Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 09:13
Static task
static1
General
-
Target
05070e04843db37043060fef03cd16d4afa24d5f33f73b1b84110bd053d12f2e.exe
-
Size
1.3MB
-
MD5
5ebd50caa8a01087c3643611355708f9
-
SHA1
17bfa35b1185cb202727a3f5a4255c25d71780a9
-
SHA256
05070e04843db37043060fef03cd16d4afa24d5f33f73b1b84110bd053d12f2e
-
SHA512
4d0b7d1be5a923cb0e426001c5d3e3ac4887a928cb1a1d8d253e0d69e2e01d17c5a9ab0e884eb78f059e88b8dc1e71cf4212e2de972ac9f977718554ceb114d7
-
SSDEEP
24576:XydIG4r8yJjTHTqyG5+xYIgaY2aQdL2O8rzvDwk9GfhgMf:idA8yJnHMYu5aY2aQsd3vDVMfh
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsxH29Ex69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnFk96Qe59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beqV14Jb08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beqV14Jb08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnFk96Qe59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beqV14Jb08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beqV14Jb08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsxH29Ex69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsxH29Ex69.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsxH29Ex69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsxH29Ex69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsxH29Ex69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnFk96Qe59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnFk96Qe59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnFk96Qe59.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beqV14Jb08.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beqV14Jb08.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/3740-187-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-188-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-190-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-192-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-194-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-196-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-198-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-200-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-202-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-204-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-206-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-208-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-210-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-212-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-214-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-216-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-218-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-220-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-222-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-224-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-226-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-228-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-230-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-232-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-234-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-236-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-238-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-240-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-242-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-244-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-246-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/3740-248-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1408-2062-0x0000000004D20000-0x0000000004D30000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation hk06NK94Qn66.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 3608 ptpe7075VU.exe 2008 ptEm9822yt.exe 3604 ptvA3665Ix.exe 5084 ptzc9362pS.exe 220 ptYs1162Oq.exe 4920 beqV14Jb08.exe 3740 cucu38PU80.exe 2272 dsxH29Ex69.exe 1408 fr66qG2597cc.exe 4620 gnFk96Qe59.exe 2372 hk06NK94Qn66.exe 4424 mnolyk.exe 1260 jxty76oN26.exe 5048 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4904 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beqV14Jb08.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsxH29Ex69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsxH29Ex69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnFk96Qe59.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptvA3665Ix.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptzc9362pS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptzc9362pS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05070e04843db37043060fef03cd16d4afa24d5f33f73b1b84110bd053d12f2e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptEm9822yt.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptvA3665Ix.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptEm9822yt.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptYs1162Oq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptYs1162Oq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 05070e04843db37043060fef03cd16d4afa24d5f33f73b1b84110bd053d12f2e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptpe7075VU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptpe7075VU.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4156 3740 WerFault.exe 101 3596 2272 WerFault.exe 105 724 1408 WerFault.exe 110 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4920 beqV14Jb08.exe 4920 beqV14Jb08.exe 3740 cucu38PU80.exe 3740 cucu38PU80.exe 2272 dsxH29Ex69.exe 2272 dsxH29Ex69.exe 1408 fr66qG2597cc.exe 1408 fr66qG2597cc.exe 4620 gnFk96Qe59.exe 4620 gnFk96Qe59.exe 1260 jxty76oN26.exe 1260 jxty76oN26.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4920 beqV14Jb08.exe Token: SeDebugPrivilege 3740 cucu38PU80.exe Token: SeDebugPrivilege 2272 dsxH29Ex69.exe Token: SeDebugPrivilege 1408 fr66qG2597cc.exe Token: SeDebugPrivilege 4620 gnFk96Qe59.exe Token: SeDebugPrivilege 1260 jxty76oN26.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4508 wrote to memory of 3608 4508 05070e04843db37043060fef03cd16d4afa24d5f33f73b1b84110bd053d12f2e.exe 85 PID 4508 wrote to memory of 3608 4508 05070e04843db37043060fef03cd16d4afa24d5f33f73b1b84110bd053d12f2e.exe 85 PID 4508 wrote to memory of 3608 4508 05070e04843db37043060fef03cd16d4afa24d5f33f73b1b84110bd053d12f2e.exe 85 PID 3608 wrote to memory of 2008 3608 ptpe7075VU.exe 86 PID 3608 wrote to memory of 2008 3608 ptpe7075VU.exe 86 PID 3608 wrote to memory of 2008 3608 ptpe7075VU.exe 86 PID 2008 wrote to memory of 3604 2008 ptEm9822yt.exe 87 PID 2008 wrote to memory of 3604 2008 ptEm9822yt.exe 87 PID 2008 wrote to memory of 3604 2008 ptEm9822yt.exe 87 PID 3604 wrote to memory of 5084 3604 ptvA3665Ix.exe 88 PID 3604 wrote to memory of 5084 3604 ptvA3665Ix.exe 88 PID 3604 wrote to memory of 5084 3604 ptvA3665Ix.exe 88 PID 5084 wrote to memory of 220 5084 ptzc9362pS.exe 89 PID 5084 wrote to memory of 220 5084 ptzc9362pS.exe 89 PID 5084 wrote to memory of 220 5084 ptzc9362pS.exe 89 PID 220 wrote to memory of 4920 220 ptYs1162Oq.exe 90 PID 220 wrote to memory of 4920 220 ptYs1162Oq.exe 90 PID 220 wrote to memory of 3740 220 ptYs1162Oq.exe 101 PID 220 wrote to memory of 3740 220 ptYs1162Oq.exe 101 PID 220 wrote to memory of 3740 220 ptYs1162Oq.exe 101 PID 5084 wrote to memory of 2272 5084 ptzc9362pS.exe 105 PID 5084 wrote to memory of 2272 5084 ptzc9362pS.exe 105 PID 5084 wrote to memory of 2272 5084 ptzc9362pS.exe 105 PID 3604 wrote to memory of 1408 3604 ptvA3665Ix.exe 110 PID 3604 wrote to memory of 1408 3604 ptvA3665Ix.exe 110 PID 3604 wrote to memory of 1408 3604 ptvA3665Ix.exe 110 PID 2008 wrote to memory of 4620 2008 ptEm9822yt.exe 113 PID 2008 wrote to memory of 4620 2008 ptEm9822yt.exe 113 PID 3608 wrote to memory of 2372 3608 ptpe7075VU.exe 114 PID 3608 wrote to memory of 2372 3608 ptpe7075VU.exe 114 PID 3608 wrote to memory of 2372 3608 ptpe7075VU.exe 114 PID 2372 wrote to memory of 4424 2372 hk06NK94Qn66.exe 115 PID 2372 wrote to memory of 4424 2372 hk06NK94Qn66.exe 115 PID 2372 wrote to memory of 4424 2372 hk06NK94Qn66.exe 115 PID 4508 wrote to memory of 1260 4508 05070e04843db37043060fef03cd16d4afa24d5f33f73b1b84110bd053d12f2e.exe 116 PID 4508 wrote to memory of 1260 4508 05070e04843db37043060fef03cd16d4afa24d5f33f73b1b84110bd053d12f2e.exe 116 PID 4508 wrote to memory of 1260 4508 05070e04843db37043060fef03cd16d4afa24d5f33f73b1b84110bd053d12f2e.exe 116 PID 4424 wrote to memory of 3480 4424 mnolyk.exe 117 PID 4424 wrote to memory of 3480 4424 mnolyk.exe 117 PID 4424 wrote to memory of 3480 4424 mnolyk.exe 117 PID 4424 wrote to memory of 2188 4424 mnolyk.exe 119 PID 4424 wrote to memory of 2188 4424 mnolyk.exe 119 PID 4424 wrote to memory of 2188 4424 mnolyk.exe 119 PID 2188 wrote to memory of 2472 2188 cmd.exe 121 PID 2188 wrote to memory of 2472 2188 cmd.exe 121 PID 2188 wrote to memory of 2472 2188 cmd.exe 121 PID 2188 wrote to memory of 3576 2188 cmd.exe 122 PID 2188 wrote to memory of 3576 2188 cmd.exe 122 PID 2188 wrote to memory of 3576 2188 cmd.exe 122 PID 2188 wrote to memory of 988 2188 cmd.exe 123 PID 2188 wrote to memory of 988 2188 cmd.exe 123 PID 2188 wrote to memory of 988 2188 cmd.exe 123 PID 2188 wrote to memory of 4836 2188 cmd.exe 124 PID 2188 wrote to memory of 4836 2188 cmd.exe 124 PID 2188 wrote to memory of 4836 2188 cmd.exe 124 PID 2188 wrote to memory of 4688 2188 cmd.exe 125 PID 2188 wrote to memory of 4688 2188 cmd.exe 125 PID 2188 wrote to memory of 4688 2188 cmd.exe 125 PID 2188 wrote to memory of 2072 2188 cmd.exe 126 PID 2188 wrote to memory of 2072 2188 cmd.exe 126 PID 2188 wrote to memory of 2072 2188 cmd.exe 126 PID 4424 wrote to memory of 4904 4424 mnolyk.exe 129 PID 4424 wrote to memory of 4904 4424 mnolyk.exe 129 PID 4424 wrote to memory of 4904 4424 mnolyk.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\05070e04843db37043060fef03cd16d4afa24d5f33f73b1b84110bd053d12f2e.exe"C:\Users\Admin\AppData\Local\Temp\05070e04843db37043060fef03cd16d4afa24d5f33f73b1b84110bd053d12f2e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptpe7075VU.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptpe7075VU.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptEm9822yt.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptEm9822yt.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptvA3665Ix.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptvA3665Ix.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptzc9362pS.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptzc9362pS.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptYs1162Oq.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptYs1162Oq.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beqV14Jb08.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beqV14Jb08.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cucu38PU80.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cucu38PU80.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 19128⤵
- Program crash
PID:4156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsxH29Ex69.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsxH29Ex69.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 10807⤵
- Program crash
PID:3596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr66qG2597cc.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr66qG2597cc.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 13286⤵
- Program crash
PID:724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnFk96Qe59.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnFk96Qe59.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk06NK94Qn66.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk06NK94Qn66.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:3480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:3576
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:4688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:2072
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4904
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxty76oN26.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxty76oN26.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3740 -ip 37401⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2272 -ip 22721⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1408 -ip 14081⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:5048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5edfb4b6a51c7c04cd9196a4c881510fc
SHA1925eedf594d29e31fb5e595e35e283261ef3261f
SHA2562face491e66982f2526e2ec91cde4a0664a7ee4a9b7b792e247b6d743b43bf09
SHA5128984f0f86e7857b08c8468fc95e40c931d7c5d05e4519c408f99f814963149e86c6098e625209f6ebddc832e9110040d12670f79b3a0aeb3d95674853e1dce74
-
Filesize
240KB
MD5edfb4b6a51c7c04cd9196a4c881510fc
SHA1925eedf594d29e31fb5e595e35e283261ef3261f
SHA2562face491e66982f2526e2ec91cde4a0664a7ee4a9b7b792e247b6d743b43bf09
SHA5128984f0f86e7857b08c8468fc95e40c931d7c5d05e4519c408f99f814963149e86c6098e625209f6ebddc832e9110040d12670f79b3a0aeb3d95674853e1dce74
-
Filesize
240KB
MD5edfb4b6a51c7c04cd9196a4c881510fc
SHA1925eedf594d29e31fb5e595e35e283261ef3261f
SHA2562face491e66982f2526e2ec91cde4a0664a7ee4a9b7b792e247b6d743b43bf09
SHA5128984f0f86e7857b08c8468fc95e40c931d7c5d05e4519c408f99f814963149e86c6098e625209f6ebddc832e9110040d12670f79b3a0aeb3d95674853e1dce74
-
Filesize
240KB
MD5edfb4b6a51c7c04cd9196a4c881510fc
SHA1925eedf594d29e31fb5e595e35e283261ef3261f
SHA2562face491e66982f2526e2ec91cde4a0664a7ee4a9b7b792e247b6d743b43bf09
SHA5128984f0f86e7857b08c8468fc95e40c931d7c5d05e4519c408f99f814963149e86c6098e625209f6ebddc832e9110040d12670f79b3a0aeb3d95674853e1dce74
-
Filesize
177KB
MD59002f7d095dbc5e7c5d3e13ba500e6da
SHA14789b5035a76a40e9d2f2ed5641f6cf991203bcd
SHA2560760a4aad1f9bd676fe4f4044d60083eb74e9a9c8edd96126b0c754389284b0a
SHA512da5fd177cb64454f0539d417770965583ff36e0ba44e5c06f4398a6e46dad5d3812f55644e55f84a3ed91d53e7b04c15cacda67460e856ec46bfb284f5d07e3e
-
Filesize
177KB
MD59002f7d095dbc5e7c5d3e13ba500e6da
SHA14789b5035a76a40e9d2f2ed5641f6cf991203bcd
SHA2560760a4aad1f9bd676fe4f4044d60083eb74e9a9c8edd96126b0c754389284b0a
SHA512da5fd177cb64454f0539d417770965583ff36e0ba44e5c06f4398a6e46dad5d3812f55644e55f84a3ed91d53e7b04c15cacda67460e856ec46bfb284f5d07e3e
-
Filesize
1.2MB
MD5289ace1a1710042fd8c08de21d10b734
SHA1ccdb137be429a85fbe82c5060c79aa81c28d76bf
SHA2569a8fe5e2aeed6760480ec71d653105e1af7f67902e390b02bc08fed008564724
SHA51241adc28db484ed74226ac739167ddc0ffcd4b86b5cbf3d90d4356a2bacb082026f25ceee70a16017d68bb534288e89d1caed7d8a5d8486beecb8fb75a68c6945
-
Filesize
1.2MB
MD5289ace1a1710042fd8c08de21d10b734
SHA1ccdb137be429a85fbe82c5060c79aa81c28d76bf
SHA2569a8fe5e2aeed6760480ec71d653105e1af7f67902e390b02bc08fed008564724
SHA51241adc28db484ed74226ac739167ddc0ffcd4b86b5cbf3d90d4356a2bacb082026f25ceee70a16017d68bb534288e89d1caed7d8a5d8486beecb8fb75a68c6945
-
Filesize
240KB
MD5edfb4b6a51c7c04cd9196a4c881510fc
SHA1925eedf594d29e31fb5e595e35e283261ef3261f
SHA2562face491e66982f2526e2ec91cde4a0664a7ee4a9b7b792e247b6d743b43bf09
SHA5128984f0f86e7857b08c8468fc95e40c931d7c5d05e4519c408f99f814963149e86c6098e625209f6ebddc832e9110040d12670f79b3a0aeb3d95674853e1dce74
-
Filesize
240KB
MD5edfb4b6a51c7c04cd9196a4c881510fc
SHA1925eedf594d29e31fb5e595e35e283261ef3261f
SHA2562face491e66982f2526e2ec91cde4a0664a7ee4a9b7b792e247b6d743b43bf09
SHA5128984f0f86e7857b08c8468fc95e40c931d7c5d05e4519c408f99f814963149e86c6098e625209f6ebddc832e9110040d12670f79b3a0aeb3d95674853e1dce74
-
Filesize
1.0MB
MD5b93e982a5183c37888240129f6112fe0
SHA1807c949bbefc6b3a356edbc5e2b2df690e1283a5
SHA25633de0d794bcef286559b2da00f8d361bc22b2827a70ae544b6611cb3c06b4844
SHA512d829c2497553648497b4557057aa9f64e0fa8f6c01d98bd371756462a90c7ae7d1ec02f19cfebdcc32746ba54e1ec984558d3c7a4883293890bf80e3ecb8d59f
-
Filesize
1.0MB
MD5b93e982a5183c37888240129f6112fe0
SHA1807c949bbefc6b3a356edbc5e2b2df690e1283a5
SHA25633de0d794bcef286559b2da00f8d361bc22b2827a70ae544b6611cb3c06b4844
SHA512d829c2497553648497b4557057aa9f64e0fa8f6c01d98bd371756462a90c7ae7d1ec02f19cfebdcc32746ba54e1ec984558d3c7a4883293890bf80e3ecb8d59f
-
Filesize
16KB
MD5f68f516a41b0190ebe16efb649b9f851
SHA19b25a092c3e8fe6822d011366e822560140c5f0e
SHA2568452fd92f00868f7c052511a3852da68fa8c5472a6c1d5b983f5b5b932db33bf
SHA51254be7eafa86ee584654071ba8468b43803ca7d88e1fb7827e7ed9684b91d6dc67d20ba18275c09a48f266705ef4371b292936055ef7385a1e7466394b10ad1aa
-
Filesize
16KB
MD5f68f516a41b0190ebe16efb649b9f851
SHA19b25a092c3e8fe6822d011366e822560140c5f0e
SHA2568452fd92f00868f7c052511a3852da68fa8c5472a6c1d5b983f5b5b932db33bf
SHA51254be7eafa86ee584654071ba8468b43803ca7d88e1fb7827e7ed9684b91d6dc67d20ba18275c09a48f266705ef4371b292936055ef7385a1e7466394b10ad1aa
-
Filesize
936KB
MD5c2b1596bc60bc0d97ae2afa16b973b6c
SHA17fa06ba2a4cbab1d5c844a63143d93d1d3682a25
SHA256ba9ce9bad491eec9a7baa89010f870b976ef8230d35537c53f7d4bbf3528cb5e
SHA512dc5603d7931c7bbb5dca8f72899a7af7887ca904412275719b558824df123f82510b761ad56bb963c76c422b9566a970e0049d5aaf940ef411981c571ffd56d9
-
Filesize
936KB
MD5c2b1596bc60bc0d97ae2afa16b973b6c
SHA17fa06ba2a4cbab1d5c844a63143d93d1d3682a25
SHA256ba9ce9bad491eec9a7baa89010f870b976ef8230d35537c53f7d4bbf3528cb5e
SHA512dc5603d7931c7bbb5dca8f72899a7af7887ca904412275719b558824df123f82510b761ad56bb963c76c422b9566a970e0049d5aaf940ef411981c571ffd56d9
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
667KB
MD5b82a4efec920bd1d278044d4f1569460
SHA1931b5b24711fc98dc5111bca243e29f5a34aecd1
SHA256a2970ec9c34274350b4a9d734c22e5f01d6d6e08a3d0a45756260490409002c3
SHA512a7663115b58cdc7b496d56b5a945cc1720e9239978033ddfa15795cb8606f6843993aa7d62ae21ea704db95ac668963de90f0cd822e86e19ae8c3d861979b266
-
Filesize
667KB
MD5b82a4efec920bd1d278044d4f1569460
SHA1931b5b24711fc98dc5111bca243e29f5a34aecd1
SHA256a2970ec9c34274350b4a9d734c22e5f01d6d6e08a3d0a45756260490409002c3
SHA512a7663115b58cdc7b496d56b5a945cc1720e9239978033ddfa15795cb8606f6843993aa7d62ae21ea704db95ac668963de90f0cd822e86e19ae8c3d861979b266
-
Filesize
244KB
MD502f5dcb777fe1b583584f6f69878cc07
SHA126c88ed5dcc5ceebb8201ce9d5db4d58ffa54c1e
SHA256b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d
SHA512030fa12cf48981b48573cfe750958a09172b474a5ba6f4080842483a13ab875982fef46361cebeea65f25cc3616f828d289d30bbb610727698120cbefc22b202
-
Filesize
244KB
MD502f5dcb777fe1b583584f6f69878cc07
SHA126c88ed5dcc5ceebb8201ce9d5db4d58ffa54c1e
SHA256b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d
SHA512030fa12cf48981b48573cfe750958a09172b474a5ba6f4080842483a13ab875982fef46361cebeea65f25cc3616f828d289d30bbb610727698120cbefc22b202
-
Filesize
391KB
MD5e2feff0f3e6ce9e76643112379ffebc8
SHA19e44084fc4bf3f3d3e9ff2db770d22accc65bf1d
SHA256c4a0a64f3c15ece7c3eb296fd3da6d3efa7eeef1128dfbf9416983a88c7e9208
SHA512300d6974b0c827fdc3f997ba3ee6fc82a5498c7f27186d9d40f316d03d2cda764c46deb0a83786ca636934935725845ab00c2eb655162ae4970b159e9216909f
-
Filesize
391KB
MD5e2feff0f3e6ce9e76643112379ffebc8
SHA19e44084fc4bf3f3d3e9ff2db770d22accc65bf1d
SHA256c4a0a64f3c15ece7c3eb296fd3da6d3efa7eeef1128dfbf9416983a88c7e9208
SHA512300d6974b0c827fdc3f997ba3ee6fc82a5498c7f27186d9d40f316d03d2cda764c46deb0a83786ca636934935725845ab00c2eb655162ae4970b159e9216909f
-
Filesize
16KB
MD55f877767187f9278e83cc3e47581e70c
SHA181df8281ba39618103085b65c3b75e7e2dc8e00f
SHA25649ddf042037784e0f3d2da24f2ab1f34948ff98d49ac8b16bcb11f2ff564781f
SHA512bee606778fc2b5c39bd2688f29ab9afd5413e705360ac20f2a47d4d4e5c22ea3aa3840e587a43770f212d442fdca893a5742d75744ec54b0155a4807801cb0e5
-
Filesize
16KB
MD55f877767187f9278e83cc3e47581e70c
SHA181df8281ba39618103085b65c3b75e7e2dc8e00f
SHA25649ddf042037784e0f3d2da24f2ab1f34948ff98d49ac8b16bcb11f2ff564781f
SHA512bee606778fc2b5c39bd2688f29ab9afd5413e705360ac20f2a47d4d4e5c22ea3aa3840e587a43770f212d442fdca893a5742d75744ec54b0155a4807801cb0e5
-
Filesize
16KB
MD55f877767187f9278e83cc3e47581e70c
SHA181df8281ba39618103085b65c3b75e7e2dc8e00f
SHA25649ddf042037784e0f3d2da24f2ab1f34948ff98d49ac8b16bcb11f2ff564781f
SHA512bee606778fc2b5c39bd2688f29ab9afd5413e705360ac20f2a47d4d4e5c22ea3aa3840e587a43770f212d442fdca893a5742d75744ec54b0155a4807801cb0e5
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
302KB
MD55b4052ee747278a02dac44898f59aaee
SHA16b59810f74916a6921ea2276b57b6f5f61c79654
SHA256baddc727c186e86b475b2b6dd68a39db563c8f1b6129e7e5f88fb4060cb7ee80
SHA5129d14b58234c4790199902771cecd0723a17e01e7fd1cc5a66d7d92e1848de7347e86429c8985ea885e345e0a80d550af5b4629c98a8e30142c8c21201d7e2c23
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5