Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 09:50
Static task
static1
Behavioral task
behavioral1
Sample
c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe
Resource
win11-20240426-en
General
-
Target
c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe
-
Size
1.8MB
-
MD5
cd53722594cf57b910d7311c69034e6b
-
SHA1
ad4a79f29b5397d533c483998122cf47e791def7
-
SHA256
c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d
-
SHA512
b0c2ff4bda78bfb6e10b53287ea8bfc085f9bc07273deb4843fbcf62aef46ac2b226fef14520ed063f2a98ba836704928244f6810f90d3eb02ceb7e593f067ec
-
SSDEEP
49152:ol/8FzpLcb8dYe+hEEr113zb/Sy8YMJcsvPPh:olkNlcbe+br1Jzb/9sX
Malware Config
Extracted
amadey
4.21
49e482
http://147.45.47.70
-
install_dir
1b29d73536
-
install_file
axplont.exe
-
strings_key
4d31dd1a190d9879c21fac6d87dc0043
-
url_paths
/tr8nomy/index.php
Extracted
redline
newbild
185.215.113.67:40960
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000023410-32.dat family_redline behavioral1/memory/2180-47-0x0000000000010000-0x0000000000060000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplont.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplont.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplont.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation axplont.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe -
Executes dropped EXE 5 IoCs
pid Process 4684 axplont.exe 2180 newbild.exe 2508 axplont.exe 548 axplont.exe 4248 axplont.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine axplont.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Wine axplont.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4944 c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe 4684 axplont.exe 2508 axplont.exe 548 axplont.exe 4248 axplont.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplont.job c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 4944 c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe 4944 c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe 4684 axplont.exe 4684 axplont.exe 2180 newbild.exe 2180 newbild.exe 2180 newbild.exe 2180 newbild.exe 2180 newbild.exe 2508 axplont.exe 2508 axplont.exe 548 axplont.exe 548 axplont.exe 4248 axplont.exe 4248 axplont.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2180 newbild.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4944 wrote to memory of 4684 4944 c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe 86 PID 4944 wrote to memory of 4684 4944 c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe 86 PID 4944 wrote to memory of 4684 4944 c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe 86 PID 4684 wrote to memory of 2180 4684 axplont.exe 91 PID 4684 wrote to memory of 2180 4684 axplont.exe 91 PID 4684 wrote to memory of 2180 4684 axplont.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe"C:\Users\Admin\AppData\Local\Temp\c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\1000051001\newbild.exe"C:\Users\Admin\AppData\Local\Temp\1000051001\newbild.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:548
-
C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exeC:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
297KB
MD5c302ed158d988bc5aeb37a4658e3eb0a
SHA1af658ccf6f44899a0ffb97759e6135f46dcd2f8e
SHA25658bdeb7c3da885110d6983f3e7e752119ec8bf9da9631452b94ddc8bed6abf90
SHA51294e4576e39d6cac2d5553cdec9def10926929a3f4262b5bc1caa3e7db64f0e73c00e5fc1aef08eff003d25a294edc1b95ba89a7880d93d97b873f8d275a4f09d
-
Filesize
1.8MB
MD5cd53722594cf57b910d7311c69034e6b
SHA1ad4a79f29b5397d533c483998122cf47e791def7
SHA256c1b8ba6ec9b4ecf61a409159e5f72ab60b14a2f1f47433122986ab5fb7ce417d
SHA512b0c2ff4bda78bfb6e10b53287ea8bfc085f9bc07273deb4843fbcf62aef46ac2b226fef14520ed063f2a98ba836704928244f6810f90d3eb02ceb7e593f067ec