Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
22-07-2024 05:01
Static task
static1
Behavioral task
behavioral1
Sample
170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe
Resource
win10-20240404-en
General
-
Target
170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe
-
Size
1.8MB
-
MD5
b85fa0d79d936b8b006c535d006c7f29
-
SHA1
210085d4f3cf1cf08c34baa5bfba0b0fc5a6c639
-
SHA256
170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c
-
SHA512
263b04b455dd7af8455eca46ff9cf833d53a8a3d3c3a4bdf3cfc2edfcf6993c19f2ecc6f2a61ad4c35b57264e3e08f545358c994eb8078aeb1d0403b218da9a9
-
SSDEEP
49152:K23fbpRhR0OiwF7BESrgRSzLBEF7YcMs6:3zhR9FdVOFSz
Malware Config
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Extracted
stealc
QLL
http://85.28.47.70
-
url_path
/744f169d372be841.php
Extracted
redline
1307newbild
185.215.113.67:40960
Extracted
redline
LiveTraffic
20.52.165.210:39030
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x000800000001abfd-105.dat family_redline behavioral2/memory/1144-113-0x00000000006E0000-0x0000000000730000-memory.dmp family_redline behavioral2/memory/3340-159-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Executes dropped EXE 21 IoCs
pid Process 4676 axplong.exe 4420 axplong.exe 2784 Files.exe 2756 uJTTkt2Fxq.exe 4348 Tj5A4P9a4r.exe 96 axplong.exe 3228 567jn7x.exe 1144 newstart.exe 4212 gold.exe 1048 acev.exe 2120 34v3vz.exe 2188 robo.exe 312 newwork.exe 4100 Hkbsse.exe 1188 2.exe 4236 Hkbsse.exe 4176 axplong.exe 2724 axplong.exe 1876 Hkbsse.exe 2492 axplong.exe 2424 Hkbsse.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Wine 170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe Key opened \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Wine axplong.exe -
Loads dropped DLL 3 IoCs
pid Process 1048 acev.exe 4464 RegAsm.exe 4464 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2452 170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe 4676 axplong.exe 4420 axplong.exe 96 axplong.exe 4176 axplong.exe 2724 axplong.exe 2492 axplong.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2784 set thread context of 4128 2784 Files.exe 79 PID 3228 set thread context of 4464 3228 567jn7x.exe 88 PID 4212 set thread context of 3340 4212 gold.exe 92 PID 1048 set thread context of 2912 1048 acev.exe 95 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe File created C:\Windows\Tasks\Hkbsse.job newwork.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3220 2120 WerFault.exe 96 1420 2188 WerFault.exe 99 2972 1188 WerFault.exe 103 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2452 170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe 2452 170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe 4676 axplong.exe 4676 axplong.exe 4420 axplong.exe 4420 axplong.exe 2756 uJTTkt2Fxq.exe 4348 Tj5A4P9a4r.exe 96 axplong.exe 96 axplong.exe 4464 RegAsm.exe 4464 RegAsm.exe 4464 RegAsm.exe 4464 RegAsm.exe 1144 newstart.exe 1144 newstart.exe 1144 newstart.exe 3340 RegAsm.exe 3340 RegAsm.exe 3340 RegAsm.exe 3340 RegAsm.exe 4176 axplong.exe 4176 axplong.exe 2724 axplong.exe 2724 axplong.exe 2492 axplong.exe 2492 axplong.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4348 Tj5A4P9a4r.exe Token: SeDebugPrivilege 2756 uJTTkt2Fxq.exe Token: SeBackupPrivilege 4348 Tj5A4P9a4r.exe Token: SeBackupPrivilege 2756 uJTTkt2Fxq.exe Token: SeSecurityPrivilege 4348 Tj5A4P9a4r.exe Token: SeSecurityPrivilege 2756 uJTTkt2Fxq.exe Token: SeSecurityPrivilege 2756 uJTTkt2Fxq.exe Token: SeSecurityPrivilege 2756 uJTTkt2Fxq.exe Token: SeSecurityPrivilege 4348 Tj5A4P9a4r.exe Token: SeSecurityPrivilege 2756 uJTTkt2Fxq.exe Token: SeSecurityPrivilege 4348 Tj5A4P9a4r.exe Token: SeSecurityPrivilege 4348 Tj5A4P9a4r.exe Token: SeDebugPrivilege 2912 MSBuild.exe Token: SeBackupPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeDebugPrivilege 1144 newstart.exe Token: SeDebugPrivilege 3340 RegAsm.exe Token: SeBackupPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeBackupPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeBackupPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeBackupPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeBackupPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeBackupPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeBackupPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeBackupPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeBackupPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe Token: SeSecurityPrivilege 2912 MSBuild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2452 wrote to memory of 4676 2452 170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe 74 PID 2452 wrote to memory of 4676 2452 170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe 74 PID 2452 wrote to memory of 4676 2452 170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe 74 PID 4676 wrote to memory of 2784 4676 axplong.exe 76 PID 4676 wrote to memory of 2784 4676 axplong.exe 76 PID 4676 wrote to memory of 2784 4676 axplong.exe 76 PID 2784 wrote to memory of 1876 2784 Files.exe 78 PID 2784 wrote to memory of 1876 2784 Files.exe 78 PID 2784 wrote to memory of 1876 2784 Files.exe 78 PID 2784 wrote to memory of 4128 2784 Files.exe 79 PID 2784 wrote to memory of 4128 2784 Files.exe 79 PID 2784 wrote to memory of 4128 2784 Files.exe 79 PID 2784 wrote to memory of 4128 2784 Files.exe 79 PID 2784 wrote to memory of 4128 2784 Files.exe 79 PID 2784 wrote to memory of 4128 2784 Files.exe 79 PID 2784 wrote to memory of 4128 2784 Files.exe 79 PID 2784 wrote to memory of 4128 2784 Files.exe 79 PID 2784 wrote to memory of 4128 2784 Files.exe 79 PID 2784 wrote to memory of 4128 2784 Files.exe 79 PID 4128 wrote to memory of 2756 4128 RegAsm.exe 80 PID 4128 wrote to memory of 2756 4128 RegAsm.exe 80 PID 4128 wrote to memory of 2756 4128 RegAsm.exe 80 PID 4128 wrote to memory of 4348 4128 RegAsm.exe 82 PID 4128 wrote to memory of 4348 4128 RegAsm.exe 82 PID 4128 wrote to memory of 4348 4128 RegAsm.exe 82 PID 4676 wrote to memory of 3228 4676 axplong.exe 86 PID 4676 wrote to memory of 3228 4676 axplong.exe 86 PID 4676 wrote to memory of 3228 4676 axplong.exe 86 PID 3228 wrote to memory of 4464 3228 567jn7x.exe 88 PID 3228 wrote to memory of 4464 3228 567jn7x.exe 88 PID 3228 wrote to memory of 4464 3228 567jn7x.exe 88 PID 3228 wrote to memory of 4464 3228 567jn7x.exe 88 PID 3228 wrote to memory of 4464 3228 567jn7x.exe 88 PID 3228 wrote to memory of 4464 3228 567jn7x.exe 88 PID 3228 wrote to memory of 4464 3228 567jn7x.exe 88 PID 3228 wrote to memory of 4464 3228 567jn7x.exe 88 PID 3228 wrote to memory of 4464 3228 567jn7x.exe 88 PID 4676 wrote to memory of 1144 4676 axplong.exe 89 PID 4676 wrote to memory of 1144 4676 axplong.exe 89 PID 4676 wrote to memory of 1144 4676 axplong.exe 89 PID 4676 wrote to memory of 4212 4676 axplong.exe 90 PID 4676 wrote to memory of 4212 4676 axplong.exe 90 PID 4676 wrote to memory of 4212 4676 axplong.exe 90 PID 4212 wrote to memory of 3340 4212 gold.exe 92 PID 4212 wrote to memory of 3340 4212 gold.exe 92 PID 4212 wrote to memory of 3340 4212 gold.exe 92 PID 4212 wrote to memory of 3340 4212 gold.exe 92 PID 4212 wrote to memory of 3340 4212 gold.exe 92 PID 4212 wrote to memory of 3340 4212 gold.exe 92 PID 4212 wrote to memory of 3340 4212 gold.exe 92 PID 4212 wrote to memory of 3340 4212 gold.exe 92 PID 4676 wrote to memory of 1048 4676 axplong.exe 93 PID 4676 wrote to memory of 1048 4676 axplong.exe 93 PID 4676 wrote to memory of 1048 4676 axplong.exe 93 PID 1048 wrote to memory of 2912 1048 acev.exe 95 PID 1048 wrote to memory of 2912 1048 acev.exe 95 PID 1048 wrote to memory of 2912 1048 acev.exe 95 PID 1048 wrote to memory of 2912 1048 acev.exe 95 PID 1048 wrote to memory of 2912 1048 acev.exe 95 PID 1048 wrote to memory of 2912 1048 acev.exe 95 PID 1048 wrote to memory of 2912 1048 acev.exe 95 PID 1048 wrote to memory of 2912 1048 acev.exe 95 PID 4676 wrote to memory of 2120 4676 axplong.exe 96 PID 4676 wrote to memory of 2120 4676 axplong.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe"C:\Users\Admin\AppData\Local\Temp\170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\1000160001\Files.exe"C:\Users\Admin\AppData\Local\Temp\1000160001\Files.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1876
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Roaming\uJTTkt2Fxq.exe"C:\Users\Admin\AppData\Roaming\uJTTkt2Fxq.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Users\Admin\AppData\Roaming\Tj5A4P9a4r.exe"C:\Users\Admin\AppData\Roaming\Tj5A4P9a4r.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000202001\567jn7x.exe"C:\Users\Admin\AppData\Local\Temp\1000202001\567jn7x.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000240001\newstart.exe"C:\Users\Admin\AppData\Local\Temp\1000240001\newstart.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\1000259001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000259001\gold.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000304001\acev.exe"C:\Users\Admin\AppData\Local\Temp\1000304001\acev.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000305001\34v3vz.exe"C:\Users\Admin\AppData\Local\Temp\1000305001\34v3vz.exe"3⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 5404⤵
- Program crash
PID:3220
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000308001\robo.exe"C:\Users\Admin\AppData\Local\Temp\1000308001\robo.exe"3⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2188 -s 5444⤵
- Program crash
PID:1420
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000313001\newwork.exe"C:\Users\Admin\AppData\Local\Temp\1000313001\newwork.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:312 -
C:\Users\Admin\AppData\Local\Temp\9b26cd18f9\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\9b26cd18f9\Hkbsse.exe"4⤵
- Executes dropped EXE
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\1000007001\2.exe"C:\Users\Admin\AppData\Local\Temp\1000007001\2.exe"5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 4886⤵
- Program crash
PID:2972
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:96
-
C:\Users\Admin\AppData\Local\Temp\9b26cd18f9\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\9b26cd18f9\Hkbsse.exe1⤵
- Executes dropped EXE
PID:4236
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
C:\Users\Admin\AppData\Local\Temp\9b26cd18f9\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\9b26cd18f9\Hkbsse.exe1⤵
- Executes dropped EXE
PID:1876
-
C:\Users\Admin\AppData\Local\Temp\9b26cd18f9\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\9b26cd18f9\Hkbsse.exe1⤵
- Executes dropped EXE
PID:2424
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5834fd33ab762fd5ab107b994a22337d4
SHA1c894f3ed162b93c0881388ee18bbe0cb6bbf7b0d
SHA25665ff684e5c0525b968da206392408a4804fa0cc545f96c631dbe2336c47beed4
SHA512e9f83b268a88f30fb738b53217b9f51f43936fab9c498666e158cc84c999bec5f9cbfbdca54aa7611b95c1503fbd35555dd3c81bb010957d82deb8a95ee7e053
-
Filesize
1.3MB
MD590b3832d4da1a85d18c9c515cb01780e
SHA157a70473e3046328cdce3da7943d13c1a79fe8c5
SHA256ba82b9708925f266c292334bc5e20e963c6e20ce134f03f79892fd5c26e645f8
SHA5123987c88a9a30a0c1b2ca03e784e3c0631f83e5576faa3243787ab2407f1fd0f9302a538e0caccc785d308802eabaf91ded96902cab70be51482513c72cd383e2
-
Filesize
1.1MB
MD5e8a1d35e54a6982c175c4351f3ce0dcd
SHA19e5c8167d0957701d549f4586f9b5e9861df5471
SHA2566565ab8e7be0d3e8544a49cb90e79715df0120d03c187ba9443ab738ca4dca28
SHA5126bb5a288d5fd7962e5bc80cb8785ecc67d83be49ec701bb61a88d7d3e0af90a0747d1f015506b07d2661becf98ac76f067cecf261d507b51dcfdbade9f31d78c
-
Filesize
297KB
MD5a20fc3377c07aa683a47397f9f5ff355
SHA113160e27dcea48dc9c5393948b7918cb2fcdd759
SHA256f7891ca59e0907217db3eeafbe751e2d184317a871450b5ec401217a12df9d33
SHA512dcdba7203efeea40366375fb54123b11bba972552795c64cbe912bef137698d308ea8e370732e5a65cba5687fbe6095bd53e5e1e49e3a6d8cf6912ebb61da254
-
Filesize
527KB
MD53828babaa69c01aa31609e67ac8c1f71
SHA197c9185851f81f6d9cffa22105dc858add2768f8
SHA256a13c3863d0fdb36d18368500bd07167cd058d7b6fb511a9356b2cf99d14ccb48
SHA512b1baf57c8a90df0142d913e83046e532161c72e894dc5aa46d3368f9e8c6d9a97067def52d07367f5a15dba84a4f6a040c3ef289a819c48d5be5653583a69234
-
Filesize
681KB
MD54f5771aa008fb55801a3f9fba7130f69
SHA1eaace725791c08810198c08907b84b8850d4ef5b
SHA256447ed0bdf4f8d0479545724b9578d2a3296b6bc5e2162d7ba405276234eccf0d
SHA5120ce8c4c44338d92f4a5f07f38a93812a85ce5524a4ed0c4e4d616127ea6fe02e94df0938075b4d2dc3eead2fac4a827230b0d2e1333bb51146d92417b1a5bfec
-
Filesize
330KB
MD561547b701d759958b78b75aeca77279c
SHA121e5b345bdcaaeadf6df1359f805f63aafabe223
SHA2560a18067c173a7c4bdc24b8d3a847814b30733cecfdcc305c431a3d1fcc322536
SHA512f65d898c13b09bd5f1102ad95e68d5b9982214a53d5a13db12cf287468d1740cfccee407d27534331c29f21705b8fed8b3bfecdda49224f2b9e33364392aaa1c
-
Filesize
326KB
MD5133cece8f596e1c7b89705d4d4c4d5f3
SHA1bc9e2cd9b30f4c6d7d20a509d85c8fb0166a9510
SHA256dcff0ce8faf0bc8555c4213eecf50f8e98a72b9cac87676239afd9eb5d7ed8f6
SHA512aa81bebcc555753bc5215cc5a97d108ec5990abd3c3f2d74d1f5cf563afeea639405273c47f30bcfb0f85eab29f340edde01f8e6ac8a9131a06815bff1b84633
-
Filesize
416KB
MD53764897fd08b8427b978fb099c091f71
SHA1a6abba0f071fbf0d4fa529b773678c6532493164
SHA256a67f6fa1fa32b492f08ae46e187a143d8b107863df119cdb0759b39446827a68
SHA512472730a36d32c15b4758c0c6051f27a3e72cf09e7e9d031ca923bb3d098fc7bd05e3acd00e204d41cc9c0b65ddf88cc151e9cb8e6646a73a380499c83ea4bc42
-
Filesize
1.8MB
MD5b85fa0d79d936b8b006c535d006c7f29
SHA1210085d4f3cf1cf08c34baa5bfba0b0fc5a6c639
SHA256170004b7b6bab6c3c860a6402f9d3d8988e4f3de7682e28738c3c27ac33b0e1c
SHA512263b04b455dd7af8455eca46ff9cf833d53a8a3d3c3a4bdf3cfc2edfcf6993c19f2ecc6f2a61ad4c35b57264e3e08f545358c994eb8078aeb1d0403b218da9a9
-
Filesize
503KB
MD52c2be38fb507206d36dddb3d03096518
SHA1a16edb81610a080096376d998e5ddc3e4b54bbd6
SHA2560c7173daaa5ad8dabe7a2cde6dbd0eee1ca790071443aa13b01a1e731053491e
SHA512e436954d7d5b77feb32f200cc48cb01f94b449887443a1e75ebef2f6fa2139d989d65f5ea7a71f8562c3aae2fea4117efc87e8aae905e1ba466fbc8bb328b316
-
Filesize
381KB
MD51b75671fb234ae1fb72406a317fa752a
SHA1bd47c38b7fb55d013b85c60cd51c8c5ee56f3757
SHA256499d5830b76daff19e04393ba05f63baa893f8d86ae358fc59365a5938177cbe
SHA5124c96d2c40862f73314394f48bc9c0930d5c51bfaa389185518c84ac921ceafab0f296df48655a9640d4232265daf67f3b0f4b886bfd31d230e8ec9ed11bbc2f5
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649KB
MD5103c525aa49b81407e72a346baa3ec19
SHA11ae74f6ef71b929472d28d064fc0c17d0fc54d1c
SHA2560593eef89f1bde96f5d469281de905717e9b38a70d9b374c9c3193fcb740a22d
SHA5124fb74f42fce676b37208b75ce378f4b91772f4c088a7c3c8d120f92c67d337dad99e21f26da5adaff0a2566158ec33de35e8341415a1f6a729d5840cee69ef8b