Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 14:11
Static task
static1
General
-
Target
6bfa08d51755cb14f247b7073b535ecf9fdca4e58ad5480dfb3803ace6c652d9.exe
-
Size
1.3MB
-
MD5
0c861a9e42908df10cb1b5b315f65983
-
SHA1
39d1dafe7a9b488ff15dc7da1bf3f1b114247425
-
SHA256
6bfa08d51755cb14f247b7073b535ecf9fdca4e58ad5480dfb3803ace6c652d9
-
SHA512
e426ca9d77cac9b695b2b4b9877e62692266ea6aeb06b0913a37dfe49bb66868cefe132ab012df59d6eee2935557fb666ce6418df5839620b12a71b58cf52685
-
SSDEEP
24576:qyVa/RxKaNisN+ot3g8sX16aNl2pXmfI8KZPCuV7XXmlRLmywohP2Q:xVaJxKaNZJQLXoaGpXgIVnVjml5wqu
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnJG26xv77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnJG26xv77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beOE35ZV64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beOE35ZV64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beOE35ZV64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beOE35ZV64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsgZ85oh04.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beOE35ZV64.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsgZ85oh04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsgZ85oh04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsgZ85oh04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnJG26xv77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnJG26xv77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beOE35ZV64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsgZ85oh04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnJG26xv77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsgZ85oh04.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/1152-183-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-188-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-185-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-190-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-192-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-194-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-196-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-198-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-200-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-202-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-204-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-206-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-208-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-210-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-212-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-214-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-216-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-218-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-220-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-222-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-224-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-226-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-228-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-230-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-232-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-234-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-236-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-238-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-240-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-242-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-244-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-246-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/1152-248-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/2844-1308-0x0000000004CB0000-0x0000000004CC0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation hk01Jn95NY54.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 3676 ptNP7855EJ.exe 1956 ptcK4059ri.exe 3360 ptoW7628tT.exe 3380 ptlA5048Pf.exe 1516 ptmK2612Fm.exe 3260 beOE35ZV64.exe 1152 cuan18AD73.exe 3404 dsgZ85oh04.exe 2844 fr42Dl0996fl.exe 2412 gnJG26xv77.exe 1524 hk01Jn95NY54.exe 2800 mnolyk.exe 4016 jxIJ67cq26.exe 3308 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 3464 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnJG26xv77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beOE35ZV64.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsgZ85oh04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsgZ85oh04.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6bfa08d51755cb14f247b7073b535ecf9fdca4e58ad5480dfb3803ace6c652d9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptNP7855EJ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptNP7855EJ.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptlA5048Pf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptlA5048Pf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptmK2612Fm.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6bfa08d51755cb14f247b7073b535ecf9fdca4e58ad5480dfb3803ace6c652d9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptcK4059ri.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptcK4059ri.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptoW7628tT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptoW7628tT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptmK2612Fm.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2156 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2300 1152 WerFault.exe 95 4084 3404 WerFault.exe 99 2168 2844 WerFault.exe 111 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4484 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3260 beOE35ZV64.exe 3260 beOE35ZV64.exe 1152 cuan18AD73.exe 1152 cuan18AD73.exe 3404 dsgZ85oh04.exe 3404 dsgZ85oh04.exe 2844 fr42Dl0996fl.exe 2844 fr42Dl0996fl.exe 2412 gnJG26xv77.exe 2412 gnJG26xv77.exe 4016 jxIJ67cq26.exe 4016 jxIJ67cq26.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3260 beOE35ZV64.exe Token: SeDebugPrivilege 1152 cuan18AD73.exe Token: SeDebugPrivilege 3404 dsgZ85oh04.exe Token: SeDebugPrivilege 2844 fr42Dl0996fl.exe Token: SeDebugPrivilege 2412 gnJG26xv77.exe Token: SeDebugPrivilege 4016 jxIJ67cq26.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3676 4912 6bfa08d51755cb14f247b7073b535ecf9fdca4e58ad5480dfb3803ace6c652d9.exe 86 PID 4912 wrote to memory of 3676 4912 6bfa08d51755cb14f247b7073b535ecf9fdca4e58ad5480dfb3803ace6c652d9.exe 86 PID 4912 wrote to memory of 3676 4912 6bfa08d51755cb14f247b7073b535ecf9fdca4e58ad5480dfb3803ace6c652d9.exe 86 PID 3676 wrote to memory of 1956 3676 ptNP7855EJ.exe 87 PID 3676 wrote to memory of 1956 3676 ptNP7855EJ.exe 87 PID 3676 wrote to memory of 1956 3676 ptNP7855EJ.exe 87 PID 1956 wrote to memory of 3360 1956 ptcK4059ri.exe 88 PID 1956 wrote to memory of 3360 1956 ptcK4059ri.exe 88 PID 1956 wrote to memory of 3360 1956 ptcK4059ri.exe 88 PID 3360 wrote to memory of 3380 3360 ptoW7628tT.exe 89 PID 3360 wrote to memory of 3380 3360 ptoW7628tT.exe 89 PID 3360 wrote to memory of 3380 3360 ptoW7628tT.exe 89 PID 3380 wrote to memory of 1516 3380 ptlA5048Pf.exe 90 PID 3380 wrote to memory of 1516 3380 ptlA5048Pf.exe 90 PID 3380 wrote to memory of 1516 3380 ptlA5048Pf.exe 90 PID 1516 wrote to memory of 3260 1516 ptmK2612Fm.exe 91 PID 1516 wrote to memory of 3260 1516 ptmK2612Fm.exe 91 PID 1516 wrote to memory of 1152 1516 ptmK2612Fm.exe 95 PID 1516 wrote to memory of 1152 1516 ptmK2612Fm.exe 95 PID 1516 wrote to memory of 1152 1516 ptmK2612Fm.exe 95 PID 3380 wrote to memory of 3404 3380 ptlA5048Pf.exe 99 PID 3380 wrote to memory of 3404 3380 ptlA5048Pf.exe 99 PID 3380 wrote to memory of 3404 3380 ptlA5048Pf.exe 99 PID 3360 wrote to memory of 2844 3360 ptoW7628tT.exe 111 PID 3360 wrote to memory of 2844 3360 ptoW7628tT.exe 111 PID 3360 wrote to memory of 2844 3360 ptoW7628tT.exe 111 PID 1956 wrote to memory of 2412 1956 ptcK4059ri.exe 114 PID 1956 wrote to memory of 2412 1956 ptcK4059ri.exe 114 PID 3676 wrote to memory of 1524 3676 ptNP7855EJ.exe 115 PID 3676 wrote to memory of 1524 3676 ptNP7855EJ.exe 115 PID 3676 wrote to memory of 1524 3676 ptNP7855EJ.exe 115 PID 1524 wrote to memory of 2800 1524 hk01Jn95NY54.exe 116 PID 1524 wrote to memory of 2800 1524 hk01Jn95NY54.exe 116 PID 1524 wrote to memory of 2800 1524 hk01Jn95NY54.exe 116 PID 4912 wrote to memory of 4016 4912 6bfa08d51755cb14f247b7073b535ecf9fdca4e58ad5480dfb3803ace6c652d9.exe 117 PID 4912 wrote to memory of 4016 4912 6bfa08d51755cb14f247b7073b535ecf9fdca4e58ad5480dfb3803ace6c652d9.exe 117 PID 4912 wrote to memory of 4016 4912 6bfa08d51755cb14f247b7073b535ecf9fdca4e58ad5480dfb3803ace6c652d9.exe 117 PID 2800 wrote to memory of 4484 2800 mnolyk.exe 118 PID 2800 wrote to memory of 4484 2800 mnolyk.exe 118 PID 2800 wrote to memory of 4484 2800 mnolyk.exe 118 PID 2800 wrote to memory of 1276 2800 mnolyk.exe 120 PID 2800 wrote to memory of 1276 2800 mnolyk.exe 120 PID 2800 wrote to memory of 1276 2800 mnolyk.exe 120 PID 1276 wrote to memory of 1324 1276 cmd.exe 122 PID 1276 wrote to memory of 1324 1276 cmd.exe 122 PID 1276 wrote to memory of 1324 1276 cmd.exe 122 PID 1276 wrote to memory of 896 1276 cmd.exe 123 PID 1276 wrote to memory of 896 1276 cmd.exe 123 PID 1276 wrote to memory of 896 1276 cmd.exe 123 PID 1276 wrote to memory of 3972 1276 cmd.exe 124 PID 1276 wrote to memory of 3972 1276 cmd.exe 124 PID 1276 wrote to memory of 3972 1276 cmd.exe 124 PID 1276 wrote to memory of 396 1276 cmd.exe 126 PID 1276 wrote to memory of 396 1276 cmd.exe 126 PID 1276 wrote to memory of 396 1276 cmd.exe 126 PID 1276 wrote to memory of 848 1276 cmd.exe 125 PID 1276 wrote to memory of 848 1276 cmd.exe 125 PID 1276 wrote to memory of 848 1276 cmd.exe 125 PID 1276 wrote to memory of 3820 1276 cmd.exe 127 PID 1276 wrote to memory of 3820 1276 cmd.exe 127 PID 1276 wrote to memory of 3820 1276 cmd.exe 127 PID 2800 wrote to memory of 3464 2800 mnolyk.exe 130 PID 2800 wrote to memory of 3464 2800 mnolyk.exe 130 PID 2800 wrote to memory of 3464 2800 mnolyk.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bfa08d51755cb14f247b7073b535ecf9fdca4e58ad5480dfb3803ace6c652d9.exe"C:\Users\Admin\AppData\Local\Temp\6bfa08d51755cb14f247b7073b535ecf9fdca4e58ad5480dfb3803ace6c652d9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptNP7855EJ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptNP7855EJ.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptcK4059ri.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptcK4059ri.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptoW7628tT.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptoW7628tT.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptlA5048Pf.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptlA5048Pf.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptmK2612Fm.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptmK2612Fm.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beOE35ZV64.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beOE35ZV64.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuan18AD73.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuan18AD73.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 17808⤵
- Program crash
PID:2300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsgZ85oh04.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsgZ85oh04.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 10847⤵
- Program crash
PID:4084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr42Dl0996fl.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr42Dl0996fl.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 13166⤵
- Program crash
PID:2168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnJG26xv77.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnJG26xv77.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk01Jn95NY54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk01Jn95NY54.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:4484
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1324
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:3972
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:3820
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3464
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxIJ67cq26.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxIJ67cq26.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1152 -ip 11521⤵PID:3456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3404 -ip 34041⤵PID:2076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2844 -ip 28441⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:3308
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD57e2ae5765bdf657f590f6265c9f04d80
SHA175b65c45a59768bade9aa348c66562523da2ae57
SHA2560306b387a969fd733a4171c46ec078ba1d8ac5f98843d5c992942a8e50f0f7de
SHA512cdf5f02952406ce7ae5a59449c1fa52cd1a24a5d13c1195172a477ef764f27129643c8deab7a648a5c76ebcbaa70290011d60f207ac44a07b5f4b9a17def5c69
-
Filesize
240KB
MD57e2ae5765bdf657f590f6265c9f04d80
SHA175b65c45a59768bade9aa348c66562523da2ae57
SHA2560306b387a969fd733a4171c46ec078ba1d8ac5f98843d5c992942a8e50f0f7de
SHA512cdf5f02952406ce7ae5a59449c1fa52cd1a24a5d13c1195172a477ef764f27129643c8deab7a648a5c76ebcbaa70290011d60f207ac44a07b5f4b9a17def5c69
-
Filesize
240KB
MD57e2ae5765bdf657f590f6265c9f04d80
SHA175b65c45a59768bade9aa348c66562523da2ae57
SHA2560306b387a969fd733a4171c46ec078ba1d8ac5f98843d5c992942a8e50f0f7de
SHA512cdf5f02952406ce7ae5a59449c1fa52cd1a24a5d13c1195172a477ef764f27129643c8deab7a648a5c76ebcbaa70290011d60f207ac44a07b5f4b9a17def5c69
-
Filesize
240KB
MD57e2ae5765bdf657f590f6265c9f04d80
SHA175b65c45a59768bade9aa348c66562523da2ae57
SHA2560306b387a969fd733a4171c46ec078ba1d8ac5f98843d5c992942a8e50f0f7de
SHA512cdf5f02952406ce7ae5a59449c1fa52cd1a24a5d13c1195172a477ef764f27129643c8deab7a648a5c76ebcbaa70290011d60f207ac44a07b5f4b9a17def5c69
-
Filesize
177KB
MD5c99afd546a15f39568b1f259b28266ce
SHA1ad9c1fed89bb1117ddfb75fe19a36e538c74f4c7
SHA256fec863203635416d50e3b6c249781e3f5fbf9191830a2343013e9a665ff11cbc
SHA5125afa930368ad0050b8429ffab8a12793703f19399019c8cf05ed5a3b1ad537bf8f2c421e288f830bf890c91cdbfda399cfc8632586c893a8a96a2973764488df
-
Filesize
177KB
MD5c99afd546a15f39568b1f259b28266ce
SHA1ad9c1fed89bb1117ddfb75fe19a36e538c74f4c7
SHA256fec863203635416d50e3b6c249781e3f5fbf9191830a2343013e9a665ff11cbc
SHA5125afa930368ad0050b8429ffab8a12793703f19399019c8cf05ed5a3b1ad537bf8f2c421e288f830bf890c91cdbfda399cfc8632586c893a8a96a2973764488df
-
Filesize
1.2MB
MD5a7ddcdcaf291297c12a8614173ed4809
SHA1f7721b11dec1e4dab4667bc38a792c84dc741c87
SHA256525d8b3e39c4b267984ec6a2902378b95dbd77af129ff102fe3251a1b748bf17
SHA5121a888cf8f92be1d27c6ec1e24755ca71e4d7eab761c721eff39b0f8b11e9677f2bd4904b3243db758f04ee8b51db59970097e45969b566539419b73908260d17
-
Filesize
1.2MB
MD5a7ddcdcaf291297c12a8614173ed4809
SHA1f7721b11dec1e4dab4667bc38a792c84dc741c87
SHA256525d8b3e39c4b267984ec6a2902378b95dbd77af129ff102fe3251a1b748bf17
SHA5121a888cf8f92be1d27c6ec1e24755ca71e4d7eab761c721eff39b0f8b11e9677f2bd4904b3243db758f04ee8b51db59970097e45969b566539419b73908260d17
-
Filesize
240KB
MD57e2ae5765bdf657f590f6265c9f04d80
SHA175b65c45a59768bade9aa348c66562523da2ae57
SHA2560306b387a969fd733a4171c46ec078ba1d8ac5f98843d5c992942a8e50f0f7de
SHA512cdf5f02952406ce7ae5a59449c1fa52cd1a24a5d13c1195172a477ef764f27129643c8deab7a648a5c76ebcbaa70290011d60f207ac44a07b5f4b9a17def5c69
-
Filesize
240KB
MD57e2ae5765bdf657f590f6265c9f04d80
SHA175b65c45a59768bade9aa348c66562523da2ae57
SHA2560306b387a969fd733a4171c46ec078ba1d8ac5f98843d5c992942a8e50f0f7de
SHA512cdf5f02952406ce7ae5a59449c1fa52cd1a24a5d13c1195172a477ef764f27129643c8deab7a648a5c76ebcbaa70290011d60f207ac44a07b5f4b9a17def5c69
-
Filesize
996KB
MD5830bc2ec923cfebbd07cac2f108c8c6d
SHA1b587245028c075efd89671512682023d5110b55e
SHA256f183701cdadb733b9eaba132e960007aa41edd3133c0cc31f93891cea277045c
SHA51262fabe5d8a5943b96bf9a17961aa8d1e0df8b590f7b2e209818331dcb962e47165e1b1f6f8fb3f3479fb5b548f51e4f09707ea785bd573c7aaa191afbc3a40e3
-
Filesize
996KB
MD5830bc2ec923cfebbd07cac2f108c8c6d
SHA1b587245028c075efd89671512682023d5110b55e
SHA256f183701cdadb733b9eaba132e960007aa41edd3133c0cc31f93891cea277045c
SHA51262fabe5d8a5943b96bf9a17961aa8d1e0df8b590f7b2e209818331dcb962e47165e1b1f6f8fb3f3479fb5b548f51e4f09707ea785bd573c7aaa191afbc3a40e3
-
Filesize
17KB
MD54548d1fc291f0b1a249daa39727f4d41
SHA13340bffc6dffdae2bb61b720208a3f4025920eff
SHA2567dae92e86e8ca5d8b715dcdafc42ab04ecd60ad3fb365451e3ed66e836190d8d
SHA5123185b68931a076337a9b3c2b89e4d204d96fbf12c5482c47b4bc7d03803c0225cb64e0f14b932c2945357f0eca0d3b457229706541e95f71f08c6dbda7bd6823
-
Filesize
17KB
MD54548d1fc291f0b1a249daa39727f4d41
SHA13340bffc6dffdae2bb61b720208a3f4025920eff
SHA2567dae92e86e8ca5d8b715dcdafc42ab04ecd60ad3fb365451e3ed66e836190d8d
SHA5123185b68931a076337a9b3c2b89e4d204d96fbf12c5482c47b4bc7d03803c0225cb64e0f14b932c2945357f0eca0d3b457229706541e95f71f08c6dbda7bd6823
-
Filesize
893KB
MD594210836359a8aa3a75918aa917a7f64
SHA188f578832a960776bbc20c44fdc00cf809acb960
SHA256dd1adeb5542c5248159e13ac6411b2d1c9cd6879f808ad7278967cf24b8d30ef
SHA512573e9faf4a1a9b8b6b1de58c86eadedcc913f786118f384b08162d33bb468014fdc5cfe396f4f91f505287f77f31fb22ae5bb0c29d32c0d891e5c3c236af64de
-
Filesize
893KB
MD594210836359a8aa3a75918aa917a7f64
SHA188f578832a960776bbc20c44fdc00cf809acb960
SHA256dd1adeb5542c5248159e13ac6411b2d1c9cd6879f808ad7278967cf24b8d30ef
SHA512573e9faf4a1a9b8b6b1de58c86eadedcc913f786118f384b08162d33bb468014fdc5cfe396f4f91f505287f77f31fb22ae5bb0c29d32c0d891e5c3c236af64de
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
667KB
MD5b222bcd4ab9e661cf3b7fbe78c04d6f1
SHA1a688fb79499ee7eda0891ca32d8114cb5923265c
SHA256c42227e882f95e02fe5a962691020512406ee08d465546f415053ab97302dbdd
SHA51205dda2b392b7d4b3b66367f6f8f9cecb07a7e8cbf7e5d74d1a6e287c150819cb1a7719ec5c484f051354aba95132e69ef8557e5acc3b0f46db7cdb35850c2c35
-
Filesize
667KB
MD5b222bcd4ab9e661cf3b7fbe78c04d6f1
SHA1a688fb79499ee7eda0891ca32d8114cb5923265c
SHA256c42227e882f95e02fe5a962691020512406ee08d465546f415053ab97302dbdd
SHA51205dda2b392b7d4b3b66367f6f8f9cecb07a7e8cbf7e5d74d1a6e287c150819cb1a7719ec5c484f051354aba95132e69ef8557e5acc3b0f46db7cdb35850c2c35
-
Filesize
246KB
MD597c977c85d447742b3e217de53a0f069
SHA1053a758567d8c26f1aea1e74382133097d8ba74d
SHA256ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d
SHA51214fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129
-
Filesize
246KB
MD597c977c85d447742b3e217de53a0f069
SHA1053a758567d8c26f1aea1e74382133097d8ba74d
SHA256ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d
SHA51214fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129
-
Filesize
391KB
MD5ddce08016aeebe6be8531dd9f7c9b608
SHA149e2c79847e0cda07114ac5fdb0be8a8c961df9e
SHA256c2dd2457cac1da5df3356e1348a2d0c37e6b566c07af4b9a3282f399cc38357c
SHA512ebd4ddd06c628c10d885fb27b96bd7e7b04f12e488fb8cf56b07798965c69b3700da01f5ea9c153f8f27b92f851f701e9564434b49b5c98b42ec09e70ab4547a
-
Filesize
391KB
MD5ddce08016aeebe6be8531dd9f7c9b608
SHA149e2c79847e0cda07114ac5fdb0be8a8c961df9e
SHA256c2dd2457cac1da5df3356e1348a2d0c37e6b566c07af4b9a3282f399cc38357c
SHA512ebd4ddd06c628c10d885fb27b96bd7e7b04f12e488fb8cf56b07798965c69b3700da01f5ea9c153f8f27b92f851f701e9564434b49b5c98b42ec09e70ab4547a
-
Filesize
17KB
MD591f179ea2f9ca5fef15c9080c5f1e448
SHA18ab1544890218150dbb1b236b2a09da068d829a8
SHA256ff4062f1c2bb3644358c3a8aa596017a862b358c2b395dc469580a1e01a1e652
SHA5120a80be63b0d3c03a25d0c1829cf552916e4609ff94ce7e1bc154ebf6ec4c29a00c7746d3fb40c3cc9cca01ef05fc146d90241556cdbf2f8313dd09e7580bcffa
-
Filesize
17KB
MD591f179ea2f9ca5fef15c9080c5f1e448
SHA18ab1544890218150dbb1b236b2a09da068d829a8
SHA256ff4062f1c2bb3644358c3a8aa596017a862b358c2b395dc469580a1e01a1e652
SHA5120a80be63b0d3c03a25d0c1829cf552916e4609ff94ce7e1bc154ebf6ec4c29a00c7746d3fb40c3cc9cca01ef05fc146d90241556cdbf2f8313dd09e7580bcffa
-
Filesize
17KB
MD591f179ea2f9ca5fef15c9080c5f1e448
SHA18ab1544890218150dbb1b236b2a09da068d829a8
SHA256ff4062f1c2bb3644358c3a8aa596017a862b358c2b395dc469580a1e01a1e652
SHA5120a80be63b0d3c03a25d0c1829cf552916e4609ff94ce7e1bc154ebf6ec4c29a00c7746d3fb40c3cc9cca01ef05fc146d90241556cdbf2f8313dd09e7580bcffa
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5