Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 08:05
Static task
static1
General
-
Target
10f2d4cfb5f0beccc72b78d08f4a579fc6a058769bd09736409fad2e22a2b513.exe
-
Size
1.3MB
-
MD5
87e3d079157d6f11bfe9b8c25378e934
-
SHA1
a14082931e11882f310ab93bc450fb998555e4fb
-
SHA256
10f2d4cfb5f0beccc72b78d08f4a579fc6a058769bd09736409fad2e22a2b513
-
SHA512
b81e511de5757d44e3e761bac2b52c2b36dcd28d2a2ebb88931fbd177fee60657e9e6e9ca3048bca5874b3cf77e61ca10342de71cde91765aac30cb59073b0c2
-
SSDEEP
24576:5y3x3ewYsDILCs2HputA1ZDh/5M83LYUlzevvZkM5QhawK4TWqfefXpCvE:sh3ekIus2HpV1ZrMSLYUlzkh5AawKGGy
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" becb15ZR47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsiQ12tA92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsiQ12tA92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnUn37Bp24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnUn37Bp24.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection becb15ZR47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" becb15ZR47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" becb15ZR47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsiQ12tA92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnUn37Bp24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnUn37Bp24.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsiQ12tA92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" becb15ZR47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" becb15ZR47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsiQ12tA92.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsiQ12tA92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnUn37Bp24.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4628-183-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-184-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-188-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-186-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-202-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-200-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-204-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-198-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-196-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-206-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-218-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-222-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-239-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-237-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-249-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-247-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-245-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-243-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-241-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-235-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-233-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-231-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-228-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-225-0x0000000004CB0000-0x0000000004CC0000-memory.dmp family_redline behavioral1/memory/4628-224-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-220-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-216-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-214-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-212-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-210-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-208-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-194-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-192-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-190-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4628-1102-0x0000000004CB0000-0x0000000004CC0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation hk59eu11qL30.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 15 IoCs
pid Process 1448 ptLA3347lv.exe 1920 ptal2334fN.exe 3184 ptke6001yF.exe 1224 ptVP3484tl.exe 228 ptzC8922rz.exe 1976 becb15ZR47.exe 4628 cuhc01sF66.exe 3260 dsiQ12tA92.exe 1640 fr68mU1419ah.exe 2612 gnUn37Bp24.exe 4596 hk59eu11qL30.exe 5072 mnolyk.exe 3136 jxBB19FQ36.exe 452 mnolyk.exe 2200 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4032 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" becb15ZR47.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsiQ12tA92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsiQ12tA92.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnUn37Bp24.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptLA3347lv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptal2334fN.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptke6001yF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptVP3484tl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptzC8922rz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptzC8922rz.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 10f2d4cfb5f0beccc72b78d08f4a579fc6a058769bd09736409fad2e22a2b513.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 10f2d4cfb5f0beccc72b78d08f4a579fc6a058769bd09736409fad2e22a2b513.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptke6001yF.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptVP3484tl.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptLA3347lv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptal2334fN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 3588 4628 WerFault.exe 99 4980 3260 WerFault.exe 103 2376 1640 WerFault.exe 109 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3216 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1976 becb15ZR47.exe 1976 becb15ZR47.exe 4628 cuhc01sF66.exe 4628 cuhc01sF66.exe 3260 dsiQ12tA92.exe 3260 dsiQ12tA92.exe 1640 fr68mU1419ah.exe 1640 fr68mU1419ah.exe 2612 gnUn37Bp24.exe 2612 gnUn37Bp24.exe 3136 jxBB19FQ36.exe 3136 jxBB19FQ36.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1976 becb15ZR47.exe Token: SeDebugPrivilege 4628 cuhc01sF66.exe Token: SeDebugPrivilege 3260 dsiQ12tA92.exe Token: SeDebugPrivilege 1640 fr68mU1419ah.exe Token: SeDebugPrivilege 2612 gnUn37Bp24.exe Token: SeDebugPrivilege 3136 jxBB19FQ36.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 780 wrote to memory of 1448 780 10f2d4cfb5f0beccc72b78d08f4a579fc6a058769bd09736409fad2e22a2b513.exe 85 PID 780 wrote to memory of 1448 780 10f2d4cfb5f0beccc72b78d08f4a579fc6a058769bd09736409fad2e22a2b513.exe 85 PID 780 wrote to memory of 1448 780 10f2d4cfb5f0beccc72b78d08f4a579fc6a058769bd09736409fad2e22a2b513.exe 85 PID 1448 wrote to memory of 1920 1448 ptLA3347lv.exe 86 PID 1448 wrote to memory of 1920 1448 ptLA3347lv.exe 86 PID 1448 wrote to memory of 1920 1448 ptLA3347lv.exe 86 PID 1920 wrote to memory of 3184 1920 ptal2334fN.exe 87 PID 1920 wrote to memory of 3184 1920 ptal2334fN.exe 87 PID 1920 wrote to memory of 3184 1920 ptal2334fN.exe 87 PID 3184 wrote to memory of 1224 3184 ptke6001yF.exe 88 PID 3184 wrote to memory of 1224 3184 ptke6001yF.exe 88 PID 3184 wrote to memory of 1224 3184 ptke6001yF.exe 88 PID 1224 wrote to memory of 228 1224 ptVP3484tl.exe 89 PID 1224 wrote to memory of 228 1224 ptVP3484tl.exe 89 PID 1224 wrote to memory of 228 1224 ptVP3484tl.exe 89 PID 228 wrote to memory of 1976 228 ptzC8922rz.exe 90 PID 228 wrote to memory of 1976 228 ptzC8922rz.exe 90 PID 228 wrote to memory of 4628 228 ptzC8922rz.exe 99 PID 228 wrote to memory of 4628 228 ptzC8922rz.exe 99 PID 228 wrote to memory of 4628 228 ptzC8922rz.exe 99 PID 1224 wrote to memory of 3260 1224 ptVP3484tl.exe 103 PID 1224 wrote to memory of 3260 1224 ptVP3484tl.exe 103 PID 1224 wrote to memory of 3260 1224 ptVP3484tl.exe 103 PID 3184 wrote to memory of 1640 3184 ptke6001yF.exe 109 PID 3184 wrote to memory of 1640 3184 ptke6001yF.exe 109 PID 3184 wrote to memory of 1640 3184 ptke6001yF.exe 109 PID 1920 wrote to memory of 2612 1920 ptal2334fN.exe 112 PID 1920 wrote to memory of 2612 1920 ptal2334fN.exe 112 PID 1448 wrote to memory of 4596 1448 ptLA3347lv.exe 113 PID 1448 wrote to memory of 4596 1448 ptLA3347lv.exe 113 PID 1448 wrote to memory of 4596 1448 ptLA3347lv.exe 113 PID 4596 wrote to memory of 5072 4596 hk59eu11qL30.exe 114 PID 4596 wrote to memory of 5072 4596 hk59eu11qL30.exe 114 PID 4596 wrote to memory of 5072 4596 hk59eu11qL30.exe 114 PID 780 wrote to memory of 3136 780 10f2d4cfb5f0beccc72b78d08f4a579fc6a058769bd09736409fad2e22a2b513.exe 115 PID 780 wrote to memory of 3136 780 10f2d4cfb5f0beccc72b78d08f4a579fc6a058769bd09736409fad2e22a2b513.exe 115 PID 780 wrote to memory of 3136 780 10f2d4cfb5f0beccc72b78d08f4a579fc6a058769bd09736409fad2e22a2b513.exe 115 PID 5072 wrote to memory of 3216 5072 mnolyk.exe 116 PID 5072 wrote to memory of 3216 5072 mnolyk.exe 116 PID 5072 wrote to memory of 3216 5072 mnolyk.exe 116 PID 5072 wrote to memory of 2044 5072 mnolyk.exe 118 PID 5072 wrote to memory of 2044 5072 mnolyk.exe 118 PID 5072 wrote to memory of 2044 5072 mnolyk.exe 118 PID 2044 wrote to memory of 4052 2044 cmd.exe 120 PID 2044 wrote to memory of 4052 2044 cmd.exe 120 PID 2044 wrote to memory of 4052 2044 cmd.exe 120 PID 2044 wrote to memory of 4460 2044 cmd.exe 121 PID 2044 wrote to memory of 4460 2044 cmd.exe 121 PID 2044 wrote to memory of 4460 2044 cmd.exe 121 PID 2044 wrote to memory of 3672 2044 cmd.exe 122 PID 2044 wrote to memory of 3672 2044 cmd.exe 122 PID 2044 wrote to memory of 3672 2044 cmd.exe 122 PID 2044 wrote to memory of 1476 2044 cmd.exe 123 PID 2044 wrote to memory of 1476 2044 cmd.exe 123 PID 2044 wrote to memory of 1476 2044 cmd.exe 123 PID 2044 wrote to memory of 3764 2044 cmd.exe 124 PID 2044 wrote to memory of 3764 2044 cmd.exe 124 PID 2044 wrote to memory of 3764 2044 cmd.exe 124 PID 2044 wrote to memory of 100 2044 cmd.exe 125 PID 2044 wrote to memory of 100 2044 cmd.exe 125 PID 2044 wrote to memory of 100 2044 cmd.exe 125 PID 5072 wrote to memory of 4032 5072 mnolyk.exe 128 PID 5072 wrote to memory of 4032 5072 mnolyk.exe 128 PID 5072 wrote to memory of 4032 5072 mnolyk.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\10f2d4cfb5f0beccc72b78d08f4a579fc6a058769bd09736409fad2e22a2b513.exe"C:\Users\Admin\AppData\Local\Temp\10f2d4cfb5f0beccc72b78d08f4a579fc6a058769bd09736409fad2e22a2b513.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptLA3347lv.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptLA3347lv.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptal2334fN.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptal2334fN.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptke6001yF.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptke6001yF.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptVP3484tl.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptVP3484tl.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptzC8922rz.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptzC8922rz.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\becb15ZR47.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\becb15ZR47.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuhc01sF66.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuhc01sF66.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 13368⤵
- Program crash
PID:3588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsiQ12tA92.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsiQ12tA92.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 10807⤵
- Program crash
PID:4980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr68mU1419ah.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr68mU1419ah.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 13486⤵
- Program crash
PID:2376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnUn37Bp24.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnUn37Bp24.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk59eu11qL30.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk59eu11qL30.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:3216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:4460
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:3672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1476
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:3764
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:100
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4032
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxBB19FQ36.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxBB19FQ36.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4628 -ip 46281⤵PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3260 -ip 32601⤵PID:632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1640 -ip 16401⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:452
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:2200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD554edc5f640ea55e0471929be06bd4be6
SHA1fe6c358d8fcf9807a42a7735a35fc5122fe89e9b
SHA25607b115d3b1f97cdeaef054917a97c392cde786cc15b491027160fccaa1903201
SHA51227658c91235668bd7c14986efd99fcf689252ae3a0454e60b2e4dd8cabcaac50e17e451a721029a247540aa92a4a700e220dd053e3e3f455a65f3c3983a3dfb5
-
Filesize
240KB
MD554edc5f640ea55e0471929be06bd4be6
SHA1fe6c358d8fcf9807a42a7735a35fc5122fe89e9b
SHA25607b115d3b1f97cdeaef054917a97c392cde786cc15b491027160fccaa1903201
SHA51227658c91235668bd7c14986efd99fcf689252ae3a0454e60b2e4dd8cabcaac50e17e451a721029a247540aa92a4a700e220dd053e3e3f455a65f3c3983a3dfb5
-
Filesize
240KB
MD554edc5f640ea55e0471929be06bd4be6
SHA1fe6c358d8fcf9807a42a7735a35fc5122fe89e9b
SHA25607b115d3b1f97cdeaef054917a97c392cde786cc15b491027160fccaa1903201
SHA51227658c91235668bd7c14986efd99fcf689252ae3a0454e60b2e4dd8cabcaac50e17e451a721029a247540aa92a4a700e220dd053e3e3f455a65f3c3983a3dfb5
-
Filesize
240KB
MD554edc5f640ea55e0471929be06bd4be6
SHA1fe6c358d8fcf9807a42a7735a35fc5122fe89e9b
SHA25607b115d3b1f97cdeaef054917a97c392cde786cc15b491027160fccaa1903201
SHA51227658c91235668bd7c14986efd99fcf689252ae3a0454e60b2e4dd8cabcaac50e17e451a721029a247540aa92a4a700e220dd053e3e3f455a65f3c3983a3dfb5
-
Filesize
240KB
MD554edc5f640ea55e0471929be06bd4be6
SHA1fe6c358d8fcf9807a42a7735a35fc5122fe89e9b
SHA25607b115d3b1f97cdeaef054917a97c392cde786cc15b491027160fccaa1903201
SHA51227658c91235668bd7c14986efd99fcf689252ae3a0454e60b2e4dd8cabcaac50e17e451a721029a247540aa92a4a700e220dd053e3e3f455a65f3c3983a3dfb5
-
Filesize
177KB
MD59b7ffa0abcd4331e2a705516b79d173e
SHA17975e25475808de55d798c141adfbc5307beed21
SHA2569d09add9fca1870ba54b1999fc0722d99d09e7e435e3a7b318f16302f6ea0d61
SHA51266296c611e200dd5114f112a96a150fa64b07a8a101f5853eccc48fa352961c7d67ef93d2c3f917c3fb2be6b911115415fcc18155cca2a73f334e787c9a9eaf9
-
Filesize
177KB
MD59b7ffa0abcd4331e2a705516b79d173e
SHA17975e25475808de55d798c141adfbc5307beed21
SHA2569d09add9fca1870ba54b1999fc0722d99d09e7e435e3a7b318f16302f6ea0d61
SHA51266296c611e200dd5114f112a96a150fa64b07a8a101f5853eccc48fa352961c7d67ef93d2c3f917c3fb2be6b911115415fcc18155cca2a73f334e787c9a9eaf9
-
Filesize
1.2MB
MD5efe6c35a4cbfbf4150ba27f6c0713aff
SHA19ead6b526ce617a4fd53ec889a4ac4d3cc4f25c5
SHA2563ef5168edd4b0c35c10e78bf039668b83f3558c42796227c30e8862129ce6a25
SHA5120f2d11e9e62314ac1a576584b4a21ee1f52e3d0be27579a255d57691f8975b1903186d3bdc1231ee7f518cb4383dba1483213b720232679e4b22e31e925cd62b
-
Filesize
1.2MB
MD5efe6c35a4cbfbf4150ba27f6c0713aff
SHA19ead6b526ce617a4fd53ec889a4ac4d3cc4f25c5
SHA2563ef5168edd4b0c35c10e78bf039668b83f3558c42796227c30e8862129ce6a25
SHA5120f2d11e9e62314ac1a576584b4a21ee1f52e3d0be27579a255d57691f8975b1903186d3bdc1231ee7f518cb4383dba1483213b720232679e4b22e31e925cd62b
-
Filesize
240KB
MD554edc5f640ea55e0471929be06bd4be6
SHA1fe6c358d8fcf9807a42a7735a35fc5122fe89e9b
SHA25607b115d3b1f97cdeaef054917a97c392cde786cc15b491027160fccaa1903201
SHA51227658c91235668bd7c14986efd99fcf689252ae3a0454e60b2e4dd8cabcaac50e17e451a721029a247540aa92a4a700e220dd053e3e3f455a65f3c3983a3dfb5
-
Filesize
240KB
MD554edc5f640ea55e0471929be06bd4be6
SHA1fe6c358d8fcf9807a42a7735a35fc5122fe89e9b
SHA25607b115d3b1f97cdeaef054917a97c392cde786cc15b491027160fccaa1903201
SHA51227658c91235668bd7c14986efd99fcf689252ae3a0454e60b2e4dd8cabcaac50e17e451a721029a247540aa92a4a700e220dd053e3e3f455a65f3c3983a3dfb5
-
Filesize
1.0MB
MD54b721f54fad91b93551ef0e011fc6537
SHA15f35a032c603ca0a80d150d86697688d4462291c
SHA25687ebfc03427a5b7ce292d0d065646ee05a18f64e3a26d8783968262f25095abe
SHA51247775c0e8d224987d0fda579af4951d2e5e9f65735608cc751fc7bc80c185bfa8b8eb17fcc1d6749b18607bc5794481f18ad8c9f1713f1bd9d6c54b2449e46d5
-
Filesize
1.0MB
MD54b721f54fad91b93551ef0e011fc6537
SHA15f35a032c603ca0a80d150d86697688d4462291c
SHA25687ebfc03427a5b7ce292d0d065646ee05a18f64e3a26d8783968262f25095abe
SHA51247775c0e8d224987d0fda579af4951d2e5e9f65735608cc751fc7bc80c185bfa8b8eb17fcc1d6749b18607bc5794481f18ad8c9f1713f1bd9d6c54b2449e46d5
-
Filesize
16KB
MD5bde74582e7771c79b1c360134d9ae27b
SHA1ca767cec7ef875cc0b4c1bf6e5758824000d6bf1
SHA256dc55914dae449c18ff587e24d8a81621b88f64ee775a2a86e438ca053c0103b0
SHA512e3e21ae0eb35ec860080e65e8938f2a382e94a33ed1a86a64693cd60fa78d164b07e69404896c76a68a13215fb613249a9e48fd06e10eb8c54d59292aa3ed964
-
Filesize
16KB
MD5bde74582e7771c79b1c360134d9ae27b
SHA1ca767cec7ef875cc0b4c1bf6e5758824000d6bf1
SHA256dc55914dae449c18ff587e24d8a81621b88f64ee775a2a86e438ca053c0103b0
SHA512e3e21ae0eb35ec860080e65e8938f2a382e94a33ed1a86a64693cd60fa78d164b07e69404896c76a68a13215fb613249a9e48fd06e10eb8c54d59292aa3ed964
-
Filesize
936KB
MD5c798cea67d2f07f7f1895ea312f7410b
SHA1e324eee013264bcbd09994e7bc1db2c2ee2ec3e0
SHA2566b3cd661d3bf047c5a03dbe13e8a853e50045fb2f710b3796cde36aa81d6b120
SHA5126150f30893a4fbf97fa19b2dd94d076df6e441cb231d0baece61f52e52a5897775188c99ab8178c4d4416d8006df3967bed51e4adb3aff53cb938a087a8fb945
-
Filesize
936KB
MD5c798cea67d2f07f7f1895ea312f7410b
SHA1e324eee013264bcbd09994e7bc1db2c2ee2ec3e0
SHA2566b3cd661d3bf047c5a03dbe13e8a853e50045fb2f710b3796cde36aa81d6b120
SHA5126150f30893a4fbf97fa19b2dd94d076df6e441cb231d0baece61f52e52a5897775188c99ab8178c4d4416d8006df3967bed51e4adb3aff53cb938a087a8fb945
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
667KB
MD5106d14419bb643f1a99bc0c2dd0d3757
SHA15315e0b307b9ffebd32d2e152c401748e5ace820
SHA256c2be0f89e95baef9a98d8cb7330462f665452fc74bc30cc3dbd607ddfe2088a7
SHA512374f5bcbee98a4e27c1bade035bf4eddf25102c07437e70573b5729c9cd7743ff23e9253e086f9b8f358edbd1152dbea2f980273350193d47748ebc916416e52
-
Filesize
667KB
MD5106d14419bb643f1a99bc0c2dd0d3757
SHA15315e0b307b9ffebd32d2e152c401748e5ace820
SHA256c2be0f89e95baef9a98d8cb7330462f665452fc74bc30cc3dbd607ddfe2088a7
SHA512374f5bcbee98a4e27c1bade035bf4eddf25102c07437e70573b5729c9cd7743ff23e9253e086f9b8f358edbd1152dbea2f980273350193d47748ebc916416e52
-
Filesize
244KB
MD569a54c5fef6686e702572410b20cbf95
SHA1f4710eee2982c59058b53e23415051029d465f77
SHA25685dc2a941050a6000b3bc6fed7fd47730d7bb6d7b7fb761b769a6e0e6b5012c9
SHA512503391d6642b4093b70bbaa3dcd3ce19aa94e73b0f33deec770208d8094f8d1c24ff8be9ac1df69daf2c902af9300a0abd018a51fc0099552d94725a12cd7f1c
-
Filesize
244KB
MD569a54c5fef6686e702572410b20cbf95
SHA1f4710eee2982c59058b53e23415051029d465f77
SHA25685dc2a941050a6000b3bc6fed7fd47730d7bb6d7b7fb761b769a6e0e6b5012c9
SHA512503391d6642b4093b70bbaa3dcd3ce19aa94e73b0f33deec770208d8094f8d1c24ff8be9ac1df69daf2c902af9300a0abd018a51fc0099552d94725a12cd7f1c
-
Filesize
391KB
MD57bd9748a94bb5adc91a7b8598b0709ef
SHA1247c94b568e3293f36dfe6c38e9a10d692a06a04
SHA256415c8fe00b6a66540c3277cbcfe8241f0613e6b68726536270f551e7eef050c0
SHA5123f07b66f032673f6dce32502d17926c63d9a06bc1c6995721c6677481d98bce82c125032c727d6f1d34bcc971cd6b83453d720ca02dc4f7dc84b31f9a2b633f1
-
Filesize
391KB
MD57bd9748a94bb5adc91a7b8598b0709ef
SHA1247c94b568e3293f36dfe6c38e9a10d692a06a04
SHA256415c8fe00b6a66540c3277cbcfe8241f0613e6b68726536270f551e7eef050c0
SHA5123f07b66f032673f6dce32502d17926c63d9a06bc1c6995721c6677481d98bce82c125032c727d6f1d34bcc971cd6b83453d720ca02dc4f7dc84b31f9a2b633f1
-
Filesize
16KB
MD5378331057518aa0a481f9a5dcc5b64f2
SHA1d7093e84bf13c972278e525ca103f027fe151ec7
SHA256eb20e35166c9472ea9316cae757e31a8a8c6657646c38d9c9e97cee73e9f0d5d
SHA51220a0d2b5cd3ece0beb5dacbb5992109787e4309ce71be6765793ab6faa0d80682251923230ddbb1c42311487b426bf99607a7721c399040d4f55fb4d33f6cc7c
-
Filesize
16KB
MD5378331057518aa0a481f9a5dcc5b64f2
SHA1d7093e84bf13c972278e525ca103f027fe151ec7
SHA256eb20e35166c9472ea9316cae757e31a8a8c6657646c38d9c9e97cee73e9f0d5d
SHA51220a0d2b5cd3ece0beb5dacbb5992109787e4309ce71be6765793ab6faa0d80682251923230ddbb1c42311487b426bf99607a7721c399040d4f55fb4d33f6cc7c
-
Filesize
16KB
MD5378331057518aa0a481f9a5dcc5b64f2
SHA1d7093e84bf13c972278e525ca103f027fe151ec7
SHA256eb20e35166c9472ea9316cae757e31a8a8c6657646c38d9c9e97cee73e9f0d5d
SHA51220a0d2b5cd3ece0beb5dacbb5992109787e4309ce71be6765793ab6faa0d80682251923230ddbb1c42311487b426bf99607a7721c399040d4f55fb4d33f6cc7c
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5