Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 15:00
Static task
static1
General
-
Target
21bfde5c236f0db2363a3fef25d305c689649b39fbf8cb493fc7b148748382fb.exe
-
Size
1.3MB
-
MD5
4776552ef76f0dc7fd74cff6e5ce2210
-
SHA1
6f8daddb7f08d79455d1403178755d2f1cc34d2f
-
SHA256
21bfde5c236f0db2363a3fef25d305c689649b39fbf8cb493fc7b148748382fb
-
SHA512
757bfc708805e7fd0de37bdd9df444eed0163644d912b28f30fb38c3fc6b2fda4111328e122e8995b641ea6f08b480885a4da5459997ba5dd86f4a1ac2dd5dfc
-
SSDEEP
24576:myr3m2No8tdqUa96s9Fg8TTYzPjQvbQ9kzG9DUfDrRlRNZlAvcT1Uyzb/fSdsh:1r3m2NJHDW6KFjTUEvEKa9ARhZlPTnS6
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsgO12UB81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnKh09AP76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnKh09AP76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnKh09AP76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beBA95rW40.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsgO12UB81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsgO12UB81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsgO12UB81.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beBA95rW40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beBA95rW40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beBA95rW40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsgO12UB81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnKh09AP76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnKh09AP76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beBA95rW40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beBA95rW40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsgO12UB81.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/3420-183-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-184-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-186-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-190-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-193-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-195-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-197-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-199-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-201-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-203-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-205-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-207-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-209-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-211-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-213-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-215-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-217-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-219-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-221-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-223-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-225-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-227-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-229-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-231-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-233-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-235-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-237-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-239-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-241-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-243-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-245-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-247-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3420-249-0x0000000004B30000-0x0000000004B6E000-memory.dmp family_redline behavioral1/memory/3572-2065-0x0000000004E10000-0x0000000004E20000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation mnolyk.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation hk73SN35Fv52.exe -
Executes dropped EXE 15 IoCs
pid Process 2080 ptFU3653aW.exe 1284 ptwY6858kb.exe 3200 ptjx4794bH.exe 2752 ptWS5882FU.exe 3944 ptsf1541jC.exe 3888 beBA95rW40.exe 3420 cuun24Yw22.exe 1592 dsgO12UB81.exe 3572 fr09Bs7634eM.exe 312 gnKh09AP76.exe 3272 hk73SN35Fv52.exe 2456 mnolyk.exe 1568 jxFk88eK78.exe 5100 mnolyk.exe 1752 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 384 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsgO12UB81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsgO12UB81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnKh09AP76.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beBA95rW40.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptwY6858kb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptjx4794bH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptjx4794bH.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptWS5882FU.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptsf1541jC.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 21bfde5c236f0db2363a3fef25d305c689649b39fbf8cb493fc7b148748382fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 21bfde5c236f0db2363a3fef25d305c689649b39fbf8cb493fc7b148748382fb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptFU3653aW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptFU3653aW.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptwY6858kb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptWS5882FU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptsf1541jC.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 4452 3420 WerFault.exe 96 3896 1592 WerFault.exe 101 3108 3572 WerFault.exe 104 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3888 beBA95rW40.exe 3888 beBA95rW40.exe 3420 cuun24Yw22.exe 3420 cuun24Yw22.exe 1592 dsgO12UB81.exe 1592 dsgO12UB81.exe 3572 fr09Bs7634eM.exe 3572 fr09Bs7634eM.exe 312 gnKh09AP76.exe 312 gnKh09AP76.exe 1568 jxFk88eK78.exe 1568 jxFk88eK78.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3888 beBA95rW40.exe Token: SeDebugPrivilege 3420 cuun24Yw22.exe Token: SeDebugPrivilege 1592 dsgO12UB81.exe Token: SeDebugPrivilege 3572 fr09Bs7634eM.exe Token: SeDebugPrivilege 312 gnKh09AP76.exe Token: SeDebugPrivilege 1568 jxFk88eK78.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 2080 3712 21bfde5c236f0db2363a3fef25d305c689649b39fbf8cb493fc7b148748382fb.exe 86 PID 3712 wrote to memory of 2080 3712 21bfde5c236f0db2363a3fef25d305c689649b39fbf8cb493fc7b148748382fb.exe 86 PID 3712 wrote to memory of 2080 3712 21bfde5c236f0db2363a3fef25d305c689649b39fbf8cb493fc7b148748382fb.exe 86 PID 2080 wrote to memory of 1284 2080 ptFU3653aW.exe 87 PID 2080 wrote to memory of 1284 2080 ptFU3653aW.exe 87 PID 2080 wrote to memory of 1284 2080 ptFU3653aW.exe 87 PID 1284 wrote to memory of 3200 1284 ptwY6858kb.exe 88 PID 1284 wrote to memory of 3200 1284 ptwY6858kb.exe 88 PID 1284 wrote to memory of 3200 1284 ptwY6858kb.exe 88 PID 3200 wrote to memory of 2752 3200 ptjx4794bH.exe 89 PID 3200 wrote to memory of 2752 3200 ptjx4794bH.exe 89 PID 3200 wrote to memory of 2752 3200 ptjx4794bH.exe 89 PID 2752 wrote to memory of 3944 2752 ptWS5882FU.exe 90 PID 2752 wrote to memory of 3944 2752 ptWS5882FU.exe 90 PID 2752 wrote to memory of 3944 2752 ptWS5882FU.exe 90 PID 3944 wrote to memory of 3888 3944 ptsf1541jC.exe 91 PID 3944 wrote to memory of 3888 3944 ptsf1541jC.exe 91 PID 3944 wrote to memory of 3420 3944 ptsf1541jC.exe 96 PID 3944 wrote to memory of 3420 3944 ptsf1541jC.exe 96 PID 3944 wrote to memory of 3420 3944 ptsf1541jC.exe 96 PID 2752 wrote to memory of 1592 2752 ptWS5882FU.exe 101 PID 2752 wrote to memory of 1592 2752 ptWS5882FU.exe 101 PID 2752 wrote to memory of 1592 2752 ptWS5882FU.exe 101 PID 3200 wrote to memory of 3572 3200 ptjx4794bH.exe 104 PID 3200 wrote to memory of 3572 3200 ptjx4794bH.exe 104 PID 3200 wrote to memory of 3572 3200 ptjx4794bH.exe 104 PID 1284 wrote to memory of 312 1284 ptwY6858kb.exe 108 PID 1284 wrote to memory of 312 1284 ptwY6858kb.exe 108 PID 2080 wrote to memory of 3272 2080 ptFU3653aW.exe 109 PID 2080 wrote to memory of 3272 2080 ptFU3653aW.exe 109 PID 2080 wrote to memory of 3272 2080 ptFU3653aW.exe 109 PID 3272 wrote to memory of 2456 3272 hk73SN35Fv52.exe 110 PID 3272 wrote to memory of 2456 3272 hk73SN35Fv52.exe 110 PID 3272 wrote to memory of 2456 3272 hk73SN35Fv52.exe 110 PID 3712 wrote to memory of 1568 3712 21bfde5c236f0db2363a3fef25d305c689649b39fbf8cb493fc7b148748382fb.exe 111 PID 3712 wrote to memory of 1568 3712 21bfde5c236f0db2363a3fef25d305c689649b39fbf8cb493fc7b148748382fb.exe 111 PID 3712 wrote to memory of 1568 3712 21bfde5c236f0db2363a3fef25d305c689649b39fbf8cb493fc7b148748382fb.exe 111 PID 2456 wrote to memory of 4004 2456 mnolyk.exe 112 PID 2456 wrote to memory of 4004 2456 mnolyk.exe 112 PID 2456 wrote to memory of 4004 2456 mnolyk.exe 112 PID 2456 wrote to memory of 2428 2456 mnolyk.exe 114 PID 2456 wrote to memory of 2428 2456 mnolyk.exe 114 PID 2456 wrote to memory of 2428 2456 mnolyk.exe 114 PID 2428 wrote to memory of 2824 2428 cmd.exe 116 PID 2428 wrote to memory of 2824 2428 cmd.exe 116 PID 2428 wrote to memory of 2824 2428 cmd.exe 116 PID 2428 wrote to memory of 3664 2428 cmd.exe 117 PID 2428 wrote to memory of 3664 2428 cmd.exe 117 PID 2428 wrote to memory of 3664 2428 cmd.exe 117 PID 2428 wrote to memory of 3052 2428 cmd.exe 118 PID 2428 wrote to memory of 3052 2428 cmd.exe 118 PID 2428 wrote to memory of 3052 2428 cmd.exe 118 PID 2428 wrote to memory of 1648 2428 cmd.exe 119 PID 2428 wrote to memory of 1648 2428 cmd.exe 119 PID 2428 wrote to memory of 1648 2428 cmd.exe 119 PID 2428 wrote to memory of 4452 2428 cmd.exe 120 PID 2428 wrote to memory of 4452 2428 cmd.exe 120 PID 2428 wrote to memory of 4452 2428 cmd.exe 120 PID 2428 wrote to memory of 2612 2428 cmd.exe 121 PID 2428 wrote to memory of 2612 2428 cmd.exe 121 PID 2428 wrote to memory of 2612 2428 cmd.exe 121 PID 2456 wrote to memory of 384 2456 mnolyk.exe 125 PID 2456 wrote to memory of 384 2456 mnolyk.exe 125 PID 2456 wrote to memory of 384 2456 mnolyk.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\21bfde5c236f0db2363a3fef25d305c689649b39fbf8cb493fc7b148748382fb.exe"C:\Users\Admin\AppData\Local\Temp\21bfde5c236f0db2363a3fef25d305c689649b39fbf8cb493fc7b148748382fb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptFU3653aW.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptFU3653aW.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptwY6858kb.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptwY6858kb.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptjx4794bH.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptjx4794bH.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptWS5882FU.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptWS5882FU.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptsf1541jC.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptsf1541jC.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beBA95rW40.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beBA95rW40.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuun24Yw22.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuun24Yw22.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 13648⤵
- Program crash
PID:4452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsgO12UB81.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsgO12UB81.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 10847⤵
- Program crash
PID:3896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr09Bs7634eM.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr09Bs7634eM.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 20246⤵
- Program crash
PID:3108
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnKh09AP76.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnKh09AP76.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:312
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk73SN35Fv52.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk73SN35Fv52.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:4004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:3664
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:3052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:4452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:2612
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:384
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxFk88eK78.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxFk88eK78.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3420 -ip 34201⤵PID:2824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1592 -ip 15921⤵PID:3696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3572 -ip 35721⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:5100
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:1752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD582975cb6edbe18484d4268c42afcb09e
SHA10bd28c43d7692f0e577c92faf86df05d1a502d8e
SHA2561629eeb3817cc4e46ac5d27cc6c2242885870486c86e7c554307abaf85e99667
SHA5122c2b5c52fb8e17c6798f704cf8098f0386b9a5763b30a55202da2e6e2bef0420252d66979c5f263e3f6f7a3808244530cde4b2bb4f79f0780b2ac355c81bcbed
-
Filesize
240KB
MD582975cb6edbe18484d4268c42afcb09e
SHA10bd28c43d7692f0e577c92faf86df05d1a502d8e
SHA2561629eeb3817cc4e46ac5d27cc6c2242885870486c86e7c554307abaf85e99667
SHA5122c2b5c52fb8e17c6798f704cf8098f0386b9a5763b30a55202da2e6e2bef0420252d66979c5f263e3f6f7a3808244530cde4b2bb4f79f0780b2ac355c81bcbed
-
Filesize
240KB
MD582975cb6edbe18484d4268c42afcb09e
SHA10bd28c43d7692f0e577c92faf86df05d1a502d8e
SHA2561629eeb3817cc4e46ac5d27cc6c2242885870486c86e7c554307abaf85e99667
SHA5122c2b5c52fb8e17c6798f704cf8098f0386b9a5763b30a55202da2e6e2bef0420252d66979c5f263e3f6f7a3808244530cde4b2bb4f79f0780b2ac355c81bcbed
-
Filesize
240KB
MD582975cb6edbe18484d4268c42afcb09e
SHA10bd28c43d7692f0e577c92faf86df05d1a502d8e
SHA2561629eeb3817cc4e46ac5d27cc6c2242885870486c86e7c554307abaf85e99667
SHA5122c2b5c52fb8e17c6798f704cf8098f0386b9a5763b30a55202da2e6e2bef0420252d66979c5f263e3f6f7a3808244530cde4b2bb4f79f0780b2ac355c81bcbed
-
Filesize
240KB
MD582975cb6edbe18484d4268c42afcb09e
SHA10bd28c43d7692f0e577c92faf86df05d1a502d8e
SHA2561629eeb3817cc4e46ac5d27cc6c2242885870486c86e7c554307abaf85e99667
SHA5122c2b5c52fb8e17c6798f704cf8098f0386b9a5763b30a55202da2e6e2bef0420252d66979c5f263e3f6f7a3808244530cde4b2bb4f79f0780b2ac355c81bcbed
-
Filesize
177KB
MD526ae1be20c482a014dcd41183da162ad
SHA13ce8578a1dcff8b756dc646882427e8064b5490d
SHA256c73326ba2adeb955fef93e4a7722ae7b8400c547677eead0f86b5ea57dbab495
SHA5120c258f8ed9011c6440124622997302cb9daf78a91825905b6605baf922f9efd82f76bdf07b56e18e0b083ce0b549bc1b2cc2b0032299da7f512f858092ef39b8
-
Filesize
177KB
MD526ae1be20c482a014dcd41183da162ad
SHA13ce8578a1dcff8b756dc646882427e8064b5490d
SHA256c73326ba2adeb955fef93e4a7722ae7b8400c547677eead0f86b5ea57dbab495
SHA5120c258f8ed9011c6440124622997302cb9daf78a91825905b6605baf922f9efd82f76bdf07b56e18e0b083ce0b549bc1b2cc2b0032299da7f512f858092ef39b8
-
Filesize
1.2MB
MD570a49bafdeea07e92f87a02c0e3c7bce
SHA1d2a7093a019f101f2853eeeadb837d5c0d47b1ec
SHA256aedcdee0a93d83576138f1faaa272dd7f25b6197aaa3d14cb6c4c3b7a9c7b921
SHA51209206d9b425cb34d7b468fe10f862f794548bb28e3a10368295515377be2518b8563b9b87ed9531e163d1114dc31f82441fb34d308bb51ad5731201b7fa0911e
-
Filesize
1.2MB
MD570a49bafdeea07e92f87a02c0e3c7bce
SHA1d2a7093a019f101f2853eeeadb837d5c0d47b1ec
SHA256aedcdee0a93d83576138f1faaa272dd7f25b6197aaa3d14cb6c4c3b7a9c7b921
SHA51209206d9b425cb34d7b468fe10f862f794548bb28e3a10368295515377be2518b8563b9b87ed9531e163d1114dc31f82441fb34d308bb51ad5731201b7fa0911e
-
Filesize
240KB
MD582975cb6edbe18484d4268c42afcb09e
SHA10bd28c43d7692f0e577c92faf86df05d1a502d8e
SHA2561629eeb3817cc4e46ac5d27cc6c2242885870486c86e7c554307abaf85e99667
SHA5122c2b5c52fb8e17c6798f704cf8098f0386b9a5763b30a55202da2e6e2bef0420252d66979c5f263e3f6f7a3808244530cde4b2bb4f79f0780b2ac355c81bcbed
-
Filesize
240KB
MD582975cb6edbe18484d4268c42afcb09e
SHA10bd28c43d7692f0e577c92faf86df05d1a502d8e
SHA2561629eeb3817cc4e46ac5d27cc6c2242885870486c86e7c554307abaf85e99667
SHA5122c2b5c52fb8e17c6798f704cf8098f0386b9a5763b30a55202da2e6e2bef0420252d66979c5f263e3f6f7a3808244530cde4b2bb4f79f0780b2ac355c81bcbed
-
Filesize
996KB
MD5063486bd0d4f8547aa8afdd8feb27a31
SHA1c366c317e9cba2c5112189e78a1c804e9e8858e5
SHA2561857ffc695cdb2b24a81d30cd16889d1e80076af876a9442bedc8f333664da66
SHA5129a86686ec92cf45dcaef575e2bcdf9da149198b1078f544837fa7eb67ad60588cc155616515a708e11fe367c5448c3498123aacc162b4cda66e2be74106bdd8d
-
Filesize
996KB
MD5063486bd0d4f8547aa8afdd8feb27a31
SHA1c366c317e9cba2c5112189e78a1c804e9e8858e5
SHA2561857ffc695cdb2b24a81d30cd16889d1e80076af876a9442bedc8f333664da66
SHA5129a86686ec92cf45dcaef575e2bcdf9da149198b1078f544837fa7eb67ad60588cc155616515a708e11fe367c5448c3498123aacc162b4cda66e2be74106bdd8d
-
Filesize
17KB
MD5321ac6600f8870865e5bb9f7bf896581
SHA10354c9d5f49dc6348008582b79973e360817ca5f
SHA256e9ea80712defc7c5c0eb2b5ec2204f22916a87fb16100217fa8b597144b55c36
SHA512c3e03f846381a9f4cd6b6ca5f4dbfb20a420dbcc225e8bb07ff454fc832e29fca8b46dbfd1d2e209b05d40afa1fa113694cbe082d3728207de931a6e10e79448
-
Filesize
17KB
MD5321ac6600f8870865e5bb9f7bf896581
SHA10354c9d5f49dc6348008582b79973e360817ca5f
SHA256e9ea80712defc7c5c0eb2b5ec2204f22916a87fb16100217fa8b597144b55c36
SHA512c3e03f846381a9f4cd6b6ca5f4dbfb20a420dbcc225e8bb07ff454fc832e29fca8b46dbfd1d2e209b05d40afa1fa113694cbe082d3728207de931a6e10e79448
-
Filesize
892KB
MD5822b46369d97717dbcb9ec457bd628ef
SHA10a774bf58f0c5a95c7dc688397452640d6c94f56
SHA25613f23dd05179d5bf49d10ab17a758d6ab759ed5e9f162fc386d32be9d8b4821f
SHA512bc2a467b3311fcb58d94b5562a78e080015832b6cefe6561fdef6c20dc2eb32b720906a15723c9edb1a5bbc057ea5746969b9bd5de06d6ed575a0d0c2deeba5f
-
Filesize
892KB
MD5822b46369d97717dbcb9ec457bd628ef
SHA10a774bf58f0c5a95c7dc688397452640d6c94f56
SHA25613f23dd05179d5bf49d10ab17a758d6ab759ed5e9f162fc386d32be9d8b4821f
SHA512bc2a467b3311fcb58d94b5562a78e080015832b6cefe6561fdef6c20dc2eb32b720906a15723c9edb1a5bbc057ea5746969b9bd5de06d6ed575a0d0c2deeba5f
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
667KB
MD5c8cea7549ab45f414d172db931fe981a
SHA11916fe62a019d4f785540dd8faa1b9e9c180f8be
SHA256fb3562f1549aeaddfa72bf347b9f10509b45b17a1dd2005e3d75c7a8c9defd56
SHA51249d11d69fec788c4d950fa07e547824f8db125a464ea0c0bd58ea819bc888543300db258babb0d9cd0222104d46738f8d6fc7512a097ddb13650c3cf90155125
-
Filesize
667KB
MD5c8cea7549ab45f414d172db931fe981a
SHA11916fe62a019d4f785540dd8faa1b9e9c180f8be
SHA256fb3562f1549aeaddfa72bf347b9f10509b45b17a1dd2005e3d75c7a8c9defd56
SHA51249d11d69fec788c4d950fa07e547824f8db125a464ea0c0bd58ea819bc888543300db258babb0d9cd0222104d46738f8d6fc7512a097ddb13650c3cf90155125
-
Filesize
246KB
MD597c977c85d447742b3e217de53a0f069
SHA1053a758567d8c26f1aea1e74382133097d8ba74d
SHA256ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d
SHA51214fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129
-
Filesize
246KB
MD597c977c85d447742b3e217de53a0f069
SHA1053a758567d8c26f1aea1e74382133097d8ba74d
SHA256ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d
SHA51214fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129
-
Filesize
391KB
MD529624bfe106263371d066b6a342e61f6
SHA1f4c3a2287005ab6356886d2dfd182f85adfd10b1
SHA2565c7f2e397a3acecdfc84d5ad62d6e703da083a54950c17cb221920899fb9aab6
SHA512ac5e0c1f66b18669c8f2d93f02397070f79a3ef6218176aa433216799ea0f6b886a38fda2df550d367be004eb0819dc33a2d2473b616e1c62ccd6abfb188fa46
-
Filesize
391KB
MD529624bfe106263371d066b6a342e61f6
SHA1f4c3a2287005ab6356886d2dfd182f85adfd10b1
SHA2565c7f2e397a3acecdfc84d5ad62d6e703da083a54950c17cb221920899fb9aab6
SHA512ac5e0c1f66b18669c8f2d93f02397070f79a3ef6218176aa433216799ea0f6b886a38fda2df550d367be004eb0819dc33a2d2473b616e1c62ccd6abfb188fa46
-
Filesize
17KB
MD5ace0493857b83f18582858ba3cc69ae5
SHA18ba5fee9012424cb748868ac8bde9fa1e092adeb
SHA25676c1f72deecf9dd35c19416807010c8bdc33bd450e8a1fff119a92a6f0c5989a
SHA512a574701a877954e4335d2ba6acdb7ce28d07e7139552e7cd0d711d67041bdd8f742608d98d062fb743f1101a580d93141a29bacc804d48314eb48aa0bd4d2774
-
Filesize
17KB
MD5ace0493857b83f18582858ba3cc69ae5
SHA18ba5fee9012424cb748868ac8bde9fa1e092adeb
SHA25676c1f72deecf9dd35c19416807010c8bdc33bd450e8a1fff119a92a6f0c5989a
SHA512a574701a877954e4335d2ba6acdb7ce28d07e7139552e7cd0d711d67041bdd8f742608d98d062fb743f1101a580d93141a29bacc804d48314eb48aa0bd4d2774
-
Filesize
17KB
MD5ace0493857b83f18582858ba3cc69ae5
SHA18ba5fee9012424cb748868ac8bde9fa1e092adeb
SHA25676c1f72deecf9dd35c19416807010c8bdc33bd450e8a1fff119a92a6f0c5989a
SHA512a574701a877954e4335d2ba6acdb7ce28d07e7139552e7cd0d711d67041bdd8f742608d98d062fb743f1101a580d93141a29bacc804d48314eb48aa0bd4d2774
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5