Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 10:05
Static task
static1
General
-
Target
823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2.exe
-
Size
1.3MB
-
MD5
4a8d540c4f8068105cc2a6f40d9ec225
-
SHA1
756dee78851ef984314c944e973cb2e29989ef45
-
SHA256
823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2
-
SHA512
241d726e86552c55575585a2df1b79a7837affb272979a54633508a348b9a8b1c05d149e692e18a35b3cd8d55812a670071e022825efa0c5bfad051d8c408c7a
-
SSDEEP
24576:HyHMgeMqG0Juus4wN7rzz6zT8J7raSBGwtiP1wFziKgMfDtv9ytfSUkfFZ4:SHwwxaSB7EPydgUEtfPkNZ
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dssm24Mn65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnvG41iU47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dssm24Mn65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beDg89KM84.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dssm24Mn65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dssm24Mn65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnvG41iU47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beDg89KM84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beDg89KM84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dssm24Mn65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dssm24Mn65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnvG41iU47.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beDg89KM84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beDg89KM84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnvG41iU47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnvG41iU47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beDg89KM84.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4324-186-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-189-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-187-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-191-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-193-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-195-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-197-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-199-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-201-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-203-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-205-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-207-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-209-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-211-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-213-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-215-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-217-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-219-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-221-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-223-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-225-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-227-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-229-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-231-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-233-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-235-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-237-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-239-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-241-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-243-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-245-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-247-0x0000000002540000-0x000000000257E000-memory.dmp family_redline behavioral1/memory/4324-249-0x0000000002540000-0x000000000257E000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation hk15le91Xw46.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 3976 ptAo5210cU.exe 2388 ptag4174bo.exe 2220 ptiF6093OI.exe 3840 ptmO0116kU.exe 1400 ptHw5036es.exe 4436 beDg89KM84.exe 4324 cuhu90QC10.exe 220 dssm24Mn65.exe 1760 fr35qx6451Ru.exe 4632 gnvG41iU47.exe 3964 hk15le91Xw46.exe 548 mnolyk.exe 888 jxPZ34fX23.exe 496 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 744 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dssm24Mn65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dssm24Mn65.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnvG41iU47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beDg89KM84.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptmO0116kU.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptHw5036es.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptAo5210cU.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptag4174bo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptag4174bo.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptiF6093OI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptiF6093OI.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptAo5210cU.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptmO0116kU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptHw5036es.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4364 4324 WerFault.exe 95 1472 220 WerFault.exe 100 712 1760 WerFault.exe 103 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4340 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4436 beDg89KM84.exe 4436 beDg89KM84.exe 4324 cuhu90QC10.exe 4324 cuhu90QC10.exe 220 dssm24Mn65.exe 220 dssm24Mn65.exe 1760 fr35qx6451Ru.exe 1760 fr35qx6451Ru.exe 4632 gnvG41iU47.exe 4632 gnvG41iU47.exe 888 jxPZ34fX23.exe 888 jxPZ34fX23.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4436 beDg89KM84.exe Token: SeDebugPrivilege 4324 cuhu90QC10.exe Token: SeDebugPrivilege 220 dssm24Mn65.exe Token: SeDebugPrivilege 1760 fr35qx6451Ru.exe Token: SeDebugPrivilege 4632 gnvG41iU47.exe Token: SeDebugPrivilege 888 jxPZ34fX23.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3976 2676 823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2.exe 84 PID 2676 wrote to memory of 3976 2676 823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2.exe 84 PID 2676 wrote to memory of 3976 2676 823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2.exe 84 PID 3976 wrote to memory of 2388 3976 ptAo5210cU.exe 85 PID 3976 wrote to memory of 2388 3976 ptAo5210cU.exe 85 PID 3976 wrote to memory of 2388 3976 ptAo5210cU.exe 85 PID 2388 wrote to memory of 2220 2388 ptag4174bo.exe 86 PID 2388 wrote to memory of 2220 2388 ptag4174bo.exe 86 PID 2388 wrote to memory of 2220 2388 ptag4174bo.exe 86 PID 2220 wrote to memory of 3840 2220 ptiF6093OI.exe 87 PID 2220 wrote to memory of 3840 2220 ptiF6093OI.exe 87 PID 2220 wrote to memory of 3840 2220 ptiF6093OI.exe 87 PID 3840 wrote to memory of 1400 3840 ptmO0116kU.exe 88 PID 3840 wrote to memory of 1400 3840 ptmO0116kU.exe 88 PID 3840 wrote to memory of 1400 3840 ptmO0116kU.exe 88 PID 1400 wrote to memory of 4436 1400 ptHw5036es.exe 89 PID 1400 wrote to memory of 4436 1400 ptHw5036es.exe 89 PID 1400 wrote to memory of 4324 1400 ptHw5036es.exe 95 PID 1400 wrote to memory of 4324 1400 ptHw5036es.exe 95 PID 1400 wrote to memory of 4324 1400 ptHw5036es.exe 95 PID 3840 wrote to memory of 220 3840 ptmO0116kU.exe 100 PID 3840 wrote to memory of 220 3840 ptmO0116kU.exe 100 PID 3840 wrote to memory of 220 3840 ptmO0116kU.exe 100 PID 2220 wrote to memory of 1760 2220 ptiF6093OI.exe 103 PID 2220 wrote to memory of 1760 2220 ptiF6093OI.exe 103 PID 2220 wrote to memory of 1760 2220 ptiF6093OI.exe 103 PID 2388 wrote to memory of 4632 2388 ptag4174bo.exe 106 PID 2388 wrote to memory of 4632 2388 ptag4174bo.exe 106 PID 3976 wrote to memory of 3964 3976 ptAo5210cU.exe 108 PID 3976 wrote to memory of 3964 3976 ptAo5210cU.exe 108 PID 3976 wrote to memory of 3964 3976 ptAo5210cU.exe 108 PID 3964 wrote to memory of 548 3964 hk15le91Xw46.exe 109 PID 3964 wrote to memory of 548 3964 hk15le91Xw46.exe 109 PID 3964 wrote to memory of 548 3964 hk15le91Xw46.exe 109 PID 2676 wrote to memory of 888 2676 823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2.exe 110 PID 2676 wrote to memory of 888 2676 823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2.exe 110 PID 2676 wrote to memory of 888 2676 823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2.exe 110 PID 548 wrote to memory of 4340 548 mnolyk.exe 111 PID 548 wrote to memory of 4340 548 mnolyk.exe 111 PID 548 wrote to memory of 4340 548 mnolyk.exe 111 PID 548 wrote to memory of 1388 548 mnolyk.exe 113 PID 548 wrote to memory of 1388 548 mnolyk.exe 113 PID 548 wrote to memory of 1388 548 mnolyk.exe 113 PID 1388 wrote to memory of 3824 1388 cmd.exe 115 PID 1388 wrote to memory of 3824 1388 cmd.exe 115 PID 1388 wrote to memory of 3824 1388 cmd.exe 115 PID 1388 wrote to memory of 1720 1388 cmd.exe 116 PID 1388 wrote to memory of 1720 1388 cmd.exe 116 PID 1388 wrote to memory of 1720 1388 cmd.exe 116 PID 1388 wrote to memory of 3152 1388 cmd.exe 117 PID 1388 wrote to memory of 3152 1388 cmd.exe 117 PID 1388 wrote to memory of 3152 1388 cmd.exe 117 PID 1388 wrote to memory of 2648 1388 cmd.exe 119 PID 1388 wrote to memory of 2648 1388 cmd.exe 119 PID 1388 wrote to memory of 2648 1388 cmd.exe 119 PID 1388 wrote to memory of 1484 1388 cmd.exe 118 PID 1388 wrote to memory of 1484 1388 cmd.exe 118 PID 1388 wrote to memory of 1484 1388 cmd.exe 118 PID 1388 wrote to memory of 2952 1388 cmd.exe 120 PID 1388 wrote to memory of 2952 1388 cmd.exe 120 PID 1388 wrote to memory of 2952 1388 cmd.exe 120 PID 548 wrote to memory of 744 548 mnolyk.exe 128 PID 548 wrote to memory of 744 548 mnolyk.exe 128 PID 548 wrote to memory of 744 548 mnolyk.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2.exe"C:\Users\Admin\AppData\Local\Temp\823b0c8b489ab1f04aaeb9506f2f009790bd151825177c2942b8dc9c9c826ea2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptAo5210cU.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptAo5210cU.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptag4174bo.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptag4174bo.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptiF6093OI.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptiF6093OI.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptmO0116kU.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptmO0116kU.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptHw5036es.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptHw5036es.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beDg89KM84.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beDg89KM84.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuhu90QC10.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuhu90QC10.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 13288⤵
- Program crash
PID:4364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dssm24Mn65.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dssm24Mn65.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 10767⤵
- Program crash
PID:1472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr35qx6451Ru.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr35qx6451Ru.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 19046⤵
- Program crash
PID:712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnvG41iU47.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnvG41iU47.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk15le91Xw46.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk15le91Xw46.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:4340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:1720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:3152
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:1484
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:2952
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:744
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxPZ34fX23.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxPZ34fX23.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4324 -ip 43241⤵PID:2744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 220 -ip 2201⤵PID:4880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1760 -ip 17601⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:496
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5fd2ce35bd675bdb42192d57d0d1ff761
SHA18afdd2b7b2d72b6553bfe03c69ecdc37d01e40e0
SHA25685dca3ee94325b2f30845fe41b53492d8ed3b0d77e823fae5111929a3b1efa85
SHA512d3f49ac2bb3f212673de2a78832a82461fff55bace65bcb9c1d5b604182ebe4e0d424c1c5d278c2946ddde7cdce058f1a08e68f6b0072ecd759171a4b4bf24ce
-
Filesize
240KB
MD5fd2ce35bd675bdb42192d57d0d1ff761
SHA18afdd2b7b2d72b6553bfe03c69ecdc37d01e40e0
SHA25685dca3ee94325b2f30845fe41b53492d8ed3b0d77e823fae5111929a3b1efa85
SHA512d3f49ac2bb3f212673de2a78832a82461fff55bace65bcb9c1d5b604182ebe4e0d424c1c5d278c2946ddde7cdce058f1a08e68f6b0072ecd759171a4b4bf24ce
-
Filesize
240KB
MD5fd2ce35bd675bdb42192d57d0d1ff761
SHA18afdd2b7b2d72b6553bfe03c69ecdc37d01e40e0
SHA25685dca3ee94325b2f30845fe41b53492d8ed3b0d77e823fae5111929a3b1efa85
SHA512d3f49ac2bb3f212673de2a78832a82461fff55bace65bcb9c1d5b604182ebe4e0d424c1c5d278c2946ddde7cdce058f1a08e68f6b0072ecd759171a4b4bf24ce
-
Filesize
240KB
MD5fd2ce35bd675bdb42192d57d0d1ff761
SHA18afdd2b7b2d72b6553bfe03c69ecdc37d01e40e0
SHA25685dca3ee94325b2f30845fe41b53492d8ed3b0d77e823fae5111929a3b1efa85
SHA512d3f49ac2bb3f212673de2a78832a82461fff55bace65bcb9c1d5b604182ebe4e0d424c1c5d278c2946ddde7cdce058f1a08e68f6b0072ecd759171a4b4bf24ce
-
Filesize
177KB
MD55210ff20c80fb81182e38cd8d461a598
SHA1af82b6078032c4fff1e835e6038b13f56957301d
SHA2562304351f947f7050f094423ccaf79319d00de33c3c25ba1efae2e8fa1ca6e61a
SHA512e6ffcf5e486310504457b337438024081b2001851abf5bdc5ac8d1812bccbccd8a2eae2aaff635db994602c6d0647ab1b7808c14f0699bbae2789052d7613a90
-
Filesize
177KB
MD55210ff20c80fb81182e38cd8d461a598
SHA1af82b6078032c4fff1e835e6038b13f56957301d
SHA2562304351f947f7050f094423ccaf79319d00de33c3c25ba1efae2e8fa1ca6e61a
SHA512e6ffcf5e486310504457b337438024081b2001851abf5bdc5ac8d1812bccbccd8a2eae2aaff635db994602c6d0647ab1b7808c14f0699bbae2789052d7613a90
-
Filesize
1.2MB
MD5fedf38220338097d725ae2232206c96a
SHA1c2f25378e2724f027cfc3bac1048b5f6da8290e4
SHA25630ff1e3e726dde1b764e6c3500519431f41f7d0dabf2392d034538656cf0da47
SHA512bb0bde3d345272ee341ed5136368efde6925c5e6336c9dbc49c0cfdf2f22bf64b9c4175c6c896c394dcfb56b031f654a28aabfaa800db66ec264a0c96f1fd11c
-
Filesize
1.2MB
MD5fedf38220338097d725ae2232206c96a
SHA1c2f25378e2724f027cfc3bac1048b5f6da8290e4
SHA25630ff1e3e726dde1b764e6c3500519431f41f7d0dabf2392d034538656cf0da47
SHA512bb0bde3d345272ee341ed5136368efde6925c5e6336c9dbc49c0cfdf2f22bf64b9c4175c6c896c394dcfb56b031f654a28aabfaa800db66ec264a0c96f1fd11c
-
Filesize
240KB
MD5fd2ce35bd675bdb42192d57d0d1ff761
SHA18afdd2b7b2d72b6553bfe03c69ecdc37d01e40e0
SHA25685dca3ee94325b2f30845fe41b53492d8ed3b0d77e823fae5111929a3b1efa85
SHA512d3f49ac2bb3f212673de2a78832a82461fff55bace65bcb9c1d5b604182ebe4e0d424c1c5d278c2946ddde7cdce058f1a08e68f6b0072ecd759171a4b4bf24ce
-
Filesize
240KB
MD5fd2ce35bd675bdb42192d57d0d1ff761
SHA18afdd2b7b2d72b6553bfe03c69ecdc37d01e40e0
SHA25685dca3ee94325b2f30845fe41b53492d8ed3b0d77e823fae5111929a3b1efa85
SHA512d3f49ac2bb3f212673de2a78832a82461fff55bace65bcb9c1d5b604182ebe4e0d424c1c5d278c2946ddde7cdce058f1a08e68f6b0072ecd759171a4b4bf24ce
-
Filesize
995KB
MD51b0690ce2e40c574c0fb97c4f51fc86a
SHA1d3332fd8c84f848a09771b47a9d53395a668139c
SHA2564da2fb9a8aa9087f90f015471fab0c58e79b061491e87d4d4687d242c548606f
SHA5121d9d1bcce3c2de078679401e016715d6a533e62f64683978661ede62c7bcba274dd11cfe33a3d2316fe14cf0a829396c16d889cb25489351afda2169cd170977
-
Filesize
995KB
MD51b0690ce2e40c574c0fb97c4f51fc86a
SHA1d3332fd8c84f848a09771b47a9d53395a668139c
SHA2564da2fb9a8aa9087f90f015471fab0c58e79b061491e87d4d4687d242c548606f
SHA5121d9d1bcce3c2de078679401e016715d6a533e62f64683978661ede62c7bcba274dd11cfe33a3d2316fe14cf0a829396c16d889cb25489351afda2169cd170977
-
Filesize
16KB
MD562cf7617892ce2cdc6bcfb5c0bcad531
SHA19a157bd20efbe8474a8046c5fd28127d9b21780b
SHA2564a2c444194696e63246ff6c26f8d9fd5d1e19f6ad66a48878a4d9256dc071361
SHA512c974f3ec42c4f93a1108c35bac673235f814553f56ece2b971b6f5f50056b8499d2565fd60d908a50b94946bef66fed82ff65b998a620f911b890dafa043cd0e
-
Filesize
16KB
MD562cf7617892ce2cdc6bcfb5c0bcad531
SHA19a157bd20efbe8474a8046c5fd28127d9b21780b
SHA2564a2c444194696e63246ff6c26f8d9fd5d1e19f6ad66a48878a4d9256dc071361
SHA512c974f3ec42c4f93a1108c35bac673235f814553f56ece2b971b6f5f50056b8499d2565fd60d908a50b94946bef66fed82ff65b998a620f911b890dafa043cd0e
-
Filesize
892KB
MD506d3f66c9093e8bed99766d7c69ccd88
SHA108560c7b90c5b23f68a498278a2116704bd38476
SHA2567c0df2df11baecf23c68851d1c78e75b8c5c281820c3536abdf123c1d704db44
SHA512785da4b2c8d5e992873d4298e3902b13afe1f63d9c22b6f2fe676967aa23d587d15f2aa7977ed370a86758e1412b32105409cb2ff1492b8dca02e72f0fb74ee2
-
Filesize
892KB
MD506d3f66c9093e8bed99766d7c69ccd88
SHA108560c7b90c5b23f68a498278a2116704bd38476
SHA2567c0df2df11baecf23c68851d1c78e75b8c5c281820c3536abdf123c1d704db44
SHA512785da4b2c8d5e992873d4298e3902b13afe1f63d9c22b6f2fe676967aa23d587d15f2aa7977ed370a86758e1412b32105409cb2ff1492b8dca02e72f0fb74ee2
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
666KB
MD569d6d1cc105c51b7c85a25ef0784dc7c
SHA1d7f7d982819b173158c1f4a8cc00d32b63d43afc
SHA256384c9e5f167653144bcc5326530b0be8d81250ff64f70765dfcd8c23f53b0a5e
SHA51235165a7aa922a68631fbc0996dad7c17a6817b193701e9a2ba89d7595b5eda52244a19590e9e92d8cdb32072f9983213e99fa05c2dd66a8fbe09c5ae28cb8451
-
Filesize
666KB
MD569d6d1cc105c51b7c85a25ef0784dc7c
SHA1d7f7d982819b173158c1f4a8cc00d32b63d43afc
SHA256384c9e5f167653144bcc5326530b0be8d81250ff64f70765dfcd8c23f53b0a5e
SHA51235165a7aa922a68631fbc0996dad7c17a6817b193701e9a2ba89d7595b5eda52244a19590e9e92d8cdb32072f9983213e99fa05c2dd66a8fbe09c5ae28cb8451
-
Filesize
244KB
MD502f5dcb777fe1b583584f6f69878cc07
SHA126c88ed5dcc5ceebb8201ce9d5db4d58ffa54c1e
SHA256b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d
SHA512030fa12cf48981b48573cfe750958a09172b474a5ba6f4080842483a13ab875982fef46361cebeea65f25cc3616f828d289d30bbb610727698120cbefc22b202
-
Filesize
244KB
MD502f5dcb777fe1b583584f6f69878cc07
SHA126c88ed5dcc5ceebb8201ce9d5db4d58ffa54c1e
SHA256b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d
SHA512030fa12cf48981b48573cfe750958a09172b474a5ba6f4080842483a13ab875982fef46361cebeea65f25cc3616f828d289d30bbb610727698120cbefc22b202
-
Filesize
391KB
MD5b0b24ca221797f23b68a305e4833e450
SHA1c712f2fc6c2565a66bf2e556427a1c2f8ca3bccd
SHA25672c6e18fe1c0e4b80c3aab04d29d519006b9bdc2517536b5957ab532c970a3d5
SHA51215acf88514952c3649325b3409d854f7db6e7b9c07468b629c6fd1b6454efdadd43699a60f674d861edda802d9363d6d3ad136dc97ad51bfa0a3c6de8ad47050
-
Filesize
391KB
MD5b0b24ca221797f23b68a305e4833e450
SHA1c712f2fc6c2565a66bf2e556427a1c2f8ca3bccd
SHA25672c6e18fe1c0e4b80c3aab04d29d519006b9bdc2517536b5957ab532c970a3d5
SHA51215acf88514952c3649325b3409d854f7db6e7b9c07468b629c6fd1b6454efdadd43699a60f674d861edda802d9363d6d3ad136dc97ad51bfa0a3c6de8ad47050
-
Filesize
16KB
MD54ede7f38e08026054fac197f9e23b364
SHA15e041979505003a6460f96fa63750cea1d876540
SHA256731eb76f4d64ccb05cc438eef2647b2ba6f17125acc8a5b8fc6e12799ebcfa42
SHA512e4f1e2ce51bce3493403a546740a1374e5626d9331f2e75c259ec7313f7074e3e7a9d9daae36de9b1b3f3707a41712c70b68df8444a8001a52dd23318c39a9b1
-
Filesize
16KB
MD54ede7f38e08026054fac197f9e23b364
SHA15e041979505003a6460f96fa63750cea1d876540
SHA256731eb76f4d64ccb05cc438eef2647b2ba6f17125acc8a5b8fc6e12799ebcfa42
SHA512e4f1e2ce51bce3493403a546740a1374e5626d9331f2e75c259ec7313f7074e3e7a9d9daae36de9b1b3f3707a41712c70b68df8444a8001a52dd23318c39a9b1
-
Filesize
16KB
MD54ede7f38e08026054fac197f9e23b364
SHA15e041979505003a6460f96fa63750cea1d876540
SHA256731eb76f4d64ccb05cc438eef2647b2ba6f17125acc8a5b8fc6e12799ebcfa42
SHA512e4f1e2ce51bce3493403a546740a1374e5626d9331f2e75c259ec7313f7074e3e7a9d9daae36de9b1b3f3707a41712c70b68df8444a8001a52dd23318c39a9b1
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5