Analysis
-
max time kernel
147s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 15:40
Static task
static1
General
-
Target
127ba328e11c2f2e233a545f637138e80d527e594827ebd2989c6663f1ce02c8.exe
-
Size
1.3MB
-
MD5
0347b77fb5c90c4dd1975d8be6026530
-
SHA1
76864299de5269ae66728ec3ebcc9d05bbec9e19
-
SHA256
127ba328e11c2f2e233a545f637138e80d527e594827ebd2989c6663f1ce02c8
-
SHA512
5eab25c573322926f5a86df4e344919a8e392e89ba21346c5ce465d4978c34fbdb33c62fe75b4e5e924a656a7f3d49a8aa20dd0e884b3f847063bceac3fcf8a7
-
SSDEEP
24576:2yZVnsAxsmMNkrquQOacqkhWs2U9YxyyL9Mhq5hjX/J4pOPkc:FZdsAxsmSSa4wUax3njOpAk
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnZj35uR84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" begK64gh69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" begK64gh69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsmj64Py36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsmj64Py36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnZj35uR84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsmj64Py36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnZj35uR84.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection begK64gh69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" begK64gh69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" begK64gh69.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsmj64Py36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsmj64Py36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" begK64gh69.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsmj64Py36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnZj35uR84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnZj35uR84.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/832-186-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-189-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-187-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-191-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-193-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-195-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-197-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-199-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-201-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-203-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-205-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-207-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-209-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-211-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-213-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-215-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-217-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-219-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-221-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-223-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-225-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-227-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-229-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-231-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-233-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-235-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-237-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-239-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-241-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-243-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-245-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-247-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/832-249-0x0000000002570000-0x00000000025AE000-memory.dmp family_redline behavioral1/memory/4228-1389-0x0000000004DC0000-0x0000000004DD0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation mnolyk.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation hk29Bi91me53.exe -
Executes dropped EXE 15 IoCs
pid Process 2540 ptZh7468Fc.exe 3304 ptGG0238EF.exe 2500 ptLW4346in.exe 3680 ptOu7909ez.exe 312 ptry3090eX.exe 2576 begK64gh69.exe 832 cuJz78BT78.exe 1180 dsmj64Py36.exe 4228 fr58kK5539uz.exe 4612 gnZj35uR84.exe 4508 hk29Bi91me53.exe 740 mnolyk.exe 4672 jxrh68Ck51.exe 3284 mnolyk.exe 5096 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 1752 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" begK64gh69.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsmj64Py36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsmj64Py36.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnZj35uR84.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptZh7468Fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptZh7468Fc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptLW4346in.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptLW4346in.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptOu7909ez.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptry3090eX.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 127ba328e11c2f2e233a545f637138e80d527e594827ebd2989c6663f1ce02c8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptGG0238EF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptGG0238EF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptOu7909ez.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptry3090eX.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 127ba328e11c2f2e233a545f637138e80d527e594827ebd2989c6663f1ce02c8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4624 832 WerFault.exe 90 3028 1180 WerFault.exe 94 3928 4228 WerFault.exe 104 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2576 begK64gh69.exe 2576 begK64gh69.exe 832 cuJz78BT78.exe 832 cuJz78BT78.exe 1180 dsmj64Py36.exe 1180 dsmj64Py36.exe 4228 fr58kK5539uz.exe 4228 fr58kK5539uz.exe 4612 gnZj35uR84.exe 4612 gnZj35uR84.exe 4672 jxrh68Ck51.exe 4672 jxrh68Ck51.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2576 begK64gh69.exe Token: SeDebugPrivilege 832 cuJz78BT78.exe Token: SeDebugPrivilege 1180 dsmj64Py36.exe Token: SeDebugPrivilege 4228 fr58kK5539uz.exe Token: SeDebugPrivilege 4612 gnZj35uR84.exe Token: SeDebugPrivilege 4672 jxrh68Ck51.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2540 1980 127ba328e11c2f2e233a545f637138e80d527e594827ebd2989c6663f1ce02c8.exe 84 PID 1980 wrote to memory of 2540 1980 127ba328e11c2f2e233a545f637138e80d527e594827ebd2989c6663f1ce02c8.exe 84 PID 1980 wrote to memory of 2540 1980 127ba328e11c2f2e233a545f637138e80d527e594827ebd2989c6663f1ce02c8.exe 84 PID 2540 wrote to memory of 3304 2540 ptZh7468Fc.exe 85 PID 2540 wrote to memory of 3304 2540 ptZh7468Fc.exe 85 PID 2540 wrote to memory of 3304 2540 ptZh7468Fc.exe 85 PID 3304 wrote to memory of 2500 3304 ptGG0238EF.exe 86 PID 3304 wrote to memory of 2500 3304 ptGG0238EF.exe 86 PID 3304 wrote to memory of 2500 3304 ptGG0238EF.exe 86 PID 2500 wrote to memory of 3680 2500 ptLW4346in.exe 87 PID 2500 wrote to memory of 3680 2500 ptLW4346in.exe 87 PID 2500 wrote to memory of 3680 2500 ptLW4346in.exe 87 PID 3680 wrote to memory of 312 3680 ptOu7909ez.exe 88 PID 3680 wrote to memory of 312 3680 ptOu7909ez.exe 88 PID 3680 wrote to memory of 312 3680 ptOu7909ez.exe 88 PID 312 wrote to memory of 2576 312 ptry3090eX.exe 89 PID 312 wrote to memory of 2576 312 ptry3090eX.exe 89 PID 312 wrote to memory of 832 312 ptry3090eX.exe 90 PID 312 wrote to memory of 832 312 ptry3090eX.exe 90 PID 312 wrote to memory of 832 312 ptry3090eX.exe 90 PID 3680 wrote to memory of 1180 3680 ptOu7909ez.exe 94 PID 3680 wrote to memory of 1180 3680 ptOu7909ez.exe 94 PID 3680 wrote to memory of 1180 3680 ptOu7909ez.exe 94 PID 2500 wrote to memory of 4228 2500 ptLW4346in.exe 104 PID 2500 wrote to memory of 4228 2500 ptLW4346in.exe 104 PID 2500 wrote to memory of 4228 2500 ptLW4346in.exe 104 PID 3304 wrote to memory of 4612 3304 ptGG0238EF.exe 107 PID 3304 wrote to memory of 4612 3304 ptGG0238EF.exe 107 PID 2540 wrote to memory of 4508 2540 ptZh7468Fc.exe 108 PID 2540 wrote to memory of 4508 2540 ptZh7468Fc.exe 108 PID 2540 wrote to memory of 4508 2540 ptZh7468Fc.exe 108 PID 4508 wrote to memory of 740 4508 hk29Bi91me53.exe 109 PID 4508 wrote to memory of 740 4508 hk29Bi91me53.exe 109 PID 4508 wrote to memory of 740 4508 hk29Bi91me53.exe 109 PID 1980 wrote to memory of 4672 1980 127ba328e11c2f2e233a545f637138e80d527e594827ebd2989c6663f1ce02c8.exe 110 PID 1980 wrote to memory of 4672 1980 127ba328e11c2f2e233a545f637138e80d527e594827ebd2989c6663f1ce02c8.exe 110 PID 1980 wrote to memory of 4672 1980 127ba328e11c2f2e233a545f637138e80d527e594827ebd2989c6663f1ce02c8.exe 110 PID 740 wrote to memory of 1380 740 mnolyk.exe 111 PID 740 wrote to memory of 1380 740 mnolyk.exe 111 PID 740 wrote to memory of 1380 740 mnolyk.exe 111 PID 740 wrote to memory of 4048 740 mnolyk.exe 112 PID 740 wrote to memory of 4048 740 mnolyk.exe 112 PID 740 wrote to memory of 4048 740 mnolyk.exe 112 PID 4048 wrote to memory of 3712 4048 cmd.exe 115 PID 4048 wrote to memory of 3712 4048 cmd.exe 115 PID 4048 wrote to memory of 3712 4048 cmd.exe 115 PID 4048 wrote to memory of 3672 4048 cmd.exe 116 PID 4048 wrote to memory of 3672 4048 cmd.exe 116 PID 4048 wrote to memory of 3672 4048 cmd.exe 116 PID 4048 wrote to memory of 4240 4048 cmd.exe 117 PID 4048 wrote to memory of 4240 4048 cmd.exe 117 PID 4048 wrote to memory of 4240 4048 cmd.exe 117 PID 4048 wrote to memory of 4376 4048 cmd.exe 118 PID 4048 wrote to memory of 4376 4048 cmd.exe 118 PID 4048 wrote to memory of 4376 4048 cmd.exe 118 PID 4048 wrote to memory of 4420 4048 cmd.exe 119 PID 4048 wrote to memory of 4420 4048 cmd.exe 119 PID 4048 wrote to memory of 4420 4048 cmd.exe 119 PID 4048 wrote to memory of 4128 4048 cmd.exe 120 PID 4048 wrote to memory of 4128 4048 cmd.exe 120 PID 4048 wrote to memory of 4128 4048 cmd.exe 120 PID 740 wrote to memory of 1752 740 mnolyk.exe 123 PID 740 wrote to memory of 1752 740 mnolyk.exe 123 PID 740 wrote to memory of 1752 740 mnolyk.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\127ba328e11c2f2e233a545f637138e80d527e594827ebd2989c6663f1ce02c8.exe"C:\Users\Admin\AppData\Local\Temp\127ba328e11c2f2e233a545f637138e80d527e594827ebd2989c6663f1ce02c8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptZh7468Fc.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptZh7468Fc.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptGG0238EF.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptGG0238EF.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptLW4346in.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptLW4346in.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptOu7909ez.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptOu7909ez.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptry3090eX.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptry3090eX.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\begK64gh69.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\begK64gh69.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuJz78BT78.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuJz78BT78.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 13208⤵
- Program crash
PID:4624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsmj64Py36.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsmj64Py36.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 10807⤵
- Program crash
PID:3028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr58kK5539uz.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr58kK5539uz.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 18846⤵
- Program crash
PID:3928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnZj35uR84.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnZj35uR84.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk29Bi91me53.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk29Bi91me53.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:1380
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:3672
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:4240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:4420
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:4128
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1752
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxrh68Ck51.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxrh68Ck51.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 832 -ip 8321⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1180 -ip 11801⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4228 -ip 42281⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:3284
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:5096
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD51a8010e0e635b4fccc00e869e65dd261
SHA1044c55f6489d32922b474f5981adef1ea4e72e70
SHA2562da850ee5dc0837748c45342ef8d75d8bf70f3fad3488a814777593d9c4ea6c0
SHA512658f17809a20359859e9573f37574a35c64f7bad0a6b948b050384d02d1339dbdda2e2462a62eaed2e47d14703c7f3313a2020eda544eeccfd2c8e2ee490013a
-
Filesize
240KB
MD51a8010e0e635b4fccc00e869e65dd261
SHA1044c55f6489d32922b474f5981adef1ea4e72e70
SHA2562da850ee5dc0837748c45342ef8d75d8bf70f3fad3488a814777593d9c4ea6c0
SHA512658f17809a20359859e9573f37574a35c64f7bad0a6b948b050384d02d1339dbdda2e2462a62eaed2e47d14703c7f3313a2020eda544eeccfd2c8e2ee490013a
-
Filesize
240KB
MD51a8010e0e635b4fccc00e869e65dd261
SHA1044c55f6489d32922b474f5981adef1ea4e72e70
SHA2562da850ee5dc0837748c45342ef8d75d8bf70f3fad3488a814777593d9c4ea6c0
SHA512658f17809a20359859e9573f37574a35c64f7bad0a6b948b050384d02d1339dbdda2e2462a62eaed2e47d14703c7f3313a2020eda544eeccfd2c8e2ee490013a
-
Filesize
240KB
MD51a8010e0e635b4fccc00e869e65dd261
SHA1044c55f6489d32922b474f5981adef1ea4e72e70
SHA2562da850ee5dc0837748c45342ef8d75d8bf70f3fad3488a814777593d9c4ea6c0
SHA512658f17809a20359859e9573f37574a35c64f7bad0a6b948b050384d02d1339dbdda2e2462a62eaed2e47d14703c7f3313a2020eda544eeccfd2c8e2ee490013a
-
Filesize
240KB
MD51a8010e0e635b4fccc00e869e65dd261
SHA1044c55f6489d32922b474f5981adef1ea4e72e70
SHA2562da850ee5dc0837748c45342ef8d75d8bf70f3fad3488a814777593d9c4ea6c0
SHA512658f17809a20359859e9573f37574a35c64f7bad0a6b948b050384d02d1339dbdda2e2462a62eaed2e47d14703c7f3313a2020eda544eeccfd2c8e2ee490013a
-
Filesize
177KB
MD53a9dd2a4421da4d3341ea5bbd44bc0d9
SHA1f10749daecd85f3387d84088d5ca4063ace50835
SHA2560b68ed74b75bf40107e6860260982f3751f06b623b68c8f77f2bcfe79f85f338
SHA5126b21faf2598bea4472d6cf950c70355625a0c7833a9534dacf3f445aa726f7517a7965e6a7798aadea02f73a8d4a34accc77c196f5e681077156850baf5f4b99
-
Filesize
177KB
MD53a9dd2a4421da4d3341ea5bbd44bc0d9
SHA1f10749daecd85f3387d84088d5ca4063ace50835
SHA2560b68ed74b75bf40107e6860260982f3751f06b623b68c8f77f2bcfe79f85f338
SHA5126b21faf2598bea4472d6cf950c70355625a0c7833a9534dacf3f445aa726f7517a7965e6a7798aadea02f73a8d4a34accc77c196f5e681077156850baf5f4b99
-
Filesize
1.2MB
MD57ddf7cafbc38e62fa6f5b3ab248e5f5e
SHA17e625cba08c4c6a9547ebb3ab36948e3b32c0378
SHA256a6dc6861504a7e5cc4a0c83eec5fdad28aaa33f74977e8b11a1040e763be116d
SHA5129ad0b094bd8b5a13ada1367f084b905e2e256e024252fa319cf37f2d66377c9fdcd1674a79b89d8f367e5c352c990d44d2658f797dadcc5761f4e4342965bf44
-
Filesize
1.2MB
MD57ddf7cafbc38e62fa6f5b3ab248e5f5e
SHA17e625cba08c4c6a9547ebb3ab36948e3b32c0378
SHA256a6dc6861504a7e5cc4a0c83eec5fdad28aaa33f74977e8b11a1040e763be116d
SHA5129ad0b094bd8b5a13ada1367f084b905e2e256e024252fa319cf37f2d66377c9fdcd1674a79b89d8f367e5c352c990d44d2658f797dadcc5761f4e4342965bf44
-
Filesize
240KB
MD51a8010e0e635b4fccc00e869e65dd261
SHA1044c55f6489d32922b474f5981adef1ea4e72e70
SHA2562da850ee5dc0837748c45342ef8d75d8bf70f3fad3488a814777593d9c4ea6c0
SHA512658f17809a20359859e9573f37574a35c64f7bad0a6b948b050384d02d1339dbdda2e2462a62eaed2e47d14703c7f3313a2020eda544eeccfd2c8e2ee490013a
-
Filesize
240KB
MD51a8010e0e635b4fccc00e869e65dd261
SHA1044c55f6489d32922b474f5981adef1ea4e72e70
SHA2562da850ee5dc0837748c45342ef8d75d8bf70f3fad3488a814777593d9c4ea6c0
SHA512658f17809a20359859e9573f37574a35c64f7bad0a6b948b050384d02d1339dbdda2e2462a62eaed2e47d14703c7f3313a2020eda544eeccfd2c8e2ee490013a
-
Filesize
997KB
MD54fd92fe15893d4bea2acdf6eda2c6983
SHA1d9780715d02cebbea75283d76d044c9cb2ebcd89
SHA256ecb08d510b695a1b4df29017c230aaa896fa2f9d05320a284d9e77add8ec0a69
SHA512f4aae3929e202cea8f8cfaaa4e318759bfb22773503f83a896c4d80110257bcea92a92a4dbcc2bbf114f1d31cc18c3644f64bd89f8710b983b32a4f499549e9c
-
Filesize
997KB
MD54fd92fe15893d4bea2acdf6eda2c6983
SHA1d9780715d02cebbea75283d76d044c9cb2ebcd89
SHA256ecb08d510b695a1b4df29017c230aaa896fa2f9d05320a284d9e77add8ec0a69
SHA512f4aae3929e202cea8f8cfaaa4e318759bfb22773503f83a896c4d80110257bcea92a92a4dbcc2bbf114f1d31cc18c3644f64bd89f8710b983b32a4f499549e9c
-
Filesize
17KB
MD55a81098b59b508d770f01236d5e031f5
SHA15fac9dba86915812bbee3a5c29697267823b3bb4
SHA256ebd58fb269ca2062ca42eb10f90f5498d59dfdbf75902ee66bf7bb5cf39e091d
SHA5121b818c5662695e162b7a4c46983c3fc0e298ede68494229bc3937741e8980c663d575a43e33a6bd8d9c6313d13eda3ea2684567a46ca4585e0fea9c3ed8f73a6
-
Filesize
17KB
MD55a81098b59b508d770f01236d5e031f5
SHA15fac9dba86915812bbee3a5c29697267823b3bb4
SHA256ebd58fb269ca2062ca42eb10f90f5498d59dfdbf75902ee66bf7bb5cf39e091d
SHA5121b818c5662695e162b7a4c46983c3fc0e298ede68494229bc3937741e8980c663d575a43e33a6bd8d9c6313d13eda3ea2684567a46ca4585e0fea9c3ed8f73a6
-
Filesize
893KB
MD5a3eeefe26fadb448067fe27c4ae6e30e
SHA10c920c8f0a6e9ee4ca7cc5457dd5c9e0738f5060
SHA256c664c2138f7b2da046ce93224eb47ceb30b8207c2615dde99a61fa53314b5d74
SHA5126e11169630ff0b52b28ed6748257c87fc9a1fbd3d925c158d0f92aba55154d5622d52a79d53adfc8a1a99a8a67bffdf6ae8c0c51c63654ad973e1e4a4f2b2f25
-
Filesize
893KB
MD5a3eeefe26fadb448067fe27c4ae6e30e
SHA10c920c8f0a6e9ee4ca7cc5457dd5c9e0738f5060
SHA256c664c2138f7b2da046ce93224eb47ceb30b8207c2615dde99a61fa53314b5d74
SHA5126e11169630ff0b52b28ed6748257c87fc9a1fbd3d925c158d0f92aba55154d5622d52a79d53adfc8a1a99a8a67bffdf6ae8c0c51c63654ad973e1e4a4f2b2f25
-
Filesize
304KB
MD5bc94778948460579a0739b42d8018118
SHA1f960e87471a354673dc63408a7cfd07052a18561
SHA256164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b
SHA512ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b
-
Filesize
304KB
MD5bc94778948460579a0739b42d8018118
SHA1f960e87471a354673dc63408a7cfd07052a18561
SHA256164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b
SHA512ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b
-
Filesize
667KB
MD5c592e1d98a16d3b8fb8c1622d0ac3dcc
SHA12cfbc09c5cdac6fb5a875090310e0537f54eece0
SHA25653e490923506d7fd70780016d9746013c643d592ad66cecc56af1d4553c097b5
SHA512f073e93dc60629b8a5e60bbfd8c7ac22ce2120abfabc5f262d1d321b37b6cb442e35ad34a34c3fa5550207f13efd65594e278444d8e65b72fc5a51e8757faf3a
-
Filesize
667KB
MD5c592e1d98a16d3b8fb8c1622d0ac3dcc
SHA12cfbc09c5cdac6fb5a875090310e0537f54eece0
SHA25653e490923506d7fd70780016d9746013c643d592ad66cecc56af1d4553c097b5
SHA512f073e93dc60629b8a5e60bbfd8c7ac22ce2120abfabc5f262d1d321b37b6cb442e35ad34a34c3fa5550207f13efd65594e278444d8e65b72fc5a51e8757faf3a
-
Filesize
246KB
MD51b00aa290c5f57aca9420b25512997ac
SHA1755c6719b2ccaad2292189a34e2250a0a4f098ca
SHA256c8a94b411835cc43efcb2f22680bcd8523065dc9886a406508b6d362c5be8b4a
SHA51293af0e601c6930507a3904b4042bb9c0a175ae71c752b5785622ff72a1d5f58e2b82e867ac750f4ba7b9ba6582443e2b217f799f6787fcbb4c9bfac4f731922d
-
Filesize
246KB
MD51b00aa290c5f57aca9420b25512997ac
SHA1755c6719b2ccaad2292189a34e2250a0a4f098ca
SHA256c8a94b411835cc43efcb2f22680bcd8523065dc9886a406508b6d362c5be8b4a
SHA51293af0e601c6930507a3904b4042bb9c0a175ae71c752b5785622ff72a1d5f58e2b82e867ac750f4ba7b9ba6582443e2b217f799f6787fcbb4c9bfac4f731922d
-
Filesize
392KB
MD5711bac675f9feb3640f765030bb347b5
SHA1a39077ef1a1a8b9ad70650073df587b3ada34657
SHA2568b9e82b6f8744c5fbb2d6a974c6991dc04c09e311d4968a4687734d27a7ef060
SHA512c80ceb1eb1764b29bb5fb10cf73a13a9cbd387c560da46477486a1a1b8ce4b6ba7c2eb8b881d5fbff0fb53ffdb8ffea14f51971bb56ad3a5aa6322cb533da51a
-
Filesize
392KB
MD5711bac675f9feb3640f765030bb347b5
SHA1a39077ef1a1a8b9ad70650073df587b3ada34657
SHA2568b9e82b6f8744c5fbb2d6a974c6991dc04c09e311d4968a4687734d27a7ef060
SHA512c80ceb1eb1764b29bb5fb10cf73a13a9cbd387c560da46477486a1a1b8ce4b6ba7c2eb8b881d5fbff0fb53ffdb8ffea14f51971bb56ad3a5aa6322cb533da51a
-
Filesize
17KB
MD5ddea3e21d455ebf8dc1b6c9ed8206335
SHA1823e6f86ad0fe8f4189381a3fbd9c00adae7613d
SHA2563f8900bcf7a8a8c470470874459747c33d7031a12609ff8ebf9dbcb8ff1e6152
SHA512aed622d05bd4646e4fcf37609dc3c6eeec4180071c4aae41d565835aeaee945cbce003f20dd4cac933cc3d6d1d1b48df433225acfd98b52c78f77314926e4205
-
Filesize
17KB
MD5ddea3e21d455ebf8dc1b6c9ed8206335
SHA1823e6f86ad0fe8f4189381a3fbd9c00adae7613d
SHA2563f8900bcf7a8a8c470470874459747c33d7031a12609ff8ebf9dbcb8ff1e6152
SHA512aed622d05bd4646e4fcf37609dc3c6eeec4180071c4aae41d565835aeaee945cbce003f20dd4cac933cc3d6d1d1b48df433225acfd98b52c78f77314926e4205
-
Filesize
17KB
MD5ddea3e21d455ebf8dc1b6c9ed8206335
SHA1823e6f86ad0fe8f4189381a3fbd9c00adae7613d
SHA2563f8900bcf7a8a8c470470874459747c33d7031a12609ff8ebf9dbcb8ff1e6152
SHA512aed622d05bd4646e4fcf37609dc3c6eeec4180071c4aae41d565835aeaee945cbce003f20dd4cac933cc3d6d1d1b48df433225acfd98b52c78f77314926e4205
-
Filesize
304KB
MD5bc94778948460579a0739b42d8018118
SHA1f960e87471a354673dc63408a7cfd07052a18561
SHA256164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b
SHA512ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b
-
Filesize
304KB
MD5bc94778948460579a0739b42d8018118
SHA1f960e87471a354673dc63408a7cfd07052a18561
SHA256164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b
SHA512ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b
-
Filesize
304KB
MD5bc94778948460579a0739b42d8018118
SHA1f960e87471a354673dc63408a7cfd07052a18561
SHA256164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b
SHA512ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5