Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe
Resource
win11-20240802-en
General
-
Target
c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe
-
Size
1.8MB
-
MD5
7cf1f4552c8145f13d37d55125dc99cb
-
SHA1
f76cd17dc7e085f3952718694e97091d1b8fc8a3
-
SHA256
c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5
-
SHA512
34a94e2c31549687eb55cefc0693d2177d90ad193f93a93241c2364fef9056926ee595acdbdde2ff527d3041118725485bb2c1e0610332f7fc2b171eafdb1362
-
SSDEEP
24576:lJC31PpNWSdM1LliCaxIsg9otM2/s6glLBHPpOSY47zfS1SbNh4etIqZLxeBY+YG:QyciliJGF9o/sB3x1rVNh4eJsPTwG
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
20.52.165.210:39030
Extracted
redline
185.215.113.67:21405
Extracted
stealc
default
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
redline
BUY TG @FATHEROFCARDERS
45.66.231.214:9932
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1952-38-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/files/0x00070000000234e0-101.dat family_redline behavioral1/memory/4036-133-0x0000000000290000-0x00000000002E2000-memory.dmp family_redline behavioral1/files/0x00070000000234f7-230.dat family_redline behavioral1/memory/4332-249-0x0000000000890000-0x00000000008E2000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation newalp.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 06082025.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 5555.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 16 IoCs
pid Process 388 axplong.exe 3860 GOLD.exe 4020 crypteda.exe 4580 newalp.exe 3020 Hkbsse.exe 2088 AUMOkr0Tag.exe 4036 06082025.exe 2588 svxykjkMcQ.exe 4052 stealc_default.exe 5060 FILE2233.exe 4332 MYNEWRDX.exe 4508 axplong.exe 2648 Hkbsse.exe 324 5555.exe 2152 Hkbsse.exe 796 axplong.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Wine axplong.exe -
Loads dropped DLL 2 IoCs
pid Process 4052 stealc_default.exe 4052 stealc_default.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\My Program = "C:\\ProgramData\\MyHiddenFolder\\5555.exe" 5555.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 39 raw.githubusercontent.com 40 raw.githubusercontent.com 60 bitbucket.org 62 bitbucket.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4204 c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe 388 axplong.exe 4508 axplong.exe 796 axplong.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3860 set thread context of 1952 3860 GOLD.exe 89 PID 4020 set thread context of 1380 4020 crypteda.exe 94 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe File created C:\Windows\Tasks\Hkbsse.job newalp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newalp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06082025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svxykjkMcQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MYNEWRDX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypteda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AUMOkr0Tag.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 4204 c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe 4204 c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe 388 axplong.exe 388 axplong.exe 4052 stealc_default.exe 4052 stealc_default.exe 1952 RegAsm.exe 2088 AUMOkr0Tag.exe 2088 AUMOkr0Tag.exe 2588 svxykjkMcQ.exe 2588 svxykjkMcQ.exe 1952 RegAsm.exe 1952 RegAsm.exe 1952 RegAsm.exe 1952 RegAsm.exe 4052 stealc_default.exe 4052 stealc_default.exe 4036 06082025.exe 4036 06082025.exe 4036 06082025.exe 4036 06082025.exe 4036 06082025.exe 4332 MYNEWRDX.exe 4332 MYNEWRDX.exe 4332 MYNEWRDX.exe 4332 MYNEWRDX.exe 4332 MYNEWRDX.exe 4508 axplong.exe 4508 axplong.exe 796 axplong.exe 796 axplong.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2588 svxykjkMcQ.exe Token: SeDebugPrivilege 2088 AUMOkr0Tag.exe Token: SeBackupPrivilege 2588 svxykjkMcQ.exe Token: SeBackupPrivilege 2088 AUMOkr0Tag.exe Token: SeSecurityPrivilege 2088 AUMOkr0Tag.exe Token: SeSecurityPrivilege 2588 svxykjkMcQ.exe Token: SeSecurityPrivilege 2088 AUMOkr0Tag.exe Token: SeSecurityPrivilege 2088 AUMOkr0Tag.exe Token: SeSecurityPrivilege 2088 AUMOkr0Tag.exe Token: SeSecurityPrivilege 2588 svxykjkMcQ.exe Token: SeSecurityPrivilege 2588 svxykjkMcQ.exe Token: SeSecurityPrivilege 2588 svxykjkMcQ.exe Token: SeDebugPrivilege 1952 RegAsm.exe Token: SeDebugPrivilege 4036 06082025.exe Token: SeDebugPrivilege 4332 MYNEWRDX.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4204 c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 4204 wrote to memory of 388 4204 c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe 86 PID 4204 wrote to memory of 388 4204 c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe 86 PID 4204 wrote to memory of 388 4204 c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe 86 PID 388 wrote to memory of 3860 388 axplong.exe 87 PID 388 wrote to memory of 3860 388 axplong.exe 87 PID 388 wrote to memory of 3860 388 axplong.exe 87 PID 3860 wrote to memory of 1952 3860 GOLD.exe 89 PID 3860 wrote to memory of 1952 3860 GOLD.exe 89 PID 3860 wrote to memory of 1952 3860 GOLD.exe 89 PID 3860 wrote to memory of 1952 3860 GOLD.exe 89 PID 3860 wrote to memory of 1952 3860 GOLD.exe 89 PID 3860 wrote to memory of 1952 3860 GOLD.exe 89 PID 3860 wrote to memory of 1952 3860 GOLD.exe 89 PID 3860 wrote to memory of 1952 3860 GOLD.exe 89 PID 388 wrote to memory of 4020 388 axplong.exe 90 PID 388 wrote to memory of 4020 388 axplong.exe 90 PID 388 wrote to memory of 4020 388 axplong.exe 90 PID 388 wrote to memory of 4580 388 axplong.exe 92 PID 388 wrote to memory of 4580 388 axplong.exe 92 PID 388 wrote to memory of 4580 388 axplong.exe 92 PID 4580 wrote to memory of 3020 4580 newalp.exe 93 PID 4580 wrote to memory of 3020 4580 newalp.exe 93 PID 4580 wrote to memory of 3020 4580 newalp.exe 93 PID 4020 wrote to memory of 1380 4020 crypteda.exe 94 PID 4020 wrote to memory of 1380 4020 crypteda.exe 94 PID 4020 wrote to memory of 1380 4020 crypteda.exe 94 PID 4020 wrote to memory of 1380 4020 crypteda.exe 94 PID 4020 wrote to memory of 1380 4020 crypteda.exe 94 PID 4020 wrote to memory of 1380 4020 crypteda.exe 94 PID 4020 wrote to memory of 1380 4020 crypteda.exe 94 PID 4020 wrote to memory of 1380 4020 crypteda.exe 94 PID 4020 wrote to memory of 1380 4020 crypteda.exe 94 PID 4020 wrote to memory of 1380 4020 crypteda.exe 94 PID 1380 wrote to memory of 2088 1380 RegAsm.exe 95 PID 1380 wrote to memory of 2088 1380 RegAsm.exe 95 PID 1380 wrote to memory of 2088 1380 RegAsm.exe 95 PID 388 wrote to memory of 4036 388 axplong.exe 96 PID 388 wrote to memory of 4036 388 axplong.exe 96 PID 388 wrote to memory of 4036 388 axplong.exe 96 PID 1380 wrote to memory of 2588 1380 RegAsm.exe 98 PID 1380 wrote to memory of 2588 1380 RegAsm.exe 98 PID 1380 wrote to memory of 2588 1380 RegAsm.exe 98 PID 388 wrote to memory of 4052 388 axplong.exe 100 PID 388 wrote to memory of 4052 388 axplong.exe 100 PID 388 wrote to memory of 4052 388 axplong.exe 100 PID 388 wrote to memory of 5060 388 axplong.exe 102 PID 388 wrote to memory of 5060 388 axplong.exe 102 PID 388 wrote to memory of 4332 388 axplong.exe 104 PID 388 wrote to memory of 4332 388 axplong.exe 104 PID 388 wrote to memory of 4332 388 axplong.exe 104 PID 4036 wrote to memory of 324 4036 06082025.exe 110 PID 4036 wrote to memory of 324 4036 06082025.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe"C:\Users\Admin\AppData\Local\Temp\c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Roaming\AUMOkr0Tag.exe"C:\Users\Admin\AppData\Roaming\AUMOkr0Tag.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Users\Admin\AppData\Roaming\svxykjkMcQ.exe"C:\Users\Admin\AppData\Roaming\svxykjkMcQ.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3020
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\5555.exe"C:\Users\Admin\AppData\Local\Temp\5555.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:324
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe"C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe"3⤵
- Executes dropped EXE
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\1000090001\MYNEWRDX.exe"C:\Users\Admin\AppData\Local\Temp\1000090001\MYNEWRDX.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:2648
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:2152
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:796
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
954KB
MD5e71c0c5d72455dde6510ba23552d7d2f
SHA14dff851c07a9f9ebc9e71b7f675cc20b06a2439c
SHA256de1d7fe86a0b70a7a268d2960109833f4d126d5d9e3acb36697e8ff59c56017f
SHA512c6f4b1eb353a554ca49bab5e894a4d7c46e2674d32f2f0d5a9231400d14a9ea5604c079193cd0bed9fea409bb71b5779c0c03671e104cb0740fe8ade3e530ca6
-
Filesize
1.4MB
MD504e90b2cf273efb3f6895cfcef1e59ba
SHA179afcc39db33426ee8b97ad7bfb48f3f2e4c3449
SHA256e015f535c8a9fab72f2e06863c559108b1a25af90468cb9f80292c3ba2c33f6e
SHA51272aa08242507f6dd39822a34c68d6185927f6772a3fc03a0850d7c8542b21a43e176f29e5fbb3a4e54bc02fa68c807a01091158ef68c5a2f425cc432c95ea555
-
Filesize
416KB
MD56093bb59e7707afe20ca2d9b80327b49
SHA1fd599fa9d5ef5c980a445fc6c19efd1fcb80f2bc
SHA2563acc0b21db1f774d15a1f1d8080aff0b8f83eefb70c5c673f1c6ed7b676cd6d3
SHA512d28808686f73bcc13b8ad57c84585b9d55d1b6445807023897be45f229bcab89971fb320223772fa500a692ad0b6106eaa0b4cf35e807038a6050994106d18e1
-
Filesize
304KB
MD50d76d08b0f0a404604e7de4d28010abc
SHA1ef4270c06b84b0d43372c5827c807641a41f2374
SHA2566dcda2619b61b0cafbfdebb7fbb82c8c2c0b3f9855a4306782874625d6ff067e
SHA512979e0d3ec0dad1cc2acd5ec8b0a84a5161e46ee7a30f99d9a3ff3b7ce4eec7f5fa1f11fbe2a84267a7263e04434f4fc7fabc7858ef4c0b7667aeb6dcd3aa7165
-
Filesize
187KB
MD5e78239a5b0223499bed12a752b893cad
SHA1a429b46db791f433180ae4993ebb656d2f9393a4
SHA25680befdb25413d68adbadd8f236a2e8c71b261d8befc04c99749e778b07bcde89
SHA512cee5d5d4d32e5575852a412f6b3e17f8c0cbafe97fd92c7024934234a23c240dcc1f7a0452e2e5da949dec09dcfeb006e73862c5bbc549a2ab1cfb0241eaddfc
-
Filesize
3.2MB
MD503fe60596aa8f9b633ac360fd9ec42d8
SHA11e7bc8d80c7a2a315639b09d332a549dc7ddcb4b
SHA256e731f79ee3512fefe48e53b4424145efc6a1b2585220b9c6025038d5f1263055
SHA512d6f080881874112c2876ed691a6c725ce0cc87196934fd8fa9ff488619c84e6e4a9c244c0840999b6a6cce95b4b7375648cf3011d79927e90a0c786895c0cfdf
-
Filesize
304KB
MD50f02da56dab4bc19fca05d6d93e74dcf
SHA1a809c7e9c3136b8030727f128004aa2c31edc7a9
SHA256e1d0fe3bada7fdec17d7279e6294731e2684399905f05e5a3449ba14542b1379
SHA512522ec9042680a94a73cefa56e7902bacb166e23484f041c9e06dce033d3d16d13f7508f4d1e160c81198f61aa8c9a5aecfa62068150705ecf4803733f7e01ded
-
Filesize
1.8MB
MD57cf1f4552c8145f13d37d55125dc99cb
SHA1f76cd17dc7e085f3952718694e97091d1b8fc8a3
SHA256c9bda48cab612cf9dfdd23f5e483ca8490cc397e39776dd0dcce65ea8847a3b5
SHA51234a94e2c31549687eb55cefc0693d2177d90ad193f93a93241c2364fef9056926ee595acdbdde2ff527d3041118725485bb2c1e0610332f7fc2b171eafdb1362
-
Filesize
547KB
MD58ecad7a38a26ac1fc2c7804afd0599fa
SHA1587475e77012d412fd96213f048b2fb2d5d405e9
SHA25683f6f8c068cd5b4448b2525ee799f58aa5ad0ce40f901881eda105f6d6ed4661
SHA512a5a2499fb2c5a7751f09c50032c2fcba1c2c87ad4c35910decf00d24d4d90e233fa383319d7ddd3537f3891a0db49240a9c2c81451192308280687015c8898d5
-
Filesize
510KB
MD574e358f24a40f37c8ffd7fa40d98683a
SHA17a330075e6ea3d871eaeefcecdeb1d2feb2fc202
SHA2560928c96b35cd4cc5887fb205731aa91eb68886b816bcc5ec151aeee81ce4f9a6
SHA5121525e07712c35111b56664e1589b1db37965995cc8e6d9b6f931fa38b0aa8e8347fc08b870d03573d10f0d597a2cd9db2598845c82b6c085f0df04f2a3b46eaf
-
Filesize
503KB
MD52c2be38fb507206d36dddb3d03096518
SHA1a16edb81610a080096376d998e5ddc3e4b54bbd6
SHA2560c7173daaa5ad8dabe7a2cde6dbd0eee1ca790071443aa13b01a1e731053491e
SHA512e436954d7d5b77feb32f200cc48cb01f94b449887443a1e75ebef2f6fa2139d989d65f5ea7a71f8562c3aae2fea4117efc87e8aae905e1ba466fbc8bb328b316