Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 20:24
Static task
static1
General
-
Target
e458e240819275e42081c794a6ab97840d87b70e64a0297d59630c5a553e0f54.exe
-
Size
1.3MB
-
MD5
2240d76e64c55818e69e1a6447116924
-
SHA1
fec2a3deb63967759fcdfe7fd3b3ab709b7f1b2e
-
SHA256
e458e240819275e42081c794a6ab97840d87b70e64a0297d59630c5a553e0f54
-
SHA512
069b52a90e5bb2717e2c1b909971e7818a1d7e2f73f113eb87d332862153aca82fad32c705435f42b3203033c592b22f351d00c93a63e63c8f867b6bd2e30ba1
-
SSDEEP
24576:Kyhfph35hLiQ2AlMcqQUQfNV62id4RUzfLgFAL5rhMoa6utcsjmS4h:RhfphfGQ/Q+34dG8fLgFAVrhMhzjK
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beTZ07LU32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dskr77ay96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dskr77ay96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beTZ07LU32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beTZ07LU32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beTZ07LU32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dskr77ay96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dskr77ay96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dskr77ay96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnRA42cW52.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnRA42cW52.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beTZ07LU32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beTZ07LU32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnRA42cW52.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dskr77ay96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnRA42cW52.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnRA42cW52.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 33 IoCs
resource yara_rule behavioral1/memory/1232-183-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-184-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-186-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-188-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-190-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-192-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-194-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-196-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-200-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-203-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-205-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-207-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-209-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-211-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-213-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-217-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-215-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-219-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-221-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-223-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-225-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-227-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-229-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-231-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-233-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-235-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-237-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-239-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-241-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-243-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-245-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-247-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline behavioral1/memory/1232-249-0x0000000004BB0000-0x0000000004BEE000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation hk99Mk24JG31.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 1800 ptrl1843Mv.exe 3896 ptZR3672WZ.exe 740 ptlA5689DH.exe 420 pthx3538Hk.exe 2568 ptMu1233nZ.exe 216 beTZ07LU32.exe 1232 cuTH65DX97.exe 3520 dskr77ay96.exe 1672 fr26NV6621bY.exe 684 gnRA42cW52.exe 4168 hk99Mk24JG31.exe 3016 mnolyk.exe 496 jxaW41cf61.exe 3308 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 1208 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beTZ07LU32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dskr77ay96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dskr77ay96.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnRA42cW52.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptlA5689DH.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pthx3538Hk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" pthx3538Hk.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptMu1233nZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptlA5689DH.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptMu1233nZ.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e458e240819275e42081c794a6ab97840d87b70e64a0297d59630c5a553e0f54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e458e240819275e42081c794a6ab97840d87b70e64a0297d59630c5a553e0f54.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptrl1843Mv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptrl1843Mv.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptZR3672WZ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptZR3672WZ.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 2436 1232 WerFault.exe 95 1704 3520 WerFault.exe 99 3148 1672 WerFault.exe 105 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 216 beTZ07LU32.exe 216 beTZ07LU32.exe 1232 cuTH65DX97.exe 1232 cuTH65DX97.exe 3520 dskr77ay96.exe 3520 dskr77ay96.exe 1672 fr26NV6621bY.exe 1672 fr26NV6621bY.exe 684 gnRA42cW52.exe 684 gnRA42cW52.exe 496 jxaW41cf61.exe 496 jxaW41cf61.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 216 beTZ07LU32.exe Token: SeDebugPrivilege 1232 cuTH65DX97.exe Token: SeDebugPrivilege 3520 dskr77ay96.exe Token: SeDebugPrivilege 1672 fr26NV6621bY.exe Token: SeDebugPrivilege 684 gnRA42cW52.exe Token: SeDebugPrivilege 496 jxaW41cf61.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1800 2180 e458e240819275e42081c794a6ab97840d87b70e64a0297d59630c5a553e0f54.exe 86 PID 2180 wrote to memory of 1800 2180 e458e240819275e42081c794a6ab97840d87b70e64a0297d59630c5a553e0f54.exe 86 PID 2180 wrote to memory of 1800 2180 e458e240819275e42081c794a6ab97840d87b70e64a0297d59630c5a553e0f54.exe 86 PID 1800 wrote to memory of 3896 1800 ptrl1843Mv.exe 87 PID 1800 wrote to memory of 3896 1800 ptrl1843Mv.exe 87 PID 1800 wrote to memory of 3896 1800 ptrl1843Mv.exe 87 PID 3896 wrote to memory of 740 3896 ptZR3672WZ.exe 88 PID 3896 wrote to memory of 740 3896 ptZR3672WZ.exe 88 PID 3896 wrote to memory of 740 3896 ptZR3672WZ.exe 88 PID 740 wrote to memory of 420 740 ptlA5689DH.exe 89 PID 740 wrote to memory of 420 740 ptlA5689DH.exe 89 PID 740 wrote to memory of 420 740 ptlA5689DH.exe 89 PID 420 wrote to memory of 2568 420 pthx3538Hk.exe 90 PID 420 wrote to memory of 2568 420 pthx3538Hk.exe 90 PID 420 wrote to memory of 2568 420 pthx3538Hk.exe 90 PID 2568 wrote to memory of 216 2568 ptMu1233nZ.exe 91 PID 2568 wrote to memory of 216 2568 ptMu1233nZ.exe 91 PID 2568 wrote to memory of 1232 2568 ptMu1233nZ.exe 95 PID 2568 wrote to memory of 1232 2568 ptMu1233nZ.exe 95 PID 2568 wrote to memory of 1232 2568 ptMu1233nZ.exe 95 PID 420 wrote to memory of 3520 420 pthx3538Hk.exe 99 PID 420 wrote to memory of 3520 420 pthx3538Hk.exe 99 PID 420 wrote to memory of 3520 420 pthx3538Hk.exe 99 PID 740 wrote to memory of 1672 740 ptlA5689DH.exe 105 PID 740 wrote to memory of 1672 740 ptlA5689DH.exe 105 PID 740 wrote to memory of 1672 740 ptlA5689DH.exe 105 PID 3896 wrote to memory of 684 3896 ptZR3672WZ.exe 108 PID 3896 wrote to memory of 684 3896 ptZR3672WZ.exe 108 PID 1800 wrote to memory of 4168 1800 ptrl1843Mv.exe 109 PID 1800 wrote to memory of 4168 1800 ptrl1843Mv.exe 109 PID 1800 wrote to memory of 4168 1800 ptrl1843Mv.exe 109 PID 4168 wrote to memory of 3016 4168 hk99Mk24JG31.exe 111 PID 4168 wrote to memory of 3016 4168 hk99Mk24JG31.exe 111 PID 4168 wrote to memory of 3016 4168 hk99Mk24JG31.exe 111 PID 2180 wrote to memory of 496 2180 e458e240819275e42081c794a6ab97840d87b70e64a0297d59630c5a553e0f54.exe 112 PID 2180 wrote to memory of 496 2180 e458e240819275e42081c794a6ab97840d87b70e64a0297d59630c5a553e0f54.exe 112 PID 2180 wrote to memory of 496 2180 e458e240819275e42081c794a6ab97840d87b70e64a0297d59630c5a553e0f54.exe 112 PID 3016 wrote to memory of 5092 3016 mnolyk.exe 113 PID 3016 wrote to memory of 5092 3016 mnolyk.exe 113 PID 3016 wrote to memory of 5092 3016 mnolyk.exe 113 PID 3016 wrote to memory of 4616 3016 mnolyk.exe 115 PID 3016 wrote to memory of 4616 3016 mnolyk.exe 115 PID 3016 wrote to memory of 4616 3016 mnolyk.exe 115 PID 4616 wrote to memory of 5072 4616 cmd.exe 117 PID 4616 wrote to memory of 5072 4616 cmd.exe 117 PID 4616 wrote to memory of 5072 4616 cmd.exe 117 PID 4616 wrote to memory of 4492 4616 cmd.exe 118 PID 4616 wrote to memory of 4492 4616 cmd.exe 118 PID 4616 wrote to memory of 4492 4616 cmd.exe 118 PID 4616 wrote to memory of 4356 4616 cmd.exe 119 PID 4616 wrote to memory of 4356 4616 cmd.exe 119 PID 4616 wrote to memory of 4356 4616 cmd.exe 119 PID 4616 wrote to memory of 1960 4616 cmd.exe 120 PID 4616 wrote to memory of 1960 4616 cmd.exe 120 PID 4616 wrote to memory of 1960 4616 cmd.exe 120 PID 4616 wrote to memory of 5076 4616 cmd.exe 121 PID 4616 wrote to memory of 5076 4616 cmd.exe 121 PID 4616 wrote to memory of 5076 4616 cmd.exe 121 PID 4616 wrote to memory of 5040 4616 cmd.exe 122 PID 4616 wrote to memory of 5040 4616 cmd.exe 122 PID 4616 wrote to memory of 5040 4616 cmd.exe 122 PID 3016 wrote to memory of 1208 3016 mnolyk.exe 131 PID 3016 wrote to memory of 1208 3016 mnolyk.exe 131 PID 3016 wrote to memory of 1208 3016 mnolyk.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\e458e240819275e42081c794a6ab97840d87b70e64a0297d59630c5a553e0f54.exe"C:\Users\Admin\AppData\Local\Temp\e458e240819275e42081c794a6ab97840d87b70e64a0297d59630c5a553e0f54.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptrl1843Mv.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptrl1843Mv.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptZR3672WZ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptZR3672WZ.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptlA5689DH.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptlA5689DH.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pthx3538Hk.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\pthx3538Hk.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptMu1233nZ.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptMu1233nZ.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beTZ07LU32.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\beTZ07LU32.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuTH65DX97.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuTH65DX97.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 13488⤵
- Program crash
PID:2436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dskr77ay96.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dskr77ay96.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 11007⤵
- Program crash
PID:1704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr26NV6621bY.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr26NV6621bY.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 19966⤵
- Program crash
PID:3148
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnRA42cW52.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnRA42cW52.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk99Mk24JG31.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk99Mk24JG31.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:5092
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5072
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:4492
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:4356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:5076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:5040
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:1208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxaW41cf61.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxaW41cf61.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1232 -ip 12321⤵PID:2684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3520 -ip 35201⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1672 -ip 16721⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:3308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5a946668f468e820159797a28e87b3080
SHA182170ea653c8116a08bb8dca92cd5f3f35f59d1f
SHA256e5627f5e46d4d4229a0a016e690927bb002bde0f42e2fa4ee2e097756201a513
SHA5123566d9dfe06a5e20cc52e4199cc5be9851101853000a48cc184315cd4411a2d17fe69f3882db679dac264dd6596e298cee5f0a2a8f3bdd2d854ea12b6cd209c8
-
Filesize
239KB
MD5a946668f468e820159797a28e87b3080
SHA182170ea653c8116a08bb8dca92cd5f3f35f59d1f
SHA256e5627f5e46d4d4229a0a016e690927bb002bde0f42e2fa4ee2e097756201a513
SHA5123566d9dfe06a5e20cc52e4199cc5be9851101853000a48cc184315cd4411a2d17fe69f3882db679dac264dd6596e298cee5f0a2a8f3bdd2d854ea12b6cd209c8
-
Filesize
239KB
MD5a946668f468e820159797a28e87b3080
SHA182170ea653c8116a08bb8dca92cd5f3f35f59d1f
SHA256e5627f5e46d4d4229a0a016e690927bb002bde0f42e2fa4ee2e097756201a513
SHA5123566d9dfe06a5e20cc52e4199cc5be9851101853000a48cc184315cd4411a2d17fe69f3882db679dac264dd6596e298cee5f0a2a8f3bdd2d854ea12b6cd209c8
-
Filesize
239KB
MD5a946668f468e820159797a28e87b3080
SHA182170ea653c8116a08bb8dca92cd5f3f35f59d1f
SHA256e5627f5e46d4d4229a0a016e690927bb002bde0f42e2fa4ee2e097756201a513
SHA5123566d9dfe06a5e20cc52e4199cc5be9851101853000a48cc184315cd4411a2d17fe69f3882db679dac264dd6596e298cee5f0a2a8f3bdd2d854ea12b6cd209c8
-
Filesize
175KB
MD5132c92b7d1e0411db1ba3a1b2fefd166
SHA181ec062ea6147dfb244faf8859d2bb69fa2d826f
SHA256852be8a08c31001bb0a98ec4aa5617772d841dece1a19f99f04b4bf1050d0534
SHA5126ca08742003885f89e3a003ac497b594af9e7a5a5520de17cd58e351dea3cf1db2edc63b1e92c9f3e8832b1fcd47a5f84a4b312db5d2beb26908d6fe69518fcf
-
Filesize
175KB
MD5132c92b7d1e0411db1ba3a1b2fefd166
SHA181ec062ea6147dfb244faf8859d2bb69fa2d826f
SHA256852be8a08c31001bb0a98ec4aa5617772d841dece1a19f99f04b4bf1050d0534
SHA5126ca08742003885f89e3a003ac497b594af9e7a5a5520de17cd58e351dea3cf1db2edc63b1e92c9f3e8832b1fcd47a5f84a4b312db5d2beb26908d6fe69518fcf
-
Filesize
1.2MB
MD5b1e54f5ffe2a4e70e8284c5ab50b16bf
SHA179249a7b252bbd76853ce5dc04adb022df67f716
SHA25646f73619aace83bbd1d16403b61b2e91b45b5dbb102854078b872170c75d680b
SHA512148ed328531ab2d70ba85c157b2b77190b71165d639b7714be4edb38004d1cbbfd35629494638d33a7a189e3d79c29f585dbbe877fbbdba27a95278efb997136
-
Filesize
1.2MB
MD5b1e54f5ffe2a4e70e8284c5ab50b16bf
SHA179249a7b252bbd76853ce5dc04adb022df67f716
SHA25646f73619aace83bbd1d16403b61b2e91b45b5dbb102854078b872170c75d680b
SHA512148ed328531ab2d70ba85c157b2b77190b71165d639b7714be4edb38004d1cbbfd35629494638d33a7a189e3d79c29f585dbbe877fbbdba27a95278efb997136
-
Filesize
239KB
MD5a946668f468e820159797a28e87b3080
SHA182170ea653c8116a08bb8dca92cd5f3f35f59d1f
SHA256e5627f5e46d4d4229a0a016e690927bb002bde0f42e2fa4ee2e097756201a513
SHA5123566d9dfe06a5e20cc52e4199cc5be9851101853000a48cc184315cd4411a2d17fe69f3882db679dac264dd6596e298cee5f0a2a8f3bdd2d854ea12b6cd209c8
-
Filesize
239KB
MD5a946668f468e820159797a28e87b3080
SHA182170ea653c8116a08bb8dca92cd5f3f35f59d1f
SHA256e5627f5e46d4d4229a0a016e690927bb002bde0f42e2fa4ee2e097756201a513
SHA5123566d9dfe06a5e20cc52e4199cc5be9851101853000a48cc184315cd4411a2d17fe69f3882db679dac264dd6596e298cee5f0a2a8f3bdd2d854ea12b6cd209c8
-
Filesize
996KB
MD5e8ebe4ade3dba901a1ce30e0939d9269
SHA1c6df84967a43d23bbab455b5d64df6b136f2031c
SHA256fee201cd1f364b9d31fb11f07bbb4fe08549edc3000a8b75872273d3e22a6034
SHA5128555c9c78ea8221e06288d8d69bd1e13b0d208ef775441e9ad7306fc3ab7e145bb59b5a7c626aac8683917e7c5901b646d422fd2e8f335182ddc3ac5d6307fa2
-
Filesize
996KB
MD5e8ebe4ade3dba901a1ce30e0939d9269
SHA1c6df84967a43d23bbab455b5d64df6b136f2031c
SHA256fee201cd1f364b9d31fb11f07bbb4fe08549edc3000a8b75872273d3e22a6034
SHA5128555c9c78ea8221e06288d8d69bd1e13b0d208ef775441e9ad7306fc3ab7e145bb59b5a7c626aac8683917e7c5901b646d422fd2e8f335182ddc3ac5d6307fa2
-
Filesize
11KB
MD5fcf44d8e247adc2837b101952ff1adf8
SHA19267d75fdafafdc484f32827e1a348a847c262d5
SHA256ce366b75ad5ae005efe2a1aecb50bf14d7bf76d7bf9dbaeeafd9e01a7126aa7e
SHA51261fdf63a107558b2e0aaeca841bdd1b7eb046cebd69c728885ab32b62dcb493073ae099932144c7abb2269b942f86786db8c32d58ab890a5e76da014ec70ea17
-
Filesize
11KB
MD5fcf44d8e247adc2837b101952ff1adf8
SHA19267d75fdafafdc484f32827e1a348a847c262d5
SHA256ce366b75ad5ae005efe2a1aecb50bf14d7bf76d7bf9dbaeeafd9e01a7126aa7e
SHA51261fdf63a107558b2e0aaeca841bdd1b7eb046cebd69c728885ab32b62dcb493073ae099932144c7abb2269b942f86786db8c32d58ab890a5e76da014ec70ea17
-
Filesize
892KB
MD5d0927df093150bb024cb490c3a1538ca
SHA1e3bc95c4946fa400afe3912434cc72f30dce31db
SHA256356da393c59b68f6a6a5797f915a07a388822199cf48f033eb3d77d884e0f92e
SHA51276926888a8e5516d6aa50d32959799a1f5b11d49061bb39fcd3b69d36f73b77441a620cc3f21d41733d45335d7e161488da06431d33041f59b1bff3333fe31f1
-
Filesize
892KB
MD5d0927df093150bb024cb490c3a1538ca
SHA1e3bc95c4946fa400afe3912434cc72f30dce31db
SHA256356da393c59b68f6a6a5797f915a07a388822199cf48f033eb3d77d884e0f92e
SHA51276926888a8e5516d6aa50d32959799a1f5b11d49061bb39fcd3b69d36f73b77441a620cc3f21d41733d45335d7e161488da06431d33041f59b1bff3333fe31f1
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e
-
Filesize
666KB
MD50cd5b006baf09f642a9354d94ef9b297
SHA152d2f94ee7e59f461b9ca67203ca22fb5d730ab6
SHA2569fa61af852599866a9eae2404325a52e265c6e16e1206b7bdc07326da7144c2a
SHA5123736fd19687a1e326a70c6809cebe1dcb9e502d13d4de562b590fa4056d36d4a540ecebdb9b53cd598b80997355201a0846b1b030f2d8800b3c0a007b76a3ae2
-
Filesize
666KB
MD50cd5b006baf09f642a9354d94ef9b297
SHA152d2f94ee7e59f461b9ca67203ca22fb5d730ab6
SHA2569fa61af852599866a9eae2404325a52e265c6e16e1206b7bdc07326da7144c2a
SHA5123736fd19687a1e326a70c6809cebe1dcb9e502d13d4de562b590fa4056d36d4a540ecebdb9b53cd598b80997355201a0846b1b030f2d8800b3c0a007b76a3ae2
-
Filesize
246KB
MD5527c4b5a37685cdc0089a97115e717ab
SHA1571a5d59934aab918daca61f4934bc6b9c181783
SHA256a87e67f5d4f620ef99c204241722adf7fcc93832801444bc32b4bef03d0c9552
SHA51281e021c3bd0a6c502848b4bff9298995639e55bdfc4b988477d24087fb88c23f921d49a9b1745bd3588d7680eb62c98e229cc164ce564faeee0b452c0fc09152
-
Filesize
246KB
MD5527c4b5a37685cdc0089a97115e717ab
SHA1571a5d59934aab918daca61f4934bc6b9c181783
SHA256a87e67f5d4f620ef99c204241722adf7fcc93832801444bc32b4bef03d0c9552
SHA51281e021c3bd0a6c502848b4bff9298995639e55bdfc4b988477d24087fb88c23f921d49a9b1745bd3588d7680eb62c98e229cc164ce564faeee0b452c0fc09152
-
Filesize
391KB
MD5450938731ed5c7e2b2605fbe75676d9d
SHA128bacc717dacfe9edd9e0bff12b1b2caedcbf575
SHA256e13f0f7022de9ce6c3a717a5948d0de60e16fdc5911fbe542bd16e41e8a518fa
SHA5124fe0d614c8e0ae6b22535ed20fab41190e3b1d20672422bc1b12efc092c7f366c4c52e09630090fc2855b7fd2e3eb6f96533ec64b1dfda9a70bb32042e37db38
-
Filesize
391KB
MD5450938731ed5c7e2b2605fbe75676d9d
SHA128bacc717dacfe9edd9e0bff12b1b2caedcbf575
SHA256e13f0f7022de9ce6c3a717a5948d0de60e16fdc5911fbe542bd16e41e8a518fa
SHA5124fe0d614c8e0ae6b22535ed20fab41190e3b1d20672422bc1b12efc092c7f366c4c52e09630090fc2855b7fd2e3eb6f96533ec64b1dfda9a70bb32042e37db38
-
Filesize
11KB
MD5bebd765f384f15703162dd4dc67b9571
SHA199e0990206753ef4638bdf081676fb84e20c451a
SHA25661cb55a1cd8ec6a6ae50941956619eb8c372e22a62c70aa22c2a76ff8790e36b
SHA512c4e45553fc5afd5d0370b8f7401b826b33e5f7d4f4461143d33e1ae37f52098e9a7495cf36256a3673425de0e584c4933781dcbcc096e63736b04a2fc27b3dd1
-
Filesize
11KB
MD5bebd765f384f15703162dd4dc67b9571
SHA199e0990206753ef4638bdf081676fb84e20c451a
SHA25661cb55a1cd8ec6a6ae50941956619eb8c372e22a62c70aa22c2a76ff8790e36b
SHA512c4e45553fc5afd5d0370b8f7401b826b33e5f7d4f4461143d33e1ae37f52098e9a7495cf36256a3673425de0e584c4933781dcbcc096e63736b04a2fc27b3dd1
-
Filesize
11KB
MD5bebd765f384f15703162dd4dc67b9571
SHA199e0990206753ef4638bdf081676fb84e20c451a
SHA25661cb55a1cd8ec6a6ae50941956619eb8c372e22a62c70aa22c2a76ff8790e36b
SHA512c4e45553fc5afd5d0370b8f7401b826b33e5f7d4f4461143d33e1ae37f52098e9a7495cf36256a3673425de0e584c4933781dcbcc096e63736b04a2fc27b3dd1
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5