Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 09:43
Static task
static1
General
-
Target
0f0c91e5d112ce1539ba6efceb153df3e232e1d092b743990f2b9661748337c4.exe
-
Size
1.3MB
-
MD5
190a460dc66cc3354324521ad308aa11
-
SHA1
7ba615806bbacb0d5c79b61997e6e9b5d32a7f11
-
SHA256
0f0c91e5d112ce1539ba6efceb153df3e232e1d092b743990f2b9661748337c4
-
SHA512
c6d2db4c3303c22a17e6c9566171ca25c46ff355dd7ee702e71a6e201b9696ad71717b3789536316e9aab2e3920dea0ffb8c05aaae02867c3d1dceda380c9ed0
-
SSDEEP
24576:/yplttToR0bc6/xwbVoTabXrNnYdbDAyFyitDcNWa1534X+YaIuNE4mCu:KvtmRq9MCYYdXAO7tEoOe
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beED42mu94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dswU32Ld70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnKH28nO85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dswU32Ld70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnKH28nO85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnKH28nO85.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beED42mu94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beED42mu94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dswU32Ld70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dswU32Ld70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beED42mu94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beED42mu94.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dswU32Ld70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnKH28nO85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beED42mu94.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dswU32Ld70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnKH28nO85.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/4364-182-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-184-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-187-0x0000000002810000-0x0000000002820000-memory.dmp family_redline behavioral1/memory/4364-188-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-191-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-193-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-195-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-197-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-199-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-201-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-203-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-205-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-207-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-209-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-211-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-213-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-215-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-217-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-219-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-221-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-223-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-225-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-227-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-229-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-231-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-233-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-235-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-237-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-239-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-241-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-243-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-245-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-247-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline behavioral1/memory/4364-249-0x0000000005170000-0x00000000051AE000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation hk90ki21tQ99.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 15 IoCs
pid Process 2852 ptnT1526gP.exe 5080 ptxq2002Jg.exe 5064 ptzU5294xI.exe 4772 ptfI7925Ac.exe 4544 ptFy5454Ob.exe 3960 beED42mu94.exe 4364 cubh83iZ31.exe 4936 dswU32Ld70.exe 5076 fr24Vp7482eq.exe 4200 gnKH28nO85.exe 1080 hk90ki21tQ99.exe 2820 mnolyk.exe 3076 jxgz36ja72.exe 4700 mnolyk.exe 3372 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2004 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnKH28nO85.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beED42mu94.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dswU32Ld70.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dswU32Ld70.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptnT1526gP.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptzU5294xI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptzU5294xI.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptfI7925Ac.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptFy5454Ob.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptFy5454Ob.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0f0c91e5d112ce1539ba6efceb153df3e232e1d092b743990f2b9661748337c4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptnT1526gP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptxq2002Jg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptfI7925Ac.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0f0c91e5d112ce1539ba6efceb153df3e232e1d092b743990f2b9661748337c4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptxq2002Jg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1784 4364 WerFault.exe 95 2404 4936 WerFault.exe 100 1508 5076 WerFault.exe 112 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2748 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3960 beED42mu94.exe 3960 beED42mu94.exe 4364 cubh83iZ31.exe 4364 cubh83iZ31.exe 4936 dswU32Ld70.exe 4936 dswU32Ld70.exe 5076 fr24Vp7482eq.exe 5076 fr24Vp7482eq.exe 4200 gnKH28nO85.exe 4200 gnKH28nO85.exe 3076 jxgz36ja72.exe 3076 jxgz36ja72.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3960 beED42mu94.exe Token: SeDebugPrivilege 4364 cubh83iZ31.exe Token: SeDebugPrivilege 4936 dswU32Ld70.exe Token: SeDebugPrivilege 5076 fr24Vp7482eq.exe Token: SeDebugPrivilege 4200 gnKH28nO85.exe Token: SeDebugPrivilege 3076 jxgz36ja72.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4336 wrote to memory of 2852 4336 0f0c91e5d112ce1539ba6efceb153df3e232e1d092b743990f2b9661748337c4.exe 81 PID 4336 wrote to memory of 2852 4336 0f0c91e5d112ce1539ba6efceb153df3e232e1d092b743990f2b9661748337c4.exe 81 PID 4336 wrote to memory of 2852 4336 0f0c91e5d112ce1539ba6efceb153df3e232e1d092b743990f2b9661748337c4.exe 81 PID 2852 wrote to memory of 5080 2852 ptnT1526gP.exe 83 PID 2852 wrote to memory of 5080 2852 ptnT1526gP.exe 83 PID 2852 wrote to memory of 5080 2852 ptnT1526gP.exe 83 PID 5080 wrote to memory of 5064 5080 ptxq2002Jg.exe 84 PID 5080 wrote to memory of 5064 5080 ptxq2002Jg.exe 84 PID 5080 wrote to memory of 5064 5080 ptxq2002Jg.exe 84 PID 5064 wrote to memory of 4772 5064 ptzU5294xI.exe 85 PID 5064 wrote to memory of 4772 5064 ptzU5294xI.exe 85 PID 5064 wrote to memory of 4772 5064 ptzU5294xI.exe 85 PID 4772 wrote to memory of 4544 4772 ptfI7925Ac.exe 86 PID 4772 wrote to memory of 4544 4772 ptfI7925Ac.exe 86 PID 4772 wrote to memory of 4544 4772 ptfI7925Ac.exe 86 PID 4544 wrote to memory of 3960 4544 ptFy5454Ob.exe 87 PID 4544 wrote to memory of 3960 4544 ptFy5454Ob.exe 87 PID 4544 wrote to memory of 4364 4544 ptFy5454Ob.exe 95 PID 4544 wrote to memory of 4364 4544 ptFy5454Ob.exe 95 PID 4544 wrote to memory of 4364 4544 ptFy5454Ob.exe 95 PID 4772 wrote to memory of 4936 4772 ptfI7925Ac.exe 100 PID 4772 wrote to memory of 4936 4772 ptfI7925Ac.exe 100 PID 4772 wrote to memory of 4936 4772 ptfI7925Ac.exe 100 PID 5064 wrote to memory of 5076 5064 ptzU5294xI.exe 112 PID 5064 wrote to memory of 5076 5064 ptzU5294xI.exe 112 PID 5064 wrote to memory of 5076 5064 ptzU5294xI.exe 112 PID 5080 wrote to memory of 4200 5080 ptxq2002Jg.exe 115 PID 5080 wrote to memory of 4200 5080 ptxq2002Jg.exe 115 PID 2852 wrote to memory of 1080 2852 ptnT1526gP.exe 116 PID 2852 wrote to memory of 1080 2852 ptnT1526gP.exe 116 PID 2852 wrote to memory of 1080 2852 ptnT1526gP.exe 116 PID 1080 wrote to memory of 2820 1080 hk90ki21tQ99.exe 117 PID 1080 wrote to memory of 2820 1080 hk90ki21tQ99.exe 117 PID 1080 wrote to memory of 2820 1080 hk90ki21tQ99.exe 117 PID 4336 wrote to memory of 3076 4336 0f0c91e5d112ce1539ba6efceb153df3e232e1d092b743990f2b9661748337c4.exe 118 PID 4336 wrote to memory of 3076 4336 0f0c91e5d112ce1539ba6efceb153df3e232e1d092b743990f2b9661748337c4.exe 118 PID 4336 wrote to memory of 3076 4336 0f0c91e5d112ce1539ba6efceb153df3e232e1d092b743990f2b9661748337c4.exe 118 PID 2820 wrote to memory of 2748 2820 mnolyk.exe 119 PID 2820 wrote to memory of 2748 2820 mnolyk.exe 119 PID 2820 wrote to memory of 2748 2820 mnolyk.exe 119 PID 2820 wrote to memory of 4768 2820 mnolyk.exe 121 PID 2820 wrote to memory of 4768 2820 mnolyk.exe 121 PID 2820 wrote to memory of 4768 2820 mnolyk.exe 121 PID 4768 wrote to memory of 1640 4768 cmd.exe 123 PID 4768 wrote to memory of 1640 4768 cmd.exe 123 PID 4768 wrote to memory of 1640 4768 cmd.exe 123 PID 4768 wrote to memory of 1488 4768 cmd.exe 124 PID 4768 wrote to memory of 1488 4768 cmd.exe 124 PID 4768 wrote to memory of 1488 4768 cmd.exe 124 PID 4768 wrote to memory of 4364 4768 cmd.exe 125 PID 4768 wrote to memory of 4364 4768 cmd.exe 125 PID 4768 wrote to memory of 4364 4768 cmd.exe 125 PID 4768 wrote to memory of 4408 4768 cmd.exe 126 PID 4768 wrote to memory of 4408 4768 cmd.exe 126 PID 4768 wrote to memory of 4408 4768 cmd.exe 126 PID 4768 wrote to memory of 4132 4768 cmd.exe 127 PID 4768 wrote to memory of 4132 4768 cmd.exe 127 PID 4768 wrote to memory of 4132 4768 cmd.exe 127 PID 4768 wrote to memory of 1172 4768 cmd.exe 128 PID 4768 wrote to memory of 1172 4768 cmd.exe 128 PID 4768 wrote to memory of 1172 4768 cmd.exe 128 PID 2820 wrote to memory of 2004 2820 mnolyk.exe 131 PID 2820 wrote to memory of 2004 2820 mnolyk.exe 131 PID 2820 wrote to memory of 2004 2820 mnolyk.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f0c91e5d112ce1539ba6efceb153df3e232e1d092b743990f2b9661748337c4.exe"C:\Users\Admin\AppData\Local\Temp\0f0c91e5d112ce1539ba6efceb153df3e232e1d092b743990f2b9661748337c4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptnT1526gP.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptnT1526gP.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptxq2002Jg.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptxq2002Jg.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptzU5294xI.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptzU5294xI.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptfI7925Ac.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptfI7925Ac.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptFy5454Ob.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptFy5454Ob.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beED42mu94.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beED42mu94.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cubh83iZ31.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cubh83iZ31.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 16048⤵
- Program crash
PID:1784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dswU32Ld70.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dswU32Ld70.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 10807⤵
- Program crash
PID:2404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr24Vp7482eq.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr24Vp7482eq.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 13406⤵
- Program crash
PID:1508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnKH28nO85.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnKH28nO85.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk90ki21tQ99.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk90ki21tQ99.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:2748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1640
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:1488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:4364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4408
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:4132
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:1172
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2004
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxgz36ja72.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxgz36ja72.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4364 -ip 43641⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4936 -ip 49361⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5076 -ip 50761⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:4700
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:3372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD53f5021edf0fe286d04c4e496f2e1503b
SHA1cfab988ac90280709e06c8416eb1465dd13f1bc8
SHA256f84c17a4e5819c9ed7d4d1fc3c01f3c5dedc00a10805807723daa36db5ddb9f3
SHA5123cdbbe8acd2a277f38f8d0360c9f7a08c470e0bc5b68efb17fcc34e83f0cf65f64437d6bc8dfa182650bf97b794642f7d0acddb274871ecbcf37cde8ccfe449a
-
Filesize
240KB
MD53f5021edf0fe286d04c4e496f2e1503b
SHA1cfab988ac90280709e06c8416eb1465dd13f1bc8
SHA256f84c17a4e5819c9ed7d4d1fc3c01f3c5dedc00a10805807723daa36db5ddb9f3
SHA5123cdbbe8acd2a277f38f8d0360c9f7a08c470e0bc5b68efb17fcc34e83f0cf65f64437d6bc8dfa182650bf97b794642f7d0acddb274871ecbcf37cde8ccfe449a
-
Filesize
240KB
MD53f5021edf0fe286d04c4e496f2e1503b
SHA1cfab988ac90280709e06c8416eb1465dd13f1bc8
SHA256f84c17a4e5819c9ed7d4d1fc3c01f3c5dedc00a10805807723daa36db5ddb9f3
SHA5123cdbbe8acd2a277f38f8d0360c9f7a08c470e0bc5b68efb17fcc34e83f0cf65f64437d6bc8dfa182650bf97b794642f7d0acddb274871ecbcf37cde8ccfe449a
-
Filesize
240KB
MD53f5021edf0fe286d04c4e496f2e1503b
SHA1cfab988ac90280709e06c8416eb1465dd13f1bc8
SHA256f84c17a4e5819c9ed7d4d1fc3c01f3c5dedc00a10805807723daa36db5ddb9f3
SHA5123cdbbe8acd2a277f38f8d0360c9f7a08c470e0bc5b68efb17fcc34e83f0cf65f64437d6bc8dfa182650bf97b794642f7d0acddb274871ecbcf37cde8ccfe449a
-
Filesize
240KB
MD53f5021edf0fe286d04c4e496f2e1503b
SHA1cfab988ac90280709e06c8416eb1465dd13f1bc8
SHA256f84c17a4e5819c9ed7d4d1fc3c01f3c5dedc00a10805807723daa36db5ddb9f3
SHA5123cdbbe8acd2a277f38f8d0360c9f7a08c470e0bc5b68efb17fcc34e83f0cf65f64437d6bc8dfa182650bf97b794642f7d0acddb274871ecbcf37cde8ccfe449a
-
Filesize
177KB
MD5da0f9556fed759cf010108644ea88808
SHA134442154a27c0242e58507e18efd06eec8b7be4a
SHA25622961fbe0585ae4b15312687abc680e5d56e09da50f1ec6b51d277c1b40b3e9d
SHA5120d13a9bd996e58b2edc4460c28d75b136bae6406f68cdeaa2c63b033dbdf24e984df194c0c7f10c8e68dfedc680f1c46afdd027116e7e63c7f9ac3c2d94205aa
-
Filesize
177KB
MD5da0f9556fed759cf010108644ea88808
SHA134442154a27c0242e58507e18efd06eec8b7be4a
SHA25622961fbe0585ae4b15312687abc680e5d56e09da50f1ec6b51d277c1b40b3e9d
SHA5120d13a9bd996e58b2edc4460c28d75b136bae6406f68cdeaa2c63b033dbdf24e984df194c0c7f10c8e68dfedc680f1c46afdd027116e7e63c7f9ac3c2d94205aa
-
Filesize
1.2MB
MD5736c9ebf5e6e29e6a2484618073a41af
SHA1e442a1b3a762c8fd6447ccaf294c51e997e238e4
SHA25671239a19e8b98fa7fe4e075990adf32ced0b0ff13cec5a48b6ff3cbafaa57eb1
SHA5126c34bcf6ac99cc4cd206851b812f7ec313e93acb103a255b3927b086d1d434f27161c42cf031156917d9d274027d67b68f941d5fe59ea8a20460274d4b7aff1e
-
Filesize
1.2MB
MD5736c9ebf5e6e29e6a2484618073a41af
SHA1e442a1b3a762c8fd6447ccaf294c51e997e238e4
SHA25671239a19e8b98fa7fe4e075990adf32ced0b0ff13cec5a48b6ff3cbafaa57eb1
SHA5126c34bcf6ac99cc4cd206851b812f7ec313e93acb103a255b3927b086d1d434f27161c42cf031156917d9d274027d67b68f941d5fe59ea8a20460274d4b7aff1e
-
Filesize
240KB
MD53f5021edf0fe286d04c4e496f2e1503b
SHA1cfab988ac90280709e06c8416eb1465dd13f1bc8
SHA256f84c17a4e5819c9ed7d4d1fc3c01f3c5dedc00a10805807723daa36db5ddb9f3
SHA5123cdbbe8acd2a277f38f8d0360c9f7a08c470e0bc5b68efb17fcc34e83f0cf65f64437d6bc8dfa182650bf97b794642f7d0acddb274871ecbcf37cde8ccfe449a
-
Filesize
240KB
MD53f5021edf0fe286d04c4e496f2e1503b
SHA1cfab988ac90280709e06c8416eb1465dd13f1bc8
SHA256f84c17a4e5819c9ed7d4d1fc3c01f3c5dedc00a10805807723daa36db5ddb9f3
SHA5123cdbbe8acd2a277f38f8d0360c9f7a08c470e0bc5b68efb17fcc34e83f0cf65f64437d6bc8dfa182650bf97b794642f7d0acddb274871ecbcf37cde8ccfe449a
-
Filesize
995KB
MD524496474386422ef0abed51d7af67f47
SHA1ee4edcce3b2bc0a866df51b925b803473cd00e56
SHA2568d6ae6390327c7795b1e49fcd812d769aebf86bd1688d854bdda695fc66f71f1
SHA512e3bc6a5a68ba87edeb8dfe2cb0ec9a1847e036b3649f742f1bdabce7988be75a20bafe997a23e5abfce72643c5396fad6168b81bbd815199b9273acea0ca6123
-
Filesize
995KB
MD524496474386422ef0abed51d7af67f47
SHA1ee4edcce3b2bc0a866df51b925b803473cd00e56
SHA2568d6ae6390327c7795b1e49fcd812d769aebf86bd1688d854bdda695fc66f71f1
SHA512e3bc6a5a68ba87edeb8dfe2cb0ec9a1847e036b3649f742f1bdabce7988be75a20bafe997a23e5abfce72643c5396fad6168b81bbd815199b9273acea0ca6123
-
Filesize
16KB
MD5a9fde0ae19b1ce4f6f7b9d77869de749
SHA1b13400c7864beeff8b5db655812a04cc425b1e57
SHA256a2ae06390406f8380c652585c88d27be13c23f574ed0a9bc810435a2204f6e68
SHA512c7429f86b48b4c49100828208e267c68cb18d0c9f0f1e5880bd2d80d0cec027f0b64af526d166f87545c0ff542f063787d0f55fde77dce7d6937df7369102c4c
-
Filesize
16KB
MD5a9fde0ae19b1ce4f6f7b9d77869de749
SHA1b13400c7864beeff8b5db655812a04cc425b1e57
SHA256a2ae06390406f8380c652585c88d27be13c23f574ed0a9bc810435a2204f6e68
SHA512c7429f86b48b4c49100828208e267c68cb18d0c9f0f1e5880bd2d80d0cec027f0b64af526d166f87545c0ff542f063787d0f55fde77dce7d6937df7369102c4c
-
Filesize
892KB
MD5072334cebd67bd52465b928cd341871e
SHA1ed1887d3c960c72f8e78de1170362a4270896a94
SHA256ab76e979569e3281b7469936a4969640dff0f5bbd99fdbec44dfc1911a242943
SHA512349d411c24f9cc5abedc30b205cefd85c3d2c362e6ac0467100489bce49c273b250f42c3a1e98cfbf2d0419d5a16a836f2ae1d31834ca498b5bfd90001eb9f4d
-
Filesize
892KB
MD5072334cebd67bd52465b928cd341871e
SHA1ed1887d3c960c72f8e78de1170362a4270896a94
SHA256ab76e979569e3281b7469936a4969640dff0f5bbd99fdbec44dfc1911a242943
SHA512349d411c24f9cc5abedc30b205cefd85c3d2c362e6ac0467100489bce49c273b250f42c3a1e98cfbf2d0419d5a16a836f2ae1d31834ca498b5bfd90001eb9f4d
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
666KB
MD5f74b8f5da9cf900d37157d7739b23d3a
SHA1f04c607bf2b62988e68840fd5a4df5495bf9f545
SHA256c77496261aa30fe02d7c010c2cb05d60e0a9d6f09e69938730738992b031e9fa
SHA51240dfb1c4dc7c40125aa76ab6e4b9939e6d0a2d492bbfb341fc216008fe91f9a5fd958d827c1d51ccb06b8dedb54112693b74641fbc252daf4fb623959987a4d6
-
Filesize
666KB
MD5f74b8f5da9cf900d37157d7739b23d3a
SHA1f04c607bf2b62988e68840fd5a4df5495bf9f545
SHA256c77496261aa30fe02d7c010c2cb05d60e0a9d6f09e69938730738992b031e9fa
SHA51240dfb1c4dc7c40125aa76ab6e4b9939e6d0a2d492bbfb341fc216008fe91f9a5fd958d827c1d51ccb06b8dedb54112693b74641fbc252daf4fb623959987a4d6
-
Filesize
244KB
MD502f5dcb777fe1b583584f6f69878cc07
SHA126c88ed5dcc5ceebb8201ce9d5db4d58ffa54c1e
SHA256b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d
SHA512030fa12cf48981b48573cfe750958a09172b474a5ba6f4080842483a13ab875982fef46361cebeea65f25cc3616f828d289d30bbb610727698120cbefc22b202
-
Filesize
244KB
MD502f5dcb777fe1b583584f6f69878cc07
SHA126c88ed5dcc5ceebb8201ce9d5db4d58ffa54c1e
SHA256b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d
SHA512030fa12cf48981b48573cfe750958a09172b474a5ba6f4080842483a13ab875982fef46361cebeea65f25cc3616f828d289d30bbb610727698120cbefc22b202
-
Filesize
391KB
MD5c3234b5f9d29481bfc0d8c392672ce5d
SHA16406022feb4914b41fd67d98b62e10acdf58dacc
SHA2565bc9956bf1e538ca645347115248a7b71233dfbd10cf04a6845dfb79879f6568
SHA512274de040c120d78f05ecd74524694b87d152ab90d5d564cf0be6219af3141049690f1a9128028efc601324334470ee4e5bad4c505f4eefa4bfd707f7f1fea36c
-
Filesize
391KB
MD5c3234b5f9d29481bfc0d8c392672ce5d
SHA16406022feb4914b41fd67d98b62e10acdf58dacc
SHA2565bc9956bf1e538ca645347115248a7b71233dfbd10cf04a6845dfb79879f6568
SHA512274de040c120d78f05ecd74524694b87d152ab90d5d564cf0be6219af3141049690f1a9128028efc601324334470ee4e5bad4c505f4eefa4bfd707f7f1fea36c
-
Filesize
16KB
MD5eb5cd87e9c0bdd77cbfe38c2b3fc6f4e
SHA1a978e5f02f9d55724985dfa50a106b62f6afff09
SHA25635cb65c67babe42068c0c8be184b5c685e612e5a3fa2045987eedd04fdf324ae
SHA5127c304c8168f20f6855247930a3b07e5da19c9d51f027c27afe13c8d30ba66013f55d1d57c1a9ad92494e0bfe0cd78d5bbeece17f5a38072ffc43ad758c31ea4b
-
Filesize
16KB
MD5eb5cd87e9c0bdd77cbfe38c2b3fc6f4e
SHA1a978e5f02f9d55724985dfa50a106b62f6afff09
SHA25635cb65c67babe42068c0c8be184b5c685e612e5a3fa2045987eedd04fdf324ae
SHA5127c304c8168f20f6855247930a3b07e5da19c9d51f027c27afe13c8d30ba66013f55d1d57c1a9ad92494e0bfe0cd78d5bbeece17f5a38072ffc43ad758c31ea4b
-
Filesize
16KB
MD5eb5cd87e9c0bdd77cbfe38c2b3fc6f4e
SHA1a978e5f02f9d55724985dfa50a106b62f6afff09
SHA25635cb65c67babe42068c0c8be184b5c685e612e5a3fa2045987eedd04fdf324ae
SHA5127c304c8168f20f6855247930a3b07e5da19c9d51f027c27afe13c8d30ba66013f55d1d57c1a9ad92494e0bfe0cd78d5bbeece17f5a38072ffc43ad758c31ea4b
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5