Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2023, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
8091756530deea8d5e878dbe1aeb7fcc.exe
Resource
win7-20230220-en
General
-
Target
8091756530deea8d5e878dbe1aeb7fcc.exe
-
Size
1.3MB
-
MD5
8091756530deea8d5e878dbe1aeb7fcc
-
SHA1
2f0d6f6d5d3fe951917eb0e1bbe5eb811e3db009
-
SHA256
a0d004fb08a4183800e0e4d741edcf6dbb4aafb6a3710ee00dfa2fd0506ce5c0
-
SHA512
ed5845442c47a09dc03a9c05edfc64d9f16a211c30a553ab054858318f5433c0f4a2dfaf323dbd2cf777c2e91b1481cfeb954f9818c932ce9be7b70dd08e65d5
-
SSDEEP
24576:dylBy3NoO0ycTKJrb0jAHsdpZeyDSO1Y11JEmaTNNyY2e+Vpm:4lBINuycTAipZ2Oeamcyj5Vp
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Extracted
amadey
3.67
193.233.20.14/BR54nmB3/index.php
Extracted
redline
fuba
193.56.146.11:4162
-
auth_value
43015841fc23c63b15ca6ffe1d278d5e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bebV67pH58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bebV67pH58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bebV67pH58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dsYf28vO61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dsYf28vO61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" gnKv72EV82.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bebV67pH58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bebV67pH58.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dsYf28vO61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dsYf28vO61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" gnKv72EV82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" gnKv72EV82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bebV67pH58.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dsYf28vO61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" gnKv72EV82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dsYf28vO61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" gnKv72EV82.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral2/memory/4960-186-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-184-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-189-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-191-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-193-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-195-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-197-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-199-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-201-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-203-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-205-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-207-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-209-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-211-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-213-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-215-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-219-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-217-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-221-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-223-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-225-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-227-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-229-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-231-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-233-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-235-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-237-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-239-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-241-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-243-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-245-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-247-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/4960-249-0x0000000004B40000-0x0000000004B7E000-memory.dmp family_redline behavioral2/memory/220-1358-0x0000000004C70000-0x0000000004C80000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation hk32Os66AO64.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation mnolyk.exe -
Executes dropped EXE 14 IoCs
pid Process 1748 ptlM9593OR.exe 4696 pttE2148pq.exe 484 ptqW5803eP.exe 2552 ptqU1647Gy.exe 4028 pteT9406PD.exe 1560 bebV67pH58.exe 4960 cuvH03OI90.exe 4932 dsYf28vO61.exe 220 fr56TK2839zJ.exe 892 gnKv72EV82.exe 3948 hk32Os66AO64.exe 4244 mnolyk.exe 4016 jxWt89Ux05.exe 3016 mnolyk.exe -
Loads dropped DLL 1 IoCs
pid Process 2488 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dsYf28vO61.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" gnKv72EV82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bebV67pH58.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dsYf28vO61.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ptqU1647Gy.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pteT9406PD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8091756530deea8d5e878dbe1aeb7fcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pttE2148pq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ptlM9593OR.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pttE2148pq.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptqW5803eP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" ptqW5803eP.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptqU1647Gy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup5 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP005.TMP\\\"" pteT9406PD.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8091756530deea8d5e878dbe1aeb7fcc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ptlM9593OR.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1560 bebV67pH58.exe 1560 bebV67pH58.exe 4960 cuvH03OI90.exe 4960 cuvH03OI90.exe 4932 dsYf28vO61.exe 4932 dsYf28vO61.exe 220 fr56TK2839zJ.exe 220 fr56TK2839zJ.exe 892 gnKv72EV82.exe 892 gnKv72EV82.exe 4016 jxWt89Ux05.exe 4016 jxWt89Ux05.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1560 bebV67pH58.exe Token: SeDebugPrivilege 4960 cuvH03OI90.exe Token: SeDebugPrivilege 4932 dsYf28vO61.exe Token: SeDebugPrivilege 220 fr56TK2839zJ.exe Token: SeDebugPrivilege 892 gnKv72EV82.exe Token: SeDebugPrivilege 4016 jxWt89Ux05.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3852 wrote to memory of 1748 3852 8091756530deea8d5e878dbe1aeb7fcc.exe 86 PID 3852 wrote to memory of 1748 3852 8091756530deea8d5e878dbe1aeb7fcc.exe 86 PID 3852 wrote to memory of 1748 3852 8091756530deea8d5e878dbe1aeb7fcc.exe 86 PID 1748 wrote to memory of 4696 1748 ptlM9593OR.exe 87 PID 1748 wrote to memory of 4696 1748 ptlM9593OR.exe 87 PID 1748 wrote to memory of 4696 1748 ptlM9593OR.exe 87 PID 4696 wrote to memory of 484 4696 pttE2148pq.exe 88 PID 4696 wrote to memory of 484 4696 pttE2148pq.exe 88 PID 4696 wrote to memory of 484 4696 pttE2148pq.exe 88 PID 484 wrote to memory of 2552 484 ptqW5803eP.exe 89 PID 484 wrote to memory of 2552 484 ptqW5803eP.exe 89 PID 484 wrote to memory of 2552 484 ptqW5803eP.exe 89 PID 2552 wrote to memory of 4028 2552 ptqU1647Gy.exe 90 PID 2552 wrote to memory of 4028 2552 ptqU1647Gy.exe 90 PID 2552 wrote to memory of 4028 2552 ptqU1647Gy.exe 90 PID 4028 wrote to memory of 1560 4028 pteT9406PD.exe 91 PID 4028 wrote to memory of 1560 4028 pteT9406PD.exe 91 PID 4028 wrote to memory of 4960 4028 pteT9406PD.exe 97 PID 4028 wrote to memory of 4960 4028 pteT9406PD.exe 97 PID 4028 wrote to memory of 4960 4028 pteT9406PD.exe 97 PID 2552 wrote to memory of 4932 2552 ptqU1647Gy.exe 99 PID 2552 wrote to memory of 4932 2552 ptqU1647Gy.exe 99 PID 2552 wrote to memory of 4932 2552 ptqU1647Gy.exe 99 PID 484 wrote to memory of 220 484 ptqW5803eP.exe 103 PID 484 wrote to memory of 220 484 ptqW5803eP.exe 103 PID 484 wrote to memory of 220 484 ptqW5803eP.exe 103 PID 4696 wrote to memory of 892 4696 pttE2148pq.exe 104 PID 4696 wrote to memory of 892 4696 pttE2148pq.exe 104 PID 1748 wrote to memory of 3948 1748 ptlM9593OR.exe 105 PID 1748 wrote to memory of 3948 1748 ptlM9593OR.exe 105 PID 1748 wrote to memory of 3948 1748 ptlM9593OR.exe 105 PID 3948 wrote to memory of 4244 3948 hk32Os66AO64.exe 106 PID 3948 wrote to memory of 4244 3948 hk32Os66AO64.exe 106 PID 3948 wrote to memory of 4244 3948 hk32Os66AO64.exe 106 PID 3852 wrote to memory of 4016 3852 8091756530deea8d5e878dbe1aeb7fcc.exe 107 PID 3852 wrote to memory of 4016 3852 8091756530deea8d5e878dbe1aeb7fcc.exe 107 PID 3852 wrote to memory of 4016 3852 8091756530deea8d5e878dbe1aeb7fcc.exe 107 PID 4244 wrote to memory of 4732 4244 mnolyk.exe 108 PID 4244 wrote to memory of 4732 4244 mnolyk.exe 108 PID 4244 wrote to memory of 4732 4244 mnolyk.exe 108 PID 4244 wrote to memory of 3804 4244 mnolyk.exe 110 PID 4244 wrote to memory of 3804 4244 mnolyk.exe 110 PID 4244 wrote to memory of 3804 4244 mnolyk.exe 110 PID 3804 wrote to memory of 684 3804 cmd.exe 112 PID 3804 wrote to memory of 684 3804 cmd.exe 112 PID 3804 wrote to memory of 684 3804 cmd.exe 112 PID 3804 wrote to memory of 3516 3804 cmd.exe 113 PID 3804 wrote to memory of 3516 3804 cmd.exe 113 PID 3804 wrote to memory of 3516 3804 cmd.exe 113 PID 3804 wrote to memory of 1892 3804 cmd.exe 114 PID 3804 wrote to memory of 1892 3804 cmd.exe 114 PID 3804 wrote to memory of 1892 3804 cmd.exe 114 PID 3804 wrote to memory of 1972 3804 cmd.exe 115 PID 3804 wrote to memory of 1972 3804 cmd.exe 115 PID 3804 wrote to memory of 1972 3804 cmd.exe 115 PID 3804 wrote to memory of 1316 3804 cmd.exe 116 PID 3804 wrote to memory of 1316 3804 cmd.exe 116 PID 3804 wrote to memory of 1316 3804 cmd.exe 116 PID 3804 wrote to memory of 3988 3804 cmd.exe 117 PID 3804 wrote to memory of 3988 3804 cmd.exe 117 PID 3804 wrote to memory of 3988 3804 cmd.exe 117 PID 4244 wrote to memory of 2488 4244 mnolyk.exe 127 PID 4244 wrote to memory of 2488 4244 mnolyk.exe 127 PID 4244 wrote to memory of 2488 4244 mnolyk.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\8091756530deea8d5e878dbe1aeb7fcc.exe"C:\Users\Admin\AppData\Local\Temp\8091756530deea8d5e878dbe1aeb7fcc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptlM9593OR.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ptlM9593OR.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pttE2148pq.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pttE2148pq.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptqW5803eP.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\ptqW5803eP.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptqU1647Gy.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ptqU1647Gy.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\pteT9406PD.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\pteT9406PD.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\bebV67pH58.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\bebV67pH58.exe7⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuvH03OI90.exeC:\Users\Admin\AppData\Local\Temp\IXP005.TMP\cuvH03OI90.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsYf28vO61.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\dsYf28vO61.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr56TK2839zJ.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\fr56TK2839zJ.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnKv72EV82.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gnKv72EV82.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:892
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk32Os66AO64.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hk32Os66AO64.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe" /F5⤵
- Creates scheduled task(s)
PID:4732
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\465af4af92" /P "Admin:N"&&CACLS "..\465af4af92" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:N"6⤵PID:3516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "mnolyk.exe" /P "Admin:R" /E6⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1972
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:N"6⤵PID:1316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\465af4af92" /P "Admin:R" /E6⤵PID:3988
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2488
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxWt89Ux05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jxWt89Ux05.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exeC:\Users\Admin\AppData\Local\Temp\465af4af92\mnolyk.exe1⤵
- Executes dropped EXE
PID:3016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5796aa67d818b06d18de76f5285446f66
SHA1107c28573d2b06f6c683259e318cf5a8cbcc2487
SHA256bdd9dfdd890ca104b5ced94b25cb6152c24606a007eeffbda15b2b0fa426b870
SHA5126b54299514a0a3f73019520644476aa8b61defe84a9487c573f8680ccaf0caaba39bbdd6f3f5e1448c7979052f6e5140af963aff6d7c62da07cc5ae85fe7fbf0
-
Filesize
239KB
MD5796aa67d818b06d18de76f5285446f66
SHA1107c28573d2b06f6c683259e318cf5a8cbcc2487
SHA256bdd9dfdd890ca104b5ced94b25cb6152c24606a007eeffbda15b2b0fa426b870
SHA5126b54299514a0a3f73019520644476aa8b61defe84a9487c573f8680ccaf0caaba39bbdd6f3f5e1448c7979052f6e5140af963aff6d7c62da07cc5ae85fe7fbf0
-
Filesize
239KB
MD5796aa67d818b06d18de76f5285446f66
SHA1107c28573d2b06f6c683259e318cf5a8cbcc2487
SHA256bdd9dfdd890ca104b5ced94b25cb6152c24606a007eeffbda15b2b0fa426b870
SHA5126b54299514a0a3f73019520644476aa8b61defe84a9487c573f8680ccaf0caaba39bbdd6f3f5e1448c7979052f6e5140af963aff6d7c62da07cc5ae85fe7fbf0
-
Filesize
239KB
MD5796aa67d818b06d18de76f5285446f66
SHA1107c28573d2b06f6c683259e318cf5a8cbcc2487
SHA256bdd9dfdd890ca104b5ced94b25cb6152c24606a007eeffbda15b2b0fa426b870
SHA5126b54299514a0a3f73019520644476aa8b61defe84a9487c573f8680ccaf0caaba39bbdd6f3f5e1448c7979052f6e5140af963aff6d7c62da07cc5ae85fe7fbf0
-
Filesize
175KB
MD5d7e7e7af67f21d04ad51711f3d5597ae
SHA1710f94f349cede84d7e0c84e4a1249a9ce805170
SHA25638b3a9ef368c2faf7cff9d03d8beb5f71bc5ac17b3999d09f4de67093706f439
SHA5125494496384cb3a06fbafd0038a15afee8c348e29755f71e3eab76c4510eb45cf155128a11fddcc9b291d01e8fcfd8a0c8263dac2680d4a892c7e45ece9242f22
-
Filesize
175KB
MD5d7e7e7af67f21d04ad51711f3d5597ae
SHA1710f94f349cede84d7e0c84e4a1249a9ce805170
SHA25638b3a9ef368c2faf7cff9d03d8beb5f71bc5ac17b3999d09f4de67093706f439
SHA5125494496384cb3a06fbafd0038a15afee8c348e29755f71e3eab76c4510eb45cf155128a11fddcc9b291d01e8fcfd8a0c8263dac2680d4a892c7e45ece9242f22
-
Filesize
1.2MB
MD502bfce5440146ac201d9a0302df74a46
SHA1096b5706588ab99e5fbc6b7082cc5e10d9d2900a
SHA256678fb803b21dd49ce3565f28d0bfa99a039938746ba1ef6437d344922c6e663a
SHA5128657255429bf4d8b39514a2e78e5eb276118b5a562e252940a3b43a8a5fba0a13c5c65a1871d2c6bfb3519985516b2ca9fb8c6234a4af6075552f17cef485da1
-
Filesize
1.2MB
MD502bfce5440146ac201d9a0302df74a46
SHA1096b5706588ab99e5fbc6b7082cc5e10d9d2900a
SHA256678fb803b21dd49ce3565f28d0bfa99a039938746ba1ef6437d344922c6e663a
SHA5128657255429bf4d8b39514a2e78e5eb276118b5a562e252940a3b43a8a5fba0a13c5c65a1871d2c6bfb3519985516b2ca9fb8c6234a4af6075552f17cef485da1
-
Filesize
239KB
MD5796aa67d818b06d18de76f5285446f66
SHA1107c28573d2b06f6c683259e318cf5a8cbcc2487
SHA256bdd9dfdd890ca104b5ced94b25cb6152c24606a007eeffbda15b2b0fa426b870
SHA5126b54299514a0a3f73019520644476aa8b61defe84a9487c573f8680ccaf0caaba39bbdd6f3f5e1448c7979052f6e5140af963aff6d7c62da07cc5ae85fe7fbf0
-
Filesize
239KB
MD5796aa67d818b06d18de76f5285446f66
SHA1107c28573d2b06f6c683259e318cf5a8cbcc2487
SHA256bdd9dfdd890ca104b5ced94b25cb6152c24606a007eeffbda15b2b0fa426b870
SHA5126b54299514a0a3f73019520644476aa8b61defe84a9487c573f8680ccaf0caaba39bbdd6f3f5e1448c7979052f6e5140af963aff6d7c62da07cc5ae85fe7fbf0
-
Filesize
1.0MB
MD5d02619ab61b889651fdeeb3bcadcde97
SHA18ec891146cd758bb32920ce8ce15b22087b74a0c
SHA25688462ddd89e760d7567fb71721edc4930629dd1fcfffaac31550a563374931f3
SHA5128f65561c841d9b2e064e10557a3d5e75394903a4fd2027288ad2887b1e16290601c2e73d09ceef154f4851f40147a8348ecd23440d5c3ec5d33a66e5d1ea167d
-
Filesize
1.0MB
MD5d02619ab61b889651fdeeb3bcadcde97
SHA18ec891146cd758bb32920ce8ce15b22087b74a0c
SHA25688462ddd89e760d7567fb71721edc4930629dd1fcfffaac31550a563374931f3
SHA5128f65561c841d9b2e064e10557a3d5e75394903a4fd2027288ad2887b1e16290601c2e73d09ceef154f4851f40147a8348ecd23440d5c3ec5d33a66e5d1ea167d
-
Filesize
12KB
MD5f2d3c56be1564cc85ba7c13881377619
SHA1962b88bf6e41c79cb44c5606b9f9dc7d648f1f45
SHA256892c18f6a918e2c4a21c5ac43701537a84c9e2828f9ef0bb617d807763e3eef6
SHA512972701a8b2fe63a96e5abfa3937e6f83c817cfe7542ab30f03a18dc68b7dfe383faa4af069ca0fa78d3dff3d81b68ef0acafe7648d6f68b44e79f456062ce069
-
Filesize
12KB
MD5f2d3c56be1564cc85ba7c13881377619
SHA1962b88bf6e41c79cb44c5606b9f9dc7d648f1f45
SHA256892c18f6a918e2c4a21c5ac43701537a84c9e2828f9ef0bb617d807763e3eef6
SHA512972701a8b2fe63a96e5abfa3937e6f83c817cfe7542ab30f03a18dc68b7dfe383faa4af069ca0fa78d3dff3d81b68ef0acafe7648d6f68b44e79f456062ce069
-
Filesize
937KB
MD59520855bb0ad7e5257087413c9c7d117
SHA1b697a26f7cc4aa26a93be93c7826db82ec5929ea
SHA2569be0c667ee22f4e3ab6c7ecba3362e0dbcb793c1d1ceebc1db9558efd0d69cbc
SHA51265c219c2f088b927abe991d68b4985b0ad864f3c11b8b89d6fe5f277cc05cad084d684040b405ccbd7fb6d797c52986862e30d58bd769595c82c57fd27af376f
-
Filesize
937KB
MD59520855bb0ad7e5257087413c9c7d117
SHA1b697a26f7cc4aa26a93be93c7826db82ec5929ea
SHA2569be0c667ee22f4e3ab6c7ecba3362e0dbcb793c1d1ceebc1db9558efd0d69cbc
SHA51265c219c2f088b927abe991d68b4985b0ad864f3c11b8b89d6fe5f277cc05cad084d684040b405ccbd7fb6d797c52986862e30d58bd769595c82c57fd27af376f
-
Filesize
304KB
MD56940451e769c094029427d1531775121
SHA103c763ca8ebc6896fb35c9f8d4d3fc64d03fe850
SHA256ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca
SHA51253578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06
-
Filesize
304KB
MD56940451e769c094029427d1531775121
SHA103c763ca8ebc6896fb35c9f8d4d3fc64d03fe850
SHA256ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca
SHA51253578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06
-
Filesize
667KB
MD5858eabcf2264f5454c8a9879e26a0e6a
SHA1ff57b7e800979016425c56f6dcf0b18b2f902ee5
SHA2568b74eba2f8c9468209372a45c02a93455bc6135cc49b011f9ba8208c6f767f88
SHA51229420a8b2812d83b1ac5c0bd8e9f9fb836e222406e405efa55f83ac95c101899b0f3a018c659f65f12b8f09ec38a9f659b2681929ad4e23fc1eb205712014c9a
-
Filesize
667KB
MD5858eabcf2264f5454c8a9879e26a0e6a
SHA1ff57b7e800979016425c56f6dcf0b18b2f902ee5
SHA2568b74eba2f8c9468209372a45c02a93455bc6135cc49b011f9ba8208c6f767f88
SHA51229420a8b2812d83b1ac5c0bd8e9f9fb836e222406e405efa55f83ac95c101899b0f3a018c659f65f12b8f09ec38a9f659b2681929ad4e23fc1eb205712014c9a
-
Filesize
247KB
MD578eeb9b551547dda5c9689af8a5cd4d3
SHA18e01997b520ea67897d83ad645e1abb098303fd5
SHA256ae283e8f40225c356a94b7266f4368c435e52b1e6a8ba259d5fb12230c9b35bd
SHA5127ee35485c802ba05358cdade7d6a5a62670e8a846b50cd799dc879e8fb0529882c25b46e462cd924e43cfe4c6a4bde5057f7e1287f67265d9d2372a330e13053
-
Filesize
247KB
MD578eeb9b551547dda5c9689af8a5cd4d3
SHA18e01997b520ea67897d83ad645e1abb098303fd5
SHA256ae283e8f40225c356a94b7266f4368c435e52b1e6a8ba259d5fb12230c9b35bd
SHA5127ee35485c802ba05358cdade7d6a5a62670e8a846b50cd799dc879e8fb0529882c25b46e462cd924e43cfe4c6a4bde5057f7e1287f67265d9d2372a330e13053
-
Filesize
392KB
MD50066a72f7ae56a2677d64d185d10d94a
SHA12d42b8b51880be5dba9a38099e52f3e7a1506eb5
SHA25697f3fdd4458c2632429856fd7d72e3ed9bff82299b9777f55fe554fdd20bc14a
SHA512cfe182ba43f319d4e85f6ae3c3843455db350bae18f9a766d25ee6ebd24016cd892ca7e32cfa5bb95934333fc3933046563277ced5dc24dfce471bffbf6c4b37
-
Filesize
392KB
MD50066a72f7ae56a2677d64d185d10d94a
SHA12d42b8b51880be5dba9a38099e52f3e7a1506eb5
SHA25697f3fdd4458c2632429856fd7d72e3ed9bff82299b9777f55fe554fdd20bc14a
SHA512cfe182ba43f319d4e85f6ae3c3843455db350bae18f9a766d25ee6ebd24016cd892ca7e32cfa5bb95934333fc3933046563277ced5dc24dfce471bffbf6c4b37
-
Filesize
12KB
MD5fbda9b85e2668389b72cd9e6d26241cb
SHA1462baaa0e1cc65f9fdbaacdc21bd31f0e0b89d01
SHA256e60f98a2a6cceb8290203825b5b2dd12327600de243afb18c123ca0412478d9c
SHA512781f825d954348fc0046c8820160281ac6d1b0cb0f8fc711e7b37529dbb8664ac8cfb8ee0008f8959ad4baa18ae1264706d7f349da4547f70e23e60585eba725
-
Filesize
12KB
MD5fbda9b85e2668389b72cd9e6d26241cb
SHA1462baaa0e1cc65f9fdbaacdc21bd31f0e0b89d01
SHA256e60f98a2a6cceb8290203825b5b2dd12327600de243afb18c123ca0412478d9c
SHA512781f825d954348fc0046c8820160281ac6d1b0cb0f8fc711e7b37529dbb8664ac8cfb8ee0008f8959ad4baa18ae1264706d7f349da4547f70e23e60585eba725
-
Filesize
12KB
MD5fbda9b85e2668389b72cd9e6d26241cb
SHA1462baaa0e1cc65f9fdbaacdc21bd31f0e0b89d01
SHA256e60f98a2a6cceb8290203825b5b2dd12327600de243afb18c123ca0412478d9c
SHA512781f825d954348fc0046c8820160281ac6d1b0cb0f8fc711e7b37529dbb8664ac8cfb8ee0008f8959ad4baa18ae1264706d7f349da4547f70e23e60585eba725
-
Filesize
304KB
MD56940451e769c094029427d1531775121
SHA103c763ca8ebc6896fb35c9f8d4d3fc64d03fe850
SHA256ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca
SHA51253578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06
-
Filesize
304KB
MD56940451e769c094029427d1531775121
SHA103c763ca8ebc6896fb35c9f8d4d3fc64d03fe850
SHA256ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca
SHA51253578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06
-
Filesize
304KB
MD56940451e769c094029427d1531775121
SHA103c763ca8ebc6896fb35c9f8d4d3fc64d03fe850
SHA256ab9bbcc3bb273a1f13db7566032205b26f5a4a634194ba39007349aa34801dca
SHA51253578c0693e6a171feec767f38f4601da453875d14a37f82e3ca30cce3b7217d4b5b0a6de659d54d11810ee238bd5816d2bc9635cf20dcd9f73901a09c08ff06
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
89KB
MD5eff1ce4e3c7459a8061b91c5b55e0504
SHA1b790e43dae923d673aadf9e11a4f904a4c44a3f4
SHA256bfa2c6b2a0303482dd77f02dc34fa0df450f46debd87b8d6a8473ac7889b605a
SHA512d3ade314ad8f337d5117a3e0cec2eb7128936d97f09f496e1a0cb76b4e3204c30858ab4c6a2da9bd8fe776d32b7af38dc60d14b7c800d6f0ebb275132172cd78
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5