Analysis
-
max time kernel
127s -
max time network
117s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/03/2023, 08:20
Static task
static1
General
-
Target
46bfca80edb07b3fb116af426e184316f99841848de9230db0f5dba262f39db6.exe
-
Size
1.3MB
-
MD5
b30d7125102873e5c430173e04d0453e
-
SHA1
6a8926ee85deeaba4a5f7e7e8a2b81db057091dd
-
SHA256
46bfca80edb07b3fb116af426e184316f99841848de9230db0f5dba262f39db6
-
SHA512
28793a487802715f0275f0be178fb2c78ca97d453d2d65fc408928ac8055c3ff8507a271f1c2520cac07e6be7d6b6fc0e35f2220f72cfdcc1b694d628d1ff150
-
SSDEEP
24576:sy4lTZ0qKr/+YLH7ghYcAMO+8DNfeRN/YULmULJv55izWSXQKiTNRhrmRxXIwp:bYNnKz+YLbPcAMO5heRN/YULm87iz7xt
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsqx87Df55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnyS48yJ15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beEf40XH93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnyS48yJ15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnyS48yJ15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beEf40XH93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beEf40XH93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsqx87Df55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnyS48yJ15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnyS48yJ15.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beEf40XH93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beEf40XH93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsqx87Df55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsqx87Df55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsqx87Df55.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3560-169-0x0000000002110000-0x0000000002156000-memory.dmp family_redline behavioral1/memory/3560-171-0x0000000004B60000-0x0000000004BA4000-memory.dmp family_redline behavioral1/memory/3560-176-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-177-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-179-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-181-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-183-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-185-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-187-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-189-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-191-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-193-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-195-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-197-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-199-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-201-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-203-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-205-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-207-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-209-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-211-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-213-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-215-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-217-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-219-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-221-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-223-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-225-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-227-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-229-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-231-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-233-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-235-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-237-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/3560-239-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline -
Executes dropped EXE 15 IoCs
pid Process 2804 ptPg9695iq.exe 2592 ptgC5222BL.exe 5012 ptrW5573wR.exe 3860 pttv0513QQ.exe 4140 ptMl7560MF.exe 2556 beEf40XH93.exe 3560 cuCY05Gq52.exe 4820 dsqx87Df55.exe 4664 fr62OK0414qN.exe 3748 gnyS48yJ15.exe 3208 hk51aG15UN53.exe 5060 mnolyk.exe 5096 jxki98xs78.exe 4236 mnolyk.exe 1028 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 824 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beEf40XH93.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsqx87Df55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsqx87Df55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnyS48yJ15.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptMl7560MF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 46bfca80edb07b3fb116af426e184316f99841848de9230db0f5dba262f39db6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptPg9695iq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptrW5573wR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptgC5222BL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptrW5573wR.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pttv0513QQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" pttv0513QQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptMl7560MF.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 46bfca80edb07b3fb116af426e184316f99841848de9230db0f5dba262f39db6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptPg9695iq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptgC5222BL.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2556 beEf40XH93.exe 2556 beEf40XH93.exe 3560 cuCY05Gq52.exe 3560 cuCY05Gq52.exe 4820 dsqx87Df55.exe 4820 dsqx87Df55.exe 4664 fr62OK0414qN.exe 4664 fr62OK0414qN.exe 3748 gnyS48yJ15.exe 3748 gnyS48yJ15.exe 5096 jxki98xs78.exe 5096 jxki98xs78.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2556 beEf40XH93.exe Token: SeDebugPrivilege 3560 cuCY05Gq52.exe Token: SeDebugPrivilege 4820 dsqx87Df55.exe Token: SeDebugPrivilege 4664 fr62OK0414qN.exe Token: SeDebugPrivilege 3748 gnyS48yJ15.exe Token: SeDebugPrivilege 5096 jxki98xs78.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2804 2476 46bfca80edb07b3fb116af426e184316f99841848de9230db0f5dba262f39db6.exe 66 PID 2476 wrote to memory of 2804 2476 46bfca80edb07b3fb116af426e184316f99841848de9230db0f5dba262f39db6.exe 66 PID 2476 wrote to memory of 2804 2476 46bfca80edb07b3fb116af426e184316f99841848de9230db0f5dba262f39db6.exe 66 PID 2804 wrote to memory of 2592 2804 ptPg9695iq.exe 67 PID 2804 wrote to memory of 2592 2804 ptPg9695iq.exe 67 PID 2804 wrote to memory of 2592 2804 ptPg9695iq.exe 67 PID 2592 wrote to memory of 5012 2592 ptgC5222BL.exe 68 PID 2592 wrote to memory of 5012 2592 ptgC5222BL.exe 68 PID 2592 wrote to memory of 5012 2592 ptgC5222BL.exe 68 PID 5012 wrote to memory of 3860 5012 ptrW5573wR.exe 69 PID 5012 wrote to memory of 3860 5012 ptrW5573wR.exe 69 PID 5012 wrote to memory of 3860 5012 ptrW5573wR.exe 69 PID 3860 wrote to memory of 4140 3860 pttv0513QQ.exe 70 PID 3860 wrote to memory of 4140 3860 pttv0513QQ.exe 70 PID 3860 wrote to memory of 4140 3860 pttv0513QQ.exe 70 PID 4140 wrote to memory of 2556 4140 ptMl7560MF.exe 71 PID 4140 wrote to memory of 2556 4140 ptMl7560MF.exe 71 PID 4140 wrote to memory of 3560 4140 ptMl7560MF.exe 72 PID 4140 wrote to memory of 3560 4140 ptMl7560MF.exe 72 PID 4140 wrote to memory of 3560 4140 ptMl7560MF.exe 72 PID 3860 wrote to memory of 4820 3860 pttv0513QQ.exe 74 PID 3860 wrote to memory of 4820 3860 pttv0513QQ.exe 74 PID 3860 wrote to memory of 4820 3860 pttv0513QQ.exe 74 PID 5012 wrote to memory of 4664 5012 ptrW5573wR.exe 75 PID 5012 wrote to memory of 4664 5012 ptrW5573wR.exe 75 PID 5012 wrote to memory of 4664 5012 ptrW5573wR.exe 75 PID 2592 wrote to memory of 3748 2592 ptgC5222BL.exe 76 PID 2592 wrote to memory of 3748 2592 ptgC5222BL.exe 76 PID 2804 wrote to memory of 3208 2804 ptPg9695iq.exe 77 PID 2804 wrote to memory of 3208 2804 ptPg9695iq.exe 77 PID 2804 wrote to memory of 3208 2804 ptPg9695iq.exe 77 PID 3208 wrote to memory of 5060 3208 hk51aG15UN53.exe 78 PID 3208 wrote to memory of 5060 3208 hk51aG15UN53.exe 78 PID 3208 wrote to memory of 5060 3208 hk51aG15UN53.exe 78 PID 2476 wrote to memory of 5096 2476 46bfca80edb07b3fb116af426e184316f99841848de9230db0f5dba262f39db6.exe 79 PID 2476 wrote to memory of 5096 2476 46bfca80edb07b3fb116af426e184316f99841848de9230db0f5dba262f39db6.exe 79 PID 2476 wrote to memory of 5096 2476 46bfca80edb07b3fb116af426e184316f99841848de9230db0f5dba262f39db6.exe 79 PID 5060 wrote to memory of 5024 5060 mnolyk.exe 80 PID 5060 wrote to memory of 5024 5060 mnolyk.exe 80 PID 5060 wrote to memory of 5024 5060 mnolyk.exe 80 PID 5060 wrote to memory of 5020 5060 mnolyk.exe 81 PID 5060 wrote to memory of 5020 5060 mnolyk.exe 81 PID 5060 wrote to memory of 5020 5060 mnolyk.exe 81 PID 5020 wrote to memory of 4860 5020 cmd.exe 84 PID 5020 wrote to memory of 4860 5020 cmd.exe 84 PID 5020 wrote to memory of 4860 5020 cmd.exe 84 PID 5020 wrote to memory of 4892 5020 cmd.exe 85 PID 5020 wrote to memory of 4892 5020 cmd.exe 85 PID 5020 wrote to memory of 4892 5020 cmd.exe 85 PID 5020 wrote to memory of 4288 5020 cmd.exe 86 PID 5020 wrote to memory of 4288 5020 cmd.exe 86 PID 5020 wrote to memory of 4288 5020 cmd.exe 86 PID 5020 wrote to memory of 2144 5020 cmd.exe 87 PID 5020 wrote to memory of 2144 5020 cmd.exe 87 PID 5020 wrote to memory of 2144 5020 cmd.exe 87 PID 5020 wrote to memory of 4768 5020 cmd.exe 88 PID 5020 wrote to memory of 4768 5020 cmd.exe 88 PID 5020 wrote to memory of 4768 5020 cmd.exe 88 PID 5020 wrote to memory of 4224 5020 cmd.exe 89 PID 5020 wrote to memory of 4224 5020 cmd.exe 89 PID 5020 wrote to memory of 4224 5020 cmd.exe 89 PID 5060 wrote to memory of 824 5060 mnolyk.exe 91 PID 5060 wrote to memory of 824 5060 mnolyk.exe 91 PID 5060 wrote to memory of 824 5060 mnolyk.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\46bfca80edb07b3fb116af426e184316f99841848de9230db0f5dba262f39db6.exe"C:\Users\Admin\AppData\Local\Temp\46bfca80edb07b3fb116af426e184316f99841848de9230db0f5dba262f39db6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptPg9695iq.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptPg9695iq.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptgC5222BL.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptgC5222BL.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptrW5573wR.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptrW5573wR.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pttv0513QQ.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pttv0513QQ.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptMl7560MF.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptMl7560MF.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beEf40XH93.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beEf40XH93.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuCY05Gq52.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuCY05Gq52.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsqx87Df55.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsqx87Df55.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr62OK0414qN.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr62OK0414qN.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnyS48yJ15.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnyS48yJ15.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk51aG15UN53.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk51aG15UN53.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:5024
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:4892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:4288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2144
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:4768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:4224
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:824
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxki98xs78.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxki98xs78.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:4236
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:1028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD51a05c95bdd946978de0956d439001fb5
SHA19302a6f39bbd41d9d4058b717c113748280668af
SHA256b5dc85936cd673ba171d2b70130068b92804db7cda03ea4b31a7735176ec5059
SHA51286d65e6e2185ff55a3cbcbdb872f2a0a90c35637ddd44551ed9bace105f407cd3ff454278abdd85c5e38f40d972e5d37ad3d143e51067c47aa45e1c4f30cc8e5
-
Filesize
240KB
MD51a05c95bdd946978de0956d439001fb5
SHA19302a6f39bbd41d9d4058b717c113748280668af
SHA256b5dc85936cd673ba171d2b70130068b92804db7cda03ea4b31a7735176ec5059
SHA51286d65e6e2185ff55a3cbcbdb872f2a0a90c35637ddd44551ed9bace105f407cd3ff454278abdd85c5e38f40d972e5d37ad3d143e51067c47aa45e1c4f30cc8e5
-
Filesize
240KB
MD51a05c95bdd946978de0956d439001fb5
SHA19302a6f39bbd41d9d4058b717c113748280668af
SHA256b5dc85936cd673ba171d2b70130068b92804db7cda03ea4b31a7735176ec5059
SHA51286d65e6e2185ff55a3cbcbdb872f2a0a90c35637ddd44551ed9bace105f407cd3ff454278abdd85c5e38f40d972e5d37ad3d143e51067c47aa45e1c4f30cc8e5
-
Filesize
240KB
MD51a05c95bdd946978de0956d439001fb5
SHA19302a6f39bbd41d9d4058b717c113748280668af
SHA256b5dc85936cd673ba171d2b70130068b92804db7cda03ea4b31a7735176ec5059
SHA51286d65e6e2185ff55a3cbcbdb872f2a0a90c35637ddd44551ed9bace105f407cd3ff454278abdd85c5e38f40d972e5d37ad3d143e51067c47aa45e1c4f30cc8e5
-
Filesize
240KB
MD51a05c95bdd946978de0956d439001fb5
SHA19302a6f39bbd41d9d4058b717c113748280668af
SHA256b5dc85936cd673ba171d2b70130068b92804db7cda03ea4b31a7735176ec5059
SHA51286d65e6e2185ff55a3cbcbdb872f2a0a90c35637ddd44551ed9bace105f407cd3ff454278abdd85c5e38f40d972e5d37ad3d143e51067c47aa45e1c4f30cc8e5
-
Filesize
177KB
MD58aefee5014afde7ed4ae232f4faabfa4
SHA12416a0c6353dd9c55c61a5af1a6469b8910f1d38
SHA2560119765d52a2e85c76bfbbd358d2179a05683be5895de831b8b63718fc02e8f0
SHA512c2926d3c8f83e5e8d8583b19c736ba968d16b84e614fdb5abc10e61b8b644710297096ebd9d249423858b76ebe2b648d43a733b7db65e30236a4ae6cdca33fd7
-
Filesize
177KB
MD58aefee5014afde7ed4ae232f4faabfa4
SHA12416a0c6353dd9c55c61a5af1a6469b8910f1d38
SHA2560119765d52a2e85c76bfbbd358d2179a05683be5895de831b8b63718fc02e8f0
SHA512c2926d3c8f83e5e8d8583b19c736ba968d16b84e614fdb5abc10e61b8b644710297096ebd9d249423858b76ebe2b648d43a733b7db65e30236a4ae6cdca33fd7
-
Filesize
1.2MB
MD523457cd77919a11d235db06b55b24023
SHA136f59dd10d3913e551596c138cf94063409e69cf
SHA25683ec25612e10f8e77d574ccc7975701424f013fa7e856c408900ccf205160c06
SHA512c829e66f37514902c1f10c94e9b4a57e3f33d44a4e30756f9e01f53876a63e443fcffb48ebf166a172c69d5a485a94db44a534fa130a6aa0a8c75a66750f0207
-
Filesize
1.2MB
MD523457cd77919a11d235db06b55b24023
SHA136f59dd10d3913e551596c138cf94063409e69cf
SHA25683ec25612e10f8e77d574ccc7975701424f013fa7e856c408900ccf205160c06
SHA512c829e66f37514902c1f10c94e9b4a57e3f33d44a4e30756f9e01f53876a63e443fcffb48ebf166a172c69d5a485a94db44a534fa130a6aa0a8c75a66750f0207
-
Filesize
240KB
MD51a05c95bdd946978de0956d439001fb5
SHA19302a6f39bbd41d9d4058b717c113748280668af
SHA256b5dc85936cd673ba171d2b70130068b92804db7cda03ea4b31a7735176ec5059
SHA51286d65e6e2185ff55a3cbcbdb872f2a0a90c35637ddd44551ed9bace105f407cd3ff454278abdd85c5e38f40d972e5d37ad3d143e51067c47aa45e1c4f30cc8e5
-
Filesize
240KB
MD51a05c95bdd946978de0956d439001fb5
SHA19302a6f39bbd41d9d4058b717c113748280668af
SHA256b5dc85936cd673ba171d2b70130068b92804db7cda03ea4b31a7735176ec5059
SHA51286d65e6e2185ff55a3cbcbdb872f2a0a90c35637ddd44551ed9bace105f407cd3ff454278abdd85c5e38f40d972e5d37ad3d143e51067c47aa45e1c4f30cc8e5
-
Filesize
1.0MB
MD50055fd197e3a4092cec370b1bc986c96
SHA161ba6c48c7f0303f7873b3b94de591e9f23580fd
SHA2564abbced6cd4905b0ed9fc63010db5976b2295e051e4d37fedfef33569b24b187
SHA5122fc3734d9e0696f358b7405db3bc4d526ee4c14c079d6d28581ef18538cf22fb82640eef7a9615b825f40a4fa41272eb85c1ac454bee70f1410810488def3ae5
-
Filesize
1.0MB
MD50055fd197e3a4092cec370b1bc986c96
SHA161ba6c48c7f0303f7873b3b94de591e9f23580fd
SHA2564abbced6cd4905b0ed9fc63010db5976b2295e051e4d37fedfef33569b24b187
SHA5122fc3734d9e0696f358b7405db3bc4d526ee4c14c079d6d28581ef18538cf22fb82640eef7a9615b825f40a4fa41272eb85c1ac454bee70f1410810488def3ae5
-
Filesize
16KB
MD51bd7239ad9752e169adb888ee046eb08
SHA144c0ed1b02d806b6dc6245916b72088aa982a582
SHA256d540799fbd21bf4b94abbce9d2fb64a131d3ee22c525ac9901d2461a2e5ecc96
SHA5128f8ae4e7729a005ac3f8518f53faec7b92400d77f3b96424bdc64557c766c08a7dc55774954f3f9de7edcd68c68aab1ab8eaca0b9a8ff4b7b22d24859283f511
-
Filesize
16KB
MD51bd7239ad9752e169adb888ee046eb08
SHA144c0ed1b02d806b6dc6245916b72088aa982a582
SHA256d540799fbd21bf4b94abbce9d2fb64a131d3ee22c525ac9901d2461a2e5ecc96
SHA5128f8ae4e7729a005ac3f8518f53faec7b92400d77f3b96424bdc64557c766c08a7dc55774954f3f9de7edcd68c68aab1ab8eaca0b9a8ff4b7b22d24859283f511
-
Filesize
936KB
MD5c268d90701a896ba9a87de8b5ae55a93
SHA1b448c63a4c7bf1b06317b512ef02da9c5e0456e0
SHA256bf64114131c16a5d1df968cf296200662df5e9b719a1c589d4f974bfc676df0b
SHA512eef5c26f05088510624e0a61f306fb50bcd38fa19a2b1400311647807f837abf1afda5213d7d98df238e030edcc3c813060ba0d172fabcfde7ee410b92ff0c7f
-
Filesize
936KB
MD5c268d90701a896ba9a87de8b5ae55a93
SHA1b448c63a4c7bf1b06317b512ef02da9c5e0456e0
SHA256bf64114131c16a5d1df968cf296200662df5e9b719a1c589d4f974bfc676df0b
SHA512eef5c26f05088510624e0a61f306fb50bcd38fa19a2b1400311647807f837abf1afda5213d7d98df238e030edcc3c813060ba0d172fabcfde7ee410b92ff0c7f
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
667KB
MD5a7401b2cf8475eeff9a1dcb3fee73220
SHA113d06fbf9d3c7625b27ce89723ed454a7cdc48db
SHA25610e8b2580ac366f3199df6644c1df8f94059db05cae109d45602d46afe338cb0
SHA5121668bbfc2fa9a872d70e0020c0815661b9a3d42c01c79f15daee7988cca982faf1f89e0e260d4480f646dd7a65036ab1f5d9e9c035345d66a9f8900ea0459fab
-
Filesize
667KB
MD5a7401b2cf8475eeff9a1dcb3fee73220
SHA113d06fbf9d3c7625b27ce89723ed454a7cdc48db
SHA25610e8b2580ac366f3199df6644c1df8f94059db05cae109d45602d46afe338cb0
SHA5121668bbfc2fa9a872d70e0020c0815661b9a3d42c01c79f15daee7988cca982faf1f89e0e260d4480f646dd7a65036ab1f5d9e9c035345d66a9f8900ea0459fab
-
Filesize
244KB
MD502f5dcb777fe1b583584f6f69878cc07
SHA126c88ed5dcc5ceebb8201ce9d5db4d58ffa54c1e
SHA256b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d
SHA512030fa12cf48981b48573cfe750958a09172b474a5ba6f4080842483a13ab875982fef46361cebeea65f25cc3616f828d289d30bbb610727698120cbefc22b202
-
Filesize
244KB
MD502f5dcb777fe1b583584f6f69878cc07
SHA126c88ed5dcc5ceebb8201ce9d5db4d58ffa54c1e
SHA256b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d
SHA512030fa12cf48981b48573cfe750958a09172b474a5ba6f4080842483a13ab875982fef46361cebeea65f25cc3616f828d289d30bbb610727698120cbefc22b202
-
Filesize
391KB
MD50b0428a5d103bbbb75de5a8b3516026c
SHA1a0d720d4603674cc6619dcacc90636b9afdfe236
SHA256824899863b0b2283e1e3bcd3e7452bff8f87c3b2ce39c6fe9548e140dabb28de
SHA512e22663c3b7ecc15c987d595774bd96b9bd67f49d5d28fee31e32f7568faff85a2208f7f40bed3b587b24f65e59d6b612272c9109597ddfe67efad5d0f7ae789c
-
Filesize
391KB
MD50b0428a5d103bbbb75de5a8b3516026c
SHA1a0d720d4603674cc6619dcacc90636b9afdfe236
SHA256824899863b0b2283e1e3bcd3e7452bff8f87c3b2ce39c6fe9548e140dabb28de
SHA512e22663c3b7ecc15c987d595774bd96b9bd67f49d5d28fee31e32f7568faff85a2208f7f40bed3b587b24f65e59d6b612272c9109597ddfe67efad5d0f7ae789c
-
Filesize
16KB
MD53241cde7105a9a31a97e8d4b3508603e
SHA1f8af0811cbe50b79d10c5612ddd4b04fdbbf2ff8
SHA256f55ecd1dbdb4ab3be6d71edeac7b835b84b2c2b5f524fce8ce1f1040d19c450b
SHA5127cdca26a72a76ee88294d4f55668bbc4033f0c8f439d7a5467de99f5522c8583856397851b074c8ca421c3f850004d06a20e012ad8865804347f43e123ac57d8
-
Filesize
16KB
MD53241cde7105a9a31a97e8d4b3508603e
SHA1f8af0811cbe50b79d10c5612ddd4b04fdbbf2ff8
SHA256f55ecd1dbdb4ab3be6d71edeac7b835b84b2c2b5f524fce8ce1f1040d19c450b
SHA5127cdca26a72a76ee88294d4f55668bbc4033f0c8f439d7a5467de99f5522c8583856397851b074c8ca421c3f850004d06a20e012ad8865804347f43e123ac57d8
-
Filesize
16KB
MD53241cde7105a9a31a97e8d4b3508603e
SHA1f8af0811cbe50b79d10c5612ddd4b04fdbbf2ff8
SHA256f55ecd1dbdb4ab3be6d71edeac7b835b84b2c2b5f524fce8ce1f1040d19c450b
SHA5127cdca26a72a76ee88294d4f55668bbc4033f0c8f439d7a5467de99f5522c8583856397851b074c8ca421c3f850004d06a20e012ad8865804347f43e123ac57d8
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78