Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 11:32
Static task
static1
General
-
Target
12d328fe06dd7018678f2caf90683299d7cc72a9ba0ccd93c20451cc510176f3.exe
-
Size
1.3MB
-
MD5
aa5dfc409627a848dbc763c21123e5a2
-
SHA1
880234bba43809c7ae6ea294671a31189cbc4cb2
-
SHA256
12d328fe06dd7018678f2caf90683299d7cc72a9ba0ccd93c20451cc510176f3
-
SHA512
780d0546b78bf8c63b407313827af94889877053461affa10a87d26a006a1924fe92d7c8003cefda567e9b675bd5b257538c82547a0d16cc2de2759c59babf88
-
SSDEEP
24576:jyu58W1qE05uw8M4wpFOAeGHVzCn903JCPr0WrIc/H26jOMFUqNY/+keFvnI:2G8gg5R8Bw7e4c90AdrD/HHSMFxY/+JF
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.15/dF30Hn4m/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iVB43Im25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mHi17IN12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mHi17IN12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rbR32Zr59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rbR32Zr59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iVB43Im25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mHi17IN12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mHi17IN12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mHi17IN12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rbR32Zr59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rbR32Zr59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iVB43Im25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iVB43Im25.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection mHi17IN12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rbR32Zr59.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iVB43Im25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iVB43Im25.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4768-186-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-187-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-189-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-191-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-193-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-195-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-197-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-199-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-201-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-203-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-205-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-207-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-209-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-211-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-213-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-215-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-217-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-219-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-221-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-223-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-225-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-227-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-229-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-231-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-233-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-235-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-237-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-239-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-241-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-243-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-245-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-247-0x0000000002600000-0x000000000263E000-memory.dmp family_redline behavioral1/memory/4768-249-0x0000000002600000-0x000000000263E000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation sf40iM20uR94.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 2708 vmmQ58At61.exe 2144 vmwU93Ul45.exe 3784 vmqr48Ea26.exe 3752 vmZk48Gk43.exe 4424 vmWl12pV04.exe 2188 iVB43Im25.exe 4768 kiz12XM15.exe 1688 mHi17IN12.exe 2032 nij41hw91.exe 316 rbR32Zr59.exe 2296 sf40iM20uR94.exe 4700 mnolyk.exe 2972 tv67en29RE15.exe 3428 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4368 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iVB43Im25.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mHi17IN12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mHi17IN12.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rbR32Zr59.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmmQ58At61.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmZk48Gk43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vmZk48Gk43.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmWl12pV04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" vmWl12pV04.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 12d328fe06dd7018678f2caf90683299d7cc72a9ba0ccd93c20451cc510176f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 12d328fe06dd7018678f2caf90683299d7cc72a9ba0ccd93c20451cc510176f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmmQ58At61.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmwU93Ul45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vmwU93Ul45.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmqr48Ea26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" vmqr48Ea26.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4056 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 832 4768 WerFault.exe 94 2340 1688 WerFault.exe 98 4224 2032 WerFault.exe 110 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3612 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2188 iVB43Im25.exe 2188 iVB43Im25.exe 4768 kiz12XM15.exe 4768 kiz12XM15.exe 1688 mHi17IN12.exe 1688 mHi17IN12.exe 2032 nij41hw91.exe 2032 nij41hw91.exe 316 rbR32Zr59.exe 316 rbR32Zr59.exe 2972 tv67en29RE15.exe 2972 tv67en29RE15.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2188 iVB43Im25.exe Token: SeDebugPrivilege 4768 kiz12XM15.exe Token: SeDebugPrivilege 1688 mHi17IN12.exe Token: SeDebugPrivilege 2032 nij41hw91.exe Token: SeDebugPrivilege 316 rbR32Zr59.exe Token: SeDebugPrivilege 2972 tv67en29RE15.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 2708 624 12d328fe06dd7018678f2caf90683299d7cc72a9ba0ccd93c20451cc510176f3.exe 85 PID 624 wrote to memory of 2708 624 12d328fe06dd7018678f2caf90683299d7cc72a9ba0ccd93c20451cc510176f3.exe 85 PID 624 wrote to memory of 2708 624 12d328fe06dd7018678f2caf90683299d7cc72a9ba0ccd93c20451cc510176f3.exe 85 PID 2708 wrote to memory of 2144 2708 vmmQ58At61.exe 86 PID 2708 wrote to memory of 2144 2708 vmmQ58At61.exe 86 PID 2708 wrote to memory of 2144 2708 vmmQ58At61.exe 86 PID 2144 wrote to memory of 3784 2144 vmwU93Ul45.exe 87 PID 2144 wrote to memory of 3784 2144 vmwU93Ul45.exe 87 PID 2144 wrote to memory of 3784 2144 vmwU93Ul45.exe 87 PID 3784 wrote to memory of 3752 3784 vmqr48Ea26.exe 88 PID 3784 wrote to memory of 3752 3784 vmqr48Ea26.exe 88 PID 3784 wrote to memory of 3752 3784 vmqr48Ea26.exe 88 PID 3752 wrote to memory of 4424 3752 vmZk48Gk43.exe 89 PID 3752 wrote to memory of 4424 3752 vmZk48Gk43.exe 89 PID 3752 wrote to memory of 4424 3752 vmZk48Gk43.exe 89 PID 4424 wrote to memory of 2188 4424 vmWl12pV04.exe 90 PID 4424 wrote to memory of 2188 4424 vmWl12pV04.exe 90 PID 4424 wrote to memory of 4768 4424 vmWl12pV04.exe 94 PID 4424 wrote to memory of 4768 4424 vmWl12pV04.exe 94 PID 4424 wrote to memory of 4768 4424 vmWl12pV04.exe 94 PID 3752 wrote to memory of 1688 3752 vmZk48Gk43.exe 98 PID 3752 wrote to memory of 1688 3752 vmZk48Gk43.exe 98 PID 3752 wrote to memory of 1688 3752 vmZk48Gk43.exe 98 PID 3784 wrote to memory of 2032 3784 vmqr48Ea26.exe 110 PID 3784 wrote to memory of 2032 3784 vmqr48Ea26.exe 110 PID 3784 wrote to memory of 2032 3784 vmqr48Ea26.exe 110 PID 2144 wrote to memory of 316 2144 vmwU93Ul45.exe 114 PID 2144 wrote to memory of 316 2144 vmwU93Ul45.exe 114 PID 2708 wrote to memory of 2296 2708 vmmQ58At61.exe 115 PID 2708 wrote to memory of 2296 2708 vmmQ58At61.exe 115 PID 2708 wrote to memory of 2296 2708 vmmQ58At61.exe 115 PID 2296 wrote to memory of 4700 2296 sf40iM20uR94.exe 116 PID 2296 wrote to memory of 4700 2296 sf40iM20uR94.exe 116 PID 2296 wrote to memory of 4700 2296 sf40iM20uR94.exe 116 PID 624 wrote to memory of 2972 624 12d328fe06dd7018678f2caf90683299d7cc72a9ba0ccd93c20451cc510176f3.exe 117 PID 624 wrote to memory of 2972 624 12d328fe06dd7018678f2caf90683299d7cc72a9ba0ccd93c20451cc510176f3.exe 117 PID 624 wrote to memory of 2972 624 12d328fe06dd7018678f2caf90683299d7cc72a9ba0ccd93c20451cc510176f3.exe 117 PID 4700 wrote to memory of 3612 4700 mnolyk.exe 118 PID 4700 wrote to memory of 3612 4700 mnolyk.exe 118 PID 4700 wrote to memory of 3612 4700 mnolyk.exe 118 PID 4700 wrote to memory of 3676 4700 mnolyk.exe 120 PID 4700 wrote to memory of 3676 4700 mnolyk.exe 120 PID 4700 wrote to memory of 3676 4700 mnolyk.exe 120 PID 3676 wrote to memory of 4892 3676 cmd.exe 122 PID 3676 wrote to memory of 4892 3676 cmd.exe 122 PID 3676 wrote to memory of 4892 3676 cmd.exe 122 PID 3676 wrote to memory of 3520 3676 cmd.exe 123 PID 3676 wrote to memory of 3520 3676 cmd.exe 123 PID 3676 wrote to memory of 3520 3676 cmd.exe 123 PID 3676 wrote to memory of 3952 3676 cmd.exe 124 PID 3676 wrote to memory of 3952 3676 cmd.exe 124 PID 3676 wrote to memory of 3952 3676 cmd.exe 124 PID 3676 wrote to memory of 2084 3676 cmd.exe 125 PID 3676 wrote to memory of 2084 3676 cmd.exe 125 PID 3676 wrote to memory of 2084 3676 cmd.exe 125 PID 3676 wrote to memory of 3328 3676 cmd.exe 126 PID 3676 wrote to memory of 3328 3676 cmd.exe 126 PID 3676 wrote to memory of 3328 3676 cmd.exe 126 PID 3676 wrote to memory of 2328 3676 cmd.exe 127 PID 3676 wrote to memory of 2328 3676 cmd.exe 127 PID 3676 wrote to memory of 2328 3676 cmd.exe 127 PID 4700 wrote to memory of 4368 4700 mnolyk.exe 130 PID 4700 wrote to memory of 4368 4700 mnolyk.exe 130 PID 4700 wrote to memory of 4368 4700 mnolyk.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\12d328fe06dd7018678f2caf90683299d7cc72a9ba0ccd93c20451cc510176f3.exe"C:\Users\Admin\AppData\Local\Temp\12d328fe06dd7018678f2caf90683299d7cc72a9ba0ccd93c20451cc510176f3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmmQ58At61.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmmQ58At61.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmwU93Ul45.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmwU93Ul45.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmqr48Ea26.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmqr48Ea26.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmZk48Gk43.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmZk48Gk43.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmWl12pV04.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmWl12pV04.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iVB43Im25.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iVB43Im25.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kiz12XM15.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kiz12XM15.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 13408⤵
- Program crash
PID:832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\mHi17IN12.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\mHi17IN12.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 10807⤵
- Program crash
PID:2340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nij41hw91.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nij41hw91.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 16526⤵
- Program crash
PID:4224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rbR32Zr59.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rbR32Zr59.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf40iM20uR94.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf40iM20uR94.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:3612
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4f9dd6f8a7" /P "Admin:N"&&CACLS "..\4f9dd6f8a7" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:3520
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:3952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:N"6⤵PID:3328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:R" /E6⤵PID:2328
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4368
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv67en29RE15.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv67en29RE15.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4768 -ip 47681⤵PID:2184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1688 -ip 16881⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2032 -ip 20321⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe1⤵
- Executes dropped EXE
PID:3428
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5ea174d56ad7502297b39d31a346f2d3d
SHA198b0581d980ada98910dc1801b9b7f3f7877e178
SHA2561a75ab40f9f181b64e681f6f351791a2a879c14db1fc90e63fe92ec102517260
SHA512718c6855ea3d7a0c142ed0a7345e8817837edf1f84257a9e86527a0a145bb946e5c2265b4bc9fb5471844e0c88a32afb539f8bf151a4bccb9056ad4d0499ffe1
-
Filesize
240KB
MD5ea174d56ad7502297b39d31a346f2d3d
SHA198b0581d980ada98910dc1801b9b7f3f7877e178
SHA2561a75ab40f9f181b64e681f6f351791a2a879c14db1fc90e63fe92ec102517260
SHA512718c6855ea3d7a0c142ed0a7345e8817837edf1f84257a9e86527a0a145bb946e5c2265b4bc9fb5471844e0c88a32afb539f8bf151a4bccb9056ad4d0499ffe1
-
Filesize
240KB
MD5ea174d56ad7502297b39d31a346f2d3d
SHA198b0581d980ada98910dc1801b9b7f3f7877e178
SHA2561a75ab40f9f181b64e681f6f351791a2a879c14db1fc90e63fe92ec102517260
SHA512718c6855ea3d7a0c142ed0a7345e8817837edf1f84257a9e86527a0a145bb946e5c2265b4bc9fb5471844e0c88a32afb539f8bf151a4bccb9056ad4d0499ffe1
-
Filesize
240KB
MD5ea174d56ad7502297b39d31a346f2d3d
SHA198b0581d980ada98910dc1801b9b7f3f7877e178
SHA2561a75ab40f9f181b64e681f6f351791a2a879c14db1fc90e63fe92ec102517260
SHA512718c6855ea3d7a0c142ed0a7345e8817837edf1f84257a9e86527a0a145bb946e5c2265b4bc9fb5471844e0c88a32afb539f8bf151a4bccb9056ad4d0499ffe1
-
Filesize
177KB
MD5fce2d0b51f69710cacb264746a532a2d
SHA13c14dbe86a1e3ff39f1da18fd7db019ae8ad7acb
SHA25655e577025761efc88c19befc5871bb16d3a226886d3d3523e288331d8b271ae5
SHA5128a67d72f0418d96232e03932adc6a8e6fe0a983c119b291e24ef578511b55b5a122f9a82a1b58fcede83dbb06b0cb6e38e99116c9a12f12604c25bd1849fb0a0
-
Filesize
177KB
MD5fce2d0b51f69710cacb264746a532a2d
SHA13c14dbe86a1e3ff39f1da18fd7db019ae8ad7acb
SHA25655e577025761efc88c19befc5871bb16d3a226886d3d3523e288331d8b271ae5
SHA5128a67d72f0418d96232e03932adc6a8e6fe0a983c119b291e24ef578511b55b5a122f9a82a1b58fcede83dbb06b0cb6e38e99116c9a12f12604c25bd1849fb0a0
-
Filesize
1.2MB
MD5a1dab5e3cbd7d8fd40516a1156ea4edb
SHA14db8b3b46ed96603f2132ee157839a5267d2f66a
SHA2562b45a9c457672dae15e5fc00c27a26961f6c397609df6c1664c2129510805003
SHA512676944d06d676317d4ed96df64dda7c053c7e3cb6f053e09bf034dd70824453a8ca8fc2efe85c3c800959805f0fe9d41e3fa436ce2455f700b11bebbff49b6b5
-
Filesize
1.2MB
MD5a1dab5e3cbd7d8fd40516a1156ea4edb
SHA14db8b3b46ed96603f2132ee157839a5267d2f66a
SHA2562b45a9c457672dae15e5fc00c27a26961f6c397609df6c1664c2129510805003
SHA512676944d06d676317d4ed96df64dda7c053c7e3cb6f053e09bf034dd70824453a8ca8fc2efe85c3c800959805f0fe9d41e3fa436ce2455f700b11bebbff49b6b5
-
Filesize
240KB
MD5ea174d56ad7502297b39d31a346f2d3d
SHA198b0581d980ada98910dc1801b9b7f3f7877e178
SHA2561a75ab40f9f181b64e681f6f351791a2a879c14db1fc90e63fe92ec102517260
SHA512718c6855ea3d7a0c142ed0a7345e8817837edf1f84257a9e86527a0a145bb946e5c2265b4bc9fb5471844e0c88a32afb539f8bf151a4bccb9056ad4d0499ffe1
-
Filesize
240KB
MD5ea174d56ad7502297b39d31a346f2d3d
SHA198b0581d980ada98910dc1801b9b7f3f7877e178
SHA2561a75ab40f9f181b64e681f6f351791a2a879c14db1fc90e63fe92ec102517260
SHA512718c6855ea3d7a0c142ed0a7345e8817837edf1f84257a9e86527a0a145bb946e5c2265b4bc9fb5471844e0c88a32afb539f8bf151a4bccb9056ad4d0499ffe1
-
Filesize
1.0MB
MD5020758b9161c37efe467d8db1bc62d08
SHA19c8cde63de560ee62965aa838ff7a1b76843530f
SHA256a0a52442494e7f9840742e9e785c88ad9464ed9cc8f6b300e564a90a97038055
SHA5126d703926487ded62e08de31372b803fb19f4c41264ac53bc40f8910744d3dfecb525f98b4e457a6ce5765b6aa5aed1f98c1135e4483196689e20984b9d6f2591
-
Filesize
1.0MB
MD5020758b9161c37efe467d8db1bc62d08
SHA19c8cde63de560ee62965aa838ff7a1b76843530f
SHA256a0a52442494e7f9840742e9e785c88ad9464ed9cc8f6b300e564a90a97038055
SHA5126d703926487ded62e08de31372b803fb19f4c41264ac53bc40f8910744d3dfecb525f98b4e457a6ce5765b6aa5aed1f98c1135e4483196689e20984b9d6f2591
-
Filesize
16KB
MD529cd3d2efbce7bb00a38e1995bbab990
SHA1aa16f0d74c26156baa5b82dc6b06cdccc5a2709f
SHA256065bb2501ed1231b7f11492f6154d262f986b1035eb6b71d67098846e5e0dfd7
SHA512bf0154c3a5512f650c757f687d080eb60b72e8bba90cdaed8fc35b3406920934e9bbd5ab6d12befc7c5a230948ce6484fe12e2bdbfbe5bffd2c9566603bfac29
-
Filesize
16KB
MD529cd3d2efbce7bb00a38e1995bbab990
SHA1aa16f0d74c26156baa5b82dc6b06cdccc5a2709f
SHA256065bb2501ed1231b7f11492f6154d262f986b1035eb6b71d67098846e5e0dfd7
SHA512bf0154c3a5512f650c757f687d080eb60b72e8bba90cdaed8fc35b3406920934e9bbd5ab6d12befc7c5a230948ce6484fe12e2bdbfbe5bffd2c9566603bfac29
-
Filesize
937KB
MD55ed94a2d117eb9e5bebacdcf0348829b
SHA10b2fef7c8ae1acecb8834fbdd1c1c569eea74ae6
SHA256a5d8a3da0b9e03a3507869d2e401b78f1e6da1d0739de5e69bd8503041978935
SHA512f4f932096af3386d026c7422f9538db33262f9a299a9e4481c77b652f547d6ab7d9128abaa1e356e22417b524001d312c2d1fdf00d808fadf9f599395004344a
-
Filesize
937KB
MD55ed94a2d117eb9e5bebacdcf0348829b
SHA10b2fef7c8ae1acecb8834fbdd1c1c569eea74ae6
SHA256a5d8a3da0b9e03a3507869d2e401b78f1e6da1d0739de5e69bd8503041978935
SHA512f4f932096af3386d026c7422f9538db33262f9a299a9e4481c77b652f547d6ab7d9128abaa1e356e22417b524001d312c2d1fdf00d808fadf9f599395004344a
-
Filesize
302KB
MD547edc698fb60063cef4e63ee2d5d05bc
SHA18f7bc644d7a378df490ab77d7b3b9b2a25a870fa
SHA2562561279e13e55b30c371c6d72c72bf9124697eec6395f1c1dfbbdd8ac3f5557f
SHA512b6c7b5288217bd01efe5ee9ec396dc7471240749a9f8998ddec34f7a2a073bfaa062e4a72986d0dcb73e283dc60e0cfcd0885a2e68014598e86277dd80082715
-
Filesize
302KB
MD547edc698fb60063cef4e63ee2d5d05bc
SHA18f7bc644d7a378df490ab77d7b3b9b2a25a870fa
SHA2562561279e13e55b30c371c6d72c72bf9124697eec6395f1c1dfbbdd8ac3f5557f
SHA512b6c7b5288217bd01efe5ee9ec396dc7471240749a9f8998ddec34f7a2a073bfaa062e4a72986d0dcb73e283dc60e0cfcd0885a2e68014598e86277dd80082715
-
Filesize
667KB
MD5ae55b6d40ca1a725316efd7a30e34ff6
SHA1e6ce9845bdd0204aafb076239854cd8698a34035
SHA2568c0dcb5803a4c4477c0b660035f30eebb1c3cfe677f5760f2b6baf15598b606f
SHA51243b6bc1c8056cb1112bd122a7aa3e279b5bc5bb76c146e8753f8ed98022bbc18f0a4cce8b97420647f5a6b1e5867cba0d9897ab5cd33fd4aa50525f291c1a4b0
-
Filesize
667KB
MD5ae55b6d40ca1a725316efd7a30e34ff6
SHA1e6ce9845bdd0204aafb076239854cd8698a34035
SHA2568c0dcb5803a4c4477c0b660035f30eebb1c3cfe677f5760f2b6baf15598b606f
SHA51243b6bc1c8056cb1112bd122a7aa3e279b5bc5bb76c146e8753f8ed98022bbc18f0a4cce8b97420647f5a6b1e5867cba0d9897ab5cd33fd4aa50525f291c1a4b0
-
Filesize
245KB
MD5e6caaa2efb0cfb1c78d33f599f7111cd
SHA1399376044c0858e71b427ec0a6f3daadebec64ae
SHA2569d48837b57309f1cb4975cce80ae1b48ca9cd2eef242ba1638ca806287e79375
SHA51241ada8db6c43e7e2a093a9530ed5047c0b764e1f7ef9a7a70306b2295902afb7cfaaaff1d6e750ce966de3682f80ce95d435eb06b98a72050f499d3541f8d61c
-
Filesize
245KB
MD5e6caaa2efb0cfb1c78d33f599f7111cd
SHA1399376044c0858e71b427ec0a6f3daadebec64ae
SHA2569d48837b57309f1cb4975cce80ae1b48ca9cd2eef242ba1638ca806287e79375
SHA51241ada8db6c43e7e2a093a9530ed5047c0b764e1f7ef9a7a70306b2295902afb7cfaaaff1d6e750ce966de3682f80ce95d435eb06b98a72050f499d3541f8d61c
-
Filesize
392KB
MD51555dfcecd071941f9420d0266f439c7
SHA1db6d98d42b212823deb048223061fd8e15c5dc6e
SHA256c32f86d68f8dd7ee587c0557ad36c5bc235a315b797f27b4950182a8b19f6d15
SHA5121186d507234941bcd12fdc2d469ac499103adee26139106bc87bdcc63417e08396dafec758cef029612f736cd9f280ec34080190a3416920fbef96574731bf3c
-
Filesize
392KB
MD51555dfcecd071941f9420d0266f439c7
SHA1db6d98d42b212823deb048223061fd8e15c5dc6e
SHA256c32f86d68f8dd7ee587c0557ad36c5bc235a315b797f27b4950182a8b19f6d15
SHA5121186d507234941bcd12fdc2d469ac499103adee26139106bc87bdcc63417e08396dafec758cef029612f736cd9f280ec34080190a3416920fbef96574731bf3c
-
Filesize
16KB
MD51a3a6a4a5b32fabc6f0be1ec2d66ee60
SHA1f16c822305e4c4ec89ae9edb6fef8f53134ed4db
SHA256412bddc0963e453c79ed85f2bd360454b4e68079833f4ee4537220bc3f6e5d7c
SHA512d757c36f40ba5af0f1ad73f6238fa366c470996f9fa03bd5832b3a132173911773978dd727fbb48a7614faf6b7fe9b8dc146c159c99b0d8a934a7256e7cf5e07
-
Filesize
16KB
MD51a3a6a4a5b32fabc6f0be1ec2d66ee60
SHA1f16c822305e4c4ec89ae9edb6fef8f53134ed4db
SHA256412bddc0963e453c79ed85f2bd360454b4e68079833f4ee4537220bc3f6e5d7c
SHA512d757c36f40ba5af0f1ad73f6238fa366c470996f9fa03bd5832b3a132173911773978dd727fbb48a7614faf6b7fe9b8dc146c159c99b0d8a934a7256e7cf5e07
-
Filesize
16KB
MD51a3a6a4a5b32fabc6f0be1ec2d66ee60
SHA1f16c822305e4c4ec89ae9edb6fef8f53134ed4db
SHA256412bddc0963e453c79ed85f2bd360454b4e68079833f4ee4537220bc3f6e5d7c
SHA512d757c36f40ba5af0f1ad73f6238fa366c470996f9fa03bd5832b3a132173911773978dd727fbb48a7614faf6b7fe9b8dc146c159c99b0d8a934a7256e7cf5e07
-
Filesize
302KB
MD547edc698fb60063cef4e63ee2d5d05bc
SHA18f7bc644d7a378df490ab77d7b3b9b2a25a870fa
SHA2562561279e13e55b30c371c6d72c72bf9124697eec6395f1c1dfbbdd8ac3f5557f
SHA512b6c7b5288217bd01efe5ee9ec396dc7471240749a9f8998ddec34f7a2a073bfaa062e4a72986d0dcb73e283dc60e0cfcd0885a2e68014598e86277dd80082715
-
Filesize
302KB
MD547edc698fb60063cef4e63ee2d5d05bc
SHA18f7bc644d7a378df490ab77d7b3b9b2a25a870fa
SHA2562561279e13e55b30c371c6d72c72bf9124697eec6395f1c1dfbbdd8ac3f5557f
SHA512b6c7b5288217bd01efe5ee9ec396dc7471240749a9f8998ddec34f7a2a073bfaa062e4a72986d0dcb73e283dc60e0cfcd0885a2e68014598e86277dd80082715
-
Filesize
302KB
MD547edc698fb60063cef4e63ee2d5d05bc
SHA18f7bc644d7a378df490ab77d7b3b9b2a25a870fa
SHA2562561279e13e55b30c371c6d72c72bf9124697eec6395f1c1dfbbdd8ac3f5557f
SHA512b6c7b5288217bd01efe5ee9ec396dc7471240749a9f8998ddec34f7a2a073bfaa062e4a72986d0dcb73e283dc60e0cfcd0885a2e68014598e86277dd80082715
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5