Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240729-en -
resource tags
arch:x64arch:x86image:win11-20240729-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-07-2024 17:21
Static task
static1
Behavioral task
behavioral1
Sample
f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe
Resource
win10v2004-20240730-en
General
-
Target
f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe
-
Size
1.8MB
-
MD5
5c9f2f3ea2b203cd5da994d690608152
-
SHA1
30dc948c672153348e590db908fbbea6381fa115
-
SHA256
f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5
-
SHA512
76cda460561b7325fe313b1b430a5c538bfcee1c3d767aeef2b4b393b168d4aea053b445ce9c1df10af79ce880fd8d492c2de52877896123a313f44f44889429
-
SSDEEP
49152:EqS5n6vU/L6rKHJhi6/5twqIBrdC0lJM8:E75n8U/L6OSI52xC0le
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
30072024
185.215.113.67:40960
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x000100000002aaf7-26.dat family_redline behavioral2/memory/2716-41-0x0000000000760000-0x00000000007B2000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Executes dropped EXE 5 IoCs
pid Process 5720 axplong.exe 2716 30072024.exe 3364 axplong.exe 1004 axplong.exe 4192 axplong.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1008421703-1762585720-607722284-1000\Software\Wine f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe Key opened \REGISTRY\USER\S-1-5-21-1008421703-1762585720-607722284-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1008421703-1762585720-607722284-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1008421703-1762585720-607722284-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1008421703-1762585720-607722284-1000\Software\Wine axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 3152 f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe 5720 axplong.exe 3364 axplong.exe 1004 axplong.exe 4192 axplong.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30072024.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 30072024.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 30072024.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3152 f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe 3152 f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe 5720 axplong.exe 5720 axplong.exe 3364 axplong.exe 3364 axplong.exe 1004 axplong.exe 1004 axplong.exe 4192 axplong.exe 4192 axplong.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3152 f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3152 wrote to memory of 5720 3152 f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe 78 PID 3152 wrote to memory of 5720 3152 f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe 78 PID 3152 wrote to memory of 5720 3152 f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe 78 PID 5720 wrote to memory of 2716 5720 axplong.exe 79 PID 5720 wrote to memory of 2716 5720 axplong.exe 79 PID 5720 wrote to memory of 2716 5720 axplong.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe"C:\Users\Admin\AppData\Local\Temp\f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5720 -
C:\Users\Admin\AppData\Local\Temp\1000050001\30072024.exe"C:\Users\Admin\AppData\Local\Temp\1000050001\30072024.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2716
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4192
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD5aedfb26f18fdd54279e8d1b82b84559a
SHA1161a427ef200282daf092543b3eda9b8cd689514
SHA256ba7517fbc65542871d06e7d4b7a017d5c165f55dda2b741e2ba52a6303d21b57
SHA51230c5836584b3d74e9a0719e0559f2b83900210ee574ae780d793cdc6396bd9b7cb672f401dfa15a58687ad1d769d5ef5c0b0b24de83dec3c8429a259c9a37bb2
-
Filesize
1.8MB
MD55c9f2f3ea2b203cd5da994d690608152
SHA130dc948c672153348e590db908fbbea6381fa115
SHA256f5f9309a533440a54cb426169b9b6f8de45803862711394dca8505dd4b7a74a5
SHA51276cda460561b7325fe313b1b430a5c538bfcee1c3d767aeef2b4b393b168d4aea053b445ce9c1df10af79ce880fd8d492c2de52877896123a313f44f44889429
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8