Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 16:01
Static task
static1
General
-
Target
f3c39a309349e5e7ac0d943db189f46d7b3fd2e0467e3950fbc2b839e6c49fee.exe
-
Size
1.3MB
-
MD5
56ce2ee876f668ff5c515c3eaf24a7af
-
SHA1
0de3a1d1792ce781f851a08003a6349b470bbe5a
-
SHA256
f3c39a309349e5e7ac0d943db189f46d7b3fd2e0467e3950fbc2b839e6c49fee
-
SHA512
a236ba58b4ae077386ba715e38db36757abf9d5e376b612e0afc9b445c5203dc6af05680ae99e28b55a61ef45386f7e973a91f44c8d0534866bd232792e4f9b7
-
SSDEEP
24576:byfS2CeoVdg0sV7EgbXGkMytDAOmJizRjZwmDp2OCQkd0mxp:OK2Ceb0EEgLFtDAOlwmDYOCQQ0
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beoL48iC59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beoL48iC59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beoL48iC59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beoL48iC59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsYe98XS20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnbw76FM47.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beoL48iC59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsYe98XS20.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsYe98XS20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsYe98XS20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnbw76FM47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnbw76FM47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnbw76FM47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnbw76FM47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beoL48iC59.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsYe98XS20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsYe98XS20.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/4596-185-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-186-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-188-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-190-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-192-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-194-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-196-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-198-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-200-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-202-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-204-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-207-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-209-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-211-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-213-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-215-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-217-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-219-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-221-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-223-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-225-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-227-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-229-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-231-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-233-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-235-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-237-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-239-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-241-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-243-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-247-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-249-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-245-0x0000000002700000-0x000000000273E000-memory.dmp family_redline behavioral1/memory/4596-1102-0x0000000004C50000-0x0000000004C60000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation hk42vT41KJ73.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 2636 ptUr1078DT.exe 4996 ptKB3801op.exe 1568 ptUl6831Pj.exe 4536 ptaN5219pD.exe 208 pteJ0390lb.exe 4116 beoL48iC59.exe 4596 cujX34nt46.exe 2964 dsYe98XS20.exe 624 fr34ua5530EB.exe 1428 gnbw76FM47.exe 2492 hk42vT41KJ73.exe 3100 mnolyk.exe 4720 jxdq02Br58.exe 1056 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2120 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beoL48iC59.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsYe98XS20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsYe98XS20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnbw76FM47.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptUr1078DT.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptUl6831Pj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptaN5219pD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptaN5219pD.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pteJ0390lb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" pteJ0390lb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f3c39a309349e5e7ac0d943db189f46d7b3fd2e0467e3950fbc2b839e6c49fee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptUr1078DT.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptKB3801op.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptKB3801op.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptUl6831Pj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f3c39a309349e5e7ac0d943db189f46d7b3fd2e0467e3950fbc2b839e6c49fee.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 3772 4596 WerFault.exe 93 3816 2964 WerFault.exe 97 2340 624 WerFault.exe 103 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4116 beoL48iC59.exe 4116 beoL48iC59.exe 4596 cujX34nt46.exe 4596 cujX34nt46.exe 2964 dsYe98XS20.exe 2964 dsYe98XS20.exe 624 fr34ua5530EB.exe 624 fr34ua5530EB.exe 1428 gnbw76FM47.exe 1428 gnbw76FM47.exe 4720 jxdq02Br58.exe 4720 jxdq02Br58.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4116 beoL48iC59.exe Token: SeDebugPrivilege 4596 cujX34nt46.exe Token: SeDebugPrivilege 2964 dsYe98XS20.exe Token: SeDebugPrivilege 624 fr34ua5530EB.exe Token: SeDebugPrivilege 1428 gnbw76FM47.exe Token: SeDebugPrivilege 4720 jxdq02Br58.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 2636 552 f3c39a309349e5e7ac0d943db189f46d7b3fd2e0467e3950fbc2b839e6c49fee.exe 84 PID 552 wrote to memory of 2636 552 f3c39a309349e5e7ac0d943db189f46d7b3fd2e0467e3950fbc2b839e6c49fee.exe 84 PID 552 wrote to memory of 2636 552 f3c39a309349e5e7ac0d943db189f46d7b3fd2e0467e3950fbc2b839e6c49fee.exe 84 PID 2636 wrote to memory of 4996 2636 ptUr1078DT.exe 85 PID 2636 wrote to memory of 4996 2636 ptUr1078DT.exe 85 PID 2636 wrote to memory of 4996 2636 ptUr1078DT.exe 85 PID 4996 wrote to memory of 1568 4996 ptKB3801op.exe 86 PID 4996 wrote to memory of 1568 4996 ptKB3801op.exe 86 PID 4996 wrote to memory of 1568 4996 ptKB3801op.exe 86 PID 1568 wrote to memory of 4536 1568 ptUl6831Pj.exe 87 PID 1568 wrote to memory of 4536 1568 ptUl6831Pj.exe 87 PID 1568 wrote to memory of 4536 1568 ptUl6831Pj.exe 87 PID 4536 wrote to memory of 208 4536 ptaN5219pD.exe 88 PID 4536 wrote to memory of 208 4536 ptaN5219pD.exe 88 PID 4536 wrote to memory of 208 4536 ptaN5219pD.exe 88 PID 208 wrote to memory of 4116 208 pteJ0390lb.exe 89 PID 208 wrote to memory of 4116 208 pteJ0390lb.exe 89 PID 208 wrote to memory of 4596 208 pteJ0390lb.exe 93 PID 208 wrote to memory of 4596 208 pteJ0390lb.exe 93 PID 208 wrote to memory of 4596 208 pteJ0390lb.exe 93 PID 4536 wrote to memory of 2964 4536 ptaN5219pD.exe 97 PID 4536 wrote to memory of 2964 4536 ptaN5219pD.exe 97 PID 4536 wrote to memory of 2964 4536 ptaN5219pD.exe 97 PID 1568 wrote to memory of 624 1568 ptUl6831Pj.exe 103 PID 1568 wrote to memory of 624 1568 ptUl6831Pj.exe 103 PID 1568 wrote to memory of 624 1568 ptUl6831Pj.exe 103 PID 4996 wrote to memory of 1428 4996 ptKB3801op.exe 106 PID 4996 wrote to memory of 1428 4996 ptKB3801op.exe 106 PID 2636 wrote to memory of 2492 2636 ptUr1078DT.exe 108 PID 2636 wrote to memory of 2492 2636 ptUr1078DT.exe 108 PID 2636 wrote to memory of 2492 2636 ptUr1078DT.exe 108 PID 2492 wrote to memory of 3100 2492 hk42vT41KJ73.exe 109 PID 2492 wrote to memory of 3100 2492 hk42vT41KJ73.exe 109 PID 2492 wrote to memory of 3100 2492 hk42vT41KJ73.exe 109 PID 552 wrote to memory of 4720 552 f3c39a309349e5e7ac0d943db189f46d7b3fd2e0467e3950fbc2b839e6c49fee.exe 110 PID 552 wrote to memory of 4720 552 f3c39a309349e5e7ac0d943db189f46d7b3fd2e0467e3950fbc2b839e6c49fee.exe 110 PID 552 wrote to memory of 4720 552 f3c39a309349e5e7ac0d943db189f46d7b3fd2e0467e3950fbc2b839e6c49fee.exe 110 PID 3100 wrote to memory of 4444 3100 mnolyk.exe 111 PID 3100 wrote to memory of 4444 3100 mnolyk.exe 111 PID 3100 wrote to memory of 4444 3100 mnolyk.exe 111 PID 3100 wrote to memory of 3428 3100 mnolyk.exe 113 PID 3100 wrote to memory of 3428 3100 mnolyk.exe 113 PID 3100 wrote to memory of 3428 3100 mnolyk.exe 113 PID 3428 wrote to memory of 3236 3428 cmd.exe 115 PID 3428 wrote to memory of 3236 3428 cmd.exe 115 PID 3428 wrote to memory of 3236 3428 cmd.exe 115 PID 3428 wrote to memory of 2032 3428 cmd.exe 116 PID 3428 wrote to memory of 2032 3428 cmd.exe 116 PID 3428 wrote to memory of 2032 3428 cmd.exe 116 PID 3428 wrote to memory of 4264 3428 cmd.exe 117 PID 3428 wrote to memory of 4264 3428 cmd.exe 117 PID 3428 wrote to memory of 4264 3428 cmd.exe 117 PID 3428 wrote to memory of 4400 3428 cmd.exe 118 PID 3428 wrote to memory of 4400 3428 cmd.exe 118 PID 3428 wrote to memory of 4400 3428 cmd.exe 118 PID 3428 wrote to memory of 1968 3428 cmd.exe 119 PID 3428 wrote to memory of 1968 3428 cmd.exe 119 PID 3428 wrote to memory of 1968 3428 cmd.exe 119 PID 3428 wrote to memory of 4140 3428 cmd.exe 120 PID 3428 wrote to memory of 4140 3428 cmd.exe 120 PID 3428 wrote to memory of 4140 3428 cmd.exe 120 PID 3100 wrote to memory of 2120 3100 mnolyk.exe 128 PID 3100 wrote to memory of 2120 3100 mnolyk.exe 128 PID 3100 wrote to memory of 2120 3100 mnolyk.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3c39a309349e5e7ac0d943db189f46d7b3fd2e0467e3950fbc2b839e6c49fee.exe"C:\Users\Admin\AppData\Local\Temp\f3c39a309349e5e7ac0d943db189f46d7b3fd2e0467e3950fbc2b839e6c49fee.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptUr1078DT.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptUr1078DT.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptKB3801op.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptKB3801op.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptUl6831Pj.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptUl6831Pj.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptaN5219pD.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptaN5219pD.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\pteJ0390lb.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\pteJ0390lb.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beoL48iC59.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beoL48iC59.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cujX34nt46.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cujX34nt46.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 17448⤵
- Program crash
PID:3772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsYe98XS20.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsYe98XS20.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 10167⤵
- Program crash
PID:3816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr34ua5530EB.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr34ua5530EB.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 19606⤵
- Program crash
PID:2340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnbw76FM47.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnbw76FM47.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk42vT41KJ73.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk42vT41KJ73.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:4444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3236
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:2032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:4264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4400
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:1968
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:4140
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2120
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxdq02Br58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxdq02Br58.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4596 -ip 45961⤵PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2964 -ip 29641⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 624 -ip 6241⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:1056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD57588a1c099ba6ae81a459bdd84857d47
SHA192fbf4476a42ecbd21a7615128395e85eb28c0ed
SHA25642c4c9152d0589fec1a6bf4265746702952e598836821f461f0e94d35327548a
SHA512662f941acbedf25887c4811bcc4167f17ba8637d909759c8eb6fa5a2ebbef10bd423f00b9374c6105b7fadd91c5f7d87a4e515c79f6deb89d84f3cf97b422912
-
Filesize
240KB
MD57588a1c099ba6ae81a459bdd84857d47
SHA192fbf4476a42ecbd21a7615128395e85eb28c0ed
SHA25642c4c9152d0589fec1a6bf4265746702952e598836821f461f0e94d35327548a
SHA512662f941acbedf25887c4811bcc4167f17ba8637d909759c8eb6fa5a2ebbef10bd423f00b9374c6105b7fadd91c5f7d87a4e515c79f6deb89d84f3cf97b422912
-
Filesize
240KB
MD57588a1c099ba6ae81a459bdd84857d47
SHA192fbf4476a42ecbd21a7615128395e85eb28c0ed
SHA25642c4c9152d0589fec1a6bf4265746702952e598836821f461f0e94d35327548a
SHA512662f941acbedf25887c4811bcc4167f17ba8637d909759c8eb6fa5a2ebbef10bd423f00b9374c6105b7fadd91c5f7d87a4e515c79f6deb89d84f3cf97b422912
-
Filesize
240KB
MD57588a1c099ba6ae81a459bdd84857d47
SHA192fbf4476a42ecbd21a7615128395e85eb28c0ed
SHA25642c4c9152d0589fec1a6bf4265746702952e598836821f461f0e94d35327548a
SHA512662f941acbedf25887c4811bcc4167f17ba8637d909759c8eb6fa5a2ebbef10bd423f00b9374c6105b7fadd91c5f7d87a4e515c79f6deb89d84f3cf97b422912
-
Filesize
177KB
MD573b5dcdb013742629ba1ee62ed4bd1bc
SHA16ad3cec023bf5567ecca3ac3f59442f0caf8b03a
SHA256652f3107d20765dc8b4c1013c9e55479a533450e0e67f9c1f9c0fae37d0ce61a
SHA51206f8c1827cd4e883ef091ec7c31ca75cdd2913a41d583f215e5285058d208c912bf32cb92516770e5e6fab0df4263e0bd8bef1989b1565718fd73ad78d84ee43
-
Filesize
177KB
MD573b5dcdb013742629ba1ee62ed4bd1bc
SHA16ad3cec023bf5567ecca3ac3f59442f0caf8b03a
SHA256652f3107d20765dc8b4c1013c9e55479a533450e0e67f9c1f9c0fae37d0ce61a
SHA51206f8c1827cd4e883ef091ec7c31ca75cdd2913a41d583f215e5285058d208c912bf32cb92516770e5e6fab0df4263e0bd8bef1989b1565718fd73ad78d84ee43
-
Filesize
1.2MB
MD5cd6ddf1c3f03687071fb0259b46a5a0a
SHA172365ba82705af01d6211b6b3b4c4b59e50ebaf5
SHA25648c7138b3d12cd1518c71b921cf2b9f05b5e1edfaee5a4ca18e16bb11220295e
SHA51256606bc2e769ce2489066e758d6b9acd21f3fe852cafdc32fbc99da464150c5b055698ebbeb070f26a0c21277570544b064b431036d1ec5bf9d7009281f027f2
-
Filesize
1.2MB
MD5cd6ddf1c3f03687071fb0259b46a5a0a
SHA172365ba82705af01d6211b6b3b4c4b59e50ebaf5
SHA25648c7138b3d12cd1518c71b921cf2b9f05b5e1edfaee5a4ca18e16bb11220295e
SHA51256606bc2e769ce2489066e758d6b9acd21f3fe852cafdc32fbc99da464150c5b055698ebbeb070f26a0c21277570544b064b431036d1ec5bf9d7009281f027f2
-
Filesize
240KB
MD57588a1c099ba6ae81a459bdd84857d47
SHA192fbf4476a42ecbd21a7615128395e85eb28c0ed
SHA25642c4c9152d0589fec1a6bf4265746702952e598836821f461f0e94d35327548a
SHA512662f941acbedf25887c4811bcc4167f17ba8637d909759c8eb6fa5a2ebbef10bd423f00b9374c6105b7fadd91c5f7d87a4e515c79f6deb89d84f3cf97b422912
-
Filesize
240KB
MD57588a1c099ba6ae81a459bdd84857d47
SHA192fbf4476a42ecbd21a7615128395e85eb28c0ed
SHA25642c4c9152d0589fec1a6bf4265746702952e598836821f461f0e94d35327548a
SHA512662f941acbedf25887c4811bcc4167f17ba8637d909759c8eb6fa5a2ebbef10bd423f00b9374c6105b7fadd91c5f7d87a4e515c79f6deb89d84f3cf97b422912
-
Filesize
995KB
MD51102b73721063470aaafa025ba4e893a
SHA1de84a8c9e757e260a20af7f4d5fbca4b03935e49
SHA256290554344b03998e67410c87a06d686b93557669f43f036dc6c0203756364abb
SHA512d78e33adcadb0cdc486cfd70934ef01cf6d817b562957333ca6f0c550faffc8dbbf8f70bc1f30d38e57ab0e1529811ca0fbf3b753406576fd8d184c6de39a0a7
-
Filesize
995KB
MD51102b73721063470aaafa025ba4e893a
SHA1de84a8c9e757e260a20af7f4d5fbca4b03935e49
SHA256290554344b03998e67410c87a06d686b93557669f43f036dc6c0203756364abb
SHA512d78e33adcadb0cdc486cfd70934ef01cf6d817b562957333ca6f0c550faffc8dbbf8f70bc1f30d38e57ab0e1529811ca0fbf3b753406576fd8d184c6de39a0a7
-
Filesize
17KB
MD5f0cb7cbe27029d40a9584b55e57f7537
SHA1d426a3797ba914f3c2c5b4a6cea2e36b58a6959f
SHA256c5ca71b24fcd2627f154815a56fdf4d3cd9950c8eebd17e13e5711cdaf9b6c68
SHA5126af18fafb5aa3ac9e4ca63cfa4b99b21d25cc6fe7b0491e3ec49fb0bf7b0cd90329362abe8bca05f916aecd307fbe28fdc6cd4d0a7accb06bc9ac7e904245a64
-
Filesize
17KB
MD5f0cb7cbe27029d40a9584b55e57f7537
SHA1d426a3797ba914f3c2c5b4a6cea2e36b58a6959f
SHA256c5ca71b24fcd2627f154815a56fdf4d3cd9950c8eebd17e13e5711cdaf9b6c68
SHA5126af18fafb5aa3ac9e4ca63cfa4b99b21d25cc6fe7b0491e3ec49fb0bf7b0cd90329362abe8bca05f916aecd307fbe28fdc6cd4d0a7accb06bc9ac7e904245a64
-
Filesize
894KB
MD556a93d3aeaed1726f19adc305b4d0c76
SHA14f7d1993a810d290c734f5d79318800cdfb4bd29
SHA2560e7f3557d8b0d27282fe5304761d209cf8680a71f95cf944094dae941a4425d3
SHA512dfa02e80c04955773ae66433f8f7721f2725fcdae9e4f11088ab5692adf3b6f261f9d2f67a76cf342b6e37be778fd1fd7c22c566829f97044e2ed1e57225546f
-
Filesize
894KB
MD556a93d3aeaed1726f19adc305b4d0c76
SHA14f7d1993a810d290c734f5d79318800cdfb4bd29
SHA2560e7f3557d8b0d27282fe5304761d209cf8680a71f95cf944094dae941a4425d3
SHA512dfa02e80c04955773ae66433f8f7721f2725fcdae9e4f11088ab5692adf3b6f261f9d2f67a76cf342b6e37be778fd1fd7c22c566829f97044e2ed1e57225546f
-
Filesize
304KB
MD5bc94778948460579a0739b42d8018118
SHA1f960e87471a354673dc63408a7cfd07052a18561
SHA256164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b
SHA512ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b
-
Filesize
304KB
MD5bc94778948460579a0739b42d8018118
SHA1f960e87471a354673dc63408a7cfd07052a18561
SHA256164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b
SHA512ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b
-
Filesize
667KB
MD567ac4e5152cf179c44bc5925b3c99809
SHA12b50e4be6cb1a48ad6ba55d7397ce2ff462e0b07
SHA256284604de18f13a01232ff5fd7ff8add4c3d0181845fb95ae75ac3581629d9f98
SHA5126fd36ca27c0f7dca1d6c0c9b367f96634ba794254942ae1ac435ab6c98e86c5a39a5fbd97c54d86573f53e3ed0292812956895921ecd177cdd9220775e7b798f
-
Filesize
667KB
MD567ac4e5152cf179c44bc5925b3c99809
SHA12b50e4be6cb1a48ad6ba55d7397ce2ff462e0b07
SHA256284604de18f13a01232ff5fd7ff8add4c3d0181845fb95ae75ac3581629d9f98
SHA5126fd36ca27c0f7dca1d6c0c9b367f96634ba794254942ae1ac435ab6c98e86c5a39a5fbd97c54d86573f53e3ed0292812956895921ecd177cdd9220775e7b798f
-
Filesize
246KB
MD51b00aa290c5f57aca9420b25512997ac
SHA1755c6719b2ccaad2292189a34e2250a0a4f098ca
SHA256c8a94b411835cc43efcb2f22680bcd8523065dc9886a406508b6d362c5be8b4a
SHA51293af0e601c6930507a3904b4042bb9c0a175ae71c752b5785622ff72a1d5f58e2b82e867ac750f4ba7b9ba6582443e2b217f799f6787fcbb4c9bfac4f731922d
-
Filesize
246KB
MD51b00aa290c5f57aca9420b25512997ac
SHA1755c6719b2ccaad2292189a34e2250a0a4f098ca
SHA256c8a94b411835cc43efcb2f22680bcd8523065dc9886a406508b6d362c5be8b4a
SHA51293af0e601c6930507a3904b4042bb9c0a175ae71c752b5785622ff72a1d5f58e2b82e867ac750f4ba7b9ba6582443e2b217f799f6787fcbb4c9bfac4f731922d
-
Filesize
392KB
MD506479d6898db91aa2f141f8355dd4e55
SHA11d47d33239d99023301e7292a134a30d50980533
SHA256598b4cea37e720f606dede0e9f681d20f1db9886a3e3590b401bcc997d8961e1
SHA512b450897a3af007e2225dfa85ed3a52116dbe60eb100350373825367a06ec44166b8a1808f6fd01f1b6f943538ed75434aa2d65c90b0ff9cb62b4a5e1b7cf8525
-
Filesize
392KB
MD506479d6898db91aa2f141f8355dd4e55
SHA11d47d33239d99023301e7292a134a30d50980533
SHA256598b4cea37e720f606dede0e9f681d20f1db9886a3e3590b401bcc997d8961e1
SHA512b450897a3af007e2225dfa85ed3a52116dbe60eb100350373825367a06ec44166b8a1808f6fd01f1b6f943538ed75434aa2d65c90b0ff9cb62b4a5e1b7cf8525
-
Filesize
17KB
MD5833ba44ac60319b4b6de0498f0d1c175
SHA12eddad8a80ec537c1528ff2f763484a7ec69fa73
SHA256c94c7702b3f86873b3dd95b20ded7f5c9a5c3665f5831bebfe5253a0abf2e2ab
SHA512fed6827243a966f6c393457cd90b16eed599c531715511518b16b14b06d7aab2a044bce24fdf8fec38dedf2708beba1d31e63805476eb0a6664b3014c0e33ca6
-
Filesize
17KB
MD5833ba44ac60319b4b6de0498f0d1c175
SHA12eddad8a80ec537c1528ff2f763484a7ec69fa73
SHA256c94c7702b3f86873b3dd95b20ded7f5c9a5c3665f5831bebfe5253a0abf2e2ab
SHA512fed6827243a966f6c393457cd90b16eed599c531715511518b16b14b06d7aab2a044bce24fdf8fec38dedf2708beba1d31e63805476eb0a6664b3014c0e33ca6
-
Filesize
17KB
MD5833ba44ac60319b4b6de0498f0d1c175
SHA12eddad8a80ec537c1528ff2f763484a7ec69fa73
SHA256c94c7702b3f86873b3dd95b20ded7f5c9a5c3665f5831bebfe5253a0abf2e2ab
SHA512fed6827243a966f6c393457cd90b16eed599c531715511518b16b14b06d7aab2a044bce24fdf8fec38dedf2708beba1d31e63805476eb0a6664b3014c0e33ca6
-
Filesize
304KB
MD5bc94778948460579a0739b42d8018118
SHA1f960e87471a354673dc63408a7cfd07052a18561
SHA256164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b
SHA512ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b
-
Filesize
304KB
MD5bc94778948460579a0739b42d8018118
SHA1f960e87471a354673dc63408a7cfd07052a18561
SHA256164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b
SHA512ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b
-
Filesize
304KB
MD5bc94778948460579a0739b42d8018118
SHA1f960e87471a354673dc63408a7cfd07052a18561
SHA256164e02a2c9318020d3b3db0e977aadf0890dd6ad139cfcd07195e62578f44d8b
SHA512ff267c27af132c2ce96ca075011a96596d045f771c3439d72b1ea1f567fe585f139b0e7dc8f5c97d340209f478d7e9cad374fc0497345998702f06e234ca657b
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5