Analysis
-
max time kernel
156s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 06:42
Static task
static1
General
-
Target
1b73118a719d33609950505b4f62df6ec9fa4abfc546e33f4c7ab1c32b41fdd2.exe
-
Size
1.3MB
-
MD5
874c5d15151d48fb5a829144de75c9a1
-
SHA1
493e7ca2205308ae26b021b97c8c5c55ffa76efc
-
SHA256
1b73118a719d33609950505b4f62df6ec9fa4abfc546e33f4c7ab1c32b41fdd2
-
SHA512
bb5f3b4ce8d543053f214edd64f83a406aa31e1382be4804dd843bd9fb8090a63d05b9c090dca6fc9c168d28d76c35fa432e62d878689c912403fea8810c8c4f
-
SSDEEP
24576:Vy23kokFIyV4ROlPhPqZWeELwJ4GARMPDh3AZ1bvTX96oWBd0b4vnq:w2ZkFt4ObeEk4yhwZ1TT9LV4vn
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beOx82Zm92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsri53EU45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnxF72sv08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnxF72sv08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsri53EU45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsri53EU45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnxF72sv08.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beOx82Zm92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beOx82Zm92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beOx82Zm92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnxF72sv08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnxF72sv08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beOx82Zm92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beOx82Zm92.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsri53EU45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsri53EU45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsri53EU45.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4236-185-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-186-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-188-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-190-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-192-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-194-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-196-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-198-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-200-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-202-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-204-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-206-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-208-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-210-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-212-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-214-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-216-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-218-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-220-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-222-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-224-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-226-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-228-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-230-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-232-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-234-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-236-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-238-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-240-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-242-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-244-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-246-0x0000000002620000-0x000000000265E000-memory.dmp family_redline behavioral1/memory/4236-248-0x0000000002620000-0x000000000265E000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation mnolyk.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation hk91ej71LB24.exe -
Executes dropped EXE 14 IoCs
pid Process 2360 ptPZ4307wz.exe 2784 ptak3236vy.exe 1636 ptwE6785NC.exe 4088 ptiJ6103Eh.exe 2628 ptDb8805Vv.exe 4460 beOx82Zm92.exe 4236 cuIi32Tz60.exe 3204 dsri53EU45.exe 2648 fr24Vq9253aH.exe 4760 gnxF72sv08.exe 4924 hk91ej71LB24.exe 3824 mnolyk.exe 4984 jxCK36zl80.exe 400 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 232 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beOx82Zm92.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsri53EU45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsri53EU45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnxF72sv08.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptDb8805Vv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1b73118a719d33609950505b4f62df6ec9fa4abfc546e33f4c7ab1c32b41fdd2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptPZ4307wz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptPZ4307wz.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptak3236vy.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptwE6785NC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptwE6785NC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptiJ6103Eh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b73118a719d33609950505b4f62df6ec9fa4abfc546e33f4c7ab1c32b41fdd2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptak3236vy.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptiJ6103Eh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptDb8805Vv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 384 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 992 4236 WerFault.exe 94 4932 3204 WerFault.exe 98 764 2648 WerFault.exe 104 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1340 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4460 beOx82Zm92.exe 4460 beOx82Zm92.exe 4236 cuIi32Tz60.exe 4236 cuIi32Tz60.exe 3204 dsri53EU45.exe 3204 dsri53EU45.exe 2648 fr24Vq9253aH.exe 2648 fr24Vq9253aH.exe 4760 gnxF72sv08.exe 4760 gnxF72sv08.exe 4984 jxCK36zl80.exe 4984 jxCK36zl80.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4460 beOx82Zm92.exe Token: SeDebugPrivilege 4236 cuIi32Tz60.exe Token: SeDebugPrivilege 3204 dsri53EU45.exe Token: SeDebugPrivilege 2648 fr24Vq9253aH.exe Token: SeDebugPrivilege 4760 gnxF72sv08.exe Token: SeDebugPrivilege 4984 jxCK36zl80.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2360 4616 1b73118a719d33609950505b4f62df6ec9fa4abfc546e33f4c7ab1c32b41fdd2.exe 85 PID 4616 wrote to memory of 2360 4616 1b73118a719d33609950505b4f62df6ec9fa4abfc546e33f4c7ab1c32b41fdd2.exe 85 PID 4616 wrote to memory of 2360 4616 1b73118a719d33609950505b4f62df6ec9fa4abfc546e33f4c7ab1c32b41fdd2.exe 85 PID 2360 wrote to memory of 2784 2360 ptPZ4307wz.exe 86 PID 2360 wrote to memory of 2784 2360 ptPZ4307wz.exe 86 PID 2360 wrote to memory of 2784 2360 ptPZ4307wz.exe 86 PID 2784 wrote to memory of 1636 2784 ptak3236vy.exe 87 PID 2784 wrote to memory of 1636 2784 ptak3236vy.exe 87 PID 2784 wrote to memory of 1636 2784 ptak3236vy.exe 87 PID 1636 wrote to memory of 4088 1636 ptwE6785NC.exe 88 PID 1636 wrote to memory of 4088 1636 ptwE6785NC.exe 88 PID 1636 wrote to memory of 4088 1636 ptwE6785NC.exe 88 PID 4088 wrote to memory of 2628 4088 ptiJ6103Eh.exe 89 PID 4088 wrote to memory of 2628 4088 ptiJ6103Eh.exe 89 PID 4088 wrote to memory of 2628 4088 ptiJ6103Eh.exe 89 PID 2628 wrote to memory of 4460 2628 ptDb8805Vv.exe 90 PID 2628 wrote to memory of 4460 2628 ptDb8805Vv.exe 90 PID 2628 wrote to memory of 4236 2628 ptDb8805Vv.exe 94 PID 2628 wrote to memory of 4236 2628 ptDb8805Vv.exe 94 PID 2628 wrote to memory of 4236 2628 ptDb8805Vv.exe 94 PID 4088 wrote to memory of 3204 4088 ptiJ6103Eh.exe 98 PID 4088 wrote to memory of 3204 4088 ptiJ6103Eh.exe 98 PID 4088 wrote to memory of 3204 4088 ptiJ6103Eh.exe 98 PID 1636 wrote to memory of 2648 1636 ptwE6785NC.exe 104 PID 1636 wrote to memory of 2648 1636 ptwE6785NC.exe 104 PID 1636 wrote to memory of 2648 1636 ptwE6785NC.exe 104 PID 2784 wrote to memory of 4760 2784 ptak3236vy.exe 107 PID 2784 wrote to memory of 4760 2784 ptak3236vy.exe 107 PID 2360 wrote to memory of 4924 2360 ptPZ4307wz.exe 108 PID 2360 wrote to memory of 4924 2360 ptPZ4307wz.exe 108 PID 2360 wrote to memory of 4924 2360 ptPZ4307wz.exe 108 PID 4924 wrote to memory of 3824 4924 hk91ej71LB24.exe 109 PID 4924 wrote to memory of 3824 4924 hk91ej71LB24.exe 109 PID 4924 wrote to memory of 3824 4924 hk91ej71LB24.exe 109 PID 4616 wrote to memory of 4984 4616 1b73118a719d33609950505b4f62df6ec9fa4abfc546e33f4c7ab1c32b41fdd2.exe 110 PID 4616 wrote to memory of 4984 4616 1b73118a719d33609950505b4f62df6ec9fa4abfc546e33f4c7ab1c32b41fdd2.exe 110 PID 4616 wrote to memory of 4984 4616 1b73118a719d33609950505b4f62df6ec9fa4abfc546e33f4c7ab1c32b41fdd2.exe 110 PID 3824 wrote to memory of 1340 3824 mnolyk.exe 111 PID 3824 wrote to memory of 1340 3824 mnolyk.exe 111 PID 3824 wrote to memory of 1340 3824 mnolyk.exe 111 PID 3824 wrote to memory of 3948 3824 mnolyk.exe 113 PID 3824 wrote to memory of 3948 3824 mnolyk.exe 113 PID 3824 wrote to memory of 3948 3824 mnolyk.exe 113 PID 3948 wrote to memory of 3328 3948 cmd.exe 115 PID 3948 wrote to memory of 3328 3948 cmd.exe 115 PID 3948 wrote to memory of 3328 3948 cmd.exe 115 PID 3948 wrote to memory of 2860 3948 cmd.exe 116 PID 3948 wrote to memory of 2860 3948 cmd.exe 116 PID 3948 wrote to memory of 2860 3948 cmd.exe 116 PID 3948 wrote to memory of 4708 3948 cmd.exe 117 PID 3948 wrote to memory of 4708 3948 cmd.exe 117 PID 3948 wrote to memory of 4708 3948 cmd.exe 117 PID 3948 wrote to memory of 3324 3948 cmd.exe 118 PID 3948 wrote to memory of 3324 3948 cmd.exe 118 PID 3948 wrote to memory of 3324 3948 cmd.exe 118 PID 3948 wrote to memory of 2848 3948 cmd.exe 119 PID 3948 wrote to memory of 2848 3948 cmd.exe 119 PID 3948 wrote to memory of 2848 3948 cmd.exe 119 PID 3948 wrote to memory of 3552 3948 cmd.exe 120 PID 3948 wrote to memory of 3552 3948 cmd.exe 120 PID 3948 wrote to memory of 3552 3948 cmd.exe 120 PID 3824 wrote to memory of 232 3824 mnolyk.exe 128 PID 3824 wrote to memory of 232 3824 mnolyk.exe 128 PID 3824 wrote to memory of 232 3824 mnolyk.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b73118a719d33609950505b4f62df6ec9fa4abfc546e33f4c7ab1c32b41fdd2.exe"C:\Users\Admin\AppData\Local\Temp\1b73118a719d33609950505b4f62df6ec9fa4abfc546e33f4c7ab1c32b41fdd2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptPZ4307wz.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptPZ4307wz.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptak3236vy.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptak3236vy.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptwE6785NC.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptwE6785NC.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptiJ6103Eh.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptiJ6103Eh.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptDb8805Vv.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptDb8805Vv.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beOx82Zm92.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beOx82Zm92.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuIi32Tz60.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuIi32Tz60.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 13488⤵
- Program crash
PID:992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsri53EU45.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsri53EU45.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 10807⤵
- Program crash
PID:4932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr24Vq9253aH.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr24Vq9253aH.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 15326⤵
- Program crash
PID:764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnxF72sv08.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnxF72sv08.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk91ej71LB24.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk91ej71LB24.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:1340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:2860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:4708
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:2848
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:3552
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:232
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxCK36zl80.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxCK36zl80.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4236 -ip 42361⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3204 -ip 32041⤵PID:3248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2648 -ip 26481⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:400
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:384
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5e1fbd60ed7f2da2ddb8905b8cc64b2f4
SHA10acd9963f5814ab99d9d82be787a5b0aada9b0f8
SHA256cb2b1686ed98dd21729ed369ce5da4334388c05e0355decde9d477c056eabc56
SHA51238bd9052546ad1ae9cae27694c0cf644669843e6e2317fe2f3b0ca26918ce6d3d38131b82344e06174b369d66b276e526f46d15af2ddc0b2c039ebb07ece0a1a
-
Filesize
240KB
MD5e1fbd60ed7f2da2ddb8905b8cc64b2f4
SHA10acd9963f5814ab99d9d82be787a5b0aada9b0f8
SHA256cb2b1686ed98dd21729ed369ce5da4334388c05e0355decde9d477c056eabc56
SHA51238bd9052546ad1ae9cae27694c0cf644669843e6e2317fe2f3b0ca26918ce6d3d38131b82344e06174b369d66b276e526f46d15af2ddc0b2c039ebb07ece0a1a
-
Filesize
240KB
MD5e1fbd60ed7f2da2ddb8905b8cc64b2f4
SHA10acd9963f5814ab99d9d82be787a5b0aada9b0f8
SHA256cb2b1686ed98dd21729ed369ce5da4334388c05e0355decde9d477c056eabc56
SHA51238bd9052546ad1ae9cae27694c0cf644669843e6e2317fe2f3b0ca26918ce6d3d38131b82344e06174b369d66b276e526f46d15af2ddc0b2c039ebb07ece0a1a
-
Filesize
240KB
MD5e1fbd60ed7f2da2ddb8905b8cc64b2f4
SHA10acd9963f5814ab99d9d82be787a5b0aada9b0f8
SHA256cb2b1686ed98dd21729ed369ce5da4334388c05e0355decde9d477c056eabc56
SHA51238bd9052546ad1ae9cae27694c0cf644669843e6e2317fe2f3b0ca26918ce6d3d38131b82344e06174b369d66b276e526f46d15af2ddc0b2c039ebb07ece0a1a
-
Filesize
177KB
MD5dc04a538b7514e745995661121fb1863
SHA1b94e4aa6ed7a775b8b69d9c257ee8d485427b5ff
SHA2567cf4b395d61fbc41114ec3a5892ff154f0640756472211cbdd6f875fba21d204
SHA512a342d3d92b7b9e24cc919bc7357eee40698772d81e3d0bb0c6b93b0f155ef8d4497aefab87e5608212e8b792e09865842e9612a4d3d86119d5cd811fadefa844
-
Filesize
177KB
MD5dc04a538b7514e745995661121fb1863
SHA1b94e4aa6ed7a775b8b69d9c257ee8d485427b5ff
SHA2567cf4b395d61fbc41114ec3a5892ff154f0640756472211cbdd6f875fba21d204
SHA512a342d3d92b7b9e24cc919bc7357eee40698772d81e3d0bb0c6b93b0f155ef8d4497aefab87e5608212e8b792e09865842e9612a4d3d86119d5cd811fadefa844
-
Filesize
1.2MB
MD5dff9c3d96fdfdb902854af26dbff4e8e
SHA1831ddf8e8f1aeade711ecb771f38457d4f4ab5d5
SHA256de51506ce3c367a223d0a5a3f75da943f21f759185caf04e50948789a9c80736
SHA512549e616d259f3958efc486ac10d5d7a6339264fda77f3c6c7f49d0fbbd24e7cfd670e37de8ca0f859fe7c9869d454af4be10984151671a27594c68359bba5995
-
Filesize
1.2MB
MD5dff9c3d96fdfdb902854af26dbff4e8e
SHA1831ddf8e8f1aeade711ecb771f38457d4f4ab5d5
SHA256de51506ce3c367a223d0a5a3f75da943f21f759185caf04e50948789a9c80736
SHA512549e616d259f3958efc486ac10d5d7a6339264fda77f3c6c7f49d0fbbd24e7cfd670e37de8ca0f859fe7c9869d454af4be10984151671a27594c68359bba5995
-
Filesize
240KB
MD5e1fbd60ed7f2da2ddb8905b8cc64b2f4
SHA10acd9963f5814ab99d9d82be787a5b0aada9b0f8
SHA256cb2b1686ed98dd21729ed369ce5da4334388c05e0355decde9d477c056eabc56
SHA51238bd9052546ad1ae9cae27694c0cf644669843e6e2317fe2f3b0ca26918ce6d3d38131b82344e06174b369d66b276e526f46d15af2ddc0b2c039ebb07ece0a1a
-
Filesize
240KB
MD5e1fbd60ed7f2da2ddb8905b8cc64b2f4
SHA10acd9963f5814ab99d9d82be787a5b0aada9b0f8
SHA256cb2b1686ed98dd21729ed369ce5da4334388c05e0355decde9d477c056eabc56
SHA51238bd9052546ad1ae9cae27694c0cf644669843e6e2317fe2f3b0ca26918ce6d3d38131b82344e06174b369d66b276e526f46d15af2ddc0b2c039ebb07ece0a1a
-
Filesize
1.0MB
MD591d4bc66800c5e228e2d065a37db8945
SHA1927c552bfc87dcd7809772d1e8c2a9c2e7313454
SHA25647d881b77dc87c8ac5c34bb5ff3afbcc50a521e8b1434f0427e8e7dc398b1b1f
SHA512283ccd3cc279e72160ff8b05dece7fff01f2b7ae68cb7645b8a9c23e6aea9fe2d02c896553772671da365b81a8589283ddc6e4cf435263dfe90d59c24466a8b4
-
Filesize
1.0MB
MD591d4bc66800c5e228e2d065a37db8945
SHA1927c552bfc87dcd7809772d1e8c2a9c2e7313454
SHA25647d881b77dc87c8ac5c34bb5ff3afbcc50a521e8b1434f0427e8e7dc398b1b1f
SHA512283ccd3cc279e72160ff8b05dece7fff01f2b7ae68cb7645b8a9c23e6aea9fe2d02c896553772671da365b81a8589283ddc6e4cf435263dfe90d59c24466a8b4
-
Filesize
16KB
MD53d7a4b76861f0939ab13ef0db7a3016a
SHA1f6ef4898c75244c194e7bd72e8aaf26cfd1a1c3b
SHA25654f1527545434c26c817ec94b0e7597e99f5cb631ea20e6140e710105b0a13b5
SHA512dba7686912244100e57497d2649efe8f118d2d227eb9dc7f6ed71810a3ca9ad3a03a8d04f0c98415e2ee22933074201ceca9e51da51cd0102fa2414fc6acf4fe
-
Filesize
16KB
MD53d7a4b76861f0939ab13ef0db7a3016a
SHA1f6ef4898c75244c194e7bd72e8aaf26cfd1a1c3b
SHA25654f1527545434c26c817ec94b0e7597e99f5cb631ea20e6140e710105b0a13b5
SHA512dba7686912244100e57497d2649efe8f118d2d227eb9dc7f6ed71810a3ca9ad3a03a8d04f0c98415e2ee22933074201ceca9e51da51cd0102fa2414fc6acf4fe
-
Filesize
935KB
MD555dc17ff9460fb7b522b877d1bccd9b1
SHA1d23e2e449b137b347959b55f4be3e681e78e9f32
SHA25636b1eaad8164a4b80f7623525157537c8287808b3fe56bc4f2b2b4b01cadfa04
SHA51262b4c6c73cb7ff2631f41052a4a2b10e82bba2fc2c2e5f2648f691c7f4cf039617cf3faba4fe6d62b6f57ebc1afd790fd2a35a75ac9287365c4d83c10e98cbb1
-
Filesize
935KB
MD555dc17ff9460fb7b522b877d1bccd9b1
SHA1d23e2e449b137b347959b55f4be3e681e78e9f32
SHA25636b1eaad8164a4b80f7623525157537c8287808b3fe56bc4f2b2b4b01cadfa04
SHA51262b4c6c73cb7ff2631f41052a4a2b10e82bba2fc2c2e5f2648f691c7f4cf039617cf3faba4fe6d62b6f57ebc1afd790fd2a35a75ac9287365c4d83c10e98cbb1
-
Filesize
301KB
MD50b1fc7b6b5f423e268221516747427e9
SHA146193a7985ffd4b645fb2abf9eb10bc11a78a537
SHA256d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2
SHA512120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8
-
Filesize
301KB
MD50b1fc7b6b5f423e268221516747427e9
SHA146193a7985ffd4b645fb2abf9eb10bc11a78a537
SHA256d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2
SHA512120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8
-
Filesize
666KB
MD51b7ef8794faf78bd404983e01297e705
SHA181aa6e051fadce98607b6bf98e8eee142fd58f90
SHA2560becc263bec6798b157b343a13ab01e7a546294d7335651124ea5f6c27061a9c
SHA512e595f6ac866ed884dbdbb65531e42be12e4a6f0c441bc9598d0e6e83e6b7150ba82bb76f8fa5fd5e858736ee082bedab0bff5437a0a5800a0d25fdfdffee11e4
-
Filesize
666KB
MD51b7ef8794faf78bd404983e01297e705
SHA181aa6e051fadce98607b6bf98e8eee142fd58f90
SHA2560becc263bec6798b157b343a13ab01e7a546294d7335651124ea5f6c27061a9c
SHA512e595f6ac866ed884dbdbb65531e42be12e4a6f0c441bc9598d0e6e83e6b7150ba82bb76f8fa5fd5e858736ee082bedab0bff5437a0a5800a0d25fdfdffee11e4
-
Filesize
244KB
MD5aac5f074d640ba0b694fba12e61c37de
SHA141b22f35c58322c3336965324179cee4f2169c7e
SHA256b9066604c2acdc28870f5654c8186c37746636cd1c873858acd66ef22dd2efff
SHA512dd026c1c8f433a4ac461646524c0b638ac34009379c6ae013902989721b4e736609c7aba942b8c176bd48e9dcd4418da445c6c2807091851377f0321fa2c5812
-
Filesize
244KB
MD5aac5f074d640ba0b694fba12e61c37de
SHA141b22f35c58322c3336965324179cee4f2169c7e
SHA256b9066604c2acdc28870f5654c8186c37746636cd1c873858acd66ef22dd2efff
SHA512dd026c1c8f433a4ac461646524c0b638ac34009379c6ae013902989721b4e736609c7aba942b8c176bd48e9dcd4418da445c6c2807091851377f0321fa2c5812
-
Filesize
391KB
MD588cb30d9a3c0d5e55882a131eb3643f3
SHA12a2ece5e3d8ed864219991c5b9f78944bf44a3e3
SHA25686823dca6f408a02bf47da7d34c8c4eab3af8edf48495b4f841681fc3c9095ac
SHA5129e2618237f9f81730a03c2821ddbcfd820f4eae7bec59eb1a590037da5e43cb2ecceee70ee60c89d34f5e1366e89631b287043d10ae26a4acfbfdb3c06c49089
-
Filesize
391KB
MD588cb30d9a3c0d5e55882a131eb3643f3
SHA12a2ece5e3d8ed864219991c5b9f78944bf44a3e3
SHA25686823dca6f408a02bf47da7d34c8c4eab3af8edf48495b4f841681fc3c9095ac
SHA5129e2618237f9f81730a03c2821ddbcfd820f4eae7bec59eb1a590037da5e43cb2ecceee70ee60c89d34f5e1366e89631b287043d10ae26a4acfbfdb3c06c49089
-
Filesize
16KB
MD5fda6b4eb58ca576c750ffcdd3d98632a
SHA13414c14b1d6ce384170d205d983b43898c6499a7
SHA2562156a7432ae7bba64572c56324452691ef5fe5992a2ab903286b49bc6972708a
SHA51203864610b543bb167fb76c31b740d96813107b419cc3acb7a16560ac6fbdd51d69ed6d384a9bebeef114ca7e5ad3ca69a217408d6f16e7ed172ee61ee18ca536
-
Filesize
16KB
MD5fda6b4eb58ca576c750ffcdd3d98632a
SHA13414c14b1d6ce384170d205d983b43898c6499a7
SHA2562156a7432ae7bba64572c56324452691ef5fe5992a2ab903286b49bc6972708a
SHA51203864610b543bb167fb76c31b740d96813107b419cc3acb7a16560ac6fbdd51d69ed6d384a9bebeef114ca7e5ad3ca69a217408d6f16e7ed172ee61ee18ca536
-
Filesize
16KB
MD5fda6b4eb58ca576c750ffcdd3d98632a
SHA13414c14b1d6ce384170d205d983b43898c6499a7
SHA2562156a7432ae7bba64572c56324452691ef5fe5992a2ab903286b49bc6972708a
SHA51203864610b543bb167fb76c31b740d96813107b419cc3acb7a16560ac6fbdd51d69ed6d384a9bebeef114ca7e5ad3ca69a217408d6f16e7ed172ee61ee18ca536
-
Filesize
301KB
MD50b1fc7b6b5f423e268221516747427e9
SHA146193a7985ffd4b645fb2abf9eb10bc11a78a537
SHA256d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2
SHA512120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8
-
Filesize
301KB
MD50b1fc7b6b5f423e268221516747427e9
SHA146193a7985ffd4b645fb2abf9eb10bc11a78a537
SHA256d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2
SHA512120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8
-
Filesize
301KB
MD50b1fc7b6b5f423e268221516747427e9
SHA146193a7985ffd4b645fb2abf9eb10bc11a78a537
SHA256d798407025621d1aab6e51a2cd6b6b8db9b0832b5ff932001ae3a42789c69bc2
SHA512120304b76de795816e47f07555c149c65dc52a152b92dafc5f5e4ff4dc4c09e8a1ca3b71c043d0cecb2f4c74e434ba0ec9ae4bd15a3cf22bb880326c77be02e8
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5