Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 10:01
Static task
static1
General
-
Target
b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc.exe
-
Size
1.4MB
-
MD5
b8adbc1a0523ed53d82bfc31c40b2b08
-
SHA1
2ea884f4c0eb4b23b74d65f7168e1aac66741959
-
SHA256
b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc
-
SHA512
8c78df002df7fb30637797b8c195f9710c21a811a9399741381733cfc61b6cba710f7e98c0d7ee58ca75982e6ba90dd9a6698bbb1201ef9a915ec61dc2f5b518
-
SSDEEP
24576:hyrMzDizMkq9kWr1uh3/CinGt7C41MuOmBhMRRYrKh+fD3FY:Uo/iAkWr1wa2Gt7CuMuO2MRRYbf
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsqx39QH31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsqx39QH31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsqx39QH31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnVc68Cw21.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bemO01BI77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bemO01BI77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bemO01BI77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bemO01BI77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bemO01BI77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsqx39QH31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnVc68Cw21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnVc68Cw21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsqx39QH31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnVc68Cw21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnVc68Cw21.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bemO01BI77.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsqx39QH31.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/3652-185-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-188-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-186-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-190-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-192-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-194-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-196-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-198-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-200-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-202-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-204-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-206-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-208-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-210-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-212-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-214-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-216-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-218-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-221-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-223-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-225-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-227-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-231-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-229-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-233-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-235-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-237-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-239-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-241-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-243-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-245-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-247-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3652-249-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/3276-2068-0x0000000007400000-0x0000000007410000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation hk08uy43Fu72.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 15 IoCs
pid Process 220 ptDt5262yV.exe 3376 ptAQ5305Qq.exe 2204 ptfe7818RM.exe 2720 ptqs1915SN.exe 1972 ptxI7132mi.exe 4768 bemO01BI77.exe 3652 cuLC30ZK78.exe 764 dsqx39QH31.exe 3276 fr12gI6135EN.exe 1776 gnVc68Cw21.exe 988 hk08uy43Fu72.exe 2304 mnolyk.exe 2952 jxyO04Kn57.exe 644 mnolyk.exe 4748 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 4412 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bemO01BI77.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsqx39QH31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsqx39QH31.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnVc68Cw21.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptDt5262yV.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptAQ5305Qq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptqs1915SN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptqs1915SN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptxI7132mi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptDt5262yV.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptAQ5305Qq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptfe7818RM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptfe7818RM.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptxI7132mi.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 1552 3652 WerFault.exe 97 1552 764 WerFault.exe 102 4388 3276 WerFault.exe 112 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4768 bemO01BI77.exe 4768 bemO01BI77.exe 3652 cuLC30ZK78.exe 3652 cuLC30ZK78.exe 764 dsqx39QH31.exe 764 dsqx39QH31.exe 3276 fr12gI6135EN.exe 3276 fr12gI6135EN.exe 1776 gnVc68Cw21.exe 1776 gnVc68Cw21.exe 2952 jxyO04Kn57.exe 2952 jxyO04Kn57.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4768 bemO01BI77.exe Token: SeDebugPrivilege 3652 cuLC30ZK78.exe Token: SeDebugPrivilege 764 dsqx39QH31.exe Token: SeDebugPrivilege 3276 fr12gI6135EN.exe Token: SeDebugPrivilege 1776 gnVc68Cw21.exe Token: SeDebugPrivilege 2952 jxyO04Kn57.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3580 wrote to memory of 220 3580 b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc.exe 88 PID 3580 wrote to memory of 220 3580 b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc.exe 88 PID 3580 wrote to memory of 220 3580 b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc.exe 88 PID 220 wrote to memory of 3376 220 ptDt5262yV.exe 89 PID 220 wrote to memory of 3376 220 ptDt5262yV.exe 89 PID 220 wrote to memory of 3376 220 ptDt5262yV.exe 89 PID 3376 wrote to memory of 2204 3376 ptAQ5305Qq.exe 90 PID 3376 wrote to memory of 2204 3376 ptAQ5305Qq.exe 90 PID 3376 wrote to memory of 2204 3376 ptAQ5305Qq.exe 90 PID 2204 wrote to memory of 2720 2204 ptfe7818RM.exe 91 PID 2204 wrote to memory of 2720 2204 ptfe7818RM.exe 91 PID 2204 wrote to memory of 2720 2204 ptfe7818RM.exe 91 PID 2720 wrote to memory of 1972 2720 ptqs1915SN.exe 92 PID 2720 wrote to memory of 1972 2720 ptqs1915SN.exe 92 PID 2720 wrote to memory of 1972 2720 ptqs1915SN.exe 92 PID 1972 wrote to memory of 4768 1972 ptxI7132mi.exe 93 PID 1972 wrote to memory of 4768 1972 ptxI7132mi.exe 93 PID 1972 wrote to memory of 3652 1972 ptxI7132mi.exe 97 PID 1972 wrote to memory of 3652 1972 ptxI7132mi.exe 97 PID 1972 wrote to memory of 3652 1972 ptxI7132mi.exe 97 PID 2720 wrote to memory of 764 2720 ptqs1915SN.exe 102 PID 2720 wrote to memory of 764 2720 ptqs1915SN.exe 102 PID 2720 wrote to memory of 764 2720 ptqs1915SN.exe 102 PID 2204 wrote to memory of 3276 2204 ptfe7818RM.exe 112 PID 2204 wrote to memory of 3276 2204 ptfe7818RM.exe 112 PID 2204 wrote to memory of 3276 2204 ptfe7818RM.exe 112 PID 3376 wrote to memory of 1776 3376 ptAQ5305Qq.exe 115 PID 3376 wrote to memory of 1776 3376 ptAQ5305Qq.exe 115 PID 220 wrote to memory of 988 220 ptDt5262yV.exe 116 PID 220 wrote to memory of 988 220 ptDt5262yV.exe 116 PID 220 wrote to memory of 988 220 ptDt5262yV.exe 116 PID 988 wrote to memory of 2304 988 hk08uy43Fu72.exe 117 PID 988 wrote to memory of 2304 988 hk08uy43Fu72.exe 117 PID 988 wrote to memory of 2304 988 hk08uy43Fu72.exe 117 PID 3580 wrote to memory of 2952 3580 b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc.exe 118 PID 3580 wrote to memory of 2952 3580 b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc.exe 118 PID 3580 wrote to memory of 2952 3580 b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc.exe 118 PID 2304 wrote to memory of 4220 2304 mnolyk.exe 119 PID 2304 wrote to memory of 4220 2304 mnolyk.exe 119 PID 2304 wrote to memory of 4220 2304 mnolyk.exe 119 PID 2304 wrote to memory of 2720 2304 mnolyk.exe 121 PID 2304 wrote to memory of 2720 2304 mnolyk.exe 121 PID 2304 wrote to memory of 2720 2304 mnolyk.exe 121 PID 2720 wrote to memory of 2484 2720 cmd.exe 123 PID 2720 wrote to memory of 2484 2720 cmd.exe 123 PID 2720 wrote to memory of 2484 2720 cmd.exe 123 PID 2720 wrote to memory of 1536 2720 cmd.exe 124 PID 2720 wrote to memory of 1536 2720 cmd.exe 124 PID 2720 wrote to memory of 1536 2720 cmd.exe 124 PID 2720 wrote to memory of 2708 2720 cmd.exe 125 PID 2720 wrote to memory of 2708 2720 cmd.exe 125 PID 2720 wrote to memory of 2708 2720 cmd.exe 125 PID 2720 wrote to memory of 852 2720 cmd.exe 126 PID 2720 wrote to memory of 852 2720 cmd.exe 126 PID 2720 wrote to memory of 852 2720 cmd.exe 126 PID 2720 wrote to memory of 3164 2720 cmd.exe 127 PID 2720 wrote to memory of 3164 2720 cmd.exe 127 PID 2720 wrote to memory of 3164 2720 cmd.exe 127 PID 2720 wrote to memory of 4832 2720 cmd.exe 128 PID 2720 wrote to memory of 4832 2720 cmd.exe 128 PID 2720 wrote to memory of 4832 2720 cmd.exe 128 PID 2304 wrote to memory of 4412 2304 mnolyk.exe 131 PID 2304 wrote to memory of 4412 2304 mnolyk.exe 131 PID 2304 wrote to memory of 4412 2304 mnolyk.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc.exe"C:\Users\Admin\AppData\Local\Temp\b36776c521aeee11c4282a132ad426017c2eebf6130e0af3aacf7b16981e25fc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptDt5262yV.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptDt5262yV.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptAQ5305Qq.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptAQ5305Qq.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptfe7818RM.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptfe7818RM.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptqs1915SN.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptqs1915SN.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptxI7132mi.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptxI7132mi.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\bemO01BI77.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\bemO01BI77.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuLC30ZK78.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuLC30ZK78.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 13408⤵
- Program crash
PID:1552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsqx39QH31.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsqx39QH31.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 10807⤵
- Program crash
PID:1552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr12gI6135EN.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr12gI6135EN.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 13366⤵
- Program crash
PID:4388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnVc68Cw21.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnVc68Cw21.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk08uy43Fu72.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk08uy43Fu72.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:4220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:1536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:2708
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:852
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:3164
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:4832
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:4412
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxyO04Kn57.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxyO04Kn57.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3652 -ip 36521⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 764 -ip 7641⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3276 -ip 32761⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:644
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:4748
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5e6fc2f6250d53d70aa7c2e63fd7195f5
SHA1e7980c63545e3b5c002e256d023d4e3b313431b0
SHA25649ec213c41f1381cb7f1048be71dcee73094ea2df87daa8c1aa6226a595043bf
SHA512884c5a62c5868d4ad408c5eab6e505e8154d70daf19cbb78d59e987a97cb1dd21f6654ef2882d2df74724611d1818a7c29f37070e1d54fe336a5e35da481e1f8
-
Filesize
239KB
MD5e6fc2f6250d53d70aa7c2e63fd7195f5
SHA1e7980c63545e3b5c002e256d023d4e3b313431b0
SHA25649ec213c41f1381cb7f1048be71dcee73094ea2df87daa8c1aa6226a595043bf
SHA512884c5a62c5868d4ad408c5eab6e505e8154d70daf19cbb78d59e987a97cb1dd21f6654ef2882d2df74724611d1818a7c29f37070e1d54fe336a5e35da481e1f8
-
Filesize
239KB
MD5e6fc2f6250d53d70aa7c2e63fd7195f5
SHA1e7980c63545e3b5c002e256d023d4e3b313431b0
SHA25649ec213c41f1381cb7f1048be71dcee73094ea2df87daa8c1aa6226a595043bf
SHA512884c5a62c5868d4ad408c5eab6e505e8154d70daf19cbb78d59e987a97cb1dd21f6654ef2882d2df74724611d1818a7c29f37070e1d54fe336a5e35da481e1f8
-
Filesize
239KB
MD5e6fc2f6250d53d70aa7c2e63fd7195f5
SHA1e7980c63545e3b5c002e256d023d4e3b313431b0
SHA25649ec213c41f1381cb7f1048be71dcee73094ea2df87daa8c1aa6226a595043bf
SHA512884c5a62c5868d4ad408c5eab6e505e8154d70daf19cbb78d59e987a97cb1dd21f6654ef2882d2df74724611d1818a7c29f37070e1d54fe336a5e35da481e1f8
-
Filesize
239KB
MD5e6fc2f6250d53d70aa7c2e63fd7195f5
SHA1e7980c63545e3b5c002e256d023d4e3b313431b0
SHA25649ec213c41f1381cb7f1048be71dcee73094ea2df87daa8c1aa6226a595043bf
SHA512884c5a62c5868d4ad408c5eab6e505e8154d70daf19cbb78d59e987a97cb1dd21f6654ef2882d2df74724611d1818a7c29f37070e1d54fe336a5e35da481e1f8
-
Filesize
175KB
MD53897359358af38d7463cdae052874891
SHA1bcb0a3db99284e256f17ca66b4d64e6cf019284d
SHA256711cd3f23e80ae6b865d3cb3213954f4f69524a4ee3bf54025d6a48281d9576b
SHA5123cd2935a32091c0f7f1c9e9b809342ea6230e9bb062b0912504d900f0ad0f2f532ac8264337ccd63bd7ce519bbe476f9342601e45be27b42974d095ee96f414e
-
Filesize
175KB
MD53897359358af38d7463cdae052874891
SHA1bcb0a3db99284e256f17ca66b4d64e6cf019284d
SHA256711cd3f23e80ae6b865d3cb3213954f4f69524a4ee3bf54025d6a48281d9576b
SHA5123cd2935a32091c0f7f1c9e9b809342ea6230e9bb062b0912504d900f0ad0f2f532ac8264337ccd63bd7ce519bbe476f9342601e45be27b42974d095ee96f414e
-
Filesize
1.2MB
MD525dc4807cd056cca041a8b855baf7e79
SHA1937f4e8fcbcabb31f24bb8bb0e6a1a3511d00ff3
SHA256ee4cfba9fcddbb9b0159cc5a0e9fa4eb5be47ed63ff30a2260162b52908613f5
SHA5128e81614291cadd1e826324f237b59cca3442f4bfe2a332f91c41f808676e3e06169fd38270b324ca352e4183d4849d134c11478404e636560fbfa0bb817192da
-
Filesize
1.2MB
MD525dc4807cd056cca041a8b855baf7e79
SHA1937f4e8fcbcabb31f24bb8bb0e6a1a3511d00ff3
SHA256ee4cfba9fcddbb9b0159cc5a0e9fa4eb5be47ed63ff30a2260162b52908613f5
SHA5128e81614291cadd1e826324f237b59cca3442f4bfe2a332f91c41f808676e3e06169fd38270b324ca352e4183d4849d134c11478404e636560fbfa0bb817192da
-
Filesize
239KB
MD5e6fc2f6250d53d70aa7c2e63fd7195f5
SHA1e7980c63545e3b5c002e256d023d4e3b313431b0
SHA25649ec213c41f1381cb7f1048be71dcee73094ea2df87daa8c1aa6226a595043bf
SHA512884c5a62c5868d4ad408c5eab6e505e8154d70daf19cbb78d59e987a97cb1dd21f6654ef2882d2df74724611d1818a7c29f37070e1d54fe336a5e35da481e1f8
-
Filesize
239KB
MD5e6fc2f6250d53d70aa7c2e63fd7195f5
SHA1e7980c63545e3b5c002e256d023d4e3b313431b0
SHA25649ec213c41f1381cb7f1048be71dcee73094ea2df87daa8c1aa6226a595043bf
SHA512884c5a62c5868d4ad408c5eab6e505e8154d70daf19cbb78d59e987a97cb1dd21f6654ef2882d2df74724611d1818a7c29f37070e1d54fe336a5e35da481e1f8
-
Filesize
1.1MB
MD5582069ca046a964cc02e4ac65e72a605
SHA11aca42d0066208625df095d307226933551e92e8
SHA256c61a81e8b02a9261f97f1c84452d07e3fd15279e381fef52334f72ebf715bbe8
SHA512d8e2c24cf5b6f8bcabe5873829568fa528185cda4b7a2e33f64383bbfb06ea04910548ac1b6fd65a0fcf2c8aed4cbb734b19a203736e9f6addfdfba9afffe124
-
Filesize
1.1MB
MD5582069ca046a964cc02e4ac65e72a605
SHA11aca42d0066208625df095d307226933551e92e8
SHA256c61a81e8b02a9261f97f1c84452d07e3fd15279e381fef52334f72ebf715bbe8
SHA512d8e2c24cf5b6f8bcabe5873829568fa528185cda4b7a2e33f64383bbfb06ea04910548ac1b6fd65a0fcf2c8aed4cbb734b19a203736e9f6addfdfba9afffe124
-
Filesize
12KB
MD55cc2ac8989638203bf5a3a64a338cc8b
SHA1bf2803ef4dfecf986e1c8352a1c12fceb6f30c1d
SHA256c5932461650996c6a9b5a49806cd0ff82db60070d5f162a5f41db303e691d8b5
SHA51238485bf062259fc00f7c8edba231d3c11d476cdc22930c154c73df7c5616b9b5ad1db7a0a4700e6c17e05b2b7014d89ba1a1bbd7dd1c8d96c1776703c5e7a9f0
-
Filesize
12KB
MD55cc2ac8989638203bf5a3a64a338cc8b
SHA1bf2803ef4dfecf986e1c8352a1c12fceb6f30c1d
SHA256c5932461650996c6a9b5a49806cd0ff82db60070d5f162a5f41db303e691d8b5
SHA51238485bf062259fc00f7c8edba231d3c11d476cdc22930c154c73df7c5616b9b5ad1db7a0a4700e6c17e05b2b7014d89ba1a1bbd7dd1c8d96c1776703c5e7a9f0
-
Filesize
974KB
MD57c21ce7e2698371631a776f76df8f1dc
SHA16683e965ac6773d25e1d134d87bf559a0844291e
SHA256e5c9ae5e55361f9fc5677160c59485b58574fb47f865d08c57b6da725edb1259
SHA512734ee17cdb7d7868c40880ac835f70f77e96f8260ebfa4440e6b0ebaf8a2b93cffce8e50823fd7bbfa9a10d4bf9ec91964ad199d64aeaca87362f7b8e62e9b02
-
Filesize
974KB
MD57c21ce7e2698371631a776f76df8f1dc
SHA16683e965ac6773d25e1d134d87bf559a0844291e
SHA256e5c9ae5e55361f9fc5677160c59485b58574fb47f865d08c57b6da725edb1259
SHA512734ee17cdb7d7868c40880ac835f70f77e96f8260ebfa4440e6b0ebaf8a2b93cffce8e50823fd7bbfa9a10d4bf9ec91964ad199d64aeaca87362f7b8e62e9b02
-
Filesize
380KB
MD5a3da8951bb23f305fd251958e8535aa4
SHA1ef6115e81f6e8a5a7ed3428db8ff7e34619e7e54
SHA256786dcca370472e838015aaff2797f569f05b3fe168087a60e95294354ced715a
SHA512be73e7708641e3d8d8f3f7b9136287bdf4de58798dd98ba5b03d1e486ff97aafcba07f428d135c87cb84098595e711a64d72b3ec43100375049d49d88618fe9d
-
Filesize
380KB
MD5a3da8951bb23f305fd251958e8535aa4
SHA1ef6115e81f6e8a5a7ed3428db8ff7e34619e7e54
SHA256786dcca370472e838015aaff2797f569f05b3fe168087a60e95294354ced715a
SHA512be73e7708641e3d8d8f3f7b9136287bdf4de58798dd98ba5b03d1e486ff97aafcba07f428d135c87cb84098595e711a64d72b3ec43100375049d49d88618fe9d
-
Filesize
692KB
MD58fb28b5ddcf937faf7f2682573233c4b
SHA1f20cdd3970044f09ce94de85c5c2402264536692
SHA2569abd49125b16fc0a08d8c83ab9da88b21cd4d071531a776082d930d028121493
SHA512d4b5eb2a4591bb61bb918d644aa797760cdd2bd1bae511eca356b837ecb213d577f3686fe97cca47f65a0a7e6b92a54236fe71d040a27cc415bcd0936330ebf3
-
Filesize
692KB
MD58fb28b5ddcf937faf7f2682573233c4b
SHA1f20cdd3970044f09ce94de85c5c2402264536692
SHA2569abd49125b16fc0a08d8c83ab9da88b21cd4d071531a776082d930d028121493
SHA512d4b5eb2a4591bb61bb918d644aa797760cdd2bd1bae511eca356b837ecb213d577f3686fe97cca47f65a0a7e6b92a54236fe71d040a27cc415bcd0936330ebf3
-
Filesize
323KB
MD5d63943fff34d970e9e0b3f75786ebb19
SHA1ae02c8c5e501ee6082690c891d76d7c8ed2b8d61
SHA2568737bbc6d4523a9630be3cc5456bee48ab25ae652c58de3627fc3579ca54bf87
SHA5128b9d252d2617486c40a04048558a5c01722b45350c5a8c7a2b0fd2816e0954464dfbc5ba5bfe63a5d052f5d0fa9b6ed915232d42259ab1d9a66e5b86576699a0
-
Filesize
323KB
MD5d63943fff34d970e9e0b3f75786ebb19
SHA1ae02c8c5e501ee6082690c891d76d7c8ed2b8d61
SHA2568737bbc6d4523a9630be3cc5456bee48ab25ae652c58de3627fc3579ca54bf87
SHA5128b9d252d2617486c40a04048558a5c01722b45350c5a8c7a2b0fd2816e0954464dfbc5ba5bfe63a5d052f5d0fa9b6ed915232d42259ab1d9a66e5b86576699a0
-
Filesize
404KB
MD5a47eac91b7a078db79c39dc8ba4bddd4
SHA1c213608eaa7b6eb0d6995406ec5d3002278f9602
SHA256a5c0274d4567261cd9f9ab43346fbc58e2b07d691b469feb8135012253b340a9
SHA512fcb8b46fe1dce8a7812370c527b10d13833bb8d98e1bcb58dd37936a4e1e6edb20d48e7d1965f551d000304e87ab62e8cea5dbda49fc7043a6e0e17c3f2d4b8c
-
Filesize
404KB
MD5a47eac91b7a078db79c39dc8ba4bddd4
SHA1c213608eaa7b6eb0d6995406ec5d3002278f9602
SHA256a5c0274d4567261cd9f9ab43346fbc58e2b07d691b469feb8135012253b340a9
SHA512fcb8b46fe1dce8a7812370c527b10d13833bb8d98e1bcb58dd37936a4e1e6edb20d48e7d1965f551d000304e87ab62e8cea5dbda49fc7043a6e0e17c3f2d4b8c
-
Filesize
12KB
MD51f1ead7e083f03d45e22b3f7702daca1
SHA1748a6a548a416b58e635a678e2498b883589c540
SHA256cf658e81d29d1154a1d9633c37d914f80f804d9be464b9ffab6a8eab2e1a90b1
SHA512606701cab5ee935aa1426851d033c851bb6ab3690821f39103fd0a3e0bdba0b804f1737db11ef97c23a43357e7d0ce5b65242458e803a1b596d8eaf5600355f3
-
Filesize
12KB
MD51f1ead7e083f03d45e22b3f7702daca1
SHA1748a6a548a416b58e635a678e2498b883589c540
SHA256cf658e81d29d1154a1d9633c37d914f80f804d9be464b9ffab6a8eab2e1a90b1
SHA512606701cab5ee935aa1426851d033c851bb6ab3690821f39103fd0a3e0bdba0b804f1737db11ef97c23a43357e7d0ce5b65242458e803a1b596d8eaf5600355f3
-
Filesize
12KB
MD51f1ead7e083f03d45e22b3f7702daca1
SHA1748a6a548a416b58e635a678e2498b883589c540
SHA256cf658e81d29d1154a1d9633c37d914f80f804d9be464b9ffab6a8eab2e1a90b1
SHA512606701cab5ee935aa1426851d033c851bb6ab3690821f39103fd0a3e0bdba0b804f1737db11ef97c23a43357e7d0ce5b65242458e803a1b596d8eaf5600355f3
-
Filesize
380KB
MD5a3da8951bb23f305fd251958e8535aa4
SHA1ef6115e81f6e8a5a7ed3428db8ff7e34619e7e54
SHA256786dcca370472e838015aaff2797f569f05b3fe168087a60e95294354ced715a
SHA512be73e7708641e3d8d8f3f7b9136287bdf4de58798dd98ba5b03d1e486ff97aafcba07f428d135c87cb84098595e711a64d72b3ec43100375049d49d88618fe9d
-
Filesize
380KB
MD5a3da8951bb23f305fd251958e8535aa4
SHA1ef6115e81f6e8a5a7ed3428db8ff7e34619e7e54
SHA256786dcca370472e838015aaff2797f569f05b3fe168087a60e95294354ced715a
SHA512be73e7708641e3d8d8f3f7b9136287bdf4de58798dd98ba5b03d1e486ff97aafcba07f428d135c87cb84098595e711a64d72b3ec43100375049d49d88618fe9d
-
Filesize
380KB
MD5a3da8951bb23f305fd251958e8535aa4
SHA1ef6115e81f6e8a5a7ed3428db8ff7e34619e7e54
SHA256786dcca370472e838015aaff2797f569f05b3fe168087a60e95294354ced715a
SHA512be73e7708641e3d8d8f3f7b9136287bdf4de58798dd98ba5b03d1e486ff97aafcba07f428d135c87cb84098595e711a64d72b3ec43100375049d49d88618fe9d
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5