Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 09:43
Static task
static1
General
-
Target
945ce6bb46b84c8280b39d9e332379cb62048eb784ac07e8f5c2c69c9b761d41.exe
-
Size
1.3MB
-
MD5
38f53cbb7d19cb8498855c1447608381
-
SHA1
5b0e3688143ef1ed69a5950a74e3f13d18d255cc
-
SHA256
945ce6bb46b84c8280b39d9e332379cb62048eb784ac07e8f5c2c69c9b761d41
-
SHA512
fe2e6b8b1f7ba9b29080082d4ec16a4c4aaab43673e289886041a9107f37e487de4ad9b9a3e327a226bd6d1f476c01534f0d9101e88a4ed6408eb7191f0207f6
-
SSDEEP
24576:Ay97a4NYksirj5URRAuo2JHOILyFoiNdC0qCiEoIxFW9Tx2ESEHo:H97dNYksi8RAujH9Lu1S0boMFcd22
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.15/dF30Hn4m/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mNI88Bc05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mNI88Bc05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mNI88Bc05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rvU16Nw37.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iNW74Fs84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iNW74Fs84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mNI88Bc05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mNI88Bc05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rvU16Nw37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iNW74Fs84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iNW74Fs84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rvU16Nw37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iNW74Fs84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iNW74Fs84.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection mNI88Bc05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rvU16Nw37.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rvU16Nw37.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/4356-183-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-184-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-186-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-188-0x0000000004BB0000-0x0000000004BC0000-memory.dmp family_redline behavioral1/memory/4356-190-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-191-0x0000000004BB0000-0x0000000004BC0000-memory.dmp family_redline behavioral1/memory/4356-193-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-195-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-197-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-199-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-201-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-203-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-205-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-207-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-211-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-213-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-209-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-215-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-217-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-219-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-221-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-223-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-225-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-227-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-229-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-233-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-231-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-235-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-237-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-239-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-241-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-243-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-245-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-247-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/4356-249-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2276-1650-0x0000000002660000-0x0000000002670000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation sf59Ez85JQ11.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 4504 vmys54rL67.exe 2144 vmOS42Mt20.exe 3972 vmaX30JW20.exe 4072 vmUz00mV25.exe 4552 vmkz91KP99.exe 4460 iNW74Fs84.exe 4356 kTt79gc54.exe 3804 mNI88Bc05.exe 2276 nlL26hp64.exe 4532 rvU16Nw37.exe 668 sf59Ez85JQ11.exe 1888 mnolyk.exe 2616 tv05CO89tw67.exe 4444 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4368 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iNW74Fs84.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mNI88Bc05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mNI88Bc05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rvU16Nw37.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" vmaX30JW20.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmUz00mV25.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmkz91KP99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 945ce6bb46b84c8280b39d9e332379cb62048eb784ac07e8f5c2c69c9b761d41.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmys54rL67.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmaX30JW20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vmOS42Mt20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vmUz00mV25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" vmkz91KP99.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 945ce6bb46b84c8280b39d9e332379cb62048eb784ac07e8f5c2c69c9b761d41.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmys54rL67.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmOS42Mt20.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4320 4356 WerFault.exe 95 2160 3804 WerFault.exe 99 2988 2276 WerFault.exe 104 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2652 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4460 iNW74Fs84.exe 4460 iNW74Fs84.exe 4356 kTt79gc54.exe 4356 kTt79gc54.exe 3804 mNI88Bc05.exe 3804 mNI88Bc05.exe 2276 nlL26hp64.exe 2276 nlL26hp64.exe 4532 rvU16Nw37.exe 4532 rvU16Nw37.exe 2616 tv05CO89tw67.exe 2616 tv05CO89tw67.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4460 iNW74Fs84.exe Token: SeDebugPrivilege 4356 kTt79gc54.exe Token: SeDebugPrivilege 3804 mNI88Bc05.exe Token: SeDebugPrivilege 2276 nlL26hp64.exe Token: SeDebugPrivilege 4532 rvU16Nw37.exe Token: SeDebugPrivilege 2616 tv05CO89tw67.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 4504 4160 945ce6bb46b84c8280b39d9e332379cb62048eb784ac07e8f5c2c69c9b761d41.exe 86 PID 4160 wrote to memory of 4504 4160 945ce6bb46b84c8280b39d9e332379cb62048eb784ac07e8f5c2c69c9b761d41.exe 86 PID 4160 wrote to memory of 4504 4160 945ce6bb46b84c8280b39d9e332379cb62048eb784ac07e8f5c2c69c9b761d41.exe 86 PID 4504 wrote to memory of 2144 4504 vmys54rL67.exe 87 PID 4504 wrote to memory of 2144 4504 vmys54rL67.exe 87 PID 4504 wrote to memory of 2144 4504 vmys54rL67.exe 87 PID 2144 wrote to memory of 3972 2144 vmOS42Mt20.exe 88 PID 2144 wrote to memory of 3972 2144 vmOS42Mt20.exe 88 PID 2144 wrote to memory of 3972 2144 vmOS42Mt20.exe 88 PID 3972 wrote to memory of 4072 3972 vmaX30JW20.exe 89 PID 3972 wrote to memory of 4072 3972 vmaX30JW20.exe 89 PID 3972 wrote to memory of 4072 3972 vmaX30JW20.exe 89 PID 4072 wrote to memory of 4552 4072 vmUz00mV25.exe 90 PID 4072 wrote to memory of 4552 4072 vmUz00mV25.exe 90 PID 4072 wrote to memory of 4552 4072 vmUz00mV25.exe 90 PID 4552 wrote to memory of 4460 4552 vmkz91KP99.exe 91 PID 4552 wrote to memory of 4460 4552 vmkz91KP99.exe 91 PID 4552 wrote to memory of 4356 4552 vmkz91KP99.exe 95 PID 4552 wrote to memory of 4356 4552 vmkz91KP99.exe 95 PID 4552 wrote to memory of 4356 4552 vmkz91KP99.exe 95 PID 4072 wrote to memory of 3804 4072 vmUz00mV25.exe 99 PID 4072 wrote to memory of 3804 4072 vmUz00mV25.exe 99 PID 4072 wrote to memory of 3804 4072 vmUz00mV25.exe 99 PID 3972 wrote to memory of 2276 3972 vmaX30JW20.exe 104 PID 3972 wrote to memory of 2276 3972 vmaX30JW20.exe 104 PID 3972 wrote to memory of 2276 3972 vmaX30JW20.exe 104 PID 2144 wrote to memory of 4532 2144 vmOS42Mt20.exe 108 PID 2144 wrote to memory of 4532 2144 vmOS42Mt20.exe 108 PID 4504 wrote to memory of 668 4504 vmys54rL67.exe 109 PID 4504 wrote to memory of 668 4504 vmys54rL67.exe 109 PID 4504 wrote to memory of 668 4504 vmys54rL67.exe 109 PID 668 wrote to memory of 1888 668 sf59Ez85JQ11.exe 110 PID 668 wrote to memory of 1888 668 sf59Ez85JQ11.exe 110 PID 668 wrote to memory of 1888 668 sf59Ez85JQ11.exe 110 PID 4160 wrote to memory of 2616 4160 945ce6bb46b84c8280b39d9e332379cb62048eb784ac07e8f5c2c69c9b761d41.exe 111 PID 4160 wrote to memory of 2616 4160 945ce6bb46b84c8280b39d9e332379cb62048eb784ac07e8f5c2c69c9b761d41.exe 111 PID 4160 wrote to memory of 2616 4160 945ce6bb46b84c8280b39d9e332379cb62048eb784ac07e8f5c2c69c9b761d41.exe 111 PID 1888 wrote to memory of 2652 1888 mnolyk.exe 112 PID 1888 wrote to memory of 2652 1888 mnolyk.exe 112 PID 1888 wrote to memory of 2652 1888 mnolyk.exe 112 PID 1888 wrote to memory of 3044 1888 mnolyk.exe 114 PID 1888 wrote to memory of 3044 1888 mnolyk.exe 114 PID 1888 wrote to memory of 3044 1888 mnolyk.exe 114 PID 3044 wrote to memory of 2632 3044 cmd.exe 116 PID 3044 wrote to memory of 2632 3044 cmd.exe 116 PID 3044 wrote to memory of 2632 3044 cmd.exe 116 PID 3044 wrote to memory of 3792 3044 cmd.exe 117 PID 3044 wrote to memory of 3792 3044 cmd.exe 117 PID 3044 wrote to memory of 3792 3044 cmd.exe 117 PID 3044 wrote to memory of 3736 3044 cmd.exe 118 PID 3044 wrote to memory of 3736 3044 cmd.exe 118 PID 3044 wrote to memory of 3736 3044 cmd.exe 118 PID 3044 wrote to memory of 2380 3044 cmd.exe 120 PID 3044 wrote to memory of 2380 3044 cmd.exe 120 PID 3044 wrote to memory of 2380 3044 cmd.exe 120 PID 3044 wrote to memory of 3616 3044 cmd.exe 119 PID 3044 wrote to memory of 3616 3044 cmd.exe 119 PID 3044 wrote to memory of 3616 3044 cmd.exe 119 PID 3044 wrote to memory of 4592 3044 cmd.exe 121 PID 3044 wrote to memory of 4592 3044 cmd.exe 121 PID 3044 wrote to memory of 4592 3044 cmd.exe 121 PID 1888 wrote to memory of 4368 1888 mnolyk.exe 129 PID 1888 wrote to memory of 4368 1888 mnolyk.exe 129 PID 1888 wrote to memory of 4368 1888 mnolyk.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\945ce6bb46b84c8280b39d9e332379cb62048eb784ac07e8f5c2c69c9b761d41.exe"C:\Users\Admin\AppData\Local\Temp\945ce6bb46b84c8280b39d9e332379cb62048eb784ac07e8f5c2c69c9b761d41.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmys54rL67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmys54rL67.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmOS42Mt20.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmOS42Mt20.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmaX30JW20.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmaX30JW20.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmUz00mV25.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmUz00mV25.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmkz91KP99.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmkz91KP99.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iNW74Fs84.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iNW74Fs84.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kTt79gc54.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kTt79gc54.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 20248⤵
- Program crash
PID:4320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\mNI88Bc05.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\mNI88Bc05.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 10847⤵
- Program crash
PID:2160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nlL26hp64.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nlL26hp64.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2276 -s 13206⤵
- Program crash
PID:2988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rvU16Nw37.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rvU16Nw37.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf59Ez85JQ11.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf59Ez85JQ11.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:2652
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4f9dd6f8a7" /P "Admin:N"&&CACLS "..\4f9dd6f8a7" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:3792
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:3736
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:N"6⤵PID:3616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2380
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:R" /E6⤵PID:4592
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4368
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv05CO89tw67.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv05CO89tw67.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4356 -ip 43561⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3804 -ip 38041⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2276 -ip 22761⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe1⤵
- Executes dropped EXE
PID:4444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD550883300aed18894f55bd7c58a58ae8c
SHA15a027d0977eedbd5ae15df41adbaf03fb5dca464
SHA256d59e4834a6dee836fa7f29fa529f1ab911a880939e654c05b564a2f8099a2a9f
SHA51263150b7af13ab1b101673b899add76208b74808d50ebbd80648490c4dad6a710220c0f23e0ae06a734a96fda8311fa71eb9254676633dd9d3cdcdd2a86ae9423
-
Filesize
240KB
MD550883300aed18894f55bd7c58a58ae8c
SHA15a027d0977eedbd5ae15df41adbaf03fb5dca464
SHA256d59e4834a6dee836fa7f29fa529f1ab911a880939e654c05b564a2f8099a2a9f
SHA51263150b7af13ab1b101673b899add76208b74808d50ebbd80648490c4dad6a710220c0f23e0ae06a734a96fda8311fa71eb9254676633dd9d3cdcdd2a86ae9423
-
Filesize
240KB
MD550883300aed18894f55bd7c58a58ae8c
SHA15a027d0977eedbd5ae15df41adbaf03fb5dca464
SHA256d59e4834a6dee836fa7f29fa529f1ab911a880939e654c05b564a2f8099a2a9f
SHA51263150b7af13ab1b101673b899add76208b74808d50ebbd80648490c4dad6a710220c0f23e0ae06a734a96fda8311fa71eb9254676633dd9d3cdcdd2a86ae9423
-
Filesize
240KB
MD550883300aed18894f55bd7c58a58ae8c
SHA15a027d0977eedbd5ae15df41adbaf03fb5dca464
SHA256d59e4834a6dee836fa7f29fa529f1ab911a880939e654c05b564a2f8099a2a9f
SHA51263150b7af13ab1b101673b899add76208b74808d50ebbd80648490c4dad6a710220c0f23e0ae06a734a96fda8311fa71eb9254676633dd9d3cdcdd2a86ae9423
-
Filesize
177KB
MD55270cd5ca17d0aa2fea1203aa926f2e7
SHA1c66c0030e2f32b09c81733c878cd0d9072cb1fa9
SHA25643563866ae9fc6e146841f95b8684b78034b5d2e073448a3c99f7c0bef262be2
SHA512f7f12ac3a97651853b0ce6130fe5574d00d8546a8ab1e2f59150af1ae04c9129bd4432310cc40d7126bc562f6051c8e9e66ee2c8547e8ce57ba1648cb4e4f1da
-
Filesize
177KB
MD55270cd5ca17d0aa2fea1203aa926f2e7
SHA1c66c0030e2f32b09c81733c878cd0d9072cb1fa9
SHA25643563866ae9fc6e146841f95b8684b78034b5d2e073448a3c99f7c0bef262be2
SHA512f7f12ac3a97651853b0ce6130fe5574d00d8546a8ab1e2f59150af1ae04c9129bd4432310cc40d7126bc562f6051c8e9e66ee2c8547e8ce57ba1648cb4e4f1da
-
Filesize
1.2MB
MD5b4e64128cf5fafdba36615b4923898eb
SHA17c603e8eccec191fc56e8ee244d373ee7176b5b4
SHA25637fdac61687b58082e3e2a9a566e8ced65fd33a96ad18e182c873e532e7ff163
SHA51212c9ff1b3e63bbcf140bdc678631ece52988e11fb5705a26ad7ee739cf276f9ecdc2e01be803a0e3781a51af9d34f0271892bd0ae580126d60731cb8dab227fe
-
Filesize
1.2MB
MD5b4e64128cf5fafdba36615b4923898eb
SHA17c603e8eccec191fc56e8ee244d373ee7176b5b4
SHA25637fdac61687b58082e3e2a9a566e8ced65fd33a96ad18e182c873e532e7ff163
SHA51212c9ff1b3e63bbcf140bdc678631ece52988e11fb5705a26ad7ee739cf276f9ecdc2e01be803a0e3781a51af9d34f0271892bd0ae580126d60731cb8dab227fe
-
Filesize
240KB
MD550883300aed18894f55bd7c58a58ae8c
SHA15a027d0977eedbd5ae15df41adbaf03fb5dca464
SHA256d59e4834a6dee836fa7f29fa529f1ab911a880939e654c05b564a2f8099a2a9f
SHA51263150b7af13ab1b101673b899add76208b74808d50ebbd80648490c4dad6a710220c0f23e0ae06a734a96fda8311fa71eb9254676633dd9d3cdcdd2a86ae9423
-
Filesize
240KB
MD550883300aed18894f55bd7c58a58ae8c
SHA15a027d0977eedbd5ae15df41adbaf03fb5dca464
SHA256d59e4834a6dee836fa7f29fa529f1ab911a880939e654c05b564a2f8099a2a9f
SHA51263150b7af13ab1b101673b899add76208b74808d50ebbd80648490c4dad6a710220c0f23e0ae06a734a96fda8311fa71eb9254676633dd9d3cdcdd2a86ae9423
-
Filesize
990KB
MD5facb82be9c12eedde0f862c3e2eaa997
SHA108fa9c71f184ec7afdb3eef33b5ff6ecf185cb44
SHA256580aba04348a3e065b12996b840c50ab0869049c4ba83014a4633e60162a6b37
SHA5122cf7f160864ef5f5f0bfbef623eb85ab3f97633af8abd7c326118cd1cbec2c59e58aef474263a30dae937209b639c37e3cf7b9f3cd62e3a304cad791b2aa245f
-
Filesize
990KB
MD5facb82be9c12eedde0f862c3e2eaa997
SHA108fa9c71f184ec7afdb3eef33b5ff6ecf185cb44
SHA256580aba04348a3e065b12996b840c50ab0869049c4ba83014a4633e60162a6b37
SHA5122cf7f160864ef5f5f0bfbef623eb85ab3f97633af8abd7c326118cd1cbec2c59e58aef474263a30dae937209b639c37e3cf7b9f3cd62e3a304cad791b2aa245f
-
Filesize
16KB
MD50c825aa0c8fb3a2e7ffe17ac49adf3c6
SHA142ca90b5980efb1157071c31db1a77d797b413a5
SHA25606adb53ade529ded5b40cb1758df372a7f9f46f969b44c3f6c34301bdc183d7a
SHA51235082ec8d7678de2ff1f7cdf77cb57eb84f0fbd1061d2f632446fe9f6c66055d2e406f95f8a02676b8bbbc6e98c0929f8b4901b003c12f0aa79535380cf849c1
-
Filesize
16KB
MD50c825aa0c8fb3a2e7ffe17ac49adf3c6
SHA142ca90b5980efb1157071c31db1a77d797b413a5
SHA25606adb53ade529ded5b40cb1758df372a7f9f46f969b44c3f6c34301bdc183d7a
SHA51235082ec8d7678de2ff1f7cdf77cb57eb84f0fbd1061d2f632446fe9f6c66055d2e406f95f8a02676b8bbbc6e98c0929f8b4901b003c12f0aa79535380cf849c1
-
Filesize
892KB
MD5b61acc8128c2ba2d2050b76e576874b6
SHA18e9db5d268d19e33adfa99230534e5364890733c
SHA2560919ab2a11db2ccd0f87297a989574519df40edf52c720aafc831c28936e4d3b
SHA5123044afbaf51442e1bf02eab961df685f9aef60307adee7813e863aa76b4d2d06eefd02e65c8ff01f14bd350d9dc53ab734dee0b88f17fb988c9b10b7afddac4e
-
Filesize
892KB
MD5b61acc8128c2ba2d2050b76e576874b6
SHA18e9db5d268d19e33adfa99230534e5364890733c
SHA2560919ab2a11db2ccd0f87297a989574519df40edf52c720aafc831c28936e4d3b
SHA5123044afbaf51442e1bf02eab961df685f9aef60307adee7813e863aa76b4d2d06eefd02e65c8ff01f14bd350d9dc53ab734dee0b88f17fb988c9b10b7afddac4e
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
666KB
MD57d1d8665dbd93a17d85e5639995795c6
SHA1f433fad7440038cd5901a5ea210ad57ceecf86a7
SHA256d5bb2d3dd9a78cdf50063e0efd3deecf446bb25e0fdcfe6ac2bc3d606377253e
SHA512101a1b3db489b780ed0c79f88fb16ed3d030ee281948cd5b3c344439139e71e41217c78e0ee63b1ae10d84899facd13f1e2693a7decb23ebb57e7f037dd5a41c
-
Filesize
666KB
MD57d1d8665dbd93a17d85e5639995795c6
SHA1f433fad7440038cd5901a5ea210ad57ceecf86a7
SHA256d5bb2d3dd9a78cdf50063e0efd3deecf446bb25e0fdcfe6ac2bc3d606377253e
SHA512101a1b3db489b780ed0c79f88fb16ed3d030ee281948cd5b3c344439139e71e41217c78e0ee63b1ae10d84899facd13f1e2693a7decb23ebb57e7f037dd5a41c
-
Filesize
244KB
MD502f5dcb777fe1b583584f6f69878cc07
SHA126c88ed5dcc5ceebb8201ce9d5db4d58ffa54c1e
SHA256b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d
SHA512030fa12cf48981b48573cfe750958a09172b474a5ba6f4080842483a13ab875982fef46361cebeea65f25cc3616f828d289d30bbb610727698120cbefc22b202
-
Filesize
244KB
MD502f5dcb777fe1b583584f6f69878cc07
SHA126c88ed5dcc5ceebb8201ce9d5db4d58ffa54c1e
SHA256b79a6a8e5cb6aa996e9695384382fd3c1760e510bffc62a5f6b2ce96ff827b1d
SHA512030fa12cf48981b48573cfe750958a09172b474a5ba6f4080842483a13ab875982fef46361cebeea65f25cc3616f828d289d30bbb610727698120cbefc22b202
-
Filesize
391KB
MD5dba6bff6a7085ae63542d17abdaabf2e
SHA11818247e9cd4e96e10f8e16db72477b7be4c7a80
SHA2564c0f66ba5f5b0de63332f0bc941b613127f79ffdee4b87cc91a6ad854e49f073
SHA51229618ee58e62a4f04160ca51f54da36eac9c05550ccba61853272367b33383db76ba4c2f80d1a690e85ff2bb5904e8cdc01583d38917c5b78974bf390d328e95
-
Filesize
391KB
MD5dba6bff6a7085ae63542d17abdaabf2e
SHA11818247e9cd4e96e10f8e16db72477b7be4c7a80
SHA2564c0f66ba5f5b0de63332f0bc941b613127f79ffdee4b87cc91a6ad854e49f073
SHA51229618ee58e62a4f04160ca51f54da36eac9c05550ccba61853272367b33383db76ba4c2f80d1a690e85ff2bb5904e8cdc01583d38917c5b78974bf390d328e95
-
Filesize
16KB
MD52a1e5941a64fc6ce0fb41f625ba2c6b5
SHA1ce160adc947436eeb857d2beb9494d77154f235c
SHA256c6a0859df852bdb780f8a3d66c59ef85ec7bd996cda134a313178ef8d04bc170
SHA51252073e95faae987a4d27162d007597d759779c15d0ce4cfd4a5a1f2d60f2d9d9399230c0ae92b0bd9ff88b9988f07e71cafbc43547adbcd5e69bf7760264aa6f
-
Filesize
16KB
MD52a1e5941a64fc6ce0fb41f625ba2c6b5
SHA1ce160adc947436eeb857d2beb9494d77154f235c
SHA256c6a0859df852bdb780f8a3d66c59ef85ec7bd996cda134a313178ef8d04bc170
SHA51252073e95faae987a4d27162d007597d759779c15d0ce4cfd4a5a1f2d60f2d9d9399230c0ae92b0bd9ff88b9988f07e71cafbc43547adbcd5e69bf7760264aa6f
-
Filesize
16KB
MD52a1e5941a64fc6ce0fb41f625ba2c6b5
SHA1ce160adc947436eeb857d2beb9494d77154f235c
SHA256c6a0859df852bdb780f8a3d66c59ef85ec7bd996cda134a313178ef8d04bc170
SHA51252073e95faae987a4d27162d007597d759779c15d0ce4cfd4a5a1f2d60f2d9d9399230c0ae92b0bd9ff88b9988f07e71cafbc43547adbcd5e69bf7760264aa6f
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
301KB
MD5c20ade32de13d71d0544db09353ae664
SHA12360c19884041d41655172027c5ae07d537e01b4
SHA256680ab026b99110c40b7082b3d30fa3f74ee17d49c1b6b3d97cb72ba4cf3323fc
SHA512c09973e49b5d30ad8f3528913c73394e5144eaa857bdcbc05186a65bea1a5dc6c937e58d7e2ec2fb2aa017af312f678fad5b857c9fa988a7d78a04abfbe512aa
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5