Analysis
-
max time kernel
144s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 11:01
Static task
static1
Behavioral task
behavioral1
Sample
0ad015140e4fc39e43cdf99f79811e32.exe
Resource
win7-20230220-en
General
-
Target
0ad015140e4fc39e43cdf99f79811e32.exe
-
Size
1.4MB
-
MD5
0ad015140e4fc39e43cdf99f79811e32
-
SHA1
f5f14043d6807687be927cceb30f540ee2e18052
-
SHA256
8d82d706e740b03a9c1d4d390ea343723d5c09c7c5749c9f1100f93298e45511
-
SHA512
8989ef28f50c8ae7d3ac35c0943e913dbbfe82560415d589954b93f63b9b054745c130b525c6972960984987d6e5e20f704b78bf38fd140e2b3e976f8da6f304
-
SSDEEP
24576:Yy6YDOHJFr/ZHokjteoEeur84I0e/WeivGjbSA5zf2t3yBLLUC/nuEw320LRAXCs:f6YmJFrplEnI5/aGyt3yxF/rF0LYM
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bePu47LK83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dstI10uG79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dstI10uG79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dstI10uG79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dstI10uG79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bePu47LK83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnbW29Wp50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bePu47LK83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bePu47LK83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bePu47LK83.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bePu47LK83.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dstI10uG79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dstI10uG79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnbW29Wp50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnbW29Wp50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnbW29Wp50.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnbW29Wp50.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral2/memory/3376-186-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-189-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-187-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-191-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-193-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-195-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-197-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-199-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-201-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-203-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-205-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-207-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-209-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-211-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-213-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-215-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-217-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-219-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-221-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-223-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-225-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-227-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-229-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-233-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-235-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-231-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-237-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-239-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-241-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-243-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-245-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-247-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/3376-249-0x0000000004C40000-0x0000000004C7E000-memory.dmp family_redline behavioral2/memory/1912-2068-0x0000000007180000-0x0000000007190000-memory.dmp family_redline behavioral2/memory/1912-2069-0x0000000007180000-0x0000000007190000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation mnolyk.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation hk28BF13nx74.exe -
Executes dropped EXE 14 IoCs
pid Process 808 ptuJ3266Xv.exe 3808 ptXp9149iw.exe 4656 pteo1997mu.exe 3664 ptSN1549wn.exe 1832 ptkY5306lI.exe 2076 bePu47LK83.exe 3376 cuLq22xT92.exe 2884 dstI10uG79.exe 1912 fr55wB0933Wr.exe 4660 gnbW29Wp50.exe 4300 hk28BF13nx74.exe 5072 mnolyk.exe 4192 jxsG08OV85.exe 5000 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 912 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bePu47LK83.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dstI10uG79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dstI10uG79.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnbW29Wp50.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pteo1997mu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pteo1997mu.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptSN1549wn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptSN1549wn.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptkY5306lI.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0ad015140e4fc39e43cdf99f79811e32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptuJ3266Xv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptuJ3266Xv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" ptkY5306lI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0ad015140e4fc39e43cdf99f79811e32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptXp9149iw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ptXp9149iw.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 3252 3376 WerFault.exe 94 2836 2884 WerFault.exe 100 2292 1912 WerFault.exe 103 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3372 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2076 bePu47LK83.exe 2076 bePu47LK83.exe 3376 cuLq22xT92.exe 3376 cuLq22xT92.exe 2884 dstI10uG79.exe 2884 dstI10uG79.exe 1912 fr55wB0933Wr.exe 1912 fr55wB0933Wr.exe 4660 gnbW29Wp50.exe 4660 gnbW29Wp50.exe 4192 jxsG08OV85.exe 4192 jxsG08OV85.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2076 bePu47LK83.exe Token: SeDebugPrivilege 3376 cuLq22xT92.exe Token: SeDebugPrivilege 2884 dstI10uG79.exe Token: SeDebugPrivilege 1912 fr55wB0933Wr.exe Token: SeDebugPrivilege 4660 gnbW29Wp50.exe Token: SeDebugPrivilege 4192 jxsG08OV85.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 860 wrote to memory of 808 860 0ad015140e4fc39e43cdf99f79811e32.exe 84 PID 860 wrote to memory of 808 860 0ad015140e4fc39e43cdf99f79811e32.exe 84 PID 860 wrote to memory of 808 860 0ad015140e4fc39e43cdf99f79811e32.exe 84 PID 808 wrote to memory of 3808 808 ptuJ3266Xv.exe 85 PID 808 wrote to memory of 3808 808 ptuJ3266Xv.exe 85 PID 808 wrote to memory of 3808 808 ptuJ3266Xv.exe 85 PID 3808 wrote to memory of 4656 3808 ptXp9149iw.exe 86 PID 3808 wrote to memory of 4656 3808 ptXp9149iw.exe 86 PID 3808 wrote to memory of 4656 3808 ptXp9149iw.exe 86 PID 4656 wrote to memory of 3664 4656 pteo1997mu.exe 87 PID 4656 wrote to memory of 3664 4656 pteo1997mu.exe 87 PID 4656 wrote to memory of 3664 4656 pteo1997mu.exe 87 PID 3664 wrote to memory of 1832 3664 ptSN1549wn.exe 88 PID 3664 wrote to memory of 1832 3664 ptSN1549wn.exe 88 PID 3664 wrote to memory of 1832 3664 ptSN1549wn.exe 88 PID 1832 wrote to memory of 2076 1832 ptkY5306lI.exe 89 PID 1832 wrote to memory of 2076 1832 ptkY5306lI.exe 89 PID 1832 wrote to memory of 3376 1832 ptkY5306lI.exe 94 PID 1832 wrote to memory of 3376 1832 ptkY5306lI.exe 94 PID 1832 wrote to memory of 3376 1832 ptkY5306lI.exe 94 PID 3664 wrote to memory of 2884 3664 ptSN1549wn.exe 100 PID 3664 wrote to memory of 2884 3664 ptSN1549wn.exe 100 PID 3664 wrote to memory of 2884 3664 ptSN1549wn.exe 100 PID 4656 wrote to memory of 1912 4656 pteo1997mu.exe 103 PID 4656 wrote to memory of 1912 4656 pteo1997mu.exe 103 PID 4656 wrote to memory of 1912 4656 pteo1997mu.exe 103 PID 3808 wrote to memory of 4660 3808 ptXp9149iw.exe 106 PID 3808 wrote to memory of 4660 3808 ptXp9149iw.exe 106 PID 808 wrote to memory of 4300 808 ptuJ3266Xv.exe 108 PID 808 wrote to memory of 4300 808 ptuJ3266Xv.exe 108 PID 808 wrote to memory of 4300 808 ptuJ3266Xv.exe 108 PID 4300 wrote to memory of 5072 4300 hk28BF13nx74.exe 109 PID 4300 wrote to memory of 5072 4300 hk28BF13nx74.exe 109 PID 4300 wrote to memory of 5072 4300 hk28BF13nx74.exe 109 PID 860 wrote to memory of 4192 860 0ad015140e4fc39e43cdf99f79811e32.exe 110 PID 860 wrote to memory of 4192 860 0ad015140e4fc39e43cdf99f79811e32.exe 110 PID 860 wrote to memory of 4192 860 0ad015140e4fc39e43cdf99f79811e32.exe 110 PID 5072 wrote to memory of 3372 5072 mnolyk.exe 111 PID 5072 wrote to memory of 3372 5072 mnolyk.exe 111 PID 5072 wrote to memory of 3372 5072 mnolyk.exe 111 PID 5072 wrote to memory of 4692 5072 mnolyk.exe 113 PID 5072 wrote to memory of 4692 5072 mnolyk.exe 113 PID 5072 wrote to memory of 4692 5072 mnolyk.exe 113 PID 4692 wrote to memory of 1728 4692 cmd.exe 115 PID 4692 wrote to memory of 1728 4692 cmd.exe 115 PID 4692 wrote to memory of 1728 4692 cmd.exe 115 PID 4692 wrote to memory of 1932 4692 cmd.exe 116 PID 4692 wrote to memory of 1932 4692 cmd.exe 116 PID 4692 wrote to memory of 1932 4692 cmd.exe 116 PID 4692 wrote to memory of 2060 4692 cmd.exe 117 PID 4692 wrote to memory of 2060 4692 cmd.exe 117 PID 4692 wrote to memory of 2060 4692 cmd.exe 117 PID 4692 wrote to memory of 5004 4692 cmd.exe 118 PID 4692 wrote to memory of 5004 4692 cmd.exe 118 PID 4692 wrote to memory of 5004 4692 cmd.exe 118 PID 4692 wrote to memory of 116 4692 cmd.exe 119 PID 4692 wrote to memory of 116 4692 cmd.exe 119 PID 4692 wrote to memory of 116 4692 cmd.exe 119 PID 4692 wrote to memory of 4476 4692 cmd.exe 120 PID 4692 wrote to memory of 4476 4692 cmd.exe 120 PID 4692 wrote to memory of 4476 4692 cmd.exe 120 PID 5072 wrote to memory of 912 5072 mnolyk.exe 124 PID 5072 wrote to memory of 912 5072 mnolyk.exe 124 PID 5072 wrote to memory of 912 5072 mnolyk.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ad015140e4fc39e43cdf99f79811e32.exe"C:\Users\Admin\AppData\Local\Temp\0ad015140e4fc39e43cdf99f79811e32.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptuJ3266Xv.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptuJ3266Xv.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptXp9149iw.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ptXp9149iw.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pteo1997mu.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pteo1997mu.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptSN1549wn.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptSN1549wn.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptkY5306lI.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\ptkY5306lI.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\bePu47LK83.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\bePu47LK83.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuLq22xT92.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuLq22xT92.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 13568⤵
- Program crash
PID:3252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dstI10uG79.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dstI10uG79.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 10807⤵
- Program crash
PID:2836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr55wB0933Wr.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr55wB0933Wr.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 13006⤵
- Program crash
PID:2292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnbW29Wp50.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnbW29Wp50.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk28BF13nx74.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk28BF13nx74.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:3372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1728
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:1932
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:2060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5004
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:4476
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:912
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxsG08OV85.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxsG08OV85.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3376 -ip 33761⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2884 -ip 28841⤵PID:2288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1912 -ip 19121⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:5000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5b9cc6ea6eb54e726aa3b5d6887f4f16e
SHA15825b8fc74eeafa76b0d3d91cadd6f1b391f1cb1
SHA25639910c957790499ac538eef709f7e61edf4fba53ad4fca27097cbd4a9e541520
SHA512bb62160140c8827c04eddcaef33466c22b1e924b666cef219edc24476e86ab82c842d97372223327f5804dac7a029a241608ae116543c9e38e07dbffcb6745a3
-
Filesize
239KB
MD5b9cc6ea6eb54e726aa3b5d6887f4f16e
SHA15825b8fc74eeafa76b0d3d91cadd6f1b391f1cb1
SHA25639910c957790499ac538eef709f7e61edf4fba53ad4fca27097cbd4a9e541520
SHA512bb62160140c8827c04eddcaef33466c22b1e924b666cef219edc24476e86ab82c842d97372223327f5804dac7a029a241608ae116543c9e38e07dbffcb6745a3
-
Filesize
239KB
MD5b9cc6ea6eb54e726aa3b5d6887f4f16e
SHA15825b8fc74eeafa76b0d3d91cadd6f1b391f1cb1
SHA25639910c957790499ac538eef709f7e61edf4fba53ad4fca27097cbd4a9e541520
SHA512bb62160140c8827c04eddcaef33466c22b1e924b666cef219edc24476e86ab82c842d97372223327f5804dac7a029a241608ae116543c9e38e07dbffcb6745a3
-
Filesize
239KB
MD5b9cc6ea6eb54e726aa3b5d6887f4f16e
SHA15825b8fc74eeafa76b0d3d91cadd6f1b391f1cb1
SHA25639910c957790499ac538eef709f7e61edf4fba53ad4fca27097cbd4a9e541520
SHA512bb62160140c8827c04eddcaef33466c22b1e924b666cef219edc24476e86ab82c842d97372223327f5804dac7a029a241608ae116543c9e38e07dbffcb6745a3
-
Filesize
175KB
MD564e2ea2483d6a2287968e23b0cc885d9
SHA1b23957880c257fbf538378a8b78dbaf440a7caa6
SHA25605953d44b94538cfaaa041303cde95fc72df6d63f10d518049c491011343b819
SHA51292129b8f6f3e4e60abe8325f6b2af6c7236d88c609027b3731f3b230f6680ba51d54239852638569f1320803b23db94974368ef35e48bbe35ee2cee25ae7f211
-
Filesize
175KB
MD564e2ea2483d6a2287968e23b0cc885d9
SHA1b23957880c257fbf538378a8b78dbaf440a7caa6
SHA25605953d44b94538cfaaa041303cde95fc72df6d63f10d518049c491011343b819
SHA51292129b8f6f3e4e60abe8325f6b2af6c7236d88c609027b3731f3b230f6680ba51d54239852638569f1320803b23db94974368ef35e48bbe35ee2cee25ae7f211
-
Filesize
1.2MB
MD55c3a70991f8943d058d26dc591983ad0
SHA14223428a0b12d82775ededfa869bb0b98f1f3437
SHA2560db15379653b857e7fa9f188d640c977b914a3386c5094c14a01f7c991f346a3
SHA51282caa8a5555bb3f4a3872e07edbe0f3348c9aed5b02f854ca78f997c61ea76d07f74afd619f29322f67076f00548b562556ba50ddb24b5d44b9f83b1750732eb
-
Filesize
1.2MB
MD55c3a70991f8943d058d26dc591983ad0
SHA14223428a0b12d82775ededfa869bb0b98f1f3437
SHA2560db15379653b857e7fa9f188d640c977b914a3386c5094c14a01f7c991f346a3
SHA51282caa8a5555bb3f4a3872e07edbe0f3348c9aed5b02f854ca78f997c61ea76d07f74afd619f29322f67076f00548b562556ba50ddb24b5d44b9f83b1750732eb
-
Filesize
239KB
MD5b9cc6ea6eb54e726aa3b5d6887f4f16e
SHA15825b8fc74eeafa76b0d3d91cadd6f1b391f1cb1
SHA25639910c957790499ac538eef709f7e61edf4fba53ad4fca27097cbd4a9e541520
SHA512bb62160140c8827c04eddcaef33466c22b1e924b666cef219edc24476e86ab82c842d97372223327f5804dac7a029a241608ae116543c9e38e07dbffcb6745a3
-
Filesize
239KB
MD5b9cc6ea6eb54e726aa3b5d6887f4f16e
SHA15825b8fc74eeafa76b0d3d91cadd6f1b391f1cb1
SHA25639910c957790499ac538eef709f7e61edf4fba53ad4fca27097cbd4a9e541520
SHA512bb62160140c8827c04eddcaef33466c22b1e924b666cef219edc24476e86ab82c842d97372223327f5804dac7a029a241608ae116543c9e38e07dbffcb6745a3
-
Filesize
1.1MB
MD5ae938f31d001a989283b7b85d3d84464
SHA1ca060a5bf36d3aae416ebf4478215d798cb6c545
SHA2569e78dc8a043071dae78215a5b9be56d94940579202706602b608c1d1681c9ea0
SHA512531db01ba692febf54baae06aa76a37c4085d545e24667222a29692c5e47d5879008b26ddbc35b83e2d8c120e5a84f951db64265fdd78fac72d1390fc7fed5ed
-
Filesize
1.1MB
MD5ae938f31d001a989283b7b85d3d84464
SHA1ca060a5bf36d3aae416ebf4478215d798cb6c545
SHA2569e78dc8a043071dae78215a5b9be56d94940579202706602b608c1d1681c9ea0
SHA512531db01ba692febf54baae06aa76a37c4085d545e24667222a29692c5e47d5879008b26ddbc35b83e2d8c120e5a84f951db64265fdd78fac72d1390fc7fed5ed
-
Filesize
12KB
MD5eabb23fadf27c65667aae6b9c56fb607
SHA12ccf7e60a70de56f1589b4fe262d92fa839fbbf3
SHA2564dd44fe5096f378a1c51a98a3faf2913e84631cdc8884e654828807cd40f7382
SHA51287e0757c11df8ea61a170060e07a6ee8c5e0a87886679773775a42cdf6f80c4373d8f18e2b63d54743566da81b0831d2bce5e24272a76c4aaa262f1dd1b3548c
-
Filesize
12KB
MD5eabb23fadf27c65667aae6b9c56fb607
SHA12ccf7e60a70de56f1589b4fe262d92fa839fbbf3
SHA2564dd44fe5096f378a1c51a98a3faf2913e84631cdc8884e654828807cd40f7382
SHA51287e0757c11df8ea61a170060e07a6ee8c5e0a87886679773775a42cdf6f80c4373d8f18e2b63d54743566da81b0831d2bce5e24272a76c4aaa262f1dd1b3548c
-
Filesize
973KB
MD54203e25aa066a6c7f14aee9c562856c5
SHA12daa7554a248aaf5ab913848c7de47175183852f
SHA25677eb72b77753d19b4848a8ff1259fb34a88d23e64543b8965ef41977790d541d
SHA5127ef6bf829bf6165e3f0357dd90b7fab5127c48c7af879cfe9434048224a1cf7dbae364eef1c0a5626b78b3e6e1906c8f92b63738839e0e97a68be211577bddc1
-
Filesize
973KB
MD54203e25aa066a6c7f14aee9c562856c5
SHA12daa7554a248aaf5ab913848c7de47175183852f
SHA25677eb72b77753d19b4848a8ff1259fb34a88d23e64543b8965ef41977790d541d
SHA5127ef6bf829bf6165e3f0357dd90b7fab5127c48c7af879cfe9434048224a1cf7dbae364eef1c0a5626b78b3e6e1906c8f92b63738839e0e97a68be211577bddc1
-
Filesize
380KB
MD5a3da8951bb23f305fd251958e8535aa4
SHA1ef6115e81f6e8a5a7ed3428db8ff7e34619e7e54
SHA256786dcca370472e838015aaff2797f569f05b3fe168087a60e95294354ced715a
SHA512be73e7708641e3d8d8f3f7b9136287bdf4de58798dd98ba5b03d1e486ff97aafcba07f428d135c87cb84098595e711a64d72b3ec43100375049d49d88618fe9d
-
Filesize
380KB
MD5a3da8951bb23f305fd251958e8535aa4
SHA1ef6115e81f6e8a5a7ed3428db8ff7e34619e7e54
SHA256786dcca370472e838015aaff2797f569f05b3fe168087a60e95294354ced715a
SHA512be73e7708641e3d8d8f3f7b9136287bdf4de58798dd98ba5b03d1e486ff97aafcba07f428d135c87cb84098595e711a64d72b3ec43100375049d49d88618fe9d
-
Filesize
692KB
MD524c2f00b5fef47b49ca8bceec80c2f02
SHA185f3300802ed0c681b7eb773d706f8d06d63f979
SHA2563a951d406d209cb2ee6f0e4e604741b32447d65d0115b9cab1a21c36f7a39a68
SHA512df21fc06eaf29f45e396590ce3859886b3981913f15e394827617039797b134f070c07fea888034d21170a4f2d42420f0a408b7139cbdc1deec7db079fd9c022
-
Filesize
692KB
MD524c2f00b5fef47b49ca8bceec80c2f02
SHA185f3300802ed0c681b7eb773d706f8d06d63f979
SHA2563a951d406d209cb2ee6f0e4e604741b32447d65d0115b9cab1a21c36f7a39a68
SHA512df21fc06eaf29f45e396590ce3859886b3981913f15e394827617039797b134f070c07fea888034d21170a4f2d42420f0a408b7139cbdc1deec7db079fd9c022
-
Filesize
323KB
MD5d63943fff34d970e9e0b3f75786ebb19
SHA1ae02c8c5e501ee6082690c891d76d7c8ed2b8d61
SHA2568737bbc6d4523a9630be3cc5456bee48ab25ae652c58de3627fc3579ca54bf87
SHA5128b9d252d2617486c40a04048558a5c01722b45350c5a8c7a2b0fd2816e0954464dfbc5ba5bfe63a5d052f5d0fa9b6ed915232d42259ab1d9a66e5b86576699a0
-
Filesize
323KB
MD5d63943fff34d970e9e0b3f75786ebb19
SHA1ae02c8c5e501ee6082690c891d76d7c8ed2b8d61
SHA2568737bbc6d4523a9630be3cc5456bee48ab25ae652c58de3627fc3579ca54bf87
SHA5128b9d252d2617486c40a04048558a5c01722b45350c5a8c7a2b0fd2816e0954464dfbc5ba5bfe63a5d052f5d0fa9b6ed915232d42259ab1d9a66e5b86576699a0
-
Filesize
404KB
MD5e188959e3746fe53bf60a7e4fc31750e
SHA1757dace56a932a9bb2d77f217bf21b92adf82640
SHA256feaaf8ee030c234595388ad771190f9fb6d37f6824086a47bea7552a7434f7f3
SHA5123c478e750eff1a4e32c2f3ca4a75791503cdfbb3a58d464d8023b77c1193eccce16342119740972d61155fd3d9cb2c01828330d55c26bb9d180cebe64a712182
-
Filesize
404KB
MD5e188959e3746fe53bf60a7e4fc31750e
SHA1757dace56a932a9bb2d77f217bf21b92adf82640
SHA256feaaf8ee030c234595388ad771190f9fb6d37f6824086a47bea7552a7434f7f3
SHA5123c478e750eff1a4e32c2f3ca4a75791503cdfbb3a58d464d8023b77c1193eccce16342119740972d61155fd3d9cb2c01828330d55c26bb9d180cebe64a712182
-
Filesize
12KB
MD56720f501e7726af909d1886610a8e120
SHA194e234ca5ffafb509c6dae929f77fce228e0e217
SHA256ff7bf78235e61764cccfebe8e4ec447f37bf07057eb818625c46ae243cc0cc99
SHA512a224f8816429ebfca6ee5cfbc5477e4b517a15c55deaa297e65209aa8d53ef2a7a6f76cec22337ca2d5bb89116b75717eff825bcbc9c4841e7b3fe6274c9b507
-
Filesize
12KB
MD56720f501e7726af909d1886610a8e120
SHA194e234ca5ffafb509c6dae929f77fce228e0e217
SHA256ff7bf78235e61764cccfebe8e4ec447f37bf07057eb818625c46ae243cc0cc99
SHA512a224f8816429ebfca6ee5cfbc5477e4b517a15c55deaa297e65209aa8d53ef2a7a6f76cec22337ca2d5bb89116b75717eff825bcbc9c4841e7b3fe6274c9b507
-
Filesize
12KB
MD56720f501e7726af909d1886610a8e120
SHA194e234ca5ffafb509c6dae929f77fce228e0e217
SHA256ff7bf78235e61764cccfebe8e4ec447f37bf07057eb818625c46ae243cc0cc99
SHA512a224f8816429ebfca6ee5cfbc5477e4b517a15c55deaa297e65209aa8d53ef2a7a6f76cec22337ca2d5bb89116b75717eff825bcbc9c4841e7b3fe6274c9b507
-
Filesize
380KB
MD5a3da8951bb23f305fd251958e8535aa4
SHA1ef6115e81f6e8a5a7ed3428db8ff7e34619e7e54
SHA256786dcca370472e838015aaff2797f569f05b3fe168087a60e95294354ced715a
SHA512be73e7708641e3d8d8f3f7b9136287bdf4de58798dd98ba5b03d1e486ff97aafcba07f428d135c87cb84098595e711a64d72b3ec43100375049d49d88618fe9d
-
Filesize
380KB
MD5a3da8951bb23f305fd251958e8535aa4
SHA1ef6115e81f6e8a5a7ed3428db8ff7e34619e7e54
SHA256786dcca370472e838015aaff2797f569f05b3fe168087a60e95294354ced715a
SHA512be73e7708641e3d8d8f3f7b9136287bdf4de58798dd98ba5b03d1e486ff97aafcba07f428d135c87cb84098595e711a64d72b3ec43100375049d49d88618fe9d
-
Filesize
380KB
MD5a3da8951bb23f305fd251958e8535aa4
SHA1ef6115e81f6e8a5a7ed3428db8ff7e34619e7e54
SHA256786dcca370472e838015aaff2797f569f05b3fe168087a60e95294354ced715a
SHA512be73e7708641e3d8d8f3f7b9136287bdf4de58798dd98ba5b03d1e486ff97aafcba07f428d135c87cb84098595e711a64d72b3ec43100375049d49d88618fe9d
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5