Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 17:49
Static task
static1
General
-
Target
3302ce5d3c95fc108f8b9eed328efd1335b1ad83cc2a42b07ecdb4fe242d74a3.exe
-
Size
1.3MB
-
MD5
20c2dd7e868d5c3794983a3e8f587804
-
SHA1
228dca727a6ef14a1c15b4873f559771c9eda545
-
SHA256
3302ce5d3c95fc108f8b9eed328efd1335b1ad83cc2a42b07ecdb4fe242d74a3
-
SHA512
992cf1edcdc850c832b4c2dcd7c796c5914750895446a1d3a8daee865c6bd3129f5e0261a6352474a024eedb18ca50f7987b784ea2fef23ee543f09d701bf81e
-
SSDEEP
24576:qysoMZsJboptyWPZvlFKckz19491fIHqeC1IxfBVNVjkRjgyqPnxP5O+y+iQFPX:xs5Z6opQWPZvlFFprfIHqelVLyunxRZd
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
amadey
3.67
193.233.20.15/dF30Hn4m/index.php
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ida00AX04.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection mkm93JW34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" mkm93JW34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" rZT31Mb84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" rZT31Mb84.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ida00AX04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ida00AX04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ida00AX04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" mkm93JW34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" rZT31Mb84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" rZT31Mb84.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ida00AX04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" mkm93JW34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" mkm93JW34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" mkm93JW34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ida00AX04.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" rZT31Mb84.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/2988-186-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-187-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-189-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-191-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-193-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-195-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-197-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-199-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-201-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-203-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-205-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-207-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-209-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-211-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-213-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-215-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-217-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-219-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-221-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-223-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-225-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-227-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-229-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-231-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-233-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-235-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-237-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-239-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-241-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-243-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-245-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-247-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/2988-249-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral1/memory/4104-1313-0x0000000004D70000-0x0000000004D80000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation sf29aa51fh93.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 15 IoCs
pid Process 1364 vmGN20UI39.exe 3736 vmoV99Ji36.exe 2312 vmzQ90Tw16.exe 4788 vmcE49FD72.exe 4968 vmac26WA44.exe 4920 ida00AX04.exe 2988 kEW33gl10.exe 3944 mkm93JW34.exe 4104 ncQ51zb21.exe 5092 rZT31Mb84.exe 3676 sf29aa51fh93.exe 1460 mnolyk.exe 3716 tv70Fi39sX58.exe 2868 mnolyk.exe 4740 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 3332 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" ida00AX04.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features mkm93JW34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" mkm93JW34.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" rZT31Mb84.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vmoV99Ji36.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmzQ90Tw16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" vmzQ90Tw16.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmcE49FD72.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmGN20UI39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vmGN20UI39.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmoV99Ji36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" vmcE49FD72.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vmac26WA44.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" vmac26WA44.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3302ce5d3c95fc108f8b9eed328efd1335b1ad83cc2a42b07ecdb4fe242d74a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3302ce5d3c95fc108f8b9eed328efd1335b1ad83cc2a42b07ecdb4fe242d74a3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4348 3944 WerFault.exe 104 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4920 ida00AX04.exe 4920 ida00AX04.exe 2988 kEW33gl10.exe 2988 kEW33gl10.exe 3944 mkm93JW34.exe 3944 mkm93JW34.exe 4104 ncQ51zb21.exe 4104 ncQ51zb21.exe 5092 rZT31Mb84.exe 5092 rZT31Mb84.exe 3716 tv70Fi39sX58.exe 3716 tv70Fi39sX58.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4920 ida00AX04.exe Token: SeDebugPrivilege 2988 kEW33gl10.exe Token: SeDebugPrivilege 3944 mkm93JW34.exe Token: SeDebugPrivilege 4104 ncQ51zb21.exe Token: SeDebugPrivilege 5092 rZT31Mb84.exe Token: SeDebugPrivilege 3716 tv70Fi39sX58.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3824 wrote to memory of 1364 3824 3302ce5d3c95fc108f8b9eed328efd1335b1ad83cc2a42b07ecdb4fe242d74a3.exe 86 PID 3824 wrote to memory of 1364 3824 3302ce5d3c95fc108f8b9eed328efd1335b1ad83cc2a42b07ecdb4fe242d74a3.exe 86 PID 3824 wrote to memory of 1364 3824 3302ce5d3c95fc108f8b9eed328efd1335b1ad83cc2a42b07ecdb4fe242d74a3.exe 86 PID 1364 wrote to memory of 3736 1364 vmGN20UI39.exe 87 PID 1364 wrote to memory of 3736 1364 vmGN20UI39.exe 87 PID 1364 wrote to memory of 3736 1364 vmGN20UI39.exe 87 PID 3736 wrote to memory of 2312 3736 vmoV99Ji36.exe 88 PID 3736 wrote to memory of 2312 3736 vmoV99Ji36.exe 88 PID 3736 wrote to memory of 2312 3736 vmoV99Ji36.exe 88 PID 2312 wrote to memory of 4788 2312 vmzQ90Tw16.exe 89 PID 2312 wrote to memory of 4788 2312 vmzQ90Tw16.exe 89 PID 2312 wrote to memory of 4788 2312 vmzQ90Tw16.exe 89 PID 4788 wrote to memory of 4968 4788 vmcE49FD72.exe 90 PID 4788 wrote to memory of 4968 4788 vmcE49FD72.exe 90 PID 4788 wrote to memory of 4968 4788 vmcE49FD72.exe 90 PID 4968 wrote to memory of 4920 4968 vmac26WA44.exe 91 PID 4968 wrote to memory of 4920 4968 vmac26WA44.exe 91 PID 4968 wrote to memory of 2988 4968 vmac26WA44.exe 102 PID 4968 wrote to memory of 2988 4968 vmac26WA44.exe 102 PID 4968 wrote to memory of 2988 4968 vmac26WA44.exe 102 PID 4788 wrote to memory of 3944 4788 vmcE49FD72.exe 104 PID 4788 wrote to memory of 3944 4788 vmcE49FD72.exe 104 PID 4788 wrote to memory of 3944 4788 vmcE49FD72.exe 104 PID 2312 wrote to memory of 4104 2312 vmzQ90Tw16.exe 109 PID 2312 wrote to memory of 4104 2312 vmzQ90Tw16.exe 109 PID 2312 wrote to memory of 4104 2312 vmzQ90Tw16.exe 109 PID 3736 wrote to memory of 5092 3736 vmoV99Ji36.exe 110 PID 3736 wrote to memory of 5092 3736 vmoV99Ji36.exe 110 PID 1364 wrote to memory of 3676 1364 vmGN20UI39.exe 111 PID 1364 wrote to memory of 3676 1364 vmGN20UI39.exe 111 PID 1364 wrote to memory of 3676 1364 vmGN20UI39.exe 111 PID 3676 wrote to memory of 1460 3676 sf29aa51fh93.exe 112 PID 3676 wrote to memory of 1460 3676 sf29aa51fh93.exe 112 PID 3676 wrote to memory of 1460 3676 sf29aa51fh93.exe 112 PID 3824 wrote to memory of 3716 3824 3302ce5d3c95fc108f8b9eed328efd1335b1ad83cc2a42b07ecdb4fe242d74a3.exe 113 PID 3824 wrote to memory of 3716 3824 3302ce5d3c95fc108f8b9eed328efd1335b1ad83cc2a42b07ecdb4fe242d74a3.exe 113 PID 3824 wrote to memory of 3716 3824 3302ce5d3c95fc108f8b9eed328efd1335b1ad83cc2a42b07ecdb4fe242d74a3.exe 113 PID 1460 wrote to memory of 4624 1460 mnolyk.exe 114 PID 1460 wrote to memory of 4624 1460 mnolyk.exe 114 PID 1460 wrote to memory of 4624 1460 mnolyk.exe 114 PID 1460 wrote to memory of 4752 1460 mnolyk.exe 116 PID 1460 wrote to memory of 4752 1460 mnolyk.exe 116 PID 1460 wrote to memory of 4752 1460 mnolyk.exe 116 PID 4752 wrote to memory of 3940 4752 cmd.exe 118 PID 4752 wrote to memory of 3940 4752 cmd.exe 118 PID 4752 wrote to memory of 3940 4752 cmd.exe 118 PID 4752 wrote to memory of 892 4752 cmd.exe 119 PID 4752 wrote to memory of 892 4752 cmd.exe 119 PID 4752 wrote to memory of 892 4752 cmd.exe 119 PID 4752 wrote to memory of 4224 4752 cmd.exe 120 PID 4752 wrote to memory of 4224 4752 cmd.exe 120 PID 4752 wrote to memory of 4224 4752 cmd.exe 120 PID 4752 wrote to memory of 3476 4752 cmd.exe 121 PID 4752 wrote to memory of 3476 4752 cmd.exe 121 PID 4752 wrote to memory of 3476 4752 cmd.exe 121 PID 4752 wrote to memory of 4220 4752 cmd.exe 122 PID 4752 wrote to memory of 4220 4752 cmd.exe 122 PID 4752 wrote to memory of 4220 4752 cmd.exe 122 PID 4752 wrote to memory of 2808 4752 cmd.exe 123 PID 4752 wrote to memory of 2808 4752 cmd.exe 123 PID 4752 wrote to memory of 2808 4752 cmd.exe 123 PID 1460 wrote to memory of 3332 1460 mnolyk.exe 126 PID 1460 wrote to memory of 3332 1460 mnolyk.exe 126 PID 1460 wrote to memory of 3332 1460 mnolyk.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\3302ce5d3c95fc108f8b9eed328efd1335b1ad83cc2a42b07ecdb4fe242d74a3.exe"C:\Users\Admin\AppData\Local\Temp\3302ce5d3c95fc108f8b9eed328efd1335b1ad83cc2a42b07ecdb4fe242d74a3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmGN20UI39.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmGN20UI39.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmoV99Ji36.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vmoV99Ji36.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmzQ90Tw16.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\vmzQ90Tw16.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmcE49FD72.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\vmcE49FD72.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmac26WA44.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\vmac26WA44.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\ida00AX04.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\ida00AX04.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kEW33gl10.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\kEW33gl10.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\mkm93JW34.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\mkm93JW34.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3944 -s 10167⤵
- Program crash
PID:4348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ncQ51zb21.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ncQ51zb21.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rZT31Mb84.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\rZT31Mb84.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf29aa51fh93.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf29aa51fh93.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:4624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\4f9dd6f8a7" /P "Admin:N"&&CACLS "..\4f9dd6f8a7" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3940
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:4224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3476
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:N"6⤵PID:4220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\4f9dd6f8a7" /P "Admin:R" /E6⤵PID:2808
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3332
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv70Fi39sX58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv70Fi39sX58.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3944 -ip 39441⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe1⤵
- Executes dropped EXE
PID:2868
-
C:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\4f9dd6f8a7\mnolyk.exe1⤵
- Executes dropped EXE
PID:4740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD57f58ec1156022f45dd0ddacdc6c3e06f
SHA12d0df8b2e7093ab7350e598715d230de0acbd563
SHA2568a0a46ef7941bd43255c9f1c704af7d43a82930d7b3af6785263d34a00cf37f5
SHA5126ad089933358808de6dcfd8c4c88dfd6a5bb10c7c44a4e788ba54779558eabea7d6b8f2593e99ae5732a194d9565979aaebe1f32edda7500d470be78285e0b7f
-
Filesize
239KB
MD57f58ec1156022f45dd0ddacdc6c3e06f
SHA12d0df8b2e7093ab7350e598715d230de0acbd563
SHA2568a0a46ef7941bd43255c9f1c704af7d43a82930d7b3af6785263d34a00cf37f5
SHA5126ad089933358808de6dcfd8c4c88dfd6a5bb10c7c44a4e788ba54779558eabea7d6b8f2593e99ae5732a194d9565979aaebe1f32edda7500d470be78285e0b7f
-
Filesize
239KB
MD57f58ec1156022f45dd0ddacdc6c3e06f
SHA12d0df8b2e7093ab7350e598715d230de0acbd563
SHA2568a0a46ef7941bd43255c9f1c704af7d43a82930d7b3af6785263d34a00cf37f5
SHA5126ad089933358808de6dcfd8c4c88dfd6a5bb10c7c44a4e788ba54779558eabea7d6b8f2593e99ae5732a194d9565979aaebe1f32edda7500d470be78285e0b7f
-
Filesize
239KB
MD57f58ec1156022f45dd0ddacdc6c3e06f
SHA12d0df8b2e7093ab7350e598715d230de0acbd563
SHA2568a0a46ef7941bd43255c9f1c704af7d43a82930d7b3af6785263d34a00cf37f5
SHA5126ad089933358808de6dcfd8c4c88dfd6a5bb10c7c44a4e788ba54779558eabea7d6b8f2593e99ae5732a194d9565979aaebe1f32edda7500d470be78285e0b7f
-
Filesize
239KB
MD57f58ec1156022f45dd0ddacdc6c3e06f
SHA12d0df8b2e7093ab7350e598715d230de0acbd563
SHA2568a0a46ef7941bd43255c9f1c704af7d43a82930d7b3af6785263d34a00cf37f5
SHA5126ad089933358808de6dcfd8c4c88dfd6a5bb10c7c44a4e788ba54779558eabea7d6b8f2593e99ae5732a194d9565979aaebe1f32edda7500d470be78285e0b7f
-
Filesize
175KB
MD5afcbb89dd592dbdc8441395a9df4090c
SHA12aaf576357eadd4f28c9139478847cb0821d8d45
SHA25645093bacd7b075139a21cb4ed0ef08fe0d477fff917d668c682863f837d0d6c1
SHA512e56ba7571d5ff45d2ea2dd7ffb4db7ed8c183030d518f6b512507925fa5770c996636f96663a019663e31265914fdf87905b0cd1375cfe432d10b09030aa9b64
-
Filesize
175KB
MD5afcbb89dd592dbdc8441395a9df4090c
SHA12aaf576357eadd4f28c9139478847cb0821d8d45
SHA25645093bacd7b075139a21cb4ed0ef08fe0d477fff917d668c682863f837d0d6c1
SHA512e56ba7571d5ff45d2ea2dd7ffb4db7ed8c183030d518f6b512507925fa5770c996636f96663a019663e31265914fdf87905b0cd1375cfe432d10b09030aa9b64
-
Filesize
1.2MB
MD5c645baefd0dab5ce6404d7b19a6057dc
SHA1500259c46a608bd0f2588532e2530f2203eeddda
SHA256b77f5029eb69082b7ffb94aff589b94c140cac821211f23edbd444043b1893fd
SHA5126ed8e72435508884d548f87e79f080b6c8f777e342c2c0d3e2f59effde2326b3774f049a169a33e3fd36a1dcee73c7238de0c7fcf1e1743f6839dd5bcc8e2657
-
Filesize
1.2MB
MD5c645baefd0dab5ce6404d7b19a6057dc
SHA1500259c46a608bd0f2588532e2530f2203eeddda
SHA256b77f5029eb69082b7ffb94aff589b94c140cac821211f23edbd444043b1893fd
SHA5126ed8e72435508884d548f87e79f080b6c8f777e342c2c0d3e2f59effde2326b3774f049a169a33e3fd36a1dcee73c7238de0c7fcf1e1743f6839dd5bcc8e2657
-
Filesize
239KB
MD57f58ec1156022f45dd0ddacdc6c3e06f
SHA12d0df8b2e7093ab7350e598715d230de0acbd563
SHA2568a0a46ef7941bd43255c9f1c704af7d43a82930d7b3af6785263d34a00cf37f5
SHA5126ad089933358808de6dcfd8c4c88dfd6a5bb10c7c44a4e788ba54779558eabea7d6b8f2593e99ae5732a194d9565979aaebe1f32edda7500d470be78285e0b7f
-
Filesize
239KB
MD57f58ec1156022f45dd0ddacdc6c3e06f
SHA12d0df8b2e7093ab7350e598715d230de0acbd563
SHA2568a0a46ef7941bd43255c9f1c704af7d43a82930d7b3af6785263d34a00cf37f5
SHA5126ad089933358808de6dcfd8c4c88dfd6a5bb10c7c44a4e788ba54779558eabea7d6b8f2593e99ae5732a194d9565979aaebe1f32edda7500d470be78285e0b7f
-
Filesize
1.0MB
MD5f9c482906fc53c180f60e33b739320a2
SHA14d452a77aec636a20be9c3c2cdfb8baafd909b2d
SHA256a894cf528482eb3a682a760a9af3ea7637a35054517b1946cd04bef87b3e0fb6
SHA512ead1e1eaf2c28168df1341791e1d63b8f5f63ad4a5761e472ea2325fe302cab3ac0d90290e89ff2ea1d2f8f238b24fab5b0289629a99cccb8f99f7c559568d5a
-
Filesize
1.0MB
MD5f9c482906fc53c180f60e33b739320a2
SHA14d452a77aec636a20be9c3c2cdfb8baafd909b2d
SHA256a894cf528482eb3a682a760a9af3ea7637a35054517b1946cd04bef87b3e0fb6
SHA512ead1e1eaf2c28168df1341791e1d63b8f5f63ad4a5761e472ea2325fe302cab3ac0d90290e89ff2ea1d2f8f238b24fab5b0289629a99cccb8f99f7c559568d5a
-
Filesize
11KB
MD59f37ac9732f227a7cb4d38a101cd95b6
SHA1036648d141f75044fb6fb2e4e965b4ca791f7e43
SHA256d98f9db749585792ba75ec9d29da3f8d74ebff739621f207386a06794c710d0c
SHA512928c7b0b4d29e11aca8ce81c1e0580c8572f0c79b5faff1970b718eb19eb7a4ec3897e1ae1ac04a70c55d6029211c2ba9f51750efb4c52e40043fde4486e87b1
-
Filesize
11KB
MD59f37ac9732f227a7cb4d38a101cd95b6
SHA1036648d141f75044fb6fb2e4e965b4ca791f7e43
SHA256d98f9db749585792ba75ec9d29da3f8d74ebff739621f207386a06794c710d0c
SHA512928c7b0b4d29e11aca8ce81c1e0580c8572f0c79b5faff1970b718eb19eb7a4ec3897e1ae1ac04a70c55d6029211c2ba9f51750efb4c52e40043fde4486e87b1
-
Filesize
935KB
MD5774a419ba3767427cc495bf243729c51
SHA10f4fff2de8bcd567ce325781eb256e09ea57661f
SHA256d6c74618a9ea7949f858fcf5812d0e40c63ac2ac8a9e97dcf00cab4d0fe31d3a
SHA512ed302798fddc5dcae544d965066eb836929c22ec71625ef7dd769e32010d9a11f64ac11ece514e53430073b4f038e14469e3bfd4f1a6ae862769186c017a06e3
-
Filesize
935KB
MD5774a419ba3767427cc495bf243729c51
SHA10f4fff2de8bcd567ce325781eb256e09ea57661f
SHA256d6c74618a9ea7949f858fcf5812d0e40c63ac2ac8a9e97dcf00cab4d0fe31d3a
SHA512ed302798fddc5dcae544d965066eb836929c22ec71625ef7dd769e32010d9a11f64ac11ece514e53430073b4f038e14469e3bfd4f1a6ae862769186c017a06e3
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a
-
Filesize
666KB
MD53e527f0273707f60542f49cb38c0bf89
SHA104b5474285574b90f0571139ffa683709024f3de
SHA256ac5d96fec7a0945ea72ea7eb410172b8f3bc274612fd6916716379f1f70741ff
SHA5125d864673707c1e05f8adba508b86d066e7f47498f4d8124d67cada060522455f01cf60d9004213f6e7be775b20f3b51b056518453435bf7f506e8ad7da64efdc
-
Filesize
666KB
MD53e527f0273707f60542f49cb38c0bf89
SHA104b5474285574b90f0571139ffa683709024f3de
SHA256ac5d96fec7a0945ea72ea7eb410172b8f3bc274612fd6916716379f1f70741ff
SHA5125d864673707c1e05f8adba508b86d066e7f47498f4d8124d67cada060522455f01cf60d9004213f6e7be775b20f3b51b056518453435bf7f506e8ad7da64efdc
-
Filesize
245KB
MD5a431bc74fcefa003b9f56052f7503547
SHA18ff582845291cf5b122b87707a74e5e904004d6f
SHA2564a0a577563dd54d2ffd2fa8b37ebcc1b6eca5d4a63f070daf6d52a57f786fd21
SHA5126612daf3836bce59a92d9a155480fbc1d4949cd5a5148c4dbba773253cea8306f62e1a5678247a6182192667579fd9ee7f7c1e51526a019416ab7ea51791d350
-
Filesize
245KB
MD5a431bc74fcefa003b9f56052f7503547
SHA18ff582845291cf5b122b87707a74e5e904004d6f
SHA2564a0a577563dd54d2ffd2fa8b37ebcc1b6eca5d4a63f070daf6d52a57f786fd21
SHA5126612daf3836bce59a92d9a155480fbc1d4949cd5a5148c4dbba773253cea8306f62e1a5678247a6182192667579fd9ee7f7c1e51526a019416ab7ea51791d350
-
Filesize
391KB
MD5d149dbbcfc46f6267c6dc8099f7ab39c
SHA1019c025a407e0a949e16e948a8bf09e8cfca002a
SHA256b9cf3efcc7b7be764029d43ce4e67ef6b7d053130e9d92cce9991120e14223d7
SHA5129f5e2449839134ed6cd112f05856c26caf3bf85e7916607be322bf520076f1e7a5d69202e326818aa88b954aa4c592304a0e0805dc6d8fcc49116f8d79495d93
-
Filesize
391KB
MD5d149dbbcfc46f6267c6dc8099f7ab39c
SHA1019c025a407e0a949e16e948a8bf09e8cfca002a
SHA256b9cf3efcc7b7be764029d43ce4e67ef6b7d053130e9d92cce9991120e14223d7
SHA5129f5e2449839134ed6cd112f05856c26caf3bf85e7916607be322bf520076f1e7a5d69202e326818aa88b954aa4c592304a0e0805dc6d8fcc49116f8d79495d93
-
Filesize
11KB
MD5b61bbe95c331d137846f76bd3b7e2d5f
SHA177a1f5008b6578d7bf5c5e0f1fd11ff5ff1e499f
SHA25657feaa887335fec68091ba77c95ad0e21325b8051781c72f4c5934c59ac21f53
SHA5129f21238f4327cf76343503ef521a5056734c58299dd643e4332f2b7104e110d9101302b7b58290b6aa293f78e8f6e18e225a745ce4ce49ec1c79487bd866a966
-
Filesize
11KB
MD5b61bbe95c331d137846f76bd3b7e2d5f
SHA177a1f5008b6578d7bf5c5e0f1fd11ff5ff1e499f
SHA25657feaa887335fec68091ba77c95ad0e21325b8051781c72f4c5934c59ac21f53
SHA5129f21238f4327cf76343503ef521a5056734c58299dd643e4332f2b7104e110d9101302b7b58290b6aa293f78e8f6e18e225a745ce4ce49ec1c79487bd866a966
-
Filesize
11KB
MD5b61bbe95c331d137846f76bd3b7e2d5f
SHA177a1f5008b6578d7bf5c5e0f1fd11ff5ff1e499f
SHA25657feaa887335fec68091ba77c95ad0e21325b8051781c72f4c5934c59ac21f53
SHA5129f21238f4327cf76343503ef521a5056734c58299dd643e4332f2b7104e110d9101302b7b58290b6aa293f78e8f6e18e225a745ce4ce49ec1c79487bd866a966
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a
-
Filesize
304KB
MD59c3e7c5879f2758bb2add2fbf488ed16
SHA1c5a2662767f97a4860f33a9fe6cace435a3c1b02
SHA2567ec2ec7a2ee43e8dc5523be5af507bcf31f19dfed1faa303314729d2fe456acf
SHA5120808e8e4d00ffe2201f792095081c7fc1678ef3d75d8ae1e6d18363d1693a4bf3c1458252209a6ebd13255d8eb43c9eed45d8029a409ed511fbe3020e8b7ae8a
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
89KB
MD5937b902b8ad05afb922313d2341143f4
SHA1b48d5579e01000cdb3c3ef4e1ad1b97d2056a8b1
SHA256f0f0e7ab301101e6473f1dbcadd2272468af036195685c0ae51c9d90c40f0849
SHA51291f67248e47b2fced9ff802370ced4e0de675d06e7ef32acd40a479fecfe8b912dfb2abf76cb8b391f471d8dd134b5f041186541a8038ef84219c852f31f37ff
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5