Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 23:49
Static task
static1
Behavioral task
behavioral1
Sample
d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe
Resource
win10v2004-20240802-en
General
-
Target
d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe
-
Size
1.8MB
-
MD5
7f4964d85ebd1d327bd74973b123cef3
-
SHA1
9f0f6893280fa4658daf4fcfce9d5b83c441b10b
-
SHA256
d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316
-
SHA512
b4db6eed1ae279b373ab8ed59e2f3d3d84a87dec789e951999f8327de791b5678f0adbd4615de92d5398ec2dce8119b1341d9d180c6a25ce2a23c9c8392a2396
-
SSDEEP
49152:fFWyfs9A3PMQSgbYHNNiP8/Cr9pWG17CD1zFHC/c+4:8y0ePLjbfu+keCPCE/
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
20.52.165.210:39030
Extracted
redline
30072024
185.215.113.67:40960
Extracted
stealc
default
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
lumma
https://berserkydosom.shop/api
https://tenntysjuxmz.shop/api
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/1276-37-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/files/0x00070000000233ce-107.dat family_redline behavioral1/memory/1856-134-0x0000000000150000-0x00000000001A2000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation Hkbsse.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation regasm.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation newalp.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t0hbhWzclFrkD9VFo3qpPNtV.bat regasm.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\E5KbKTYTSoGW4nfbAcLUgDSR.bat regasm.exe -
Executes dropped EXE 17 IoCs
pid Process 2880 axplong.exe 1900 GOLD.exe 856 crypteda.exe 2784 newalp.exe 3720 Hkbsse.exe 2692 ke4GX0oA0u.exe 3124 pQQiTQ9s9f.exe 1856 30072024.exe 1312 stealc_default.exe 4272 2.exe 2396 filrrr.exe 4932 2.exe 4556 GcYGvTOdzgWaLcVyxPdxGVqX.exe 1376 axplong.exe 1156 Hkbsse.exe 4540 Hkbsse.exe 1312 axplong.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine axplong.exe -
Loads dropped DLL 3 IoCs
pid Process 4932 2.exe 1312 stealc_default.exe 1312 stealc_default.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 42 raw.githubusercontent.com 53 pastebin.com 54 pastebin.com 61 raw.githubusercontent.com 41 raw.githubusercontent.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3612 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe 2880 axplong.exe 1376 axplong.exe 1312 axplong.exe -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1900 set thread context of 1276 1900 GOLD.exe 88 PID 856 set thread context of 3884 856 crypteda.exe 95 PID 4932 set thread context of 3032 4932 2.exe 112 PID 2396 set thread context of 1764 2396 filrrr.exe 115 PID 4556 set thread context of 1864 4556 GcYGvTOdzgWaLcVyxPdxGVqX.exe 120 PID 4556 set thread context of 3216 4556 GcYGvTOdzgWaLcVyxPdxGVqX.exe 126 PID 1864 set thread context of 3660 1864 AddInProcess32.exe 128 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe File created C:\Windows\Tasks\Hkbsse.job newalp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4716 4272 WerFault.exe 103 3576 3032 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regasm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30072024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newalp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pQQiTQ9s9f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypteda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ke4GX0oA0u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GcYGvTOdzgWaLcVyxPdxGVqX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 2.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 30072024.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 30072024.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 3612 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe 3612 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe 2880 axplong.exe 2880 axplong.exe 1312 stealc_default.exe 1312 stealc_default.exe 1276 RegAsm.exe 2692 ke4GX0oA0u.exe 2692 ke4GX0oA0u.exe 1276 RegAsm.exe 1276 RegAsm.exe 1276 RegAsm.exe 1276 RegAsm.exe 3124 pQQiTQ9s9f.exe 3124 pQQiTQ9s9f.exe 1312 stealc_default.exe 1312 stealc_default.exe 4556 GcYGvTOdzgWaLcVyxPdxGVqX.exe 4556 GcYGvTOdzgWaLcVyxPdxGVqX.exe 1376 axplong.exe 1376 axplong.exe 1864 AddInProcess32.exe 1864 AddInProcess32.exe 3660 InstallUtil.exe 1312 axplong.exe 1312 axplong.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2692 ke4GX0oA0u.exe Token: SeBackupPrivilege 2692 ke4GX0oA0u.exe Token: SeSecurityPrivilege 2692 ke4GX0oA0u.exe Token: SeSecurityPrivilege 2692 ke4GX0oA0u.exe Token: SeSecurityPrivilege 2692 ke4GX0oA0u.exe Token: SeSecurityPrivilege 2692 ke4GX0oA0u.exe Token: SeDebugPrivilege 3124 pQQiTQ9s9f.exe Token: SeBackupPrivilege 3124 pQQiTQ9s9f.exe Token: SeSecurityPrivilege 3124 pQQiTQ9s9f.exe Token: SeSecurityPrivilege 3124 pQQiTQ9s9f.exe Token: SeSecurityPrivilege 3124 pQQiTQ9s9f.exe Token: SeSecurityPrivilege 3124 pQQiTQ9s9f.exe Token: SeDebugPrivilege 1276 RegAsm.exe Token: SeDebugPrivilege 1764 regasm.exe Token: SeDebugPrivilege 4556 GcYGvTOdzgWaLcVyxPdxGVqX.exe Token: SeDebugPrivilege 1864 AddInProcess32.exe Token: SeDebugPrivilege 3660 InstallUtil.exe Token: SeBackupPrivilege 3660 InstallUtil.exe Token: SeSecurityPrivilege 3660 InstallUtil.exe Token: SeSecurityPrivilege 3660 InstallUtil.exe Token: SeSecurityPrivilege 3660 InstallUtil.exe Token: SeSecurityPrivilege 3660 InstallUtil.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3612 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3612 wrote to memory of 2880 3612 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe 85 PID 3612 wrote to memory of 2880 3612 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe 85 PID 3612 wrote to memory of 2880 3612 d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe 85 PID 2880 wrote to memory of 1900 2880 axplong.exe 86 PID 2880 wrote to memory of 1900 2880 axplong.exe 86 PID 2880 wrote to memory of 1900 2880 axplong.exe 86 PID 1900 wrote to memory of 1276 1900 GOLD.exe 88 PID 1900 wrote to memory of 1276 1900 GOLD.exe 88 PID 1900 wrote to memory of 1276 1900 GOLD.exe 88 PID 1900 wrote to memory of 1276 1900 GOLD.exe 88 PID 1900 wrote to memory of 1276 1900 GOLD.exe 88 PID 1900 wrote to memory of 1276 1900 GOLD.exe 88 PID 1900 wrote to memory of 1276 1900 GOLD.exe 88 PID 1900 wrote to memory of 1276 1900 GOLD.exe 88 PID 2880 wrote to memory of 856 2880 axplong.exe 89 PID 2880 wrote to memory of 856 2880 axplong.exe 89 PID 2880 wrote to memory of 856 2880 axplong.exe 89 PID 2880 wrote to memory of 2784 2880 axplong.exe 91 PID 2880 wrote to memory of 2784 2880 axplong.exe 91 PID 2880 wrote to memory of 2784 2880 axplong.exe 91 PID 2784 wrote to memory of 3720 2784 newalp.exe 92 PID 2784 wrote to memory of 3720 2784 newalp.exe 92 PID 2784 wrote to memory of 3720 2784 newalp.exe 92 PID 856 wrote to memory of 1116 856 crypteda.exe 93 PID 856 wrote to memory of 1116 856 crypteda.exe 93 PID 856 wrote to memory of 1116 856 crypteda.exe 93 PID 856 wrote to memory of 4800 856 crypteda.exe 94 PID 856 wrote to memory of 4800 856 crypteda.exe 94 PID 856 wrote to memory of 4800 856 crypteda.exe 94 PID 856 wrote to memory of 3884 856 crypteda.exe 95 PID 856 wrote to memory of 3884 856 crypteda.exe 95 PID 856 wrote to memory of 3884 856 crypteda.exe 95 PID 856 wrote to memory of 3884 856 crypteda.exe 95 PID 856 wrote to memory of 3884 856 crypteda.exe 95 PID 856 wrote to memory of 3884 856 crypteda.exe 95 PID 856 wrote to memory of 3884 856 crypteda.exe 95 PID 856 wrote to memory of 3884 856 crypteda.exe 95 PID 856 wrote to memory of 3884 856 crypteda.exe 95 PID 856 wrote to memory of 3884 856 crypteda.exe 95 PID 3884 wrote to memory of 2692 3884 RegAsm.exe 96 PID 3884 wrote to memory of 2692 3884 RegAsm.exe 96 PID 3884 wrote to memory of 2692 3884 RegAsm.exe 96 PID 3884 wrote to memory of 3124 3884 RegAsm.exe 98 PID 3884 wrote to memory of 3124 3884 RegAsm.exe 98 PID 3884 wrote to memory of 3124 3884 RegAsm.exe 98 PID 2880 wrote to memory of 1856 2880 axplong.exe 100 PID 2880 wrote to memory of 1856 2880 axplong.exe 100 PID 2880 wrote to memory of 1856 2880 axplong.exe 100 PID 2880 wrote to memory of 1312 2880 axplong.exe 101 PID 2880 wrote to memory of 1312 2880 axplong.exe 101 PID 2880 wrote to memory of 1312 2880 axplong.exe 101 PID 3720 wrote to memory of 4272 3720 Hkbsse.exe 103 PID 3720 wrote to memory of 4272 3720 Hkbsse.exe 103 PID 3720 wrote to memory of 4272 3720 Hkbsse.exe 103 PID 2880 wrote to memory of 2396 2880 axplong.exe 105 PID 2880 wrote to memory of 2396 2880 axplong.exe 105 PID 2880 wrote to memory of 4932 2880 axplong.exe 110 PID 2880 wrote to memory of 4932 2880 axplong.exe 110 PID 2880 wrote to memory of 4932 2880 axplong.exe 110 PID 4932 wrote to memory of 3032 4932 2.exe 112 PID 4932 wrote to memory of 3032 4932 2.exe 112 PID 4932 wrote to memory of 3032 4932 2.exe 112 PID 4932 wrote to memory of 3032 4932 2.exe 112 PID 4932 wrote to memory of 3032 4932 2.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe"C:\Users\Admin\AppData\Local\Temp\d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4800
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Roaming\ke4GX0oA0u.exe"C:\Users\Admin\AppData\Roaming\ke4GX0oA0u.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Users\Admin\AppData\Roaming\pQQiTQ9s9f.exe"C:\Users\Admin\AppData\Roaming\pQQiTQ9s9f.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\1000001001\2.exe"C:\Users\Admin\AppData\Local\Temp\1000001001\2.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:4272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 3526⤵
- Program crash
PID:4716
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000050001\30072024.exe"C:\Users\Admin\AppData\Local\Temp\1000050001\30072024.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\1000069001\filrrr.exe"C:\Users\Admin\AppData\Local\Temp\1000069001\filrrr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"4⤵
- Checks computer location settings
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1764 -
C:\Users\Admin\Pictures\GcYGvTOdzgWaLcVyxPdxGVqX.exe"C:\Users\Admin\Pictures\GcYGvTOdzgWaLcVyxPdxGVqX.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"6⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3216
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"4⤵PID:2308
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000087001\2.exe"C:\Users\Admin\AppData\Local\Temp\1000087001\2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"4⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 4165⤵
- Program crash
PID:3576
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4272 -ip 42721⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3032 -ip 30321⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:1156
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:4540
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1312
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
315KB
MD5eb610433c753c2c3a04fc416254a723d
SHA1d920005f8ff49c9a052d7ab3615beae5e285acbc
SHA2569e5aedb80e3822954f4817d5160af0351e8d2beb1cc9e75f065038b8195776cd
SHA512b9dbe1053edd7fd6e5947d14b044af7febe93c764ab3d8f5bfcc50ff8ac92de4cf49deb1070383fc58d2d6dfdbee8f6a83b5997c4bd72df43c5df4caed178dba
-
Filesize
954KB
MD5e71c0c5d72455dde6510ba23552d7d2f
SHA14dff851c07a9f9ebc9e71b7f675cc20b06a2439c
SHA256de1d7fe86a0b70a7a268d2960109833f4d126d5d9e3acb36697e8ff59c56017f
SHA512c6f4b1eb353a554ca49bab5e894a4d7c46e2674d32f2f0d5a9231400d14a9ea5604c079193cd0bed9fea409bb71b5779c0c03671e104cb0740fe8ade3e530ca6
-
Filesize
1.4MB
MD504e90b2cf273efb3f6895cfcef1e59ba
SHA179afcc39db33426ee8b97ad7bfb48f3f2e4c3449
SHA256e015f535c8a9fab72f2e06863c559108b1a25af90468cb9f80292c3ba2c33f6e
SHA51272aa08242507f6dd39822a34c68d6185927f6772a3fc03a0850d7c8542b21a43e176f29e5fbb3a4e54bc02fa68c807a01091158ef68c5a2f425cc432c95ea555
-
Filesize
416KB
MD56093bb59e7707afe20ca2d9b80327b49
SHA1fd599fa9d5ef5c980a445fc6c19efd1fcb80f2bc
SHA2563acc0b21db1f774d15a1f1d8080aff0b8f83eefb70c5c673f1c6ed7b676cd6d3
SHA512d28808686f73bcc13b8ad57c84585b9d55d1b6445807023897be45f229bcab89971fb320223772fa500a692ad0b6106eaa0b4cf35e807038a6050994106d18e1
-
Filesize
304KB
MD5aedfb26f18fdd54279e8d1b82b84559a
SHA1161a427ef200282daf092543b3eda9b8cd689514
SHA256ba7517fbc65542871d06e7d4b7a017d5c165f55dda2b741e2ba52a6303d21b57
SHA51230c5836584b3d74e9a0719e0559f2b83900210ee574ae780d793cdc6396bd9b7cb672f401dfa15a58687ad1d769d5ef5c0b0b24de83dec3c8429a259c9a37bb2
-
Filesize
187KB
MD5e78239a5b0223499bed12a752b893cad
SHA1a429b46db791f433180ae4993ebb656d2f9393a4
SHA25680befdb25413d68adbadd8f236a2e8c71b261d8befc04c99749e778b07bcde89
SHA512cee5d5d4d32e5575852a412f6b3e17f8c0cbafe97fd92c7024934234a23c240dcc1f7a0452e2e5da949dec09dcfeb006e73862c5bbc549a2ab1cfb0241eaddfc
-
Filesize
2.8MB
MD5e10a9aedb2abf76878765ba3cde3a690
SHA18426ab989610bf345bd2511cf21c192db7d466fe
SHA256847ef32a91c46379eefabe4f6e141dc7130214a264751898f66c995adee0b45b
SHA5126c8bf706071f146ff76c180aee0f8ac6088eefd6276c3ba3dff3a37b2f5402a25a4370925219a2b703dbedf10ba2038937b0f6f9969ece55ef37ff3c4a26adbf
-
Filesize
673KB
MD5b859d1252109669c1a82b235aaf40932
SHA1b16ea90025a7d0fad9196aa09d1091244af37474
SHA256083d9bc8566b22e67b553f9e0b2f3bf6fe292220665dcc2fc10942cdc192125c
SHA5129c0006055afd089ef2acbb253628494dd8c29bab9d5333816be8404f875c85ac342df82ae339173f853d3ebdb2261e59841352f78f6b4bd3bff3d0d606f30655
-
Filesize
1.8MB
MD57f4964d85ebd1d327bd74973b123cef3
SHA19f0f6893280fa4658daf4fcfce9d5b83c441b10b
SHA256d7e43263df2431266bf90b0d572610f901519830ec72aa0845f1b22a3c0e2316
SHA512b4db6eed1ae279b373ab8ed59e2f3d3d84a87dec789e951999f8327de791b5678f0adbd4615de92d5398ec2dce8119b1341d9d180c6a25ce2a23c9c8392a2396
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
534KB
MD5a6da8d868dbd5c9fe6b505db0ee7eb71
SHA13dad32b3b3230ad6f44b82d1eb1749c67800c6f8
SHA2564ad69afb341c6d8021db1d9b0b7e56d14b020a0d70739e31f0b65861f3c4eb2c
SHA512132f54ac3116fd644c57840c893dae2128f571a784ceaa6dd78bafa3e05fc8f2a9d2458f1e1cf321b6cecc2423d3c57ff6d3c4b6b60f92a41b665105a3262dd0
-
Filesize
510KB
MD574e358f24a40f37c8ffd7fa40d98683a
SHA17a330075e6ea3d871eaeefcecdeb1d2feb2fc202
SHA2560928c96b35cd4cc5887fb205731aa91eb68886b816bcc5ec151aeee81ce4f9a6
SHA5121525e07712c35111b56664e1589b1db37965995cc8e6d9b6f931fa38b0aa8e8347fc08b870d03573d10f0d597a2cd9db2598845c82b6c085f0df04f2a3b46eaf
-
Filesize
503KB
MD52c2be38fb507206d36dddb3d03096518
SHA1a16edb81610a080096376d998e5ddc3e4b54bbd6
SHA2560c7173daaa5ad8dabe7a2cde6dbd0eee1ca790071443aa13b01a1e731053491e
SHA512e436954d7d5b77feb32f200cc48cb01f94b449887443a1e75ebef2f6fa2139d989d65f5ea7a71f8562c3aae2fea4117efc87e8aae905e1ba466fbc8bb328b316
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
Filesize
908KB
MD585a9287c26148788deff9c77bab244b3
SHA1ca2334f97428d4a99d9d29473689c58ec31e610b
SHA256d7ef63e826cf5bfea0000d292088ea87a5f301e94bb75fe7510a96f36d87d0e9
SHA512c8108d9056af1c128d1846746779c17d72375078978f2afd4b9dce07dd50a140f4f03b2cddbc5cbaef3565b8dec01d3dd934de86ddd01e6cba2350be44d2ecc1