Analysis
-
max time kernel
148s -
max time network
115s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
01-03-2023 15:03
Static task
static1
General
-
Target
1fb35cb8e0b5f6ec997a698252b64598f64f6de6a1e5ea10e0ae94f613170101.exe
-
Size
1.3MB
-
MD5
8949152ded4153508acd5cfc6661a42d
-
SHA1
475cd5389c676a29254be5abe2194c47fd7f47d1
-
SHA256
1fb35cb8e0b5f6ec997a698252b64598f64f6de6a1e5ea10e0ae94f613170101
-
SHA512
371418e85c8b62cebddee9482da4f439c3e85565fd1d663fae580004c902329862308d2b68e17eef5b379287db10dd25b199bcbbcf9512198080dc22ead3ddaa
-
SSDEEP
24576:cyFL1VnEDvDY6WGdFr4mHnLKeQbewzBYnBLR+2/aw/TIVnpp:LB1BEJFr4gneNezLNSPp
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsuw89RK43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnfR05ei68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnfR05ei68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beqz40hY13.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beqz40hY13.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsuw89RK43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnfR05ei68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnfR05ei68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnfR05ei68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beqz40hY13.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beqz40hY13.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsuw89RK43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beqz40hY13.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsuw89RK43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsuw89RK43.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
resource yara_rule behavioral1/memory/3724-168-0x00000000022C0000-0x0000000002306000-memory.dmp family_redline behavioral1/memory/3724-170-0x00000000026B0000-0x00000000026F4000-memory.dmp family_redline behavioral1/memory/3724-175-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-178-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-176-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-180-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-182-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-184-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-186-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-188-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-190-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-192-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-194-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-196-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-198-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-200-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-202-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-204-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-206-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-208-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-210-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-212-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-214-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-216-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-218-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-220-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-222-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-224-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-226-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-228-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-230-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-232-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-234-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-236-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/3724-238-0x00000000026B0000-0x00000000026EE000-memory.dmp family_redline behavioral1/memory/4828-1607-0x0000000004B90000-0x0000000004BA0000-memory.dmp family_redline -
Executes dropped EXE 15 IoCs
pid Process 5044 ptgR9037zi.exe 4472 ptYQ2686Zn.exe 4552 ptxK1145jQ.exe 4744 ptJH3124Tt.exe 3096 ptcd2341pk.exe 1812 beqz40hY13.exe 3724 cuTF81uo66.exe 4156 dsuw89RK43.exe 4828 fr59IN9545DB.exe 4220 gnfR05ei68.exe 5032 hk40nK63dM65.exe 5104 mnolyk.exe 508 jxGs97Tt91.exe 1644 mnolyk.exe 3500 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 1500 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsuw89RK43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnfR05ei68.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beqz40hY13.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsuw89RK43.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptcd2341pk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptcd2341pk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1fb35cb8e0b5f6ec997a698252b64598f64f6de6a1e5ea10e0ae94f613170101.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptgR9037zi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptYQ2686Zn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptxK1145jQ.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptJH3124Tt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptJH3124Tt.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1fb35cb8e0b5f6ec997a698252b64598f64f6de6a1e5ea10e0ae94f613170101.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptgR9037zi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptYQ2686Zn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptxK1145jQ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 424 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1812 beqz40hY13.exe 1812 beqz40hY13.exe 3724 cuTF81uo66.exe 3724 cuTF81uo66.exe 4156 dsuw89RK43.exe 4156 dsuw89RK43.exe 4828 fr59IN9545DB.exe 4828 fr59IN9545DB.exe 4220 gnfR05ei68.exe 4220 gnfR05ei68.exe 508 jxGs97Tt91.exe 508 jxGs97Tt91.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1812 beqz40hY13.exe Token: SeDebugPrivilege 3724 cuTF81uo66.exe Token: SeDebugPrivilege 4156 dsuw89RK43.exe Token: SeDebugPrivilege 4828 fr59IN9545DB.exe Token: SeDebugPrivilege 4220 gnfR05ei68.exe Token: SeDebugPrivilege 508 jxGs97Tt91.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4452 wrote to memory of 5044 4452 1fb35cb8e0b5f6ec997a698252b64598f64f6de6a1e5ea10e0ae94f613170101.exe 66 PID 4452 wrote to memory of 5044 4452 1fb35cb8e0b5f6ec997a698252b64598f64f6de6a1e5ea10e0ae94f613170101.exe 66 PID 4452 wrote to memory of 5044 4452 1fb35cb8e0b5f6ec997a698252b64598f64f6de6a1e5ea10e0ae94f613170101.exe 66 PID 5044 wrote to memory of 4472 5044 ptgR9037zi.exe 67 PID 5044 wrote to memory of 4472 5044 ptgR9037zi.exe 67 PID 5044 wrote to memory of 4472 5044 ptgR9037zi.exe 67 PID 4472 wrote to memory of 4552 4472 ptYQ2686Zn.exe 68 PID 4472 wrote to memory of 4552 4472 ptYQ2686Zn.exe 68 PID 4472 wrote to memory of 4552 4472 ptYQ2686Zn.exe 68 PID 4552 wrote to memory of 4744 4552 ptxK1145jQ.exe 69 PID 4552 wrote to memory of 4744 4552 ptxK1145jQ.exe 69 PID 4552 wrote to memory of 4744 4552 ptxK1145jQ.exe 69 PID 4744 wrote to memory of 3096 4744 ptJH3124Tt.exe 70 PID 4744 wrote to memory of 3096 4744 ptJH3124Tt.exe 70 PID 4744 wrote to memory of 3096 4744 ptJH3124Tt.exe 70 PID 3096 wrote to memory of 1812 3096 ptcd2341pk.exe 71 PID 3096 wrote to memory of 1812 3096 ptcd2341pk.exe 71 PID 3096 wrote to memory of 3724 3096 ptcd2341pk.exe 72 PID 3096 wrote to memory of 3724 3096 ptcd2341pk.exe 72 PID 3096 wrote to memory of 3724 3096 ptcd2341pk.exe 72 PID 4744 wrote to memory of 4156 4744 ptJH3124Tt.exe 74 PID 4744 wrote to memory of 4156 4744 ptJH3124Tt.exe 74 PID 4744 wrote to memory of 4156 4744 ptJH3124Tt.exe 74 PID 4552 wrote to memory of 4828 4552 ptxK1145jQ.exe 75 PID 4552 wrote to memory of 4828 4552 ptxK1145jQ.exe 75 PID 4552 wrote to memory of 4828 4552 ptxK1145jQ.exe 75 PID 4472 wrote to memory of 4220 4472 ptYQ2686Zn.exe 76 PID 4472 wrote to memory of 4220 4472 ptYQ2686Zn.exe 76 PID 5044 wrote to memory of 5032 5044 ptgR9037zi.exe 77 PID 5044 wrote to memory of 5032 5044 ptgR9037zi.exe 77 PID 5044 wrote to memory of 5032 5044 ptgR9037zi.exe 77 PID 5032 wrote to memory of 5104 5032 hk40nK63dM65.exe 78 PID 5032 wrote to memory of 5104 5032 hk40nK63dM65.exe 78 PID 5032 wrote to memory of 5104 5032 hk40nK63dM65.exe 78 PID 4452 wrote to memory of 508 4452 1fb35cb8e0b5f6ec997a698252b64598f64f6de6a1e5ea10e0ae94f613170101.exe 79 PID 4452 wrote to memory of 508 4452 1fb35cb8e0b5f6ec997a698252b64598f64f6de6a1e5ea10e0ae94f613170101.exe 79 PID 4452 wrote to memory of 508 4452 1fb35cb8e0b5f6ec997a698252b64598f64f6de6a1e5ea10e0ae94f613170101.exe 79 PID 5104 wrote to memory of 424 5104 mnolyk.exe 80 PID 5104 wrote to memory of 424 5104 mnolyk.exe 80 PID 5104 wrote to memory of 424 5104 mnolyk.exe 80 PID 5104 wrote to memory of 496 5104 mnolyk.exe 81 PID 5104 wrote to memory of 496 5104 mnolyk.exe 81 PID 5104 wrote to memory of 496 5104 mnolyk.exe 81 PID 496 wrote to memory of 1712 496 cmd.exe 84 PID 496 wrote to memory of 1712 496 cmd.exe 84 PID 496 wrote to memory of 1712 496 cmd.exe 84 PID 496 wrote to memory of 1344 496 cmd.exe 85 PID 496 wrote to memory of 1344 496 cmd.exe 85 PID 496 wrote to memory of 1344 496 cmd.exe 85 PID 496 wrote to memory of 1176 496 cmd.exe 86 PID 496 wrote to memory of 1176 496 cmd.exe 86 PID 496 wrote to memory of 1176 496 cmd.exe 86 PID 496 wrote to memory of 1180 496 cmd.exe 87 PID 496 wrote to memory of 1180 496 cmd.exe 87 PID 496 wrote to memory of 1180 496 cmd.exe 87 PID 496 wrote to memory of 1220 496 cmd.exe 88 PID 496 wrote to memory of 1220 496 cmd.exe 88 PID 496 wrote to memory of 1220 496 cmd.exe 88 PID 496 wrote to memory of 1760 496 cmd.exe 89 PID 496 wrote to memory of 1760 496 cmd.exe 89 PID 496 wrote to memory of 1760 496 cmd.exe 89 PID 5104 wrote to memory of 1500 5104 mnolyk.exe 91 PID 5104 wrote to memory of 1500 5104 mnolyk.exe 91 PID 5104 wrote to memory of 1500 5104 mnolyk.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fb35cb8e0b5f6ec997a698252b64598f64f6de6a1e5ea10e0ae94f613170101.exe"C:\Users\Admin\AppData\Local\Temp\1fb35cb8e0b5f6ec997a698252b64598f64f6de6a1e5ea10e0ae94f613170101.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptgR9037zi.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptgR9037zi.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptYQ2686Zn.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptYQ2686Zn.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptxK1145jQ.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptxK1145jQ.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptJH3124Tt.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptJH3124Tt.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptcd2341pk.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptcd2341pk.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beqz40hY13.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beqz40hY13.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuTF81uo66.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuTF81uo66.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsuw89RK43.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsuw89RK43.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr59IN9545DB.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr59IN9545DB.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnfR05ei68.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnfR05ei68.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk40nK63dM65.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk40nK63dM65.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:424
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:1344
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:1176
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:1220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:1760
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1500
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxGs97Tt91.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxGs97Tt91.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:508
-
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:1644
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:3500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5d4e0edbb759f96b1e068da9a72664757
SHA1bf4470178c4b07fc71810c962fcefa195af7f7e6
SHA2563e43b774c45fcf011b47ea025e0018c2b3e8339c9e8b9a8b7e88eaca179e9f25
SHA512c602ed546ad61a4e0a16118649238cb98b1b28b8b6ca82eb72b38a7ba7f2f965dc7eceefcb5f86488bda983b7d110b77e4e35b03175380ca63ab863f2e3831f9
-
Filesize
240KB
MD5d4e0edbb759f96b1e068da9a72664757
SHA1bf4470178c4b07fc71810c962fcefa195af7f7e6
SHA2563e43b774c45fcf011b47ea025e0018c2b3e8339c9e8b9a8b7e88eaca179e9f25
SHA512c602ed546ad61a4e0a16118649238cb98b1b28b8b6ca82eb72b38a7ba7f2f965dc7eceefcb5f86488bda983b7d110b77e4e35b03175380ca63ab863f2e3831f9
-
Filesize
240KB
MD5d4e0edbb759f96b1e068da9a72664757
SHA1bf4470178c4b07fc71810c962fcefa195af7f7e6
SHA2563e43b774c45fcf011b47ea025e0018c2b3e8339c9e8b9a8b7e88eaca179e9f25
SHA512c602ed546ad61a4e0a16118649238cb98b1b28b8b6ca82eb72b38a7ba7f2f965dc7eceefcb5f86488bda983b7d110b77e4e35b03175380ca63ab863f2e3831f9
-
Filesize
240KB
MD5d4e0edbb759f96b1e068da9a72664757
SHA1bf4470178c4b07fc71810c962fcefa195af7f7e6
SHA2563e43b774c45fcf011b47ea025e0018c2b3e8339c9e8b9a8b7e88eaca179e9f25
SHA512c602ed546ad61a4e0a16118649238cb98b1b28b8b6ca82eb72b38a7ba7f2f965dc7eceefcb5f86488bda983b7d110b77e4e35b03175380ca63ab863f2e3831f9
-
Filesize
240KB
MD5d4e0edbb759f96b1e068da9a72664757
SHA1bf4470178c4b07fc71810c962fcefa195af7f7e6
SHA2563e43b774c45fcf011b47ea025e0018c2b3e8339c9e8b9a8b7e88eaca179e9f25
SHA512c602ed546ad61a4e0a16118649238cb98b1b28b8b6ca82eb72b38a7ba7f2f965dc7eceefcb5f86488bda983b7d110b77e4e35b03175380ca63ab863f2e3831f9
-
Filesize
177KB
MD5e4406d3ca06a4da02aa635bc13827d3f
SHA1555a693499ddd8bcf1f26447d79cdc555455ea33
SHA2566bbc6909eb5bd9e11b23968c7c9c17db5f4589f6335e881de6f4d4118e202495
SHA512745a5ef3d0ba10757c41c8cdbe37ff562f75c805809b652cc2bb07fc9637746e0bc126d3ff3d94d944f7bb0df199dcccc7417cd4a786902dbdccc6e935a075b6
-
Filesize
177KB
MD5e4406d3ca06a4da02aa635bc13827d3f
SHA1555a693499ddd8bcf1f26447d79cdc555455ea33
SHA2566bbc6909eb5bd9e11b23968c7c9c17db5f4589f6335e881de6f4d4118e202495
SHA512745a5ef3d0ba10757c41c8cdbe37ff562f75c805809b652cc2bb07fc9637746e0bc126d3ff3d94d944f7bb0df199dcccc7417cd4a786902dbdccc6e935a075b6
-
Filesize
1.2MB
MD567528a1e38beca656da3cd2d8f068e3c
SHA1fec09e08b5ce692122a9f153c810bc31609291d3
SHA2562b9a32b6a4563c9ddb72d07e81740d3dd8e00b9e5bc7fdb9b7c800e1026652f8
SHA512d9a2d8f97cc00c6019065d9c32f0896c978191cf2a5d7b96b8748bdbccdfedde79d46df5bf94c5f5f8fff4d38d0e161ffdc8d6f020cba4b7a49943ab4ac84af1
-
Filesize
1.2MB
MD567528a1e38beca656da3cd2d8f068e3c
SHA1fec09e08b5ce692122a9f153c810bc31609291d3
SHA2562b9a32b6a4563c9ddb72d07e81740d3dd8e00b9e5bc7fdb9b7c800e1026652f8
SHA512d9a2d8f97cc00c6019065d9c32f0896c978191cf2a5d7b96b8748bdbccdfedde79d46df5bf94c5f5f8fff4d38d0e161ffdc8d6f020cba4b7a49943ab4ac84af1
-
Filesize
240KB
MD5d4e0edbb759f96b1e068da9a72664757
SHA1bf4470178c4b07fc71810c962fcefa195af7f7e6
SHA2563e43b774c45fcf011b47ea025e0018c2b3e8339c9e8b9a8b7e88eaca179e9f25
SHA512c602ed546ad61a4e0a16118649238cb98b1b28b8b6ca82eb72b38a7ba7f2f965dc7eceefcb5f86488bda983b7d110b77e4e35b03175380ca63ab863f2e3831f9
-
Filesize
240KB
MD5d4e0edbb759f96b1e068da9a72664757
SHA1bf4470178c4b07fc71810c962fcefa195af7f7e6
SHA2563e43b774c45fcf011b47ea025e0018c2b3e8339c9e8b9a8b7e88eaca179e9f25
SHA512c602ed546ad61a4e0a16118649238cb98b1b28b8b6ca82eb72b38a7ba7f2f965dc7eceefcb5f86488bda983b7d110b77e4e35b03175380ca63ab863f2e3831f9
-
Filesize
995KB
MD56f0f03ddcc58ab694f6f1bbec29928eb
SHA11299254ccebf0a8c81bef7cb03f146e3c89dc01a
SHA25691a52b22626c699ce881824e280e3ad99c678ab2a8d6a52f6356dcf7fa2749f5
SHA512c244d0ba5af311d54ec556d389560eb5e95a22f3c91334777eca47b314f446a7fc2bfc37891b2992226774ead2886967c470fcb418f569b7d0917cca9a24549f
-
Filesize
995KB
MD56f0f03ddcc58ab694f6f1bbec29928eb
SHA11299254ccebf0a8c81bef7cb03f146e3c89dc01a
SHA25691a52b22626c699ce881824e280e3ad99c678ab2a8d6a52f6356dcf7fa2749f5
SHA512c244d0ba5af311d54ec556d389560eb5e95a22f3c91334777eca47b314f446a7fc2bfc37891b2992226774ead2886967c470fcb418f569b7d0917cca9a24549f
-
Filesize
17KB
MD5dbd1850e756b0b2b9434dccdbacaa443
SHA1081dfd877290c3acdfe332653fdb599109ee3029
SHA256b8e43924d0831f3dbe77ec0a63c86460ad3a1e81d3ec8da9a348ad828ad176dd
SHA5122063b34b138c867905186b930c0ba8d34e27c468d5e22ac724d62ac4c02c9a504ea74099a91452c041a17bfa80e5f34e3e8790fe2f4ee5e4255492681bd8b61f
-
Filesize
17KB
MD5dbd1850e756b0b2b9434dccdbacaa443
SHA1081dfd877290c3acdfe332653fdb599109ee3029
SHA256b8e43924d0831f3dbe77ec0a63c86460ad3a1e81d3ec8da9a348ad828ad176dd
SHA5122063b34b138c867905186b930c0ba8d34e27c468d5e22ac724d62ac4c02c9a504ea74099a91452c041a17bfa80e5f34e3e8790fe2f4ee5e4255492681bd8b61f
-
Filesize
893KB
MD5b73b9478984052803a7d0679a64e6816
SHA1b2b90170988430368b0559c194a0de37eea37c6a
SHA256ec92f36f03b8b2ff88828e1f81021bd6621189e59ff22d7dcd11e50cc047acc0
SHA5128e5fea45bf71b4f70d9dae718de4cdf49cdeacf02a8870462555a4cce881e74afb1dada87c0746589ec5e11eca839cd512b50d24a2d60431186e49046d60497d
-
Filesize
893KB
MD5b73b9478984052803a7d0679a64e6816
SHA1b2b90170988430368b0559c194a0de37eea37c6a
SHA256ec92f36f03b8b2ff88828e1f81021bd6621189e59ff22d7dcd11e50cc047acc0
SHA5128e5fea45bf71b4f70d9dae718de4cdf49cdeacf02a8870462555a4cce881e74afb1dada87c0746589ec5e11eca839cd512b50d24a2d60431186e49046d60497d
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
667KB
MD52eda3646bf1f8dea45d6bd399686848d
SHA1878bfb7361a4e6981c84fcc226c758078c00172e
SHA25610c42eded1b7930076f08e6943d423bd697172a9de141578c204d8ca584e56e3
SHA512d6e597b107d22d86fd8e083728a40a84e356705ca1bde5a3f2124f999f7d2ca32e4af7063ea5d65e24b24e8576f7ed8df50953c46bb2acd9717de68c1ab6a420
-
Filesize
667KB
MD52eda3646bf1f8dea45d6bd399686848d
SHA1878bfb7361a4e6981c84fcc226c758078c00172e
SHA25610c42eded1b7930076f08e6943d423bd697172a9de141578c204d8ca584e56e3
SHA512d6e597b107d22d86fd8e083728a40a84e356705ca1bde5a3f2124f999f7d2ca32e4af7063ea5d65e24b24e8576f7ed8df50953c46bb2acd9717de68c1ab6a420
-
Filesize
246KB
MD597c977c85d447742b3e217de53a0f069
SHA1053a758567d8c26f1aea1e74382133097d8ba74d
SHA256ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d
SHA51214fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129
-
Filesize
246KB
MD597c977c85d447742b3e217de53a0f069
SHA1053a758567d8c26f1aea1e74382133097d8ba74d
SHA256ac0fc7e08ddc3011896c384bd8ac2eb0211fed7f54721c0507cece204b33020d
SHA51214fd5ee91e2fb793460e6050eec49b5de99779ca39b5b42f4517499ae313b7955fb53b91f62e2a948468b37b5d257ba30c87c45879784e02d7263380db63e129
-
Filesize
391KB
MD54b198d20232f231984cddcaf7d5c4de3
SHA1f3cf2bc9f8376163e8ce5df9f9a7ef1ef0165e40
SHA256dd57fe72545a61ab53930cf49bbed2a29d4c66c1afba27d003436128aef778eb
SHA512ffe4d701f1f7431ac5e5537de27674961c29bc167fca5c0e9c76c721d3aa01fdeaf2d0c182f10a81940f1677e84e52659d9df001886281c9eace22e618d60d14
-
Filesize
391KB
MD54b198d20232f231984cddcaf7d5c4de3
SHA1f3cf2bc9f8376163e8ce5df9f9a7ef1ef0165e40
SHA256dd57fe72545a61ab53930cf49bbed2a29d4c66c1afba27d003436128aef778eb
SHA512ffe4d701f1f7431ac5e5537de27674961c29bc167fca5c0e9c76c721d3aa01fdeaf2d0c182f10a81940f1677e84e52659d9df001886281c9eace22e618d60d14
-
Filesize
17KB
MD5225d981de51dbe7fc0be09948417287f
SHA113a130145bbe762c0d575655d1af58f5752595c9
SHA256aeac72db9b6ef738deb92dcf50cbc7db99884637f682003505e785b992158919
SHA512a6eaab254fd2445d52f1b1342c9dd5a10450949e44eb5f5127efe000010f4c721d51e0a1e575f906675b0c252536d1a9c353a82ed03dd5d96f8f779ed5894166
-
Filesize
17KB
MD5225d981de51dbe7fc0be09948417287f
SHA113a130145bbe762c0d575655d1af58f5752595c9
SHA256aeac72db9b6ef738deb92dcf50cbc7db99884637f682003505e785b992158919
SHA512a6eaab254fd2445d52f1b1342c9dd5a10450949e44eb5f5127efe000010f4c721d51e0a1e575f906675b0c252536d1a9c353a82ed03dd5d96f8f779ed5894166
-
Filesize
17KB
MD5225d981de51dbe7fc0be09948417287f
SHA113a130145bbe762c0d575655d1af58f5752595c9
SHA256aeac72db9b6ef738deb92dcf50cbc7db99884637f682003505e785b992158919
SHA512a6eaab254fd2445d52f1b1342c9dd5a10450949e44eb5f5127efe000010f4c721d51e0a1e575f906675b0c252536d1a9c353a82ed03dd5d96f8f779ed5894166
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78