ac78e9d743f477682abdda2fd9c2009aaa975fae9dc18c4aa0657a0a24f8735b56485d43816cfd788c845f996
-
Filesize
690KB
MD5b56825131a1e3644ddc28fc27102022a
SHA1e4d90ed554051472e03c0fe22cca7f8b0aaf78d5
SHA256fdb18bbb889daaee06f92c47cc4a7370e71f8226bad94ed8807ee42489f05ee3
SHA5124d9be530a5bc3bc8d15878944c4d6abd9dde0d1ac78e9d743f477682abdda2fd9c2009aaa975fae9dc18c4aa0657a0a24f8735b56485d43816cfd788c845f996
-
Filesize
320KB
MD5887d5f3f25f82ef4ec073a39f3050594
SHA10f0d0e2f3b7d8b61dffab0d347d81740dfe956d8
SHA256f253180eaa3ade6c077fe6af72f5146029ff4d27a93debfe7f66507aa8739c65
SHA512bf6ab835d6f35063d6d499b18a60581b97c894e9a524da4b60008765a9853b29f0594c6fdca718b64cd5799a7b0fea1c115d21662bf90ff4dd67083d289cc81d
-
Filesize
320KB
MD5887d5f3f25f82ef4ec073a39f3050594
SHA10f0d0e2f3b7d8b61dffab0d347d81740dfe956d8
SHA256f253180eaa3ade6c077fe6af72f5146029ff4d27a93debfe7f66507aa8739c65
SHA512bf6ab835d6f35063d6d499b18a60581b97c894e9a524da4b60008765a9853b29f0594c6fdca718b64cd5799a7b0fea1c115d21662bf90ff4dd67083d289cc81d
-
Filesize
403KB
MD5878a3ee864f245f056d7b95f3eaddec4
SHA17aa027b943094d6a975797427569e62efffb0c21
SHA2568800821cba571233a521cc18559c158cb2ee54c70106572e5e26999a6c62de29
SHA5120eb60153d0df931ec92b0edbec2f1c29207afb1304f248d3bf644a8cb762c5b6866ac3fcca28b9c91d63cdcc11655424e66ed1fd89e7df3b80cdf6da087682c1
-
Filesize
403KB
MD5878a3ee864f245f056d7b95f3eaddec4
SHA17aa027b943094d6a975797427569e62efffb0c21
SHA2568800821cba571233a521cc18559c158cb2ee54c70106572e5e26999a6c62de29
SHA5120eb60153d0df931ec92b0edbec2f1c29207afb1304f248d3bf644a8cb762c5b6866ac3fcca28b9c91d63cdcc11655424e66ed1fd89e7df3b80cdf6da087682c1
-
Filesize
15KB
MD5d931dc56613ba472d495c9fba45bd2f2
SHA1afe14b258a0118451b20f157119029f003f529a6
SHA2563aeb5ec9c8e443b250330338a654dfea35a041333549e8c1cc012e4d87a4785f
SHA512c622b241d597fe89de41838f7eed8af43fc37890e09e2adfdd32e611db4eeec920c7a49920222a352249f18c7a6feb035962dad704953ea9406af0c2c0a9ad31
-
Filesize
15KB
MD5d931dc56613ba472d495c9fba45bd2f2
SHA1afe14b258a0118451b20f157119029f003f529a6
SHA2563aeb5ec9c8e443b250330338a654dfea35a041333549e8c1cc012e4d87a4785f
SHA512c622b241d597fe89de41838f7eed8af43fc37890e09e2adfdd32e611db4eeec920c7a49920222a352249f18c7a6feb035962dad704953ea9406af0c2c0a9ad31
-
Filesize
15KB
MD5d931dc56613ba472d495c9fba45bd2f2
SHA1afe14b258a0118451b20f157119029f003f529a6
SHA2563aeb5ec9c8e443b250330338a654dfea35a041333549e8c1cc012e4d87a4785f
SHA512c622b241d597fe89de41838f7eed8af43fc37890e09e2adfdd32e611db4eeec920c7a49920222a352249f18c7a6feb035962dad704953ea9406af0c2c0a9ad31
-
Filesize
378KB
MD50699a3dd8a0bfbef309a3c474b22b56d
SHA18f8218184e8f28b14b8a3d5f828e28b9d8cd40a8
SHA2560fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178
SHA5126dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd
-
Filesize
378KB
MD50699a3dd8a0bfbef309a3c474b22b56d
SHA18f8218184e8f28b14b8a3d5f828e28b9d8cd40a8
SHA2560fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178
SHA5126dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd
-
Filesize
378KB
MD50699a3dd8a0bfbef309a3c474b22b56d
SHA18f8218184e8f28b14b8a3d5f828e28b9d8cd40a8
SHA2560fe939fc94b4462887001499c9acd988653938b21d30b6eadfa023629edad178
SHA5126dff28c979b7efeb3b8fccb98102b1adeaa5e31aebf01713c76f8055c7ac520bc8b37857f442e1d0de5d4b77295325b485cf8d53d72fd4d22091211de4ef26cd
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5