Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 14:44
Static task
static1
General
-
Target
36e4350a6cf96652c3379132abfb05c74dd3308624a4ecae1e9e1f8ba5a0bc7c.exe
-
Size
1.3MB
-
MD5
7f51f3faa4748e761b7ec49da8be39b9
-
SHA1
e3ffc453e0f85d47621806b34c8fbe436017fd05
-
SHA256
36e4350a6cf96652c3379132abfb05c74dd3308624a4ecae1e9e1f8ba5a0bc7c
-
SHA512
0a0e41ae75d86a73149e8f07f7a30d3784bc412a4d13b8c2f2d40e994af0647457e41d332428d30310a86ad9f83e0d75fba61bcd5a83a4f3fed50c585a185042
-
SSDEEP
24576:Qy3+flHEzRsmzb23lwGdRC76K0zukslNmitM4u9UPldvJSSbM9Scfz238rWLzBpN:XuflHEzS/lwGHfzubQS/RPlJI9Scfic2
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dszE49Lx25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dszE49Lx25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnqt58ru79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beUN68ls93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beUN68ls93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beUN68ls93.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dszE49Lx25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dszE49Lx25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnqt58ru79.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beUN68ls93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beUN68ls93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnqt58ru79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beUN68ls93.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnqt58ru79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dszE49Lx25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dszE49Lx25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnqt58ru79.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4636-184-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-185-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-187-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-189-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-191-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-199-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-197-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-195-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-205-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-207-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-211-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-213-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-217-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-219-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-223-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-225-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-221-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-215-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-229-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-227-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-231-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-233-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-209-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-235-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-201-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-237-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-193-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-239-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-241-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-243-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-247-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-245-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/4636-249-0x0000000004C90000-0x0000000004CCE000-memory.dmp family_redline behavioral1/memory/3748-1188-0x0000000002730000-0x0000000002740000-memory.dmp family_redline behavioral1/memory/3748-2066-0x0000000002730000-0x0000000002740000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation hk78zv40Cp55.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 556 ptDE8643Vk.exe 212 ptzB2655Yb.exe 4128 ptDL7268Ow.exe 3368 pthX7426pT.exe 4308 ptKM8592HF.exe 1644 beUN68ls93.exe 4636 cuwk14It09.exe 3900 dszE49Lx25.exe 3748 fr21hq2699Bh.exe 4364 gnqt58ru79.exe 1884 hk78zv40Cp55.exe 5008 mnolyk.exe 680 jxVZ78Ww43.exe 4816 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 3052 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnqt58ru79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beUN68ls93.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dszE49Lx25.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dszE49Lx25.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptDL7268Ow.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pthX7426pT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" pthX7426pT.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 36e4350a6cf96652c3379132abfb05c74dd3308624a4ecae1e9e1f8ba5a0bc7c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptDE8643Vk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptzB2655Yb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptDL7268Ow.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptKM8592HF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptKM8592HF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 36e4350a6cf96652c3379132abfb05c74dd3308624a4ecae1e9e1f8ba5a0bc7c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptDE8643Vk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptzB2655Yb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4788 4636 WerFault.exe 95 3824 3900 WerFault.exe 101 2060 3748 WerFault.exe 104 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1644 beUN68ls93.exe 1644 beUN68ls93.exe 4636 cuwk14It09.exe 4636 cuwk14It09.exe 3900 dszE49Lx25.exe 3900 dszE49Lx25.exe 3748 fr21hq2699Bh.exe 3748 fr21hq2699Bh.exe 4364 gnqt58ru79.exe 4364 gnqt58ru79.exe 680 jxVZ78Ww43.exe 680 jxVZ78Ww43.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1644 beUN68ls93.exe Token: SeDebugPrivilege 4636 cuwk14It09.exe Token: SeDebugPrivilege 3900 dszE49Lx25.exe Token: SeDebugPrivilege 3748 fr21hq2699Bh.exe Token: SeDebugPrivilege 4364 gnqt58ru79.exe Token: SeDebugPrivilege 680 jxVZ78Ww43.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 556 2188 36e4350a6cf96652c3379132abfb05c74dd3308624a4ecae1e9e1f8ba5a0bc7c.exe 85 PID 2188 wrote to memory of 556 2188 36e4350a6cf96652c3379132abfb05c74dd3308624a4ecae1e9e1f8ba5a0bc7c.exe 85 PID 2188 wrote to memory of 556 2188 36e4350a6cf96652c3379132abfb05c74dd3308624a4ecae1e9e1f8ba5a0bc7c.exe 85 PID 556 wrote to memory of 212 556 ptDE8643Vk.exe 86 PID 556 wrote to memory of 212 556 ptDE8643Vk.exe 86 PID 556 wrote to memory of 212 556 ptDE8643Vk.exe 86 PID 212 wrote to memory of 4128 212 ptzB2655Yb.exe 87 PID 212 wrote to memory of 4128 212 ptzB2655Yb.exe 87 PID 212 wrote to memory of 4128 212 ptzB2655Yb.exe 87 PID 4128 wrote to memory of 3368 4128 ptDL7268Ow.exe 88 PID 4128 wrote to memory of 3368 4128 ptDL7268Ow.exe 88 PID 4128 wrote to memory of 3368 4128 ptDL7268Ow.exe 88 PID 3368 wrote to memory of 4308 3368 pthX7426pT.exe 89 PID 3368 wrote to memory of 4308 3368 pthX7426pT.exe 89 PID 3368 wrote to memory of 4308 3368 pthX7426pT.exe 89 PID 4308 wrote to memory of 1644 4308 ptKM8592HF.exe 90 PID 4308 wrote to memory of 1644 4308 ptKM8592HF.exe 90 PID 4308 wrote to memory of 4636 4308 ptKM8592HF.exe 95 PID 4308 wrote to memory of 4636 4308 ptKM8592HF.exe 95 PID 4308 wrote to memory of 4636 4308 ptKM8592HF.exe 95 PID 3368 wrote to memory of 3900 3368 pthX7426pT.exe 101 PID 3368 wrote to memory of 3900 3368 pthX7426pT.exe 101 PID 3368 wrote to memory of 3900 3368 pthX7426pT.exe 101 PID 4128 wrote to memory of 3748 4128 ptDL7268Ow.exe 104 PID 4128 wrote to memory of 3748 4128 ptDL7268Ow.exe 104 PID 4128 wrote to memory of 3748 4128 ptDL7268Ow.exe 104 PID 212 wrote to memory of 4364 212 ptzB2655Yb.exe 107 PID 212 wrote to memory of 4364 212 ptzB2655Yb.exe 107 PID 556 wrote to memory of 1884 556 ptDE8643Vk.exe 109 PID 556 wrote to memory of 1884 556 ptDE8643Vk.exe 109 PID 556 wrote to memory of 1884 556 ptDE8643Vk.exe 109 PID 1884 wrote to memory of 5008 1884 hk78zv40Cp55.exe 110 PID 1884 wrote to memory of 5008 1884 hk78zv40Cp55.exe 110 PID 1884 wrote to memory of 5008 1884 hk78zv40Cp55.exe 110 PID 2188 wrote to memory of 680 2188 36e4350a6cf96652c3379132abfb05c74dd3308624a4ecae1e9e1f8ba5a0bc7c.exe 111 PID 2188 wrote to memory of 680 2188 36e4350a6cf96652c3379132abfb05c74dd3308624a4ecae1e9e1f8ba5a0bc7c.exe 111 PID 2188 wrote to memory of 680 2188 36e4350a6cf96652c3379132abfb05c74dd3308624a4ecae1e9e1f8ba5a0bc7c.exe 111 PID 5008 wrote to memory of 1464 5008 mnolyk.exe 112 PID 5008 wrote to memory of 1464 5008 mnolyk.exe 112 PID 5008 wrote to memory of 1464 5008 mnolyk.exe 112 PID 5008 wrote to memory of 2024 5008 mnolyk.exe 114 PID 5008 wrote to memory of 2024 5008 mnolyk.exe 114 PID 5008 wrote to memory of 2024 5008 mnolyk.exe 114 PID 2024 wrote to memory of 4600 2024 cmd.exe 116 PID 2024 wrote to memory of 4600 2024 cmd.exe 116 PID 2024 wrote to memory of 4600 2024 cmd.exe 116 PID 2024 wrote to memory of 3640 2024 cmd.exe 117 PID 2024 wrote to memory of 3640 2024 cmd.exe 117 PID 2024 wrote to memory of 3640 2024 cmd.exe 117 PID 2024 wrote to memory of 4572 2024 cmd.exe 118 PID 2024 wrote to memory of 4572 2024 cmd.exe 118 PID 2024 wrote to memory of 4572 2024 cmd.exe 118 PID 2024 wrote to memory of 4040 2024 cmd.exe 119 PID 2024 wrote to memory of 4040 2024 cmd.exe 119 PID 2024 wrote to memory of 4040 2024 cmd.exe 119 PID 2024 wrote to memory of 3304 2024 cmd.exe 120 PID 2024 wrote to memory of 3304 2024 cmd.exe 120 PID 2024 wrote to memory of 3304 2024 cmd.exe 120 PID 2024 wrote to memory of 1488 2024 cmd.exe 121 PID 2024 wrote to memory of 1488 2024 cmd.exe 121 PID 2024 wrote to memory of 1488 2024 cmd.exe 121 PID 5008 wrote to memory of 3052 5008 mnolyk.exe 129 PID 5008 wrote to memory of 3052 5008 mnolyk.exe 129 PID 5008 wrote to memory of 3052 5008 mnolyk.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\36e4350a6cf96652c3379132abfb05c74dd3308624a4ecae1e9e1f8ba5a0bc7c.exe"C:\Users\Admin\AppData\Local\Temp\36e4350a6cf96652c3379132abfb05c74dd3308624a4ecae1e9e1f8ba5a0bc7c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptDE8643Vk.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptDE8643Vk.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptzB2655Yb.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptzB2655Yb.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptDL7268Ow.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptDL7268Ow.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pthX7426pT.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pthX7426pT.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptKM8592HF.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptKM8592HF.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beUN68ls93.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beUN68ls93.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuwk14It09.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuwk14It09.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 13488⤵
- Program crash
PID:4788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dszE49Lx25.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dszE49Lx25.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 11047⤵
- Program crash
PID:3824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr21hq2699Bh.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr21hq2699Bh.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 13406⤵
- Program crash
PID:2060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnqt58ru79.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnqt58ru79.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk78zv40Cp55.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk78zv40Cp55.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:1464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:3640
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:4572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:3304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:1488
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3052
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxVZ78Ww43.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxVZ78Ww43.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4636 -ip 46361⤵PID:1436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3900 -ip 39001⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3748 -ip 37481⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:4816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5a9dcb3e5589d9660906b0918863e0e00
SHA1d758baafa5bbe01a38e9d0a3b7fa47764bdeb7ee
SHA256ee0e78b54747fa1638963d2d130318374f17438099efc0873ed4353e554db784
SHA51291d3af3642c856fd273a708e02f3c04af1c148dc28efb09e71a3ee8683625886b6917750a567298f2e68f4ca7e6f496e6ebe6dbea7c552cc9d577e5f5ea25af7
-
Filesize
240KB
MD5a9dcb3e5589d9660906b0918863e0e00
SHA1d758baafa5bbe01a38e9d0a3b7fa47764bdeb7ee
SHA256ee0e78b54747fa1638963d2d130318374f17438099efc0873ed4353e554db784
SHA51291d3af3642c856fd273a708e02f3c04af1c148dc28efb09e71a3ee8683625886b6917750a567298f2e68f4ca7e6f496e6ebe6dbea7c552cc9d577e5f5ea25af7
-
Filesize
240KB
MD5a9dcb3e5589d9660906b0918863e0e00
SHA1d758baafa5bbe01a38e9d0a3b7fa47764bdeb7ee
SHA256ee0e78b54747fa1638963d2d130318374f17438099efc0873ed4353e554db784
SHA51291d3af3642c856fd273a708e02f3c04af1c148dc28efb09e71a3ee8683625886b6917750a567298f2e68f4ca7e6f496e6ebe6dbea7c552cc9d577e5f5ea25af7
-
Filesize
240KB
MD5a9dcb3e5589d9660906b0918863e0e00
SHA1d758baafa5bbe01a38e9d0a3b7fa47764bdeb7ee
SHA256ee0e78b54747fa1638963d2d130318374f17438099efc0873ed4353e554db784
SHA51291d3af3642c856fd273a708e02f3c04af1c148dc28efb09e71a3ee8683625886b6917750a567298f2e68f4ca7e6f496e6ebe6dbea7c552cc9d577e5f5ea25af7
-
Filesize
177KB
MD5d02d49470d702fc6ea321c12997dd29f
SHA19b803a18d4a9ed284cc505f8dfb470f5c46268c6
SHA2567c9d9312fd8117f55be9db06bfbbd19abaa9f801bb6fab457b45e6316f300a9a
SHA512c27fd47f702542a49454236f7048de7a582b53e169c8d93aa0ad09fa8aa89fcb7d858fa11d8f76014fa46518b37d064c746822634d91ee57c9f95e40aba531eb
-
Filesize
177KB
MD5d02d49470d702fc6ea321c12997dd29f
SHA19b803a18d4a9ed284cc505f8dfb470f5c46268c6
SHA2567c9d9312fd8117f55be9db06bfbbd19abaa9f801bb6fab457b45e6316f300a9a
SHA512c27fd47f702542a49454236f7048de7a582b53e169c8d93aa0ad09fa8aa89fcb7d858fa11d8f76014fa46518b37d064c746822634d91ee57c9f95e40aba531eb
-
Filesize
1.1MB
MD54c7e9d73ef8e02134ccc849d219356d5
SHA111c5c3663597206269169b773842ea765726af91
SHA2560257afa4485040add6df9d5e62d3ac4204e35ae63753d81d974ad38dd35493a1
SHA5123d338ad62063b039f6def5ce82f50f83958e3afa62e3ee0727bdc4c08035b082cae0aacbfac33cf15566f1673f034116941a280f4b12237de5ade4bcc604351d
-
Filesize
1.1MB
MD54c7e9d73ef8e02134ccc849d219356d5
SHA111c5c3663597206269169b773842ea765726af91
SHA2560257afa4485040add6df9d5e62d3ac4204e35ae63753d81d974ad38dd35493a1
SHA5123d338ad62063b039f6def5ce82f50f83958e3afa62e3ee0727bdc4c08035b082cae0aacbfac33cf15566f1673f034116941a280f4b12237de5ade4bcc604351d
-
Filesize
240KB
MD5a9dcb3e5589d9660906b0918863e0e00
SHA1d758baafa5bbe01a38e9d0a3b7fa47764bdeb7ee
SHA256ee0e78b54747fa1638963d2d130318374f17438099efc0873ed4353e554db784
SHA51291d3af3642c856fd273a708e02f3c04af1c148dc28efb09e71a3ee8683625886b6917750a567298f2e68f4ca7e6f496e6ebe6dbea7c552cc9d577e5f5ea25af7
-
Filesize
240KB
MD5a9dcb3e5589d9660906b0918863e0e00
SHA1d758baafa5bbe01a38e9d0a3b7fa47764bdeb7ee
SHA256ee0e78b54747fa1638963d2d130318374f17438099efc0873ed4353e554db784
SHA51291d3af3642c856fd273a708e02f3c04af1c148dc28efb09e71a3ee8683625886b6917750a567298f2e68f4ca7e6f496e6ebe6dbea7c552cc9d577e5f5ea25af7
-
Filesize
994KB
MD5e2ee5f087096831899fd6d9eec1d33ce
SHA16d5852d16ea715dfbecf339e28cf4b32f096b7ab
SHA256ee2f1c1cc215fb57d06b6418ac43acefbc537c7b98a98c42114fc5890592e068
SHA5123f3a8f861514fe2163fb7124468ff1f01e737d544597b5270df5277d2ce73816b7769530f3bc2064f3251b5777442666adbd0b6af51560cf351ee8419d4c4cfd
-
Filesize
994KB
MD5e2ee5f087096831899fd6d9eec1d33ce
SHA16d5852d16ea715dfbecf339e28cf4b32f096b7ab
SHA256ee2f1c1cc215fb57d06b6418ac43acefbc537c7b98a98c42114fc5890592e068
SHA5123f3a8f861514fe2163fb7124468ff1f01e737d544597b5270df5277d2ce73816b7769530f3bc2064f3251b5777442666adbd0b6af51560cf351ee8419d4c4cfd
-
Filesize
17KB
MD5d8e14120237c58bd0e6ba80369305010
SHA114835ba942ebf332d081d96fa9d5a6206045f4e3
SHA256d164114ff6d8a4da632ab4f9b6f72af2e8b6e424ffa2fdb05b89b0ed33e1159e
SHA512879cdb2c8db32381fb025c9631f1f18e3922528cdc90832c5d236733257f28989bf3b5992d798ff99ea49139a5df35d9d0037298a2affe6f33598bb9a5977176
-
Filesize
17KB
MD5d8e14120237c58bd0e6ba80369305010
SHA114835ba942ebf332d081d96fa9d5a6206045f4e3
SHA256d164114ff6d8a4da632ab4f9b6f72af2e8b6e424ffa2fdb05b89b0ed33e1159e
SHA512879cdb2c8db32381fb025c9631f1f18e3922528cdc90832c5d236733257f28989bf3b5992d798ff99ea49139a5df35d9d0037298a2affe6f33598bb9a5977176
-
Filesize
893KB
MD52923d12dd6c3ced321e93fdc530e969d
SHA1490f9bc884bbd0961fe3af793c8a66d602e1411b
SHA256c1382010cc1f7bba31cfda100a039959673a1c6d613fffb3b79055d83bef6551
SHA51257327b00d89a97c14f49a05737fe5e1b2ce16850e0cc0322c9f1360e3d6d74f810597e651f4cb46bbe44ba609fc3c3ce22da1a6a8f98de8e5f2679ba38007d3f
-
Filesize
893KB
MD52923d12dd6c3ced321e93fdc530e969d
SHA1490f9bc884bbd0961fe3af793c8a66d602e1411b
SHA256c1382010cc1f7bba31cfda100a039959673a1c6d613fffb3b79055d83bef6551
SHA51257327b00d89a97c14f49a05737fe5e1b2ce16850e0cc0322c9f1360e3d6d74f810597e651f4cb46bbe44ba609fc3c3ce22da1a6a8f98de8e5f2679ba38007d3f
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
666KB
MD531083e209d4e5529c1198b5bc819cbc2
SHA1c4548d07ded5c93eab772f86b6cce991cd741960
SHA2562532b6e377911e0d5b5e4a7eb48c326112be5ff4919c1977284105868a4d0ae3
SHA5124bbecdb6dd38ebe559e92f6d28254ca014a78b953106ec7c03982e606246a9e88fb8a7673cb99bf03283defd03c64a1140f1f00d511b504bc9639836fd8b86a4
-
Filesize
666KB
MD531083e209d4e5529c1198b5bc819cbc2
SHA1c4548d07ded5c93eab772f86b6cce991cd741960
SHA2562532b6e377911e0d5b5e4a7eb48c326112be5ff4919c1977284105868a4d0ae3
SHA5124bbecdb6dd38ebe559e92f6d28254ca014a78b953106ec7c03982e606246a9e88fb8a7673cb99bf03283defd03c64a1140f1f00d511b504bc9639836fd8b86a4
-
Filesize
246KB
MD597c977c85d447742b3e217de53a0f069
SHA1053a758567d8c26f1aea1e74382133097d8ba74d
SHA256ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d
SHA51214fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129
-
Filesize
246KB
MD597c977c85d447742b3e217de53a0f069
SHA1053a758567d8c26f1aea1e74382133097d8ba74d
SHA256ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d
SHA51214fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129
-
Filesize
391KB
MD5ddbd62586d0a2f4f6debd504d976d704
SHA1e967e9699bf3668e71ad7f2faf90ecdc2a691c80
SHA256c0f7cae560cb4894b3f1e552ff17d569e6b64b4b82d0c5e26b47b210419aa492
SHA51284d31b94827c5e6fd8df684f52721e62e4215939c1dfe943c055c69392da60f68416e73157ba8eff78f5384a5fffc0f7919e14789a44a14e37298fa2c9cda636
-
Filesize
391KB
MD5ddbd62586d0a2f4f6debd504d976d704
SHA1e967e9699bf3668e71ad7f2faf90ecdc2a691c80
SHA256c0f7cae560cb4894b3f1e552ff17d569e6b64b4b82d0c5e26b47b210419aa492
SHA51284d31b94827c5e6fd8df684f52721e62e4215939c1dfe943c055c69392da60f68416e73157ba8eff78f5384a5fffc0f7919e14789a44a14e37298fa2c9cda636
-
Filesize
17KB
MD558d2c782592f2526ff45d064647bcb60
SHA1cbcad8d05e849dbfc56ead933345613a355abed3
SHA25618fe83e86d0064ab105c50026babd437961d6123808d8ac42279da44dd58cf26
SHA51256dd5d98f5125c4b06d9436b05dfe7433db1589be511277b6c1746b5103e82ff2631587a5f868f08ddcbc4a1927d7e6940ea00dd5fd1f712ebe573837e534643
-
Filesize
17KB
MD558d2c782592f2526ff45d064647bcb60
SHA1cbcad8d05e849dbfc56ead933345613a355abed3
SHA25618fe83e86d0064ab105c50026babd437961d6123808d8ac42279da44dd58cf26
SHA51256dd5d98f5125c4b06d9436b05dfe7433db1589be511277b6c1746b5103e82ff2631587a5f868f08ddcbc4a1927d7e6940ea00dd5fd1f712ebe573837e534643
-
Filesize
17KB
MD558d2c782592f2526ff45d064647bcb60
SHA1cbcad8d05e849dbfc56ead933345613a355abed3
SHA25618fe83e86d0064ab105c50026babd437961d6123808d8ac42279da44dd58cf26
SHA51256dd5d98f5125c4b06d9436b05dfe7433db1589be511277b6c1746b5103e82ff2631587a5f868f08ddcbc4a1927d7e6940ea00dd5fd1f712ebe573837e534643
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5