Analysis
-
max time kernel
133s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 15:09
Static task
static1
General
-
Target
153cec8300a06239f5da82820e5ad7ddf9ba7f2c98f71f591d191f7d5dbf2ca6.exe
-
Size
1.3MB
-
MD5
b1a220f50bf66594a70254b70526ab1d
-
SHA1
77ec51d408904eadf4b477bb9cfdf3c8e0f0cf1e
-
SHA256
153cec8300a06239f5da82820e5ad7ddf9ba7f2c98f71f591d191f7d5dbf2ca6
-
SHA512
ab42248b605188d12e252f89bc7cf628eede61bed033074618cd87da964b8ba6df7f2824139b15e9e86f9421b55d91f0983c42eb2d62e6a9efe568ae28b074ed
-
SSDEEP
24576:8y4d6VJm94VqxrF4U7Xlf4Zs/lVXqS1cVKldPnYv1e87Zck/GdXJY1mjPvjo:rBOGVqj4UTSZsqHViNnoGpjPv
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beEJ80gA30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beEJ80gA30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsfa36Gc16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beEJ80gA30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsfa36Gc16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnoc56iB38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnoc56iB38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnoc56iB38.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beEJ80gA30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beEJ80gA30.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsfa36Gc16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsfa36Gc16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnoc56iB38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnoc56iB38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beEJ80gA30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsfa36Gc16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsfa36Gc16.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/4364-186-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-187-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-189-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-191-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-193-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-195-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-197-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-199-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-201-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-203-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-205-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-207-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-209-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-211-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-213-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-215-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-217-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-219-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-221-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-223-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-225-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-227-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-229-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-231-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-233-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-235-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-237-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-239-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-241-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-243-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-245-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-247-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/4364-249-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation hk96cT62iE00.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 15 IoCs
pid Process 3492 ptvR5727kL.exe 5080 ptxN5246NH.exe 444 ptJf7686Yu.exe 3728 ptjm8554Sa.exe 4720 ptma7402ba.exe 4056 beEJ80gA30.exe 4364 cuQy72nL17.exe 3508 dsfa36Gc16.exe 552 fr67hN7777wf.exe 4116 gnoc56iB38.exe 1708 hk96cT62iE00.exe 4320 mnolyk.exe 4204 jxli37cH47.exe 1700 mnolyk.exe 4468 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2468 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsfa36Gc16.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnoc56iB38.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beEJ80gA30.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsfa36Gc16.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptJf7686Yu.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptma7402ba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptvR5727kL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptvR5727kL.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptxN5246NH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptxN5246NH.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptJf7686Yu.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptjm8554Sa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 153cec8300a06239f5da82820e5ad7ddf9ba7f2c98f71f591d191f7d5dbf2ca6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 153cec8300a06239f5da82820e5ad7ddf9ba7f2c98f71f591d191f7d5dbf2ca6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptjm8554Sa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptma7402ba.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1580 4364 WerFault.exe 95 4648 3508 WerFault.exe 99 2552 552 WerFault.exe 111 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3340 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4056 beEJ80gA30.exe 4056 beEJ80gA30.exe 4364 cuQy72nL17.exe 4364 cuQy72nL17.exe 3508 dsfa36Gc16.exe 3508 dsfa36Gc16.exe 552 fr67hN7777wf.exe 552 fr67hN7777wf.exe 4116 gnoc56iB38.exe 4116 gnoc56iB38.exe 4204 jxli37cH47.exe 4204 jxli37cH47.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4056 beEJ80gA30.exe Token: SeDebugPrivilege 4364 cuQy72nL17.exe Token: SeDebugPrivilege 3508 dsfa36Gc16.exe Token: SeDebugPrivilege 552 fr67hN7777wf.exe Token: SeDebugPrivilege 4116 gnoc56iB38.exe Token: SeDebugPrivilege 4204 jxli37cH47.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 3492 2688 153cec8300a06239f5da82820e5ad7ddf9ba7f2c98f71f591d191f7d5dbf2ca6.exe 81 PID 2688 wrote to memory of 3492 2688 153cec8300a06239f5da82820e5ad7ddf9ba7f2c98f71f591d191f7d5dbf2ca6.exe 81 PID 2688 wrote to memory of 3492 2688 153cec8300a06239f5da82820e5ad7ddf9ba7f2c98f71f591d191f7d5dbf2ca6.exe 81 PID 3492 wrote to memory of 5080 3492 ptvR5727kL.exe 83 PID 3492 wrote to memory of 5080 3492 ptvR5727kL.exe 83 PID 3492 wrote to memory of 5080 3492 ptvR5727kL.exe 83 PID 5080 wrote to memory of 444 5080 ptxN5246NH.exe 84 PID 5080 wrote to memory of 444 5080 ptxN5246NH.exe 84 PID 5080 wrote to memory of 444 5080 ptxN5246NH.exe 84 PID 444 wrote to memory of 3728 444 ptJf7686Yu.exe 85 PID 444 wrote to memory of 3728 444 ptJf7686Yu.exe 85 PID 444 wrote to memory of 3728 444 ptJf7686Yu.exe 85 PID 3728 wrote to memory of 4720 3728 ptjm8554Sa.exe 86 PID 3728 wrote to memory of 4720 3728 ptjm8554Sa.exe 86 PID 3728 wrote to memory of 4720 3728 ptjm8554Sa.exe 86 PID 4720 wrote to memory of 4056 4720 ptma7402ba.exe 87 PID 4720 wrote to memory of 4056 4720 ptma7402ba.exe 87 PID 4720 wrote to memory of 4364 4720 ptma7402ba.exe 95 PID 4720 wrote to memory of 4364 4720 ptma7402ba.exe 95 PID 4720 wrote to memory of 4364 4720 ptma7402ba.exe 95 PID 3728 wrote to memory of 3508 3728 ptjm8554Sa.exe 99 PID 3728 wrote to memory of 3508 3728 ptjm8554Sa.exe 99 PID 3728 wrote to memory of 3508 3728 ptjm8554Sa.exe 99 PID 444 wrote to memory of 552 444 ptJf7686Yu.exe 111 PID 444 wrote to memory of 552 444 ptJf7686Yu.exe 111 PID 444 wrote to memory of 552 444 ptJf7686Yu.exe 111 PID 5080 wrote to memory of 4116 5080 ptxN5246NH.exe 114 PID 5080 wrote to memory of 4116 5080 ptxN5246NH.exe 114 PID 3492 wrote to memory of 1708 3492 ptvR5727kL.exe 115 PID 3492 wrote to memory of 1708 3492 ptvR5727kL.exe 115 PID 3492 wrote to memory of 1708 3492 ptvR5727kL.exe 115 PID 1708 wrote to memory of 4320 1708 hk96cT62iE00.exe 116 PID 1708 wrote to memory of 4320 1708 hk96cT62iE00.exe 116 PID 1708 wrote to memory of 4320 1708 hk96cT62iE00.exe 116 PID 2688 wrote to memory of 4204 2688 153cec8300a06239f5da82820e5ad7ddf9ba7f2c98f71f591d191f7d5dbf2ca6.exe 117 PID 2688 wrote to memory of 4204 2688 153cec8300a06239f5da82820e5ad7ddf9ba7f2c98f71f591d191f7d5dbf2ca6.exe 117 PID 2688 wrote to memory of 4204 2688 153cec8300a06239f5da82820e5ad7ddf9ba7f2c98f71f591d191f7d5dbf2ca6.exe 117 PID 4320 wrote to memory of 3340 4320 mnolyk.exe 118 PID 4320 wrote to memory of 3340 4320 mnolyk.exe 118 PID 4320 wrote to memory of 3340 4320 mnolyk.exe 118 PID 4320 wrote to memory of 3948 4320 mnolyk.exe 120 PID 4320 wrote to memory of 3948 4320 mnolyk.exe 120 PID 4320 wrote to memory of 3948 4320 mnolyk.exe 120 PID 3948 wrote to memory of 4648 3948 cmd.exe 122 PID 3948 wrote to memory of 4648 3948 cmd.exe 122 PID 3948 wrote to memory of 4648 3948 cmd.exe 122 PID 3948 wrote to memory of 4004 3948 cmd.exe 123 PID 3948 wrote to memory of 4004 3948 cmd.exe 123 PID 3948 wrote to memory of 4004 3948 cmd.exe 123 PID 3948 wrote to memory of 3804 3948 cmd.exe 124 PID 3948 wrote to memory of 3804 3948 cmd.exe 124 PID 3948 wrote to memory of 3804 3948 cmd.exe 124 PID 3948 wrote to memory of 5096 3948 cmd.exe 126 PID 3948 wrote to memory of 5096 3948 cmd.exe 126 PID 3948 wrote to memory of 5096 3948 cmd.exe 126 PID 3948 wrote to memory of 3960 3948 cmd.exe 125 PID 3948 wrote to memory of 3960 3948 cmd.exe 125 PID 3948 wrote to memory of 3960 3948 cmd.exe 125 PID 3948 wrote to memory of 1568 3948 cmd.exe 127 PID 3948 wrote to memory of 1568 3948 cmd.exe 127 PID 3948 wrote to memory of 1568 3948 cmd.exe 127 PID 4320 wrote to memory of 2468 4320 mnolyk.exe 130 PID 4320 wrote to memory of 2468 4320 mnolyk.exe 130 PID 4320 wrote to memory of 2468 4320 mnolyk.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\153cec8300a06239f5da82820e5ad7ddf9ba7f2c98f71f591d191f7d5dbf2ca6.exe"C:\Users\Admin\AppData\Local\Temp\153cec8300a06239f5da82820e5ad7ddf9ba7f2c98f71f591d191f7d5dbf2ca6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptvR5727kL.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptvR5727kL.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptxN5246NH.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptxN5246NH.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptJf7686Yu.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptJf7686Yu.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptjm8554Sa.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptjm8554Sa.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptma7402ba.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptma7402ba.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beEJ80gA30.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beEJ80gA30.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuQy72nL17.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuQy72nL17.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 13208⤵
- Program crash
PID:1580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsfa36Gc16.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsfa36Gc16.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 10287⤵
- Program crash
PID:4648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr67hN7777wf.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr67hN7777wf.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 15126⤵
- Program crash
PID:2552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnoc56iB38.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnoc56iB38.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk96cT62iE00.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk96cT62iE00.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:3340
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:4004
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:3804
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:3960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:1568
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxli37cH47.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxli37cH47.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4364 -ip 43641⤵PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3508 -ip 35081⤵PID:2580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 552 -ip 5521⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:1700
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:4468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5056a2582bba0a5c6b23546f7c0dd6078
SHA1edd914610c84d5ae27415bbf16a58a0ee6ad3bc8
SHA25681ce58c0f3b7fd34a5cd376f9a4513efcfc63e1c77d2d716ea1c8969e93b4439
SHA512bfc2623d34130569419079afe47851bb8c6a8317ffaf40a9a01a56abea2e8fae8ba120fcbfb4c66bba9f39abcae405c3b474601aa2d5f28885229718c4af9b02
-
Filesize
240KB
MD5056a2582bba0a5c6b23546f7c0dd6078
SHA1edd914610c84d5ae27415bbf16a58a0ee6ad3bc8
SHA25681ce58c0f3b7fd34a5cd376f9a4513efcfc63e1c77d2d716ea1c8969e93b4439
SHA512bfc2623d34130569419079afe47851bb8c6a8317ffaf40a9a01a56abea2e8fae8ba120fcbfb4c66bba9f39abcae405c3b474601aa2d5f28885229718c4af9b02
-
Filesize
240KB
MD5056a2582bba0a5c6b23546f7c0dd6078
SHA1edd914610c84d5ae27415bbf16a58a0ee6ad3bc8
SHA25681ce58c0f3b7fd34a5cd376f9a4513efcfc63e1c77d2d716ea1c8969e93b4439
SHA512bfc2623d34130569419079afe47851bb8c6a8317ffaf40a9a01a56abea2e8fae8ba120fcbfb4c66bba9f39abcae405c3b474601aa2d5f28885229718c4af9b02
-
Filesize
240KB
MD5056a2582bba0a5c6b23546f7c0dd6078
SHA1edd914610c84d5ae27415bbf16a58a0ee6ad3bc8
SHA25681ce58c0f3b7fd34a5cd376f9a4513efcfc63e1c77d2d716ea1c8969e93b4439
SHA512bfc2623d34130569419079afe47851bb8c6a8317ffaf40a9a01a56abea2e8fae8ba120fcbfb4c66bba9f39abcae405c3b474601aa2d5f28885229718c4af9b02
-
Filesize
240KB
MD5056a2582bba0a5c6b23546f7c0dd6078
SHA1edd914610c84d5ae27415bbf16a58a0ee6ad3bc8
SHA25681ce58c0f3b7fd34a5cd376f9a4513efcfc63e1c77d2d716ea1c8969e93b4439
SHA512bfc2623d34130569419079afe47851bb8c6a8317ffaf40a9a01a56abea2e8fae8ba120fcbfb4c66bba9f39abcae405c3b474601aa2d5f28885229718c4af9b02
-
Filesize
177KB
MD51e1f7d5e2ce46a19ca56816a5e0fd6ac
SHA1927a492fbbc9309a85deede2d80e9fd24c63d904
SHA2563df64a21b99217e2a65af6cf8c938589abf72f7fd1bc489c576a72f080d74b93
SHA51213736c6df2b4595c70ae7bdcb1a5ecad4a4779a2028aa4d71797124ff4ef8408089c6d6b4558d7a3949b684826259364eca3da7cc91b8de8f012c2d9cde27576
-
Filesize
177KB
MD51e1f7d5e2ce46a19ca56816a5e0fd6ac
SHA1927a492fbbc9309a85deede2d80e9fd24c63d904
SHA2563df64a21b99217e2a65af6cf8c938589abf72f7fd1bc489c576a72f080d74b93
SHA51213736c6df2b4595c70ae7bdcb1a5ecad4a4779a2028aa4d71797124ff4ef8408089c6d6b4558d7a3949b684826259364eca3da7cc91b8de8f012c2d9cde27576
-
Filesize
1.2MB
MD58fa184f951f412fa6850c55b244cca40
SHA1caef5ae8133107e77fa91813b9d8a7ea34c1a336
SHA2562e1a6ae47cb6b8d32036f75055bfd378d35bc0d50b67688c5a4620366dbded5a
SHA5121c2b515722df12b9f23f25a1a6f19dbade679ccd317a0aab2bb8a8a094cd934134375ddfb6c2adf4e89f78a907a0dcdb9e0c4dc0c70293b580b1d9ccf7ee446f
-
Filesize
1.2MB
MD58fa184f951f412fa6850c55b244cca40
SHA1caef5ae8133107e77fa91813b9d8a7ea34c1a336
SHA2562e1a6ae47cb6b8d32036f75055bfd378d35bc0d50b67688c5a4620366dbded5a
SHA5121c2b515722df12b9f23f25a1a6f19dbade679ccd317a0aab2bb8a8a094cd934134375ddfb6c2adf4e89f78a907a0dcdb9e0c4dc0c70293b580b1d9ccf7ee446f
-
Filesize
240KB
MD5056a2582bba0a5c6b23546f7c0dd6078
SHA1edd914610c84d5ae27415bbf16a58a0ee6ad3bc8
SHA25681ce58c0f3b7fd34a5cd376f9a4513efcfc63e1c77d2d716ea1c8969e93b4439
SHA512bfc2623d34130569419079afe47851bb8c6a8317ffaf40a9a01a56abea2e8fae8ba120fcbfb4c66bba9f39abcae405c3b474601aa2d5f28885229718c4af9b02
-
Filesize
240KB
MD5056a2582bba0a5c6b23546f7c0dd6078
SHA1edd914610c84d5ae27415bbf16a58a0ee6ad3bc8
SHA25681ce58c0f3b7fd34a5cd376f9a4513efcfc63e1c77d2d716ea1c8969e93b4439
SHA512bfc2623d34130569419079afe47851bb8c6a8317ffaf40a9a01a56abea2e8fae8ba120fcbfb4c66bba9f39abcae405c3b474601aa2d5f28885229718c4af9b02
-
Filesize
995KB
MD54901cf9c857a5e61fa8cc3dcc3123eed
SHA1b0c8fb49b239791d426ee374ff358f2a6f4dd887
SHA256869aec6eac92cae060f7e48815aa6dcc99d3d6ef2671eb4299107622f7eded9d
SHA512518f4fc84466063018aa5e101dd17b6a34a1739a4b55c7df0505cef6beed64e86e90a90b130cd2b3845e6c8ee4e9ccbf6cbf288ef0385b78f096d20b5994dcf9
-
Filesize
995KB
MD54901cf9c857a5e61fa8cc3dcc3123eed
SHA1b0c8fb49b239791d426ee374ff358f2a6f4dd887
SHA256869aec6eac92cae060f7e48815aa6dcc99d3d6ef2671eb4299107622f7eded9d
SHA512518f4fc84466063018aa5e101dd17b6a34a1739a4b55c7df0505cef6beed64e86e90a90b130cd2b3845e6c8ee4e9ccbf6cbf288ef0385b78f096d20b5994dcf9
-
Filesize
17KB
MD543b75a6e805a664607701d60bb499356
SHA1213e1aece96bd22b42c15c582f81d3dafbe1eec8
SHA2565f515162a4baf9fd6d9386ce262c83a4101a6e2ca4f2cd56c84e2ada1f868fca
SHA5120091f6be146944f1cee7e9805ad32fc2e546033b00f1f54da94e4408be5f8b95cc018fba9e13a0fa6e07f4c19cf18a7eeb2c5ab26eeb93071ae10f03f2ddf43d
-
Filesize
17KB
MD543b75a6e805a664607701d60bb499356
SHA1213e1aece96bd22b42c15c582f81d3dafbe1eec8
SHA2565f515162a4baf9fd6d9386ce262c83a4101a6e2ca4f2cd56c84e2ada1f868fca
SHA5120091f6be146944f1cee7e9805ad32fc2e546033b00f1f54da94e4408be5f8b95cc018fba9e13a0fa6e07f4c19cf18a7eeb2c5ab26eeb93071ae10f03f2ddf43d
-
Filesize
893KB
MD5c5fb20e6ae7e7de7b1208980211d6859
SHA1e4b63361bd338dfe08afd0b0255fc5d75e29b5c1
SHA256533ce87c3bfe2a1fccd2a05bfc34223f6cfc37d83162ccb808ca7b7e3077c8e4
SHA5124f40cf44ab48b0baaf63aacc9019ae79b8a34c83fcd73a967f4548c718f922f60b9f11b163bb6304612c7edc2cba2482cbb32096a9f8278c9b01c929a11877be
-
Filesize
893KB
MD5c5fb20e6ae7e7de7b1208980211d6859
SHA1e4b63361bd338dfe08afd0b0255fc5d75e29b5c1
SHA256533ce87c3bfe2a1fccd2a05bfc34223f6cfc37d83162ccb808ca7b7e3077c8e4
SHA5124f40cf44ab48b0baaf63aacc9019ae79b8a34c83fcd73a967f4548c718f922f60b9f11b163bb6304612c7edc2cba2482cbb32096a9f8278c9b01c929a11877be
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
667KB
MD5ff295f20999af49ad0f197b7a1b73fb6
SHA140362d452ef99c75e610be64b555c0e4b0e752f9
SHA2565504fc57ae9ae289ec8636b8f94b4aa690c6cb924015b656a26b774300e1cd04
SHA51298a92c35f5d5ef88a488c740a011597ea9bf2b766cc1090dfb6427c91caaef7c9073366c5b0a01a2e910c988f45f4df3fa78579eb5ea0f987e7a941c9945be5c
-
Filesize
667KB
MD5ff295f20999af49ad0f197b7a1b73fb6
SHA140362d452ef99c75e610be64b555c0e4b0e752f9
SHA2565504fc57ae9ae289ec8636b8f94b4aa690c6cb924015b656a26b774300e1cd04
SHA51298a92c35f5d5ef88a488c740a011597ea9bf2b766cc1090dfb6427c91caaef7c9073366c5b0a01a2e910c988f45f4df3fa78579eb5ea0f987e7a941c9945be5c
-
Filesize
246KB
MD51b00aa290c5f57aca9420b25512997ac
SHA1755c6719b2ccaad2292189a34e2250a0a4f098ca
SHA256c8a94b411835cc43efcb2f22680bcd8523065dc9886a406508b6d362c5be8b4a
SHA51293af0e601c6930507a3904b4042bb9c0a175ae71c752b5785622ff72a1d5f58e2b82e867ac750f4ba7b9ba6582443e2b217f799f6787fcbb4c9bfac4f731922d
-
Filesize
246KB
MD51b00aa290c5f57aca9420b25512997ac
SHA1755c6719b2ccaad2292189a34e2250a0a4f098ca
SHA256c8a94b411835cc43efcb2f22680bcd8523065dc9886a406508b6d362c5be8b4a
SHA51293af0e601c6930507a3904b4042bb9c0a175ae71c752b5785622ff72a1d5f58e2b82e867ac750f4ba7b9ba6582443e2b217f799f6787fcbb4c9bfac4f731922d
-
Filesize
391KB
MD51f798ad166d0b22932424bad92b2084d
SHA16d8fff11f7d60592cc5012a25145b728e224aead
SHA2565b92d2e36676d861b9eaf7209898cc8bba2b7e5812725deafdafbc86e7ffccd6
SHA5123b5704db4b7a4236d6b34905c58a5732089af5d300da47ca1ebceb6ea6615567d0ea3db52ca0293c61299ae86f52ba4e3b583238e475eab23ae77b58b49bdf66
-
Filesize
391KB
MD51f798ad166d0b22932424bad92b2084d
SHA16d8fff11f7d60592cc5012a25145b728e224aead
SHA2565b92d2e36676d861b9eaf7209898cc8bba2b7e5812725deafdafbc86e7ffccd6
SHA5123b5704db4b7a4236d6b34905c58a5732089af5d300da47ca1ebceb6ea6615567d0ea3db52ca0293c61299ae86f52ba4e3b583238e475eab23ae77b58b49bdf66
-
Filesize
17KB
MD58546f3e45afcb59b67d3774057626bdc
SHA1fde733f81b4323616d21a35044540399e2e11e22
SHA2563775946bc6541ead3a37f048cc3ad0fdc1a2cb83f12fecbe78e9fa1d6b722ab3
SHA512e397866ef395b6a94cb98fb7cd40b4eb9afc4e7c9540d7d82fe2db5205771852a61c057a1ea9473e5d817a2209ede6c44902fd52f633d759c1f66f98120f55bb
-
Filesize
17KB
MD58546f3e45afcb59b67d3774057626bdc
SHA1fde733f81b4323616d21a35044540399e2e11e22
SHA2563775946bc6541ead3a37f048cc3ad0fdc1a2cb83f12fecbe78e9fa1d6b722ab3
SHA512e397866ef395b6a94cb98fb7cd40b4eb9afc4e7c9540d7d82fe2db5205771852a61c057a1ea9473e5d817a2209ede6c44902fd52f633d759c1f66f98120f55bb
-
Filesize
17KB
MD58546f3e45afcb59b67d3774057626bdc
SHA1fde733f81b4323616d21a35044540399e2e11e22
SHA2563775946bc6541ead3a37f048cc3ad0fdc1a2cb83f12fecbe78e9fa1d6b722ab3
SHA512e397866ef395b6a94cb98fb7cd40b4eb9afc4e7c9540d7d82fe2db5205771852a61c057a1ea9473e5d817a2209ede6c44902fd52f633d759c1f66f98120f55bb
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
304KB
MD5ad61b513e0bbc3784d0c28ba13ab19ff
SHA10d86785da45331516385d7d72e18457e32b89aed
SHA2565e58f65612a82a7a2a61a80f45d1cc0d756372bc05a8160e1d962270d2e1b037
SHA51280d72ceb8b82f962a85381078abf4826412537604ff74749d05ff926f79ca143107219d217520050561b09675b04bfef14ddee37b2dc4818a84bf04c785afe0a
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5