Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 05:22
Static task
static1
General
-
Target
ea836ac96800d5b196db5e58dd53a03e2747cbe14d5934e7ffbd3b5097b24149.exe
-
Size
1.3MB
-
MD5
29be227d80b9cf983d3c5e5fdb13746b
-
SHA1
2c74a14f62768483df9771f167ea46aa0e0b00c6
-
SHA256
ea836ac96800d5b196db5e58dd53a03e2747cbe14d5934e7ffbd3b5097b24149
-
SHA512
2b88687a45a8c0e34b2522bd5a619ed8628fc58d2b25f353b641e1295a38fc5b7335a0ad11d94c9f6430efd1077b33ebe5f2bf14137162cd69ab612534a492a4
-
SSDEEP
24576:TyyrhTvKRetskxSB4Kc4SJ8bpPIan4+yXgcHYrVT7JSnjcuJ2bML:myvD6nB414/gan47L+REPJ
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beJN77Xe27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dssS50iE91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnbR52SZ90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beJN77Xe27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beJN77Xe27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dssS50iE91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dssS50iE91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnbR52SZ90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beJN77Xe27.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dssS50iE91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dssS50iE91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnbR52SZ90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnbR52SZ90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnbR52SZ90.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beJN77Xe27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beJN77Xe27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dssS50iE91.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/228-185-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-188-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-186-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-190-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-192-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-194-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-196-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-198-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-200-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-202-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-204-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-206-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-208-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-210-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-212-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-214-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-216-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-218-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-220-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-222-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-224-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-226-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-228-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-230-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-232-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-236-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-234-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-238-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-240-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-242-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-244-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-246-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/228-248-0x0000000002820000-0x000000000285E000-memory.dmp family_redline behavioral1/memory/4180-2065-0x00000000027D0000-0x00000000027E0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation hk68OL83qw84.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 2440 ptDL6543Kr.exe 5064 ptWR2875eI.exe 3608 ptbH9708pk.exe 1828 ptBC7830yY.exe 560 pthv1456Tf.exe 4056 beJN77Xe27.exe 228 cunv04OW99.exe 3532 dssS50iE91.exe 4180 fr57sO1025Ba.exe 1624 gnbR52SZ90.exe 4592 hk68OL83qw84.exe 960 mnolyk.exe 3552 jxje46yE79.exe 4444 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2732 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beJN77Xe27.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dssS50iE91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dssS50iE91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnbR52SZ90.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptBC7830yY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptBC7830yY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" pthv1456Tf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea836ac96800d5b196db5e58dd53a03e2747cbe14d5934e7ffbd3b5097b24149.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptDL6543Kr.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptWR2875eI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptWR2875eI.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pthv1456Tf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ea836ac96800d5b196db5e58dd53a03e2747cbe14d5934e7ffbd3b5097b24149.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptDL6543Kr.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptbH9708pk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptbH9708pk.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1788 228 WerFault.exe 98 5116 3532 WerFault.exe 102 3796 4180 WerFault.exe 113 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3048 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4056 beJN77Xe27.exe 4056 beJN77Xe27.exe 228 cunv04OW99.exe 228 cunv04OW99.exe 3532 dssS50iE91.exe 3532 dssS50iE91.exe 4180 fr57sO1025Ba.exe 4180 fr57sO1025Ba.exe 1624 gnbR52SZ90.exe 1624 gnbR52SZ90.exe 3552 jxje46yE79.exe 3552 jxje46yE79.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4056 beJN77Xe27.exe Token: SeDebugPrivilege 228 cunv04OW99.exe Token: SeDebugPrivilege 3532 dssS50iE91.exe Token: SeDebugPrivilege 4180 fr57sO1025Ba.exe Token: SeDebugPrivilege 1624 gnbR52SZ90.exe Token: SeDebugPrivilege 3552 jxje46yE79.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2440 2260 ea836ac96800d5b196db5e58dd53a03e2747cbe14d5934e7ffbd3b5097b24149.exe 84 PID 2260 wrote to memory of 2440 2260 ea836ac96800d5b196db5e58dd53a03e2747cbe14d5934e7ffbd3b5097b24149.exe 84 PID 2260 wrote to memory of 2440 2260 ea836ac96800d5b196db5e58dd53a03e2747cbe14d5934e7ffbd3b5097b24149.exe 84 PID 2440 wrote to memory of 5064 2440 ptDL6543Kr.exe 85 PID 2440 wrote to memory of 5064 2440 ptDL6543Kr.exe 85 PID 2440 wrote to memory of 5064 2440 ptDL6543Kr.exe 85 PID 5064 wrote to memory of 3608 5064 ptWR2875eI.exe 86 PID 5064 wrote to memory of 3608 5064 ptWR2875eI.exe 86 PID 5064 wrote to memory of 3608 5064 ptWR2875eI.exe 86 PID 3608 wrote to memory of 1828 3608 ptbH9708pk.exe 87 PID 3608 wrote to memory of 1828 3608 ptbH9708pk.exe 87 PID 3608 wrote to memory of 1828 3608 ptbH9708pk.exe 87 PID 1828 wrote to memory of 560 1828 ptBC7830yY.exe 88 PID 1828 wrote to memory of 560 1828 ptBC7830yY.exe 88 PID 1828 wrote to memory of 560 1828 ptBC7830yY.exe 88 PID 560 wrote to memory of 4056 560 pthv1456Tf.exe 89 PID 560 wrote to memory of 4056 560 pthv1456Tf.exe 89 PID 560 wrote to memory of 228 560 pthv1456Tf.exe 98 PID 560 wrote to memory of 228 560 pthv1456Tf.exe 98 PID 560 wrote to memory of 228 560 pthv1456Tf.exe 98 PID 1828 wrote to memory of 3532 1828 ptBC7830yY.exe 102 PID 1828 wrote to memory of 3532 1828 ptBC7830yY.exe 102 PID 1828 wrote to memory of 3532 1828 ptBC7830yY.exe 102 PID 3608 wrote to memory of 4180 3608 ptbH9708pk.exe 113 PID 3608 wrote to memory of 4180 3608 ptbH9708pk.exe 113 PID 3608 wrote to memory of 4180 3608 ptbH9708pk.exe 113 PID 5064 wrote to memory of 1624 5064 ptWR2875eI.exe 116 PID 5064 wrote to memory of 1624 5064 ptWR2875eI.exe 116 PID 2440 wrote to memory of 4592 2440 ptDL6543Kr.exe 117 PID 2440 wrote to memory of 4592 2440 ptDL6543Kr.exe 117 PID 2440 wrote to memory of 4592 2440 ptDL6543Kr.exe 117 PID 4592 wrote to memory of 960 4592 hk68OL83qw84.exe 118 PID 4592 wrote to memory of 960 4592 hk68OL83qw84.exe 118 PID 4592 wrote to memory of 960 4592 hk68OL83qw84.exe 118 PID 2260 wrote to memory of 3552 2260 ea836ac96800d5b196db5e58dd53a03e2747cbe14d5934e7ffbd3b5097b24149.exe 119 PID 2260 wrote to memory of 3552 2260 ea836ac96800d5b196db5e58dd53a03e2747cbe14d5934e7ffbd3b5097b24149.exe 119 PID 2260 wrote to memory of 3552 2260 ea836ac96800d5b196db5e58dd53a03e2747cbe14d5934e7ffbd3b5097b24149.exe 119 PID 960 wrote to memory of 3048 960 mnolyk.exe 120 PID 960 wrote to memory of 3048 960 mnolyk.exe 120 PID 960 wrote to memory of 3048 960 mnolyk.exe 120 PID 960 wrote to memory of 2000 960 mnolyk.exe 122 PID 960 wrote to memory of 2000 960 mnolyk.exe 122 PID 960 wrote to memory of 2000 960 mnolyk.exe 122 PID 2000 wrote to memory of 2576 2000 cmd.exe 124 PID 2000 wrote to memory of 2576 2000 cmd.exe 124 PID 2000 wrote to memory of 2576 2000 cmd.exe 124 PID 2000 wrote to memory of 1156 2000 cmd.exe 125 PID 2000 wrote to memory of 1156 2000 cmd.exe 125 PID 2000 wrote to memory of 1156 2000 cmd.exe 125 PID 2000 wrote to memory of 4320 2000 cmd.exe 126 PID 2000 wrote to memory of 4320 2000 cmd.exe 126 PID 2000 wrote to memory of 4320 2000 cmd.exe 126 PID 2000 wrote to memory of 3988 2000 cmd.exe 128 PID 2000 wrote to memory of 3988 2000 cmd.exe 128 PID 2000 wrote to memory of 3988 2000 cmd.exe 128 PID 2000 wrote to memory of 1340 2000 cmd.exe 127 PID 2000 wrote to memory of 1340 2000 cmd.exe 127 PID 2000 wrote to memory of 1340 2000 cmd.exe 127 PID 2000 wrote to memory of 2100 2000 cmd.exe 129 PID 2000 wrote to memory of 2100 2000 cmd.exe 129 PID 2000 wrote to memory of 2100 2000 cmd.exe 129 PID 960 wrote to memory of 2732 960 mnolyk.exe 131 PID 960 wrote to memory of 2732 960 mnolyk.exe 131 PID 960 wrote to memory of 2732 960 mnolyk.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea836ac96800d5b196db5e58dd53a03e2747cbe14d5934e7ffbd3b5097b24149.exe"C:\Users\Admin\AppData\Local\Temp\ea836ac96800d5b196db5e58dd53a03e2747cbe14d5934e7ffbd3b5097b24149.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptDL6543Kr.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptDL6543Kr.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptWR2875eI.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptWR2875eI.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptbH9708pk.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptbH9708pk.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptBC7830yY.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptBC7830yY.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\pthv1456Tf.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\pthv1456Tf.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beJN77Xe27.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beJN77Xe27.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cunv04OW99.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cunv04OW99.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 16768⤵
- Program crash
PID:1788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dssS50iE91.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dssS50iE91.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 10807⤵
- Program crash
PID:5116
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr57sO1025Ba.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr57sO1025Ba.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 15686⤵
- Program crash
PID:3796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnbR52SZ90.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnbR52SZ90.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk68OL83qw84.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk68OL83qw84.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:3048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2576
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:1156
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:4320
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:1340
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3988
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:2100
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2732
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxje46yE79.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxje46yE79.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 228 -ip 2281⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3532 -ip 35321⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4180 -ip 41801⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:4444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD59b9e2a5d53c10ee981a1883e268b5458
SHA13e3faaa130e7b254ffc923d4c5d968328bb25448
SHA2568e567ee21791243b420dcc9d3440155cd7d1d8f3690cd3b554f59a7194c02693
SHA512e99712f28d565f39d769cbd01bb6a8ddd1c9d8a5478eb6546379ab93471b4ae8c3c656be4bd3be9f957a9b38ff2ee4137243efea0394dde146320a4f61ba6f3b
-
Filesize
240KB
MD59b9e2a5d53c10ee981a1883e268b5458
SHA13e3faaa130e7b254ffc923d4c5d968328bb25448
SHA2568e567ee21791243b420dcc9d3440155cd7d1d8f3690cd3b554f59a7194c02693
SHA512e99712f28d565f39d769cbd01bb6a8ddd1c9d8a5478eb6546379ab93471b4ae8c3c656be4bd3be9f957a9b38ff2ee4137243efea0394dde146320a4f61ba6f3b
-
Filesize
240KB
MD59b9e2a5d53c10ee981a1883e268b5458
SHA13e3faaa130e7b254ffc923d4c5d968328bb25448
SHA2568e567ee21791243b420dcc9d3440155cd7d1d8f3690cd3b554f59a7194c02693
SHA512e99712f28d565f39d769cbd01bb6a8ddd1c9d8a5478eb6546379ab93471b4ae8c3c656be4bd3be9f957a9b38ff2ee4137243efea0394dde146320a4f61ba6f3b
-
Filesize
240KB
MD59b9e2a5d53c10ee981a1883e268b5458
SHA13e3faaa130e7b254ffc923d4c5d968328bb25448
SHA2568e567ee21791243b420dcc9d3440155cd7d1d8f3690cd3b554f59a7194c02693
SHA512e99712f28d565f39d769cbd01bb6a8ddd1c9d8a5478eb6546379ab93471b4ae8c3c656be4bd3be9f957a9b38ff2ee4137243efea0394dde146320a4f61ba6f3b
-
Filesize
177KB
MD5b33a07dd91311cea0d92224a4cbf8617
SHA1e5ea5ba1337a20b5d658ef911f83d8b82055f509
SHA25637ec7c7e7315cfa033eceda47514bbf95b34cdb0a2022cf00ee41fe7f91e55b9
SHA5122e5fef0705fa58346364040741e6e8d4c74ec1d9f4a82124dcca2baacd2a18d02d7118a7d0b65d9ef1ed994a19c4795a5531a74732db85d57f12661efc58416a
-
Filesize
177KB
MD5b33a07dd91311cea0d92224a4cbf8617
SHA1e5ea5ba1337a20b5d658ef911f83d8b82055f509
SHA25637ec7c7e7315cfa033eceda47514bbf95b34cdb0a2022cf00ee41fe7f91e55b9
SHA5122e5fef0705fa58346364040741e6e8d4c74ec1d9f4a82124dcca2baacd2a18d02d7118a7d0b65d9ef1ed994a19c4795a5531a74732db85d57f12661efc58416a
-
Filesize
1.1MB
MD5b224e44f6a58748d727929fec472a44b
SHA190ed3e8e4efb7da2484336306b5046fb996c5688
SHA2560d8ce73e46d5068e375fba7ea6792f0bbc2825844c217836a2b9cf70b9826c8c
SHA5127031c49b87160d98c9eb3ad7380b17cd04fb15c4db7ab27848f9d6f22f27d988e99bfc4a4ec68de885d1eb678dc314afa623b287daeed30307940d47591cd508
-
Filesize
1.1MB
MD5b224e44f6a58748d727929fec472a44b
SHA190ed3e8e4efb7da2484336306b5046fb996c5688
SHA2560d8ce73e46d5068e375fba7ea6792f0bbc2825844c217836a2b9cf70b9826c8c
SHA5127031c49b87160d98c9eb3ad7380b17cd04fb15c4db7ab27848f9d6f22f27d988e99bfc4a4ec68de885d1eb678dc314afa623b287daeed30307940d47591cd508
-
Filesize
240KB
MD59b9e2a5d53c10ee981a1883e268b5458
SHA13e3faaa130e7b254ffc923d4c5d968328bb25448
SHA2568e567ee21791243b420dcc9d3440155cd7d1d8f3690cd3b554f59a7194c02693
SHA512e99712f28d565f39d769cbd01bb6a8ddd1c9d8a5478eb6546379ab93471b4ae8c3c656be4bd3be9f957a9b38ff2ee4137243efea0394dde146320a4f61ba6f3b
-
Filesize
240KB
MD59b9e2a5d53c10ee981a1883e268b5458
SHA13e3faaa130e7b254ffc923d4c5d968328bb25448
SHA2568e567ee21791243b420dcc9d3440155cd7d1d8f3690cd3b554f59a7194c02693
SHA512e99712f28d565f39d769cbd01bb6a8ddd1c9d8a5478eb6546379ab93471b4ae8c3c656be4bd3be9f957a9b38ff2ee4137243efea0394dde146320a4f61ba6f3b
-
Filesize
996KB
MD5d6d1320b615779adcb0c3dfb5b9fa9aa
SHA113ad7eca2a3401ff3965842689c93d1d7e619cc3
SHA25600a68b36790fd51ce1fdc65035a8ac9f8e5c014fea92f62978de05520fd1cf30
SHA512630bcc0aa6c1abc5a4406f20780703c36fe34b9dab92e922e888d7529f7b02cf166deb365215f80c33df48bb2df00b6159ac6b61285ad5a5f4cfec086f5fa56a
-
Filesize
996KB
MD5d6d1320b615779adcb0c3dfb5b9fa9aa
SHA113ad7eca2a3401ff3965842689c93d1d7e619cc3
SHA25600a68b36790fd51ce1fdc65035a8ac9f8e5c014fea92f62978de05520fd1cf30
SHA512630bcc0aa6c1abc5a4406f20780703c36fe34b9dab92e922e888d7529f7b02cf166deb365215f80c33df48bb2df00b6159ac6b61285ad5a5f4cfec086f5fa56a
-
Filesize
16KB
MD5dd3a2389b23099df591c9d97bfc5bf40
SHA17d71ee4eb192a652fb70860e4bebeb8084b3c36f
SHA256c71daf02b1b2298f50229c0649c64708d131e6b8a8637279b43db8ee743ad8d6
SHA5126d44e9b2d9146d2e90a43a0e24db4c41cdaf2fed6adc7fa800dd5771a4b3a1b34147196ae53a0a9d31d8c5c22ccf94247f403eb150ee87767bbaeb6900dc0e91
-
Filesize
16KB
MD5dd3a2389b23099df591c9d97bfc5bf40
SHA17d71ee4eb192a652fb70860e4bebeb8084b3c36f
SHA256c71daf02b1b2298f50229c0649c64708d131e6b8a8637279b43db8ee743ad8d6
SHA5126d44e9b2d9146d2e90a43a0e24db4c41cdaf2fed6adc7fa800dd5771a4b3a1b34147196ae53a0a9d31d8c5c22ccf94247f403eb150ee87767bbaeb6900dc0e91
-
Filesize
892KB
MD5e0693e8473e2190e68bdb3fe10e88b1c
SHA1e3ccf162722aaa607fc1a15b6ebdaa0422f1858c
SHA256cee609d9ee53e382876852b052ccb158a9e62d733141124634351e35384dbb8a
SHA512cbf61af3d2a6ff301ab6960167748d8907f3d1a539438abd6629137facb8fec6270e62398a21d528316656513b6fc6577acd3558e10a66adee1603f9e1b38171
-
Filesize
892KB
MD5e0693e8473e2190e68bdb3fe10e88b1c
SHA1e3ccf162722aaa607fc1a15b6ebdaa0422f1858c
SHA256cee609d9ee53e382876852b052ccb158a9e62d733141124634351e35384dbb8a
SHA512cbf61af3d2a6ff301ab6960167748d8907f3d1a539438abd6629137facb8fec6270e62398a21d528316656513b6fc6577acd3558e10a66adee1603f9e1b38171
-
Filesize
302KB
MD51c5a86f75232313703fab93a198cfae7
SHA1ecf2d10a917811db5f5da1e29c929ab6a2866a0e
SHA2566c5ec3126e35491fe8716e34691036a2cd0a24c110ad9080ecc4b1130ba92b71
SHA512fd6d22ad3c16dcfa708a2e04ca73946046867a18c10ddfda030f04bc7f77373284c043d433997c27ba7e186e814573a26e11cd0a939467b7ec7683b919f9eb0f
-
Filesize
302KB
MD51c5a86f75232313703fab93a198cfae7
SHA1ecf2d10a917811db5f5da1e29c929ab6a2866a0e
SHA2566c5ec3126e35491fe8716e34691036a2cd0a24c110ad9080ecc4b1130ba92b71
SHA512fd6d22ad3c16dcfa708a2e04ca73946046867a18c10ddfda030f04bc7f77373284c043d433997c27ba7e186e814573a26e11cd0a939467b7ec7683b919f9eb0f
-
Filesize
666KB
MD5e9e56c0c46fe1fc8a68c9508275214b1
SHA1fc158b81f724463514df77b4ab14a2e8ad5fb21c
SHA256d9f243f4f02e4a3acff704795209728ed903d8a45c110511fb622280fb28dbb2
SHA512ec0a8415345d43872130f525ff0f522266190a15b33b64134274e2c5921fb74cb2cfaa87ba394725e65edd22bfaf3e89a247c0871df584f2f9256d170600d7c2
-
Filesize
666KB
MD5e9e56c0c46fe1fc8a68c9508275214b1
SHA1fc158b81f724463514df77b4ab14a2e8ad5fb21c
SHA256d9f243f4f02e4a3acff704795209728ed903d8a45c110511fb622280fb28dbb2
SHA512ec0a8415345d43872130f525ff0f522266190a15b33b64134274e2c5921fb74cb2cfaa87ba394725e65edd22bfaf3e89a247c0871df584f2f9256d170600d7c2
-
Filesize
244KB
MD5d29297337536c5530be57237fff85868
SHA16cd002f1b5309afffd620865b1ce72dd4a525caf
SHA256a9356eb37793414768c11340d0ef4f058cdc46d2f8ff73d8a3496b4a60912855
SHA51279e1bfa4eb744d852f8ce8305b5213482ca6d428ad98a2bca9013c1ad368623e6c4a395f21a071b000b5e891d6528776aea92722d45501a3fe0e8fbf14425045
-
Filesize
244KB
MD5d29297337536c5530be57237fff85868
SHA16cd002f1b5309afffd620865b1ce72dd4a525caf
SHA256a9356eb37793414768c11340d0ef4f058cdc46d2f8ff73d8a3496b4a60912855
SHA51279e1bfa4eb744d852f8ce8305b5213482ca6d428ad98a2bca9013c1ad368623e6c4a395f21a071b000b5e891d6528776aea92722d45501a3fe0e8fbf14425045
-
Filesize
391KB
MD550454633e2803448bc8d985ccef2b25a
SHA11bc1a1dee51b3bab2c9925a0bc788189fb6662f8
SHA256c153a49af82e39407cb2f04b100879de26c333fed9f6efef7b9ddc07ddd03eee
SHA512da91e1850cd8a9d1d26330b164c9e0c12393bfee8947a7bd19f0ba873bd7f4de80bfb479a4e3d13a75cda8fe97b830d1a9da956554757f917a6e01653ade0277
-
Filesize
391KB
MD550454633e2803448bc8d985ccef2b25a
SHA11bc1a1dee51b3bab2c9925a0bc788189fb6662f8
SHA256c153a49af82e39407cb2f04b100879de26c333fed9f6efef7b9ddc07ddd03eee
SHA512da91e1850cd8a9d1d26330b164c9e0c12393bfee8947a7bd19f0ba873bd7f4de80bfb479a4e3d13a75cda8fe97b830d1a9da956554757f917a6e01653ade0277
-
Filesize
16KB
MD57614f3fee2fae22e68775b529d2a873c
SHA13c3d874814e7bb1e8036a789378844a89f96bbc2
SHA256bb8b15f9a32aacffdd0b87ceaa6342e8528178c85131208cced8e7d641c72b4b
SHA512c6debc327a930365b6475659a12b0b730b47a3b889171db34ce7feb064720f3a3898a989605d59e5be4156a80125559f1d88349b1389e189addd0fa232a0d110
-
Filesize
16KB
MD57614f3fee2fae22e68775b529d2a873c
SHA13c3d874814e7bb1e8036a789378844a89f96bbc2
SHA256bb8b15f9a32aacffdd0b87ceaa6342e8528178c85131208cced8e7d641c72b4b
SHA512c6debc327a930365b6475659a12b0b730b47a3b889171db34ce7feb064720f3a3898a989605d59e5be4156a80125559f1d88349b1389e189addd0fa232a0d110
-
Filesize
16KB
MD57614f3fee2fae22e68775b529d2a873c
SHA13c3d874814e7bb1e8036a789378844a89f96bbc2
SHA256bb8b15f9a32aacffdd0b87ceaa6342e8528178c85131208cced8e7d641c72b4b
SHA512c6debc327a930365b6475659a12b0b730b47a3b889171db34ce7feb064720f3a3898a989605d59e5be4156a80125559f1d88349b1389e189addd0fa232a0d110
-
Filesize
302KB
MD51c5a86f75232313703fab93a198cfae7
SHA1ecf2d10a917811db5f5da1e29c929ab6a2866a0e
SHA2566c5ec3126e35491fe8716e34691036a2cd0a24c110ad9080ecc4b1130ba92b71
SHA512fd6d22ad3c16dcfa708a2e04ca73946046867a18c10ddfda030f04bc7f77373284c043d433997c27ba7e186e814573a26e11cd0a939467b7ec7683b919f9eb0f
-
Filesize
302KB
MD51c5a86f75232313703fab93a198cfae7
SHA1ecf2d10a917811db5f5da1e29c929ab6a2866a0e
SHA2566c5ec3126e35491fe8716e34691036a2cd0a24c110ad9080ecc4b1130ba92b71
SHA512fd6d22ad3c16dcfa708a2e04ca73946046867a18c10ddfda030f04bc7f77373284c043d433997c27ba7e186e814573a26e11cd0a939467b7ec7683b919f9eb0f
-
Filesize
302KB
MD51c5a86f75232313703fab93a198cfae7
SHA1ecf2d10a917811db5f5da1e29c929ab6a2866a0e
SHA2566c5ec3126e35491fe8716e34691036a2cd0a24c110ad9080ecc4b1130ba92b71
SHA512fd6d22ad3c16dcfa708a2e04ca73946046867a18c10ddfda030f04bc7f77373284c043d433997c27ba7e186e814573a26e11cd0a939467b7ec7683b919f9eb0f
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5