Analysis
-
max time kernel
296s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
08/08/2024, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe
Resource
win10-20240611-en
General
-
Target
5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe
-
Size
1.8MB
-
MD5
e205f70aca7807877b7f704a0b8a2f18
-
SHA1
fabe7bbc7ec955a1ae243936739c59ba4d2bd9dc
-
SHA256
5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372
-
SHA512
c61b235b3f862afbcf9623f0d061c22915538c0be73c5e1b47db78dd52eff06fd096dd33d22d2d7d59a1b202484b6b4ade5c8671d91a0c1a9b0e96714fb6d9d1
-
SSDEEP
49152:ZZmfDMeVl6fhF+uM8Sk+SO8ZpK+DmLzq:3DeVIFZNZfZpK+SLO
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
20.52.165.210:39030
Extracted
redline
185.215.113.67:21405
Extracted
stealc
default
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
redline
BUY TG @FATHEROFCARDERS
45.66.231.214:9932
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral2/memory/1600-33-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral2/files/0x000700000001aafc-78.dat family_redline behavioral2/memory/1500-86-0x0000000000340000-0x0000000000392000-memory.dmp family_redline behavioral2/files/0x000900000001ab18-216.dat family_redline behavioral2/memory/4428-224-0x0000000000F50000-0x0000000000FA2000-memory.dmp family_redline -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" FILE2233.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4592 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Control Panel\International\Geo\Nation 5555.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\faMgy7pzFtjn4SPk93vzYGZO.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ER4sDIzcLTVvasmDaZ2cy6FK.bat jsc.exe -
Executes dropped EXE 23 IoCs
pid Process 1408 axplong.exe 220 GOLD.exe 1860 crypteda.exe 416 newalp.exe 3132 Hkbsse.exe 1500 06082025.exe 4328 stealc_default.exe 912 I9PqMOqqKD.exe 832 vWYKaC3kjN.exe 4504 FILE2233.exe 2156 axplong.exe 3012 Hkbsse.exe 4428 MYNEWRDX.exe 4864 owqNP8vO3JVev9V3IdqFYQz2.exe 2636 5555.exe 2156 Hkbsse.exe 4328 axplong.exe 4472 axplong.exe 2580 Hkbsse.exe 2704 Hkbsse.exe 4800 axplong.exe 4832 axplong.exe 2512 Hkbsse.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Wine axplong.exe -
Loads dropped DLL 2 IoCs
pid Process 4328 stealc_default.exe 4328 stealc_default.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Run\My Program = "C:\\ProgramData\\MyHiddenFolder\\5555.exe" 5555.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FILE2233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" FILE2233.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 28 raw.githubusercontent.com 32 raw.githubusercontent.com 44 pastebin.com 57 iplogger.com 58 iplogger.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1724 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe 1408 axplong.exe 2156 axplong.exe 4328 axplong.exe 4472 axplong.exe 4800 axplong.exe 4832 axplong.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 220 set thread context of 1600 220 GOLD.exe 73 PID 1860 set thread context of 4848 1860 crypteda.exe 80 PID 4504 set thread context of 2280 4504 FILE2233.exe 94 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe File created C:\Windows\Tasks\Hkbsse.job newalp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypteda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newalp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06082025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MYNEWRDX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language I9PqMOqqKD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vWYKaC3kjN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language owqNP8vO3JVev9V3IdqFYQz2.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 owqNP8vO3JVev9V3IdqFYQz2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString owqNP8vO3JVev9V3IdqFYQz2.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1724 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe 1724 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe 1408 axplong.exe 1408 axplong.exe 4328 stealc_default.exe 4328 stealc_default.exe 4328 stealc_default.exe 4328 stealc_default.exe 2156 axplong.exe 2156 axplong.exe 1600 RegAsm.exe 912 I9PqMOqqKD.exe 832 vWYKaC3kjN.exe 1500 06082025.exe 4592 powershell.exe 4592 powershell.exe 4592 powershell.exe 4428 MYNEWRDX.exe 4428 MYNEWRDX.exe 4328 axplong.exe 4328 axplong.exe 4472 axplong.exe 4472 axplong.exe 4800 axplong.exe 4800 axplong.exe 4832 axplong.exe 4832 axplong.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 912 I9PqMOqqKD.exe Token: SeDebugPrivilege 832 vWYKaC3kjN.exe Token: SeBackupPrivilege 912 I9PqMOqqKD.exe Token: SeBackupPrivilege 832 vWYKaC3kjN.exe Token: SeSecurityPrivilege 912 I9PqMOqqKD.exe Token: SeSecurityPrivilege 832 vWYKaC3kjN.exe Token: SeSecurityPrivilege 832 vWYKaC3kjN.exe Token: SeSecurityPrivilege 912 I9PqMOqqKD.exe Token: SeSecurityPrivilege 832 vWYKaC3kjN.exe Token: SeSecurityPrivilege 912 I9PqMOqqKD.exe Token: SeSecurityPrivilege 832 vWYKaC3kjN.exe Token: SeSecurityPrivilege 912 I9PqMOqqKD.exe Token: SeDebugPrivilege 1600 RegAsm.exe Token: SeDebugPrivilege 1500 06082025.exe Token: SeDebugPrivilege 4592 powershell.exe Token: SeDebugPrivilege 2280 jsc.exe Token: SeIncreaseQuotaPrivilege 4592 powershell.exe Token: SeSecurityPrivilege 4592 powershell.exe Token: SeTakeOwnershipPrivilege 4592 powershell.exe Token: SeLoadDriverPrivilege 4592 powershell.exe Token: SeSystemProfilePrivilege 4592 powershell.exe Token: SeSystemtimePrivilege 4592 powershell.exe Token: SeProfSingleProcessPrivilege 4592 powershell.exe Token: SeIncBasePriorityPrivilege 4592 powershell.exe Token: SeCreatePagefilePrivilege 4592 powershell.exe Token: SeBackupPrivilege 4592 powershell.exe Token: SeRestorePrivilege 4592 powershell.exe Token: SeShutdownPrivilege 4592 powershell.exe Token: SeDebugPrivilege 4592 powershell.exe Token: SeSystemEnvironmentPrivilege 4592 powershell.exe Token: SeRemoteShutdownPrivilege 4592 powershell.exe Token: SeUndockPrivilege 4592 powershell.exe Token: SeManageVolumePrivilege 4592 powershell.exe Token: 33 4592 powershell.exe Token: 34 4592 powershell.exe Token: 35 4592 powershell.exe Token: 36 4592 powershell.exe Token: SeDebugPrivilege 4428 MYNEWRDX.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1408 1724 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe 70 PID 1724 wrote to memory of 1408 1724 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe 70 PID 1724 wrote to memory of 1408 1724 5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe 70 PID 1408 wrote to memory of 220 1408 axplong.exe 71 PID 1408 wrote to memory of 220 1408 axplong.exe 71 PID 1408 wrote to memory of 220 1408 axplong.exe 71 PID 220 wrote to memory of 1600 220 GOLD.exe 73 PID 220 wrote to memory of 1600 220 GOLD.exe 73 PID 220 wrote to memory of 1600 220 GOLD.exe 73 PID 220 wrote to memory of 1600 220 GOLD.exe 73 PID 220 wrote to memory of 1600 220 GOLD.exe 73 PID 220 wrote to memory of 1600 220 GOLD.exe 73 PID 220 wrote to memory of 1600 220 GOLD.exe 73 PID 220 wrote to memory of 1600 220 GOLD.exe 73 PID 1408 wrote to memory of 1860 1408 axplong.exe 74 PID 1408 wrote to memory of 1860 1408 axplong.exe 74 PID 1408 wrote to memory of 1860 1408 axplong.exe 74 PID 1408 wrote to memory of 416 1408 axplong.exe 76 PID 1408 wrote to memory of 416 1408 axplong.exe 76 PID 1408 wrote to memory of 416 1408 axplong.exe 76 PID 416 wrote to memory of 3132 416 newalp.exe 77 PID 416 wrote to memory of 3132 416 newalp.exe 77 PID 416 wrote to memory of 3132 416 newalp.exe 77 PID 1408 wrote to memory of 1500 1408 axplong.exe 78 PID 1408 wrote to memory of 1500 1408 axplong.exe 78 PID 1408 wrote to memory of 1500 1408 axplong.exe 78 PID 1408 wrote to memory of 4328 1408 axplong.exe 79 PID 1408 wrote to memory of 4328 1408 axplong.exe 79 PID 1408 wrote to memory of 4328 1408 axplong.exe 79 PID 1860 wrote to memory of 4848 1860 crypteda.exe 80 PID 1860 wrote to memory of 4848 1860 crypteda.exe 80 PID 1860 wrote to memory of 4848 1860 crypteda.exe 80 PID 1860 wrote to memory of 4848 1860 crypteda.exe 80 PID 1860 wrote to memory of 4848 1860 crypteda.exe 80 PID 1860 wrote to memory of 4848 1860 crypteda.exe 80 PID 1860 wrote to memory of 4848 1860 crypteda.exe 80 PID 1860 wrote to memory of 4848 1860 crypteda.exe 80 PID 1860 wrote to memory of 4848 1860 crypteda.exe 80 PID 1860 wrote to memory of 4848 1860 crypteda.exe 80 PID 4848 wrote to memory of 912 4848 RegAsm.exe 81 PID 4848 wrote to memory of 912 4848 RegAsm.exe 81 PID 4848 wrote to memory of 912 4848 RegAsm.exe 81 PID 4848 wrote to memory of 832 4848 RegAsm.exe 83 PID 4848 wrote to memory of 832 4848 RegAsm.exe 83 PID 4848 wrote to memory of 832 4848 RegAsm.exe 83 PID 1408 wrote to memory of 4504 1408 axplong.exe 86 PID 1408 wrote to memory of 4504 1408 axplong.exe 86 PID 1408 wrote to memory of 4428 1408 axplong.exe 90 PID 1408 wrote to memory of 4428 1408 axplong.exe 90 PID 1408 wrote to memory of 4428 1408 axplong.exe 90 PID 4504 wrote to memory of 4592 4504 FILE2233.exe 91 PID 4504 wrote to memory of 4592 4504 FILE2233.exe 91 PID 4504 wrote to memory of 3972 4504 FILE2233.exe 93 PID 4504 wrote to memory of 3972 4504 FILE2233.exe 93 PID 4504 wrote to memory of 3972 4504 FILE2233.exe 93 PID 4504 wrote to memory of 2280 4504 FILE2233.exe 94 PID 4504 wrote to memory of 2280 4504 FILE2233.exe 94 PID 4504 wrote to memory of 2280 4504 FILE2233.exe 94 PID 4504 wrote to memory of 2280 4504 FILE2233.exe 94 PID 4504 wrote to memory of 2280 4504 FILE2233.exe 94 PID 4504 wrote to memory of 2280 4504 FILE2233.exe 94 PID 4504 wrote to memory of 2280 4504 FILE2233.exe 94 PID 4504 wrote to memory of 2280 4504 FILE2233.exe 94 PID 4504 wrote to memory of 228 4504 FILE2233.exe 95 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" FILE2233.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe"C:\Users\Admin\AppData\Local\Temp\5327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Roaming\I9PqMOqqKD.exe"C:\Users\Admin\AppData\Roaming\I9PqMOqqKD.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Users\Admin\AppData\Roaming\vWYKaC3kjN.exe"C:\Users\Admin\AppData\Roaming\vWYKaC3kjN.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3132
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\5555.exe"C:\Users\Admin\AppData\Local\Temp\5555.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:2636
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe"C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4504 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe" -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"4⤵PID:3972
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
C:\Users\Admin\Pictures\owqNP8vO3JVev9V3IdqFYQz2.exe"C:\Users\Admin\Pictures\owqNP8vO3JVev9V3IdqFYQz2.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4864
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"4⤵PID:228
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000090001\MYNEWRDX.exe"C:\Users\Admin\AppData\Local\Temp\1000090001\MYNEWRDX.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:3012
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:2156
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:2580
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:2704
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:2512
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD56d17c0e3cfba49903eb6deee60caca28
SHA1e1ee524df65d628e36d8eea31b1f8787ea797278
SHA2561c30010f7852590bbfe814487b8382a6a139b717d7446d5d0ae63d0892f130a3
SHA5120dd3325f61c8b210c617d66537562060b40d0b4f10a02a756cabbde96424afdeff23731d00746af821e63df04192e3c9b6d518c123fcdb81d4a3d39c8785bf53
-
Filesize
954KB
MD5e71c0c5d72455dde6510ba23552d7d2f
SHA14dff851c07a9f9ebc9e71b7f675cc20b06a2439c
SHA256de1d7fe86a0b70a7a268d2960109833f4d126d5d9e3acb36697e8ff59c56017f
SHA512c6f4b1eb353a554ca49bab5e894a4d7c46e2674d32f2f0d5a9231400d14a9ea5604c079193cd0bed9fea409bb71b5779c0c03671e104cb0740fe8ade3e530ca6
-
Filesize
1.4MB
MD504e90b2cf273efb3f6895cfcef1e59ba
SHA179afcc39db33426ee8b97ad7bfb48f3f2e4c3449
SHA256e015f535c8a9fab72f2e06863c559108b1a25af90468cb9f80292c3ba2c33f6e
SHA51272aa08242507f6dd39822a34c68d6185927f6772a3fc03a0850d7c8542b21a43e176f29e5fbb3a4e54bc02fa68c807a01091158ef68c5a2f425cc432c95ea555
-
Filesize
416KB
MD56093bb59e7707afe20ca2d9b80327b49
SHA1fd599fa9d5ef5c980a445fc6c19efd1fcb80f2bc
SHA2563acc0b21db1f774d15a1f1d8080aff0b8f83eefb70c5c673f1c6ed7b676cd6d3
SHA512d28808686f73bcc13b8ad57c84585b9d55d1b6445807023897be45f229bcab89971fb320223772fa500a692ad0b6106eaa0b4cf35e807038a6050994106d18e1
-
Filesize
304KB
MD50d76d08b0f0a404604e7de4d28010abc
SHA1ef4270c06b84b0d43372c5827c807641a41f2374
SHA2566dcda2619b61b0cafbfdebb7fbb82c8c2c0b3f9855a4306782874625d6ff067e
SHA512979e0d3ec0dad1cc2acd5ec8b0a84a5161e46ee7a30f99d9a3ff3b7ce4eec7f5fa1f11fbe2a84267a7263e04434f4fc7fabc7858ef4c0b7667aeb6dcd3aa7165
-
Filesize
187KB
MD5e78239a5b0223499bed12a752b893cad
SHA1a429b46db791f433180ae4993ebb656d2f9393a4
SHA25680befdb25413d68adbadd8f236a2e8c71b261d8befc04c99749e778b07bcde89
SHA512cee5d5d4d32e5575852a412f6b3e17f8c0cbafe97fd92c7024934234a23c240dcc1f7a0452e2e5da949dec09dcfeb006e73862c5bbc549a2ab1cfb0241eaddfc
-
Filesize
3.2MB
MD503fe60596aa8f9b633ac360fd9ec42d8
SHA11e7bc8d80c7a2a315639b09d332a549dc7ddcb4b
SHA256e731f79ee3512fefe48e53b4424145efc6a1b2585220b9c6025038d5f1263055
SHA512d6f080881874112c2876ed691a6c725ce0cc87196934fd8fa9ff488619c84e6e4a9c244c0840999b6a6cce95b4b7375648cf3011d79927e90a0c786895c0cfdf
-
Filesize
304KB
MD50f02da56dab4bc19fca05d6d93e74dcf
SHA1a809c7e9c3136b8030727f128004aa2c31edc7a9
SHA256e1d0fe3bada7fdec17d7279e6294731e2684399905f05e5a3449ba14542b1379
SHA512522ec9042680a94a73cefa56e7902bacb166e23484f041c9e06dce033d3d16d13f7508f4d1e160c81198f61aa8c9a5aecfa62068150705ecf4803733f7e01ded
-
Filesize
1.8MB
MD5e205f70aca7807877b7f704a0b8a2f18
SHA1fabe7bbc7ec955a1ae243936739c59ba4d2bd9dc
SHA2565327be09c22f6dfa4189c652bc3fad5795a96f6b68c1ed709ca23ef6a1cc1372
SHA512c61b235b3f862afbcf9623f0d061c22915538c0be73c5e1b47db78dd52eff06fd096dd33d22d2d7d59a1b202484b6b4ade5c8671d91a0c1a9b0e96714fb6d9d1
-
Filesize
547KB
MD58ecad7a38a26ac1fc2c7804afd0599fa
SHA1587475e77012d412fd96213f048b2fb2d5d405e9
SHA25683f6f8c068cd5b4448b2525ee799f58aa5ad0ce40f901881eda105f6d6ed4661
SHA512a5a2499fb2c5a7751f09c50032c2fcba1c2c87ad4c35910decf00d24d4d90e233fa383319d7ddd3537f3891a0db49240a9c2c81451192308280687015c8898d5
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
510KB
MD574e358f24a40f37c8ffd7fa40d98683a
SHA17a330075e6ea3d871eaeefcecdeb1d2feb2fc202
SHA2560928c96b35cd4cc5887fb205731aa91eb68886b816bcc5ec151aeee81ce4f9a6
SHA5121525e07712c35111b56664e1589b1db37965995cc8e6d9b6f931fa38b0aa8e8347fc08b870d03573d10f0d597a2cd9db2598845c82b6c085f0df04f2a3b46eaf
-
Filesize
503KB
MD52c2be38fb507206d36dddb3d03096518
SHA1a16edb81610a080096376d998e5ddc3e4b54bbd6
SHA2560c7173daaa5ad8dabe7a2cde6dbd0eee1ca790071443aa13b01a1e731053491e
SHA512e436954d7d5b77feb32f200cc48cb01f94b449887443a1e75ebef2f6fa2139d989d65f5ea7a71f8562c3aae2fea4117efc87e8aae905e1ba466fbc8bb328b316
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
Filesize
2.9MB
MD5bc3e076ec6527a8bf74e9293be24630e
SHA12a58c06f16d1ba29e7f6945fd08896caa55df709
SHA25637b97e07cc1d88c49e382de22ce61ad6d684901114d475b96e2bc9645797903b
SHA5120dbf419d0652d143a36d4185d9b7ec2f35224b2467395826f55d53f538ef5539326bca03afa43676961c316de70b830f176a0056105d64f1205bf03fa84c4cf1
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571