Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 04:21
Static task
static1
General
-
Target
fa0633a032ee5f82d91a2b54ec358ddb2643d35584d4f794aa2186b28f160c02.exe
-
Size
1.3MB
-
MD5
8fa3d6b99d2980d7930a9011ff8db13b
-
SHA1
db934eeb7dda9c8f9c68ce736acd16e55e3ffeb8
-
SHA256
fa0633a032ee5f82d91a2b54ec358ddb2643d35584d4f794aa2186b28f160c02
-
SHA512
048bb0fe04c81164e831fa26d24843f96478e57198080ace2858759e46d4df9a851f15f8ffb0d9d553926b1f6d062fd662eca9108f4dfa05152be21d62fb592d
-
SSDEEP
24576:ly/VLGvZJ2YaKuzSnND27nhGly9uLvTKCinDpF0NT2Z/GkBOUxEWWr:A/FyJ2YaKCSnsGly9uPcpF0NT2ZOkkUC
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beCT01CT97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beCT01CT97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beCT01CT97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsxI61CR06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beCT01CT97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beCT01CT97.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnqu99wp24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnqu99wp24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnqu99wp24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beCT01CT97.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsxI61CR06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsxI61CR06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsxI61CR06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsxI61CR06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnqu99wp24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnqu99wp24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsxI61CR06.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/216-186-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-189-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-187-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-191-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-193-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-195-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-197-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-199-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-201-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-203-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-205-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-207-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-209-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-211-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-213-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-215-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-217-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-219-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-221-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-229-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-227-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-225-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-223-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-231-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-233-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-235-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-237-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-239-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-243-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-241-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-245-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-247-0x0000000005100000-0x000000000513E000-memory.dmp family_redline behavioral1/memory/216-249-0x0000000005100000-0x000000000513E000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation hk99cg51lZ95.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 15 IoCs
pid Process 4188 ptDm8848fS.exe 4380 ptsW7828Wn.exe 4524 pthh2172EN.exe 4124 ptAQ6693RY.exe 3696 ptdo7469vk.exe 3276 beCT01CT97.exe 216 cuNg05wo49.exe 3768 dsxI61CR06.exe 3008 fr90Vs2056Ae.exe 848 gnqu99wp24.exe 4464 hk99cg51lZ95.exe 644 mnolyk.exe 4860 jxFF96UT16.exe 436 mnolyk.exe 1236 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4868 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beCT01CT97.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsxI61CR06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsxI61CR06.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnqu99wp24.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptdo7469vk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fa0633a032ee5f82d91a2b54ec358ddb2643d35584d4f794aa2186b28f160c02.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptDm8848fS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptsW7828Wn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pthh2172EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pthh2172EN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptAQ6693RY.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptdo7469vk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fa0633a032ee5f82d91a2b54ec358ddb2643d35584d4f794aa2186b28f160c02.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptDm8848fS.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptsW7828Wn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptAQ6693RY.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4044 216 WerFault.exe 91 5096 3768 WerFault.exe 95 3552 3008 WerFault.exe 98 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3276 beCT01CT97.exe 3276 beCT01CT97.exe 216 cuNg05wo49.exe 216 cuNg05wo49.exe 3768 dsxI61CR06.exe 3768 dsxI61CR06.exe 3008 fr90Vs2056Ae.exe 3008 fr90Vs2056Ae.exe 848 gnqu99wp24.exe 848 gnqu99wp24.exe 4860 jxFF96UT16.exe 4860 jxFF96UT16.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3276 beCT01CT97.exe Token: SeDebugPrivilege 216 cuNg05wo49.exe Token: SeDebugPrivilege 3768 dsxI61CR06.exe Token: SeDebugPrivilege 3008 fr90Vs2056Ae.exe Token: SeDebugPrivilege 848 gnqu99wp24.exe Token: SeDebugPrivilege 4860 jxFF96UT16.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4188 4824 fa0633a032ee5f82d91a2b54ec358ddb2643d35584d4f794aa2186b28f160c02.exe 85 PID 4824 wrote to memory of 4188 4824 fa0633a032ee5f82d91a2b54ec358ddb2643d35584d4f794aa2186b28f160c02.exe 85 PID 4824 wrote to memory of 4188 4824 fa0633a032ee5f82d91a2b54ec358ddb2643d35584d4f794aa2186b28f160c02.exe 85 PID 4188 wrote to memory of 4380 4188 ptDm8848fS.exe 86 PID 4188 wrote to memory of 4380 4188 ptDm8848fS.exe 86 PID 4188 wrote to memory of 4380 4188 ptDm8848fS.exe 86 PID 4380 wrote to memory of 4524 4380 ptsW7828Wn.exe 87 PID 4380 wrote to memory of 4524 4380 ptsW7828Wn.exe 87 PID 4380 wrote to memory of 4524 4380 ptsW7828Wn.exe 87 PID 4524 wrote to memory of 4124 4524 pthh2172EN.exe 88 PID 4524 wrote to memory of 4124 4524 pthh2172EN.exe 88 PID 4524 wrote to memory of 4124 4524 pthh2172EN.exe 88 PID 4124 wrote to memory of 3696 4124 ptAQ6693RY.exe 89 PID 4124 wrote to memory of 3696 4124 ptAQ6693RY.exe 89 PID 4124 wrote to memory of 3696 4124 ptAQ6693RY.exe 89 PID 3696 wrote to memory of 3276 3696 ptdo7469vk.exe 90 PID 3696 wrote to memory of 3276 3696 ptdo7469vk.exe 90 PID 3696 wrote to memory of 216 3696 ptdo7469vk.exe 91 PID 3696 wrote to memory of 216 3696 ptdo7469vk.exe 91 PID 3696 wrote to memory of 216 3696 ptdo7469vk.exe 91 PID 4124 wrote to memory of 3768 4124 ptAQ6693RY.exe 95 PID 4124 wrote to memory of 3768 4124 ptAQ6693RY.exe 95 PID 4124 wrote to memory of 3768 4124 ptAQ6693RY.exe 95 PID 4524 wrote to memory of 3008 4524 pthh2172EN.exe 98 PID 4524 wrote to memory of 3008 4524 pthh2172EN.exe 98 PID 4524 wrote to memory of 3008 4524 pthh2172EN.exe 98 PID 4380 wrote to memory of 848 4380 ptsW7828Wn.exe 110 PID 4380 wrote to memory of 848 4380 ptsW7828Wn.exe 110 PID 4188 wrote to memory of 4464 4188 ptDm8848fS.exe 111 PID 4188 wrote to memory of 4464 4188 ptDm8848fS.exe 111 PID 4188 wrote to memory of 4464 4188 ptDm8848fS.exe 111 PID 4464 wrote to memory of 644 4464 hk99cg51lZ95.exe 112 PID 4464 wrote to memory of 644 4464 hk99cg51lZ95.exe 112 PID 4464 wrote to memory of 644 4464 hk99cg51lZ95.exe 112 PID 4824 wrote to memory of 4860 4824 fa0633a032ee5f82d91a2b54ec358ddb2643d35584d4f794aa2186b28f160c02.exe 113 PID 4824 wrote to memory of 4860 4824 fa0633a032ee5f82d91a2b54ec358ddb2643d35584d4f794aa2186b28f160c02.exe 113 PID 4824 wrote to memory of 4860 4824 fa0633a032ee5f82d91a2b54ec358ddb2643d35584d4f794aa2186b28f160c02.exe 113 PID 644 wrote to memory of 4932 644 mnolyk.exe 114 PID 644 wrote to memory of 4932 644 mnolyk.exe 114 PID 644 wrote to memory of 4932 644 mnolyk.exe 114 PID 644 wrote to memory of 4284 644 mnolyk.exe 116 PID 644 wrote to memory of 4284 644 mnolyk.exe 116 PID 644 wrote to memory of 4284 644 mnolyk.exe 116 PID 4284 wrote to memory of 4896 4284 cmd.exe 118 PID 4284 wrote to memory of 4896 4284 cmd.exe 118 PID 4284 wrote to memory of 4896 4284 cmd.exe 118 PID 4284 wrote to memory of 1900 4284 cmd.exe 119 PID 4284 wrote to memory of 1900 4284 cmd.exe 119 PID 4284 wrote to memory of 1900 4284 cmd.exe 119 PID 4284 wrote to memory of 1368 4284 cmd.exe 120 PID 4284 wrote to memory of 1368 4284 cmd.exe 120 PID 4284 wrote to memory of 1368 4284 cmd.exe 120 PID 4284 wrote to memory of 2164 4284 cmd.exe 121 PID 4284 wrote to memory of 2164 4284 cmd.exe 121 PID 4284 wrote to memory of 2164 4284 cmd.exe 121 PID 4284 wrote to memory of 1764 4284 cmd.exe 122 PID 4284 wrote to memory of 1764 4284 cmd.exe 122 PID 4284 wrote to memory of 1764 4284 cmd.exe 122 PID 4284 wrote to memory of 3484 4284 cmd.exe 123 PID 4284 wrote to memory of 3484 4284 cmd.exe 123 PID 4284 wrote to memory of 3484 4284 cmd.exe 123 PID 644 wrote to memory of 4868 644 mnolyk.exe 126 PID 644 wrote to memory of 4868 644 mnolyk.exe 126 PID 644 wrote to memory of 4868 644 mnolyk.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa0633a032ee5f82d91a2b54ec358ddb2643d35584d4f794aa2186b28f160c02.exe"C:\Users\Admin\AppData\Local\Temp\fa0633a032ee5f82d91a2b54ec358ddb2643d35584d4f794aa2186b28f160c02.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptDm8848fS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptDm8848fS.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptsW7828Wn.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptsW7828Wn.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pthh2172EN.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pthh2172EN.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptAQ6693RY.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptAQ6693RY.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptdo7469vk.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptdo7469vk.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beCT01CT97.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beCT01CT97.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuNg05wo49.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuNg05wo49.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 13488⤵
- Program crash
PID:4044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsxI61CR06.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsxI61CR06.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 10807⤵
- Program crash
PID:5096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr90Vs2056Ae.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr90Vs2056Ae.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 19046⤵
- Program crash
PID:3552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnqu99wp24.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnqu99wp24.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk99cg51lZ95.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk99cg51lZ95.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:4932
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:1900
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:1368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2164
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:1764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:3484
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxFF96UT16.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxFF96UT16.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 216 -ip 2161⤵PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3768 -ip 37681⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3008 -ip 30081⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:436
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:1236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5138063f1efa5cb54f4db097a8835f37d
SHA1ac1b84d950d36f5babf6032306684eb76062e7e0
SHA256c64bc4753402689b1e695438d6995339f82bdd68cb36aeaa717f26f254f37cf9
SHA5129c655e5f55830319931b1ad3bee082ff79dbc531453cde60d3077a0a9b1b25a31afbc997c6a89f6e635e200a6e5752be1dca7791a6ff17c37fa93af9e1f7e32d
-
Filesize
240KB
MD5138063f1efa5cb54f4db097a8835f37d
SHA1ac1b84d950d36f5babf6032306684eb76062e7e0
SHA256c64bc4753402689b1e695438d6995339f82bdd68cb36aeaa717f26f254f37cf9
SHA5129c655e5f55830319931b1ad3bee082ff79dbc531453cde60d3077a0a9b1b25a31afbc997c6a89f6e635e200a6e5752be1dca7791a6ff17c37fa93af9e1f7e32d
-
Filesize
240KB
MD5138063f1efa5cb54f4db097a8835f37d
SHA1ac1b84d950d36f5babf6032306684eb76062e7e0
SHA256c64bc4753402689b1e695438d6995339f82bdd68cb36aeaa717f26f254f37cf9
SHA5129c655e5f55830319931b1ad3bee082ff79dbc531453cde60d3077a0a9b1b25a31afbc997c6a89f6e635e200a6e5752be1dca7791a6ff17c37fa93af9e1f7e32d
-
Filesize
240KB
MD5138063f1efa5cb54f4db097a8835f37d
SHA1ac1b84d950d36f5babf6032306684eb76062e7e0
SHA256c64bc4753402689b1e695438d6995339f82bdd68cb36aeaa717f26f254f37cf9
SHA5129c655e5f55830319931b1ad3bee082ff79dbc531453cde60d3077a0a9b1b25a31afbc997c6a89f6e635e200a6e5752be1dca7791a6ff17c37fa93af9e1f7e32d
-
Filesize
240KB
MD5138063f1efa5cb54f4db097a8835f37d
SHA1ac1b84d950d36f5babf6032306684eb76062e7e0
SHA256c64bc4753402689b1e695438d6995339f82bdd68cb36aeaa717f26f254f37cf9
SHA5129c655e5f55830319931b1ad3bee082ff79dbc531453cde60d3077a0a9b1b25a31afbc997c6a89f6e635e200a6e5752be1dca7791a6ff17c37fa93af9e1f7e32d
-
Filesize
176KB
MD50c2ccc97ab5c85927b9aeab4433990ec
SHA165e7ed3f40aad198299349a8e9aecd2c5fda4fb6
SHA2567724641a613d3c761932cda8c64754c550ed09c9fe7374c23efe699277899dc9
SHA512d14ab4f39eeb56fba15d296a1aac50eb888a2c6bfc2ece2e1378658ef2c0cb18e3aaec554b088aa93a1ab459ccd4b3238dd450e20db1ba6d753a156d34dd8eea
-
Filesize
176KB
MD50c2ccc97ab5c85927b9aeab4433990ec
SHA165e7ed3f40aad198299349a8e9aecd2c5fda4fb6
SHA2567724641a613d3c761932cda8c64754c550ed09c9fe7374c23efe699277899dc9
SHA512d14ab4f39eeb56fba15d296a1aac50eb888a2c6bfc2ece2e1378658ef2c0cb18e3aaec554b088aa93a1ab459ccd4b3238dd450e20db1ba6d753a156d34dd8eea
-
Filesize
1.2MB
MD5c8ca218706f329bc6e4d3129a11c4945
SHA1409e00d7e4c766418d3a6521782054fa414af7be
SHA256064b62b7265d4ce8d477d416c7d8048772c44c810d5b15a47c24bd7052d63d62
SHA5128d4a3efa8b047250dd593680d52800bfa74360078cc0ae29527bea2e76d157e19daccd91aeb12de41a7afc3dab63d05caa4df09bdaf3dc02f00f1ecac713fce6
-
Filesize
1.2MB
MD5c8ca218706f329bc6e4d3129a11c4945
SHA1409e00d7e4c766418d3a6521782054fa414af7be
SHA256064b62b7265d4ce8d477d416c7d8048772c44c810d5b15a47c24bd7052d63d62
SHA5128d4a3efa8b047250dd593680d52800bfa74360078cc0ae29527bea2e76d157e19daccd91aeb12de41a7afc3dab63d05caa4df09bdaf3dc02f00f1ecac713fce6
-
Filesize
240KB
MD5138063f1efa5cb54f4db097a8835f37d
SHA1ac1b84d950d36f5babf6032306684eb76062e7e0
SHA256c64bc4753402689b1e695438d6995339f82bdd68cb36aeaa717f26f254f37cf9
SHA5129c655e5f55830319931b1ad3bee082ff79dbc531453cde60d3077a0a9b1b25a31afbc997c6a89f6e635e200a6e5752be1dca7791a6ff17c37fa93af9e1f7e32d
-
Filesize
240KB
MD5138063f1efa5cb54f4db097a8835f37d
SHA1ac1b84d950d36f5babf6032306684eb76062e7e0
SHA256c64bc4753402689b1e695438d6995339f82bdd68cb36aeaa717f26f254f37cf9
SHA5129c655e5f55830319931b1ad3bee082ff79dbc531453cde60d3077a0a9b1b25a31afbc997c6a89f6e635e200a6e5752be1dca7791a6ff17c37fa93af9e1f7e32d
-
Filesize
1.0MB
MD5d484dec4c22e5a820f59faa01ed68a0b
SHA18c21a084daf668bc3d0052cee3b6e8ba8218b132
SHA2561663436f9bbf62043349fb6fb3858dd9ba5fd38020001c471751bacce819d96f
SHA51277ae30fb49266e9c08247cc9110c36068e3653d04a4df048ca07dc9517ae1dc0ada945fa01211ab9dc29d7dc7ef05565e4107e777587ff5d03c404f320a1e518
-
Filesize
1.0MB
MD5d484dec4c22e5a820f59faa01ed68a0b
SHA18c21a084daf668bc3d0052cee3b6e8ba8218b132
SHA2561663436f9bbf62043349fb6fb3858dd9ba5fd38020001c471751bacce819d96f
SHA51277ae30fb49266e9c08247cc9110c36068e3653d04a4df048ca07dc9517ae1dc0ada945fa01211ab9dc29d7dc7ef05565e4107e777587ff5d03c404f320a1e518
-
Filesize
15KB
MD5854f57a1932ccab6e3ceef09c682b19f
SHA110f62c9190402b92dd510101f425d735ad2d37dc
SHA256add1e3d249d03210c7ff151b87f83fbfe6dc7b614a6057c12fb09617fe71f8ea
SHA512713c3773718f862a749b40305cd19556864b156f6efde6a9da2d7c79964dd37103c57b6871b9a8fd7312aa235eaa9f36f3a588f8206406561f213964d6d6b99c
-
Filesize
15KB
MD5854f57a1932ccab6e3ceef09c682b19f
SHA110f62c9190402b92dd510101f425d735ad2d37dc
SHA256add1e3d249d03210c7ff151b87f83fbfe6dc7b614a6057c12fb09617fe71f8ea
SHA512713c3773718f862a749b40305cd19556864b156f6efde6a9da2d7c79964dd37103c57b6871b9a8fd7312aa235eaa9f36f3a588f8206406561f213964d6d6b99c
-
Filesize
936KB
MD58b7198feae1ed69a4a82facacf58d91a
SHA102a8e01c131c0d6759d7d064dd68179bdbaf2dd2
SHA256e6534b60177b2baab622142394433082e2c3236aa46ccb40140f78283552c269
SHA51222430ec272a77bc0af4132c9f497665561f6e769f78006398560cdc6c2eb230029d7dc47c0a6373a38370ee0227f469e5ffaaa0145041911195aba5b9591a33a
-
Filesize
936KB
MD58b7198feae1ed69a4a82facacf58d91a
SHA102a8e01c131c0d6759d7d064dd68179bdbaf2dd2
SHA256e6534b60177b2baab622142394433082e2c3236aa46ccb40140f78283552c269
SHA51222430ec272a77bc0af4132c9f497665561f6e769f78006398560cdc6c2eb230029d7dc47c0a6373a38370ee0227f469e5ffaaa0145041911195aba5b9591a33a
-
Filesize
302KB
MD51c5a86f75232313703fab93a198cfae7
SHA1ecf2d10a917811db5f5da1e29c929ab6a2866a0e
SHA2566c5ec3126e35491fe8716e34691036a2cd0a24c110ad9080ecc4b1130ba92b71
SHA512fd6d22ad3c16dcfa708a2e04ca73946046867a18c10ddfda030f04bc7f77373284c043d433997c27ba7e186e814573a26e11cd0a939467b7ec7683b919f9eb0f
-
Filesize
302KB
MD51c5a86f75232313703fab93a198cfae7
SHA1ecf2d10a917811db5f5da1e29c929ab6a2866a0e
SHA2566c5ec3126e35491fe8716e34691036a2cd0a24c110ad9080ecc4b1130ba92b71
SHA512fd6d22ad3c16dcfa708a2e04ca73946046867a18c10ddfda030f04bc7f77373284c043d433997c27ba7e186e814573a26e11cd0a939467b7ec7683b919f9eb0f
-
Filesize
667KB
MD5ecc58f770ecb851a0dc7df65b16e16bf
SHA1c7774162d466e86c65c485d2cb8f97430458b889
SHA2567e3fe919f47815868ceffb4d377c9652544dc8b0a8b6ecca371671a21f3f9e19
SHA512dce650593fecae8d3df0037c272ce87ed25772a2eef41c44f0371cf18882ad3412f8f56e67fadd1c010f1931a15bdb9d25809c6d2bb237148aaac827db414890
-
Filesize
667KB
MD5ecc58f770ecb851a0dc7df65b16e16bf
SHA1c7774162d466e86c65c485d2cb8f97430458b889
SHA2567e3fe919f47815868ceffb4d377c9652544dc8b0a8b6ecca371671a21f3f9e19
SHA512dce650593fecae8d3df0037c272ce87ed25772a2eef41c44f0371cf18882ad3412f8f56e67fadd1c010f1931a15bdb9d25809c6d2bb237148aaac827db414890
-
Filesize
244KB
MD5d29297337536c5530be57237fff85868
SHA16cd002f1b5309afffd620865b1ce72dd4a525caf
SHA256a9356eb37793414768c11340d0ef4f058cdc46d2f8ff73d8a3496b4a60912855
SHA51279e1bfa4eb744d852f8ce8305b5213482ca6d428ad98a2bca9013c1ad368623e6c4a395f21a071b000b5e891d6528776aea92722d45501a3fe0e8fbf14425045
-
Filesize
244KB
MD5d29297337536c5530be57237fff85868
SHA16cd002f1b5309afffd620865b1ce72dd4a525caf
SHA256a9356eb37793414768c11340d0ef4f058cdc46d2f8ff73d8a3496b4a60912855
SHA51279e1bfa4eb744d852f8ce8305b5213482ca6d428ad98a2bca9013c1ad368623e6c4a395f21a071b000b5e891d6528776aea92722d45501a3fe0e8fbf14425045
-
Filesize
392KB
MD55dab762c6c2a0a36d02bfc6435104162
SHA18839bf8478b3d35dcb014f877a4575d427a0fa0b
SHA2560672dbd76d85cf1ce92652ed1b2d0557a402eb53b9e85837c636031c0a696ff4
SHA512baf2d4d317d603de1c4d98db3b4577bb694cb6353fccc354cf8aa17fcc05f5560e33a607ebbd8cb0da47ea6351583aa8a19586a22c9b00d1af7803b765844876
-
Filesize
392KB
MD55dab762c6c2a0a36d02bfc6435104162
SHA18839bf8478b3d35dcb014f877a4575d427a0fa0b
SHA2560672dbd76d85cf1ce92652ed1b2d0557a402eb53b9e85837c636031c0a696ff4
SHA512baf2d4d317d603de1c4d98db3b4577bb694cb6353fccc354cf8aa17fcc05f5560e33a607ebbd8cb0da47ea6351583aa8a19586a22c9b00d1af7803b765844876
-
Filesize
15KB
MD54a472e6b10e3ea717eb801f232f0dc8f
SHA1a9a9d7dc6474e11cc2b782528aaebbefc4d5ebf9
SHA2566cc32ec479788c7633556fa1458065d1353b06644e9bf9a2e0280320def6c363
SHA512ea8c6826ab20f6b738c6b9dedf24f9b7f36b616e1f45e344b6de502853d278a2a713b53a0e2ae49807d4d16d97dc8bdfdcf10fcd8088d1fd9f5434502a0fac7f
-
Filesize
15KB
MD54a472e6b10e3ea717eb801f232f0dc8f
SHA1a9a9d7dc6474e11cc2b782528aaebbefc4d5ebf9
SHA2566cc32ec479788c7633556fa1458065d1353b06644e9bf9a2e0280320def6c363
SHA512ea8c6826ab20f6b738c6b9dedf24f9b7f36b616e1f45e344b6de502853d278a2a713b53a0e2ae49807d4d16d97dc8bdfdcf10fcd8088d1fd9f5434502a0fac7f
-
Filesize
15KB
MD54a472e6b10e3ea717eb801f232f0dc8f
SHA1a9a9d7dc6474e11cc2b782528aaebbefc4d5ebf9
SHA2566cc32ec479788c7633556fa1458065d1353b06644e9bf9a2e0280320def6c363
SHA512ea8c6826ab20f6b738c6b9dedf24f9b7f36b616e1f45e344b6de502853d278a2a713b53a0e2ae49807d4d16d97dc8bdfdcf10fcd8088d1fd9f5434502a0fac7f
-
Filesize
302KB
MD51c5a86f75232313703fab93a198cfae7
SHA1ecf2d10a917811db5f5da1e29c929ab6a2866a0e
SHA2566c5ec3126e35491fe8716e34691036a2cd0a24c110ad9080ecc4b1130ba92b71
SHA512fd6d22ad3c16dcfa708a2e04ca73946046867a18c10ddfda030f04bc7f77373284c043d433997c27ba7e186e814573a26e11cd0a939467b7ec7683b919f9eb0f
-
Filesize
302KB
MD51c5a86f75232313703fab93a198cfae7
SHA1ecf2d10a917811db5f5da1e29c929ab6a2866a0e
SHA2566c5ec3126e35491fe8716e34691036a2cd0a24c110ad9080ecc4b1130ba92b71
SHA512fd6d22ad3c16dcfa708a2e04ca73946046867a18c10ddfda030f04bc7f77373284c043d433997c27ba7e186e814573a26e11cd0a939467b7ec7683b919f9eb0f
-
Filesize
302KB
MD51c5a86f75232313703fab93a198cfae7
SHA1ecf2d10a917811db5f5da1e29c929ab6a2866a0e
SHA2566c5ec3126e35491fe8716e34691036a2cd0a24c110ad9080ecc4b1130ba92b71
SHA512fd6d22ad3c16dcfa708a2e04ca73946046867a18c10ddfda030f04bc7f77373284c043d433997c27ba7e186e814573a26e11cd0a939467b7ec7683b919f9eb0f
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5