Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 13:06
Static task
static1
General
-
Target
16e944b549f36365cd604c8834144e3912e11ce127057da32f367d2a3e9761ea.exe
-
Size
1.3MB
-
MD5
84e760cab4b00bfb1812b256eda63b8c
-
SHA1
94d65f65be9338b88efad3497d374230d7562d98
-
SHA256
16e944b549f36365cd604c8834144e3912e11ce127057da32f367d2a3e9761ea
-
SHA512
75d787eefc6cbcdded7ce44439eaba7e9cea6fc40874c2a998baa39aec30ad3d4803363644f71c67faf557abf365a5aa9e25b2a9a81c44a29453a9c356c64196
-
SSDEEP
24576:vyuS+ImLn4JtFWaxY4V81SlNFhcnPdq1f1N1sR20kdgoQ9cZpax:63+VWu4VzTF2A1fRsR20Cica
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.15/dF30Hn4m/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" maV93KU27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" maV93KU27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rOc68fo79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iVW45TN09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iVW45TN09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iVW45TN09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iVW45TN09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" maV93KU27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rOc68fo79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rOc68fo79.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iVW45TN09.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" maV93KU27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" maV93KU27.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection maV93KU27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rOc68fo79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rOc68fo79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iVW45TN09.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/4464-186-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-185-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-188-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-190-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-192-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-194-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-196-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-198-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-200-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-202-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-204-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-206-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-208-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-210-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-212-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-214-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-216-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-218-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-220-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-222-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-224-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-226-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-228-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-230-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-232-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-234-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-236-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-238-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-240-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-242-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-244-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-246-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4464-248-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/1872-1174-0x00000000029C0000-0x00000000029D0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation sf75Xd61vz81.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 1044 vmgL10QR11.exe 2132 vmlE38dJ12.exe 988 vmNC96Fq31.exe 4256 vmKR36hE14.exe 5112 vmuP78of87.exe 3940 iVW45TN09.exe 4464 kvw20Pm09.exe 4104 maV93KU27.exe 1872 nNH83ES73.exe 1504 rOc68fo79.exe 4372 sf75Xd61vz81.exe 4180 mnolyk.exe 4112 tv39ix20ps53.exe 1216 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 3288 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iVW45TN09.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features maV93KU27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" maV93KU27.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rOc68fo79.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 16e944b549f36365cd604c8834144e3912e11ce127057da32f367d2a3e9761ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16e944b549f36365cd604c8834144e3912e11ce127057da32f367d2a3e9761ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vmlE38dJ12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" vmNC96Fq31.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmKR36hE14.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" vmuP78of87.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmgL10QR11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmgL10QR11.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmlE38dJ12.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmNC96Fq31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vmKR36hE14.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmuP78of87.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4800 4464 WerFault.exe 94 4252 4104 WerFault.exe 98 724 1872 WerFault.exe 102 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1928 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3940 iVW45TN09.exe 3940 iVW45TN09.exe 4464 kvw20Pm09.exe 4464 kvw20Pm09.exe 4104 maV93KU27.exe 4104 maV93KU27.exe 1872 nNH83ES73.exe 1872 nNH83ES73.exe 1504 rOc68fo79.exe 1504 rOc68fo79.exe 4112 tv39ix20ps53.exe 4112 tv39ix20ps53.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3940 iVW45TN09.exe Token: SeDebugPrivilege 4464 kvw20Pm09.exe Token: SeDebugPrivilege 4104 maV93KU27.exe Token: SeDebugPrivilege 1872 nNH83ES73.exe Token: SeDebugPrivilege 1504 rOc68fo79.exe Token: SeDebugPrivilege 4112 tv39ix20ps53.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 1044 2724 16e944b549f36365cd604c8834144e3912e11ce127057da32f367d2a3e9761ea.exe 86 PID 2724 wrote to memory of 1044 2724 16e944b549f36365cd604c8834144e3912e11ce127057da32f367d2a3e9761ea.exe 86 PID 2724 wrote to memory of 1044 2724 16e944b549f36365cd604c8834144e3912e11ce127057da32f367d2a3e9761ea.exe 86 PID 1044 wrote to memory of 2132 1044 vmgL10QR11.exe 87 PID 1044 wrote to memory of 2132 1044 vmgL10QR11.exe 87 PID 1044 wrote to memory of 2132 1044 vmgL10QR11.exe 87 PID 2132 wrote to memory of 988 2132 vmlE38dJ12.exe 88 PID 2132 wrote to memory of 988 2132 vmlE38dJ12.exe 88 PID 2132 wrote to memory of 988 2132 vmlE38dJ12.exe 88 PID 988 wrote to memory of 4256 988 vmNC96Fq31.exe 89 PID 988 wrote to memory of 4256 988 vmNC96Fq31.exe 89 PID 988 wrote to memory of 4256 988 vmNC96Fq31.exe 89 PID 4256 wrote to memory of 5112 4256 vmKR36hE14.exe 90 PID 4256 wrote to memory of 5112 4256 vmKR36hE14.exe 90 PID 4256 wrote to memory of 5112 4256 vmKR36hE14.exe 90 PID 5112 wrote to memory of 3940 5112 vmuP78of87.exe 91 PID 5112 wrote to memory of 3940 5112 vmuP78of87.exe 91 PID 5112 wrote to memory of 4464 5112 vmuP78of87.exe 94 PID 5112 wrote to memory of 4464 5112 vmuP78of87.exe 94 PID 5112 wrote to memory of 4464 5112 vmuP78of87.exe 94 PID 4256 wrote to memory of 4104 4256 vmKR36hE14.exe 98 PID 4256 wrote to memory of 4104 4256 vmKR36hE14.exe 98 PID 4256 wrote to memory of 4104 4256 vmKR36hE14.exe 98 PID 988 wrote to memory of 1872 988 vmNC96Fq31.exe 102 PID 988 wrote to memory of 1872 988 vmNC96Fq31.exe 102 PID 988 wrote to memory of 1872 988 vmNC96Fq31.exe 102 PID 2132 wrote to memory of 1504 2132 vmlE38dJ12.exe 105 PID 2132 wrote to memory of 1504 2132 vmlE38dJ12.exe 105 PID 1044 wrote to memory of 4372 1044 vmgL10QR11.exe 106 PID 1044 wrote to memory of 4372 1044 vmgL10QR11.exe 106 PID 1044 wrote to memory of 4372 1044 vmgL10QR11.exe 106 PID 4372 wrote to memory of 4180 4372 sf75Xd61vz81.exe 107 PID 4372 wrote to memory of 4180 4372 sf75Xd61vz81.exe 107 PID 4372 wrote to memory of 4180 4372 sf75Xd61vz81.exe 107 PID 2724 wrote to memory of 4112 2724 16e944b549f36365cd604c8834144e3912e11ce127057da32f367d2a3e9761ea.exe 108 PID 2724 wrote to memory of 4112 2724 16e944b549f36365cd604c8834144e3912e11ce127057da32f367d2a3e9761ea.exe 108 PID 2724 wrote to memory of 4112 2724 16e944b549f36365cd604c8834144e3912e11ce127057da32f367d2a3e9761ea.exe 108 PID 4180 wrote to memory of 1928 4180 mnolyk.exe 109 PID 4180 wrote to memory of 1928 4180 mnolyk.exe 109 PID 4180 wrote to memory of 1928 4180 mnolyk.exe 109 PID 4180 wrote to memory of 448 4180 mnolyk.exe 111 PID 4180 wrote to memory of 448 4180 mnolyk.exe 111 PID 4180 wrote to memory of 448 4180 mnolyk.exe 111 PID 448 wrote to memory of 2916 448 cmd.exe 113 PID 448 wrote to memory of 2916 448 cmd.exe 113 PID 448 wrote to memory of 2916 448 cmd.exe 113 PID 448 wrote to memory of 2772 448 cmd.exe 114 PID 448 wrote to memory of 2772 448 cmd.exe 114 PID 448 wrote to memory of 2772 448 cmd.exe 114 PID 448 wrote to memory of 4140 448 cmd.exe 115 PID 448 wrote to memory of 4140 448 cmd.exe 115 PID 448 wrote to memory of 4140 448 cmd.exe 115 PID 448 wrote to memory of 3084 448 cmd.exe 116 PID 448 wrote to memory of 3084 448 cmd.exe 116 PID 448 wrote to memory of 3084 448 cmd.exe 116 PID 448 wrote to memory of 2456 448 cmd.exe 117 PID 448 wrote to memory of 2456 448 cmd.exe 117 PID 448 wrote to memory of 2456 448 cmd.exe 117 PID 448 wrote to memory of 2272 448 cmd.exe 118 PID 448 wrote to memory of 2272 448 cmd.exe 118 PID 448 wrote to memory of 2272 448 cmd.exe 118 PID 4180 wrote to memory of 3288 4180 mnolyk.exe 125 PID 4180 wrote to memory of 3288 4180 mnolyk.exe 125 PID 4180 wrote to memory of 3288 4180 mnolyk.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\16e944b549f36365cd604c8834144e3912e11ce127057da32f367d2a3e9761ea.exe"C:\Users\Admin\AppData\Local\Temp\16e944b549f36365cd604c8834144e3912e11ce127057da32f367d2a3e9761ea.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmgL10QR11.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmgL10QR11.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmlE38dJ12.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmlE38dJ12.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmNC96Fq31.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmNC96Fq31.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmKR36hE14.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmKR36hE14.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmuP78of87.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmuP78of87.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iVW45TN09.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iVW45TN09.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kvw20Pm09.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kvw20Pm09.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 13528⤵
- Program crash
PID:4800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\maV93KU27.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\maV93KU27.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 10847⤵
- Program crash
PID:4252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nNH83ES73.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nNH83ES73.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 13286⤵
- Program crash
PID:724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rOc68fo79.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rOc68fo79.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf75Xd61vz81.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf75Xd61vz81.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:1928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4f9dd6f8a7" /P "Admin:N"&&CACLS "..\4f9dd6f8a7" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2916
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:2772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:4140
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:N"6⤵PID:2456
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:R" /E6⤵PID:2272
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3288
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv39ix20ps53.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv39ix20ps53.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4464 -ip 44641⤵PID:1160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4104 -ip 41041⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1872 -ip 18721⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe1⤵
- Executes dropped EXE
PID:1216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD50a3cbdff36f5bcbc34f5afbe24efe461
SHA11cec2f61dfe420e82cfd5bc87e36122327a291fe
SHA25699a8844da62e32709a3484a23294130d72d364786b8f3c1450b74ac8344dba4f
SHA512ba32ea3a90fcd9102d7892bb33b54d69e85ab4197e641f50a4ee6b83778fbf26ab2c18d08d06a59f315ff0fc4e9006002e5714fdc2c874425864aafc02b06021
-
Filesize
240KB
MD50a3cbdff36f5bcbc34f5afbe24efe461
SHA11cec2f61dfe420e82cfd5bc87e36122327a291fe
SHA25699a8844da62e32709a3484a23294130d72d364786b8f3c1450b74ac8344dba4f
SHA512ba32ea3a90fcd9102d7892bb33b54d69e85ab4197e641f50a4ee6b83778fbf26ab2c18d08d06a59f315ff0fc4e9006002e5714fdc2c874425864aafc02b06021
-
Filesize
240KB
MD50a3cbdff36f5bcbc34f5afbe24efe461
SHA11cec2f61dfe420e82cfd5bc87e36122327a291fe
SHA25699a8844da62e32709a3484a23294130d72d364786b8f3c1450b74ac8344dba4f
SHA512ba32ea3a90fcd9102d7892bb33b54d69e85ab4197e641f50a4ee6b83778fbf26ab2c18d08d06a59f315ff0fc4e9006002e5714fdc2c874425864aafc02b06021
-
Filesize
240KB
MD50a3cbdff36f5bcbc34f5afbe24efe461
SHA11cec2f61dfe420e82cfd5bc87e36122327a291fe
SHA25699a8844da62e32709a3484a23294130d72d364786b8f3c1450b74ac8344dba4f
SHA512ba32ea3a90fcd9102d7892bb33b54d69e85ab4197e641f50a4ee6b83778fbf26ab2c18d08d06a59f315ff0fc4e9006002e5714fdc2c874425864aafc02b06021
-
Filesize
177KB
MD5a84e06b7a9f54845b4923f0d04c5b40e
SHA1a27e58f622acd274a2ea17fa4c6a96edba7fec2c
SHA256dfe1db85118d3b4237a3a3ef25b9a43c0cc351e30ed032ef2dbe014f6dfb8eb9
SHA512053cfc68d795c59c0cc6a7a7351d88e623f6f1fc391944be5a30a32b73e37c894b64e97f3624911f5a48104a292981e1df7ee8f5a32f0b80b9ee2707a2bd5d72
-
Filesize
177KB
MD5a84e06b7a9f54845b4923f0d04c5b40e
SHA1a27e58f622acd274a2ea17fa4c6a96edba7fec2c
SHA256dfe1db85118d3b4237a3a3ef25b9a43c0cc351e30ed032ef2dbe014f6dfb8eb9
SHA512053cfc68d795c59c0cc6a7a7351d88e623f6f1fc391944be5a30a32b73e37c894b64e97f3624911f5a48104a292981e1df7ee8f5a32f0b80b9ee2707a2bd5d72
-
Filesize
1.2MB
MD5f538e96a0108f6aa3a780c6d93bf2dc1
SHA13319779fb479c62f48d2b216cd19d7a9c7ea0392
SHA256a5a847c05cf345c8c62444ac18b231d6fc3bfea4ed1a76f430ef06390d04c7e9
SHA51235e28bbd506dbc7c09e078a900b2a9f58ca40198ff0741821818663fa9db0dea843d8787c49c983db73029f61562f0f3a612840995f4ca5e4c83ffc104bf9f5c
-
Filesize
1.2MB
MD5f538e96a0108f6aa3a780c6d93bf2dc1
SHA13319779fb479c62f48d2b216cd19d7a9c7ea0392
SHA256a5a847c05cf345c8c62444ac18b231d6fc3bfea4ed1a76f430ef06390d04c7e9
SHA51235e28bbd506dbc7c09e078a900b2a9f58ca40198ff0741821818663fa9db0dea843d8787c49c983db73029f61562f0f3a612840995f4ca5e4c83ffc104bf9f5c
-
Filesize
240KB
MD50a3cbdff36f5bcbc34f5afbe24efe461
SHA11cec2f61dfe420e82cfd5bc87e36122327a291fe
SHA25699a8844da62e32709a3484a23294130d72d364786b8f3c1450b74ac8344dba4f
SHA512ba32ea3a90fcd9102d7892bb33b54d69e85ab4197e641f50a4ee6b83778fbf26ab2c18d08d06a59f315ff0fc4e9006002e5714fdc2c874425864aafc02b06021
-
Filesize
240KB
MD50a3cbdff36f5bcbc34f5afbe24efe461
SHA11cec2f61dfe420e82cfd5bc87e36122327a291fe
SHA25699a8844da62e32709a3484a23294130d72d364786b8f3c1450b74ac8344dba4f
SHA512ba32ea3a90fcd9102d7892bb33b54d69e85ab4197e641f50a4ee6b83778fbf26ab2c18d08d06a59f315ff0fc4e9006002e5714fdc2c874425864aafc02b06021
-
Filesize
989KB
MD5946649b8491ee421032b224842206fd8
SHA11003946f91a4a10c1c53d7b068f57b3c8a18aa68
SHA2569da32246b39ed6c10cbe6ca16ddcb4f73dd20fbae22c926758cd06c9682bc13f
SHA512899157bb9f3eb6d0f0f259396be44f37af4bec2ca2b2956933fbe6407cd5cbe33f66f90d557c79680dfe78475990af79410e13f5e18b4f2954981a955f616638
-
Filesize
989KB
MD5946649b8491ee421032b224842206fd8
SHA11003946f91a4a10c1c53d7b068f57b3c8a18aa68
SHA2569da32246b39ed6c10cbe6ca16ddcb4f73dd20fbae22c926758cd06c9682bc13f
SHA512899157bb9f3eb6d0f0f259396be44f37af4bec2ca2b2956933fbe6407cd5cbe33f66f90d557c79680dfe78475990af79410e13f5e18b4f2954981a955f616638
-
Filesize
17KB
MD5ec9e2cecd8a3444858903ba586e00a6f
SHA145d925565f47ba55de3b354793c5ecaa58f12dd6
SHA2565d91c034bed5f709c82eba6ff6b8bc0643b903700e3a02f6c60d73114571d545
SHA51275f96108b458967675b8a97bca674b240db7125846a28848079774dcc51bf98fbdf88dd03a159c19c43f2857afc3ccc01524a983945060bbd9d276eeaf159cba
-
Filesize
17KB
MD5ec9e2cecd8a3444858903ba586e00a6f
SHA145d925565f47ba55de3b354793c5ecaa58f12dd6
SHA2565d91c034bed5f709c82eba6ff6b8bc0643b903700e3a02f6c60d73114571d545
SHA51275f96108b458967675b8a97bca674b240db7125846a28848079774dcc51bf98fbdf88dd03a159c19c43f2857afc3ccc01524a983945060bbd9d276eeaf159cba
-
Filesize
893KB
MD522b849809ea9b187ded5d81d51546657
SHA13bcf53ce0b0662efeabde9c082542c7130b316d9
SHA256be86b33cc851f682d749b75993b84beab5d07987e4256ed0005ec2db59fb4cf0
SHA51289aea29a91eda89463c358399531d76e264a798f4102aa1b2f721b95e88e9731eb5b2c5c0ba063bda3fcee391dea42e0af06a5585e5a47da7411b1e877eb2478
-
Filesize
893KB
MD522b849809ea9b187ded5d81d51546657
SHA13bcf53ce0b0662efeabde9c082542c7130b316d9
SHA256be86b33cc851f682d749b75993b84beab5d07987e4256ed0005ec2db59fb4cf0
SHA51289aea29a91eda89463c358399531d76e264a798f4102aa1b2f721b95e88e9731eb5b2c5c0ba063bda3fcee391dea42e0af06a5585e5a47da7411b1e877eb2478
-
Filesize
303KB
MD512a07204bf4c65efdd968689ed260c4e
SHA18430e5110448dc962c4191a1a06b05c4e3c1a140
SHA256e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b
SHA51261dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a
-
Filesize
303KB
MD512a07204bf4c65efdd968689ed260c4e
SHA18430e5110448dc962c4191a1a06b05c4e3c1a140
SHA256e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b
SHA51261dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a
-
Filesize
667KB
MD5c1fc270bf6a1d2687aed45fc10cdf228
SHA18cb3ea2d421d40d19eb87ad180f256f0d24a3476
SHA256d451a271c1926946648cc0ab559ceda9e1f14cd5b3638172dc7bea8b50560df7
SHA5126b727aaf04cbf285042292dec84193b69b670ef64978d8703861c0bb2ed2471fe9d46944805782595ebaf5220eb0e9adcd7c3db5c386ea6d6e30fca4b58e0d85
-
Filesize
667KB
MD5c1fc270bf6a1d2687aed45fc10cdf228
SHA18cb3ea2d421d40d19eb87ad180f256f0d24a3476
SHA256d451a271c1926946648cc0ab559ceda9e1f14cd5b3638172dc7bea8b50560df7
SHA5126b727aaf04cbf285042292dec84193b69b670ef64978d8703861c0bb2ed2471fe9d46944805782595ebaf5220eb0e9adcd7c3db5c386ea6d6e30fca4b58e0d85
-
Filesize
245KB
MD5e4b22871ffcbe7c0b619a865c36d9342
SHA18c312d9c94858b3f905802e8e34d6e8579af737a
SHA256b3e8562d6d74517cb4379b503b1668d92e95b788174da3bf99098207d42dcce5
SHA512fc304f96ac754ac60a0e2133c00b79acc86d974cf938aaed716bf76fd9e153186f07a4ef699daecc289da432f2b50c7b44d329f376d78fc89681cf7a4b81813d
-
Filesize
245KB
MD5e4b22871ffcbe7c0b619a865c36d9342
SHA18c312d9c94858b3f905802e8e34d6e8579af737a
SHA256b3e8562d6d74517cb4379b503b1668d92e95b788174da3bf99098207d42dcce5
SHA512fc304f96ac754ac60a0e2133c00b79acc86d974cf938aaed716bf76fd9e153186f07a4ef699daecc289da432f2b50c7b44d329f376d78fc89681cf7a4b81813d
-
Filesize
391KB
MD5904be1329ad06835296900c32c8ec874
SHA1bde81d7d2493fb123fd3edc9822324af740656ba
SHA256c7bfbe486f941cfea9e61ead4348090ae806bc4b96e9ca42ceadbded9f94117b
SHA512845a4a0b27ba89d340145b783d725d51f4f899164d6ad090f20018f6746ea4416f9a8d05df75dd10f7f1c1efbcce63137a39fbb934539db4514d7a2bbb1a1404
-
Filesize
391KB
MD5904be1329ad06835296900c32c8ec874
SHA1bde81d7d2493fb123fd3edc9822324af740656ba
SHA256c7bfbe486f941cfea9e61ead4348090ae806bc4b96e9ca42ceadbded9f94117b
SHA512845a4a0b27ba89d340145b783d725d51f4f899164d6ad090f20018f6746ea4416f9a8d05df75dd10f7f1c1efbcce63137a39fbb934539db4514d7a2bbb1a1404
-
Filesize
17KB
MD5617663ac9c651c4c7f846b8964243448
SHA10f837430636f48310034411078b6663777a5d370
SHA2560521dfbd0c9394cec685c236410ac566513f21a26cbda47db494530a423223de
SHA51245be87a4781d8f755eb91dad842f9c346aba8ef6c4b8178c24b805c57e8e9be4de0134914a19ef67a7aeb4e559baa3621646fe444242214a7fc49dcb342dd87a
-
Filesize
17KB
MD5617663ac9c651c4c7f846b8964243448
SHA10f837430636f48310034411078b6663777a5d370
SHA2560521dfbd0c9394cec685c236410ac566513f21a26cbda47db494530a423223de
SHA51245be87a4781d8f755eb91dad842f9c346aba8ef6c4b8178c24b805c57e8e9be4de0134914a19ef67a7aeb4e559baa3621646fe444242214a7fc49dcb342dd87a
-
Filesize
17KB
MD5617663ac9c651c4c7f846b8964243448
SHA10f837430636f48310034411078b6663777a5d370
SHA2560521dfbd0c9394cec685c236410ac566513f21a26cbda47db494530a423223de
SHA51245be87a4781d8f755eb91dad842f9c346aba8ef6c4b8178c24b805c57e8e9be4de0134914a19ef67a7aeb4e559baa3621646fe444242214a7fc49dcb342dd87a
-
Filesize
303KB
MD512a07204bf4c65efdd968689ed260c4e
SHA18430e5110448dc962c4191a1a06b05c4e3c1a140
SHA256e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b
SHA51261dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a
-
Filesize
303KB
MD512a07204bf4c65efdd968689ed260c4e
SHA18430e5110448dc962c4191a1a06b05c4e3c1a140
SHA256e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b
SHA51261dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a
-
Filesize
303KB
MD512a07204bf4c65efdd968689ed260c4e
SHA18430e5110448dc962c4191a1a06b05c4e3c1a140
SHA256e4666bb9e57296f0140b125a1c5e32f446659b0baa2c3d7fef87a7aef339433b
SHA51261dbfcedae6259039196942064d62cae0de853c6c5afa3547e6394e789ddf3c0acc6e94cd2c89c090c6f891a77565b0fe332b21da0afa5a5102f1d12d4f3989a
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5