Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
295s -
max time network
299s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
08/08/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe
Resource
win10-20240404-en
General
-
Target
454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe
-
Size
1.8MB
-
MD5
876a6feeffb71e95f7217eaa05c585eb
-
SHA1
2e5a5e4709482cdbf42bc8173bef6ec25feac600
-
SHA256
454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3
-
SHA512
bbaeef6123efe1361ccac311790c2eec3958f145b1818bc280b9f0fda27f9fa87b5ee74db1e9d6bc0e7aaf75d852729fe8f1afcad70fe527764daaab432d6ab8
-
SSDEEP
24576:Rez4TNxWuU/dZlLTOGiyl1Iz1sGVbRKCN1jT0DUh+dIF9J52dzrf5vtO5Hn/W/9l:K4xJK5O218VNKCqI2dfOxQ91aCm
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
20.52.165.210:39030
Extracted
redline
185.215.113.67:21405
Extracted
stealc
default
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
redline
BUY TG @FATHEROFCARDERS
45.66.231.214:9932
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral2/memory/2144-30-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral2/files/0x000800000001abe5-93.dat family_redline behavioral2/memory/3400-101-0x0000000000E70000-0x0000000000EC2000-memory.dmp family_redline behavioral2/files/0x000800000001ac1c-194.dat family_redline behavioral2/memory/3944-202-0x0000000000860000-0x00000000008B2000-memory.dmp family_redline -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" FILE2233.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1728 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Control Panel\International\Geo\Nation 5555.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tAd2Pict3t7Qd0iSCOzIUvf1.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jxLP3VuA12vAGCLu0DiQOG1V.bat regsvcs.exe -
Executes dropped EXE 23 IoCs
pid Process 508 axplong.exe 588 GOLD.exe 3008 crypteda.exe 4336 newalp.exe 1256 Hkbsse.exe 4764 TBWNoH8Ixj.exe 2520 ANnPtpr69I.exe 3400 06082025.exe 4452 stealc_default.exe 4208 FILE2233.exe 3944 MYNEWRDX.exe 1668 HBp7JQplVAnzdzDK11rS07tc.exe 4688 5555.exe 4360 axplong.exe 4356 Hkbsse.exe 3068 Hkbsse.exe 4828 axplong.exe 356 Hkbsse.exe 2524 axplong.exe 2772 axplong.exe 200 Hkbsse.exe 3404 axplong.exe 4584 Hkbsse.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Wine 454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Wine axplong.exe -
Loads dropped DLL 2 IoCs
pid Process 4452 stealc_default.exe 4452 stealc_default.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows\CurrentVersion\Run\My Program = "C:\\Users\\Admin\\AppData\\Local\\MyHiddenFolder\\5555.exe" 5555.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" FILE2233.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FILE2233.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 69 iplogger.com 29 raw.githubusercontent.com 45 pastebin.com 59 raw.githubusercontent.com 61 bitbucket.org 70 iplogger.com 28 raw.githubusercontent.com 44 pastebin.com 60 bitbucket.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 204 454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe 508 axplong.exe 4360 axplong.exe 4828 axplong.exe 2524 axplong.exe 2772 axplong.exe 3404 axplong.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 588 set thread context of 2144 588 GOLD.exe 78 PID 3008 set thread context of 3696 3008 crypteda.exe 82 PID 4208 set thread context of 4624 4208 FILE2233.exe 96 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe File created C:\Windows\Tasks\Hkbsse.job newalp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06082025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TBWNoH8Ixj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypteda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ANnPtpr69I.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newalp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MYNEWRDX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HBp7JQplVAnzdzDK11rS07tc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString HBp7JQplVAnzdzDK11rS07tc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 HBp7JQplVAnzdzDK11rS07tc.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 204 454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe 204 454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe 508 axplong.exe 508 axplong.exe 2144 RegAsm.exe 4452 stealc_default.exe 4452 stealc_default.exe 2520 ANnPtpr69I.exe 4764 TBWNoH8Ixj.exe 2144 RegAsm.exe 2144 RegAsm.exe 4452 stealc_default.exe 4452 stealc_default.exe 3400 06082025.exe 3400 06082025.exe 3400 06082025.exe 1728 powershell.exe 1728 powershell.exe 1728 powershell.exe 1728 powershell.exe 3944 MYNEWRDX.exe 3944 MYNEWRDX.exe 3944 MYNEWRDX.exe 4360 axplong.exe 4360 axplong.exe 4828 axplong.exe 4828 axplong.exe 2524 axplong.exe 2524 axplong.exe 2772 axplong.exe 2772 axplong.exe 3404 axplong.exe 3404 axplong.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 4764 TBWNoH8Ixj.exe Token: SeDebugPrivilege 2520 ANnPtpr69I.exe Token: SeBackupPrivilege 2520 ANnPtpr69I.exe Token: SeSecurityPrivilege 2520 ANnPtpr69I.exe Token: SeSecurityPrivilege 2520 ANnPtpr69I.exe Token: SeSecurityPrivilege 2520 ANnPtpr69I.exe Token: SeSecurityPrivilege 2520 ANnPtpr69I.exe Token: SeBackupPrivilege 4764 TBWNoH8Ixj.exe Token: SeSecurityPrivilege 4764 TBWNoH8Ixj.exe Token: SeSecurityPrivilege 4764 TBWNoH8Ixj.exe Token: SeSecurityPrivilege 4764 TBWNoH8Ixj.exe Token: SeSecurityPrivilege 4764 TBWNoH8Ixj.exe Token: SeDebugPrivilege 2144 RegAsm.exe Token: SeDebugPrivilege 3400 06082025.exe Token: SeDebugPrivilege 1728 powershell.exe Token: SeDebugPrivilege 4624 regsvcs.exe Token: SeIncreaseQuotaPrivilege 1728 powershell.exe Token: SeSecurityPrivilege 1728 powershell.exe Token: SeTakeOwnershipPrivilege 1728 powershell.exe Token: SeLoadDriverPrivilege 1728 powershell.exe Token: SeSystemProfilePrivilege 1728 powershell.exe Token: SeSystemtimePrivilege 1728 powershell.exe Token: SeProfSingleProcessPrivilege 1728 powershell.exe Token: SeIncBasePriorityPrivilege 1728 powershell.exe Token: SeCreatePagefilePrivilege 1728 powershell.exe Token: SeBackupPrivilege 1728 powershell.exe Token: SeRestorePrivilege 1728 powershell.exe Token: SeShutdownPrivilege 1728 powershell.exe Token: SeDebugPrivilege 1728 powershell.exe Token: SeSystemEnvironmentPrivilege 1728 powershell.exe Token: SeRemoteShutdownPrivilege 1728 powershell.exe Token: SeUndockPrivilege 1728 powershell.exe Token: SeManageVolumePrivilege 1728 powershell.exe Token: 33 1728 powershell.exe Token: 34 1728 powershell.exe Token: 35 1728 powershell.exe Token: 36 1728 powershell.exe Token: SeDebugPrivilege 3944 MYNEWRDX.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 204 wrote to memory of 508 204 454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe 74 PID 204 wrote to memory of 508 204 454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe 74 PID 204 wrote to memory of 508 204 454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe 74 PID 508 wrote to memory of 588 508 axplong.exe 75 PID 508 wrote to memory of 588 508 axplong.exe 75 PID 508 wrote to memory of 588 508 axplong.exe 75 PID 588 wrote to memory of 2068 588 GOLD.exe 77 PID 588 wrote to memory of 2068 588 GOLD.exe 77 PID 588 wrote to memory of 2068 588 GOLD.exe 77 PID 588 wrote to memory of 2144 588 GOLD.exe 78 PID 588 wrote to memory of 2144 588 GOLD.exe 78 PID 588 wrote to memory of 2144 588 GOLD.exe 78 PID 588 wrote to memory of 2144 588 GOLD.exe 78 PID 588 wrote to memory of 2144 588 GOLD.exe 78 PID 588 wrote to memory of 2144 588 GOLD.exe 78 PID 588 wrote to memory of 2144 588 GOLD.exe 78 PID 588 wrote to memory of 2144 588 GOLD.exe 78 PID 508 wrote to memory of 3008 508 axplong.exe 79 PID 508 wrote to memory of 3008 508 axplong.exe 79 PID 508 wrote to memory of 3008 508 axplong.exe 79 PID 508 wrote to memory of 4336 508 axplong.exe 81 PID 508 wrote to memory of 4336 508 axplong.exe 81 PID 508 wrote to memory of 4336 508 axplong.exe 81 PID 3008 wrote to memory of 3696 3008 crypteda.exe 82 PID 3008 wrote to memory of 3696 3008 crypteda.exe 82 PID 3008 wrote to memory of 3696 3008 crypteda.exe 82 PID 3008 wrote to memory of 3696 3008 crypteda.exe 82 PID 3008 wrote to memory of 3696 3008 crypteda.exe 82 PID 3008 wrote to memory of 3696 3008 crypteda.exe 82 PID 3008 wrote to memory of 3696 3008 crypteda.exe 82 PID 3008 wrote to memory of 3696 3008 crypteda.exe 82 PID 3008 wrote to memory of 3696 3008 crypteda.exe 82 PID 3008 wrote to memory of 3696 3008 crypteda.exe 82 PID 4336 wrote to memory of 1256 4336 newalp.exe 83 PID 4336 wrote to memory of 1256 4336 newalp.exe 83 PID 4336 wrote to memory of 1256 4336 newalp.exe 83 PID 3696 wrote to memory of 4764 3696 RegAsm.exe 84 PID 3696 wrote to memory of 4764 3696 RegAsm.exe 84 PID 3696 wrote to memory of 4764 3696 RegAsm.exe 84 PID 3696 wrote to memory of 2520 3696 RegAsm.exe 85 PID 3696 wrote to memory of 2520 3696 RegAsm.exe 85 PID 3696 wrote to memory of 2520 3696 RegAsm.exe 85 PID 508 wrote to memory of 3400 508 axplong.exe 88 PID 508 wrote to memory of 3400 508 axplong.exe 88 PID 508 wrote to memory of 3400 508 axplong.exe 88 PID 508 wrote to memory of 4452 508 axplong.exe 90 PID 508 wrote to memory of 4452 508 axplong.exe 90 PID 508 wrote to memory of 4452 508 axplong.exe 90 PID 508 wrote to memory of 4208 508 axplong.exe 91 PID 508 wrote to memory of 4208 508 axplong.exe 91 PID 508 wrote to memory of 3944 508 axplong.exe 93 PID 508 wrote to memory of 3944 508 axplong.exe 93 PID 508 wrote to memory of 3944 508 axplong.exe 93 PID 4208 wrote to memory of 1728 4208 FILE2233.exe 94 PID 4208 wrote to memory of 1728 4208 FILE2233.exe 94 PID 4208 wrote to memory of 4624 4208 FILE2233.exe 96 PID 4208 wrote to memory of 4624 4208 FILE2233.exe 96 PID 4208 wrote to memory of 4624 4208 FILE2233.exe 96 PID 4208 wrote to memory of 4624 4208 FILE2233.exe 96 PID 4208 wrote to memory of 4624 4208 FILE2233.exe 96 PID 4208 wrote to memory of 4624 4208 FILE2233.exe 96 PID 4208 wrote to memory of 4624 4208 FILE2233.exe 96 PID 4208 wrote to memory of 4624 4208 FILE2233.exe 96 PID 4624 wrote to memory of 1668 4624 regsvcs.exe 100 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" FILE2233.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe"C:\Users\Admin\AppData\Local\Temp\454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2068
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Roaming\TBWNoH8Ixj.exe"C:\Users\Admin\AppData\Roaming\TBWNoH8Ixj.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Users\Admin\AppData\Roaming\ANnPtpr69I.exe"C:\Users\Admin\AppData\Roaming\ANnPtpr69I.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1256
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\5555.exe"C:\Users\Admin\AppData\Local\Temp\5555.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe"C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4208 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe" -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\Pictures\HBp7JQplVAnzdzDK11rS07tc.exe"C:\Users\Admin\Pictures\HBp7JQplVAnzdzDK11rS07tc.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000090001\MYNEWRDX.exe"C:\Users\Admin\AppData\Local\Temp\1000090001\MYNEWRDX.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:4356
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:3068
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:356
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:200
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:4584
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3404
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5e7b4859f9ffe286b522475dd54d7850d
SHA19c6a2afd0ced97f51e8d60b800d9be5baf4204f5
SHA256e657e7f219ecec0818c88b4548ec8f9f7d0294b6b6941ca7a472bbf081b9f460
SHA512e1127a62488b358e0b8bf9b19166c0216810867f10b01f3228a3eb063ef7775159b1bcbf61b0de55d0d26130a310960047220d4c351dca1d1fa74546339f7e50
-
Filesize
954KB
MD5e71c0c5d72455dde6510ba23552d7d2f
SHA14dff851c07a9f9ebc9e71b7f675cc20b06a2439c
SHA256de1d7fe86a0b70a7a268d2960109833f4d126d5d9e3acb36697e8ff59c56017f
SHA512c6f4b1eb353a554ca49bab5e894a4d7c46e2674d32f2f0d5a9231400d14a9ea5604c079193cd0bed9fea409bb71b5779c0c03671e104cb0740fe8ade3e530ca6
-
Filesize
1.4MB
MD504e90b2cf273efb3f6895cfcef1e59ba
SHA179afcc39db33426ee8b97ad7bfb48f3f2e4c3449
SHA256e015f535c8a9fab72f2e06863c559108b1a25af90468cb9f80292c3ba2c33f6e
SHA51272aa08242507f6dd39822a34c68d6185927f6772a3fc03a0850d7c8542b21a43e176f29e5fbb3a4e54bc02fa68c807a01091158ef68c5a2f425cc432c95ea555
-
Filesize
416KB
MD56093bb59e7707afe20ca2d9b80327b49
SHA1fd599fa9d5ef5c980a445fc6c19efd1fcb80f2bc
SHA2563acc0b21db1f774d15a1f1d8080aff0b8f83eefb70c5c673f1c6ed7b676cd6d3
SHA512d28808686f73bcc13b8ad57c84585b9d55d1b6445807023897be45f229bcab89971fb320223772fa500a692ad0b6106eaa0b4cf35e807038a6050994106d18e1
-
Filesize
304KB
MD50d76d08b0f0a404604e7de4d28010abc
SHA1ef4270c06b84b0d43372c5827c807641a41f2374
SHA2566dcda2619b61b0cafbfdebb7fbb82c8c2c0b3f9855a4306782874625d6ff067e
SHA512979e0d3ec0dad1cc2acd5ec8b0a84a5161e46ee7a30f99d9a3ff3b7ce4eec7f5fa1f11fbe2a84267a7263e04434f4fc7fabc7858ef4c0b7667aeb6dcd3aa7165
-
Filesize
187KB
MD5e78239a5b0223499bed12a752b893cad
SHA1a429b46db791f433180ae4993ebb656d2f9393a4
SHA25680befdb25413d68adbadd8f236a2e8c71b261d8befc04c99749e778b07bcde89
SHA512cee5d5d4d32e5575852a412f6b3e17f8c0cbafe97fd92c7024934234a23c240dcc1f7a0452e2e5da949dec09dcfeb006e73862c5bbc549a2ab1cfb0241eaddfc
-
Filesize
3.2MB
MD503fe60596aa8f9b633ac360fd9ec42d8
SHA11e7bc8d80c7a2a315639b09d332a549dc7ddcb4b
SHA256e731f79ee3512fefe48e53b4424145efc6a1b2585220b9c6025038d5f1263055
SHA512d6f080881874112c2876ed691a6c725ce0cc87196934fd8fa9ff488619c84e6e4a9c244c0840999b6a6cce95b4b7375648cf3011d79927e90a0c786895c0cfdf
-
Filesize
304KB
MD50f02da56dab4bc19fca05d6d93e74dcf
SHA1a809c7e9c3136b8030727f128004aa2c31edc7a9
SHA256e1d0fe3bada7fdec17d7279e6294731e2684399905f05e5a3449ba14542b1379
SHA512522ec9042680a94a73cefa56e7902bacb166e23484f041c9e06dce033d3d16d13f7508f4d1e160c81198f61aa8c9a5aecfa62068150705ecf4803733f7e01ded
-
Filesize
1.8MB
MD5876a6feeffb71e95f7217eaa05c585eb
SHA12e5a5e4709482cdbf42bc8173bef6ec25feac600
SHA256454f65d0741e515c03e0196b9b8fdfb11fb12c1c39717bd277d856d94dcf7db3
SHA512bbaeef6123efe1361ccac311790c2eec3958f145b1818bc280b9f0fda27f9fa87b5ee74db1e9d6bc0e7aaf75d852729fe8f1afcad70fe527764daaab432d6ab8
-
Filesize
547KB
MD58ecad7a38a26ac1fc2c7804afd0599fa
SHA1587475e77012d412fd96213f048b2fb2d5d405e9
SHA25683f6f8c068cd5b4448b2525ee799f58aa5ad0ce40f901881eda105f6d6ed4661
SHA512a5a2499fb2c5a7751f09c50032c2fcba1c2c87ad4c35910decf00d24d4d90e233fa383319d7ddd3537f3891a0db49240a9c2c81451192308280687015c8898d5
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
503KB
MD52c2be38fb507206d36dddb3d03096518
SHA1a16edb81610a080096376d998e5ddc3e4b54bbd6
SHA2560c7173daaa5ad8dabe7a2cde6dbd0eee1ca790071443aa13b01a1e731053491e
SHA512e436954d7d5b77feb32f200cc48cb01f94b449887443a1e75ebef2f6fa2139d989d65f5ea7a71f8562c3aae2fea4117efc87e8aae905e1ba466fbc8bb328b316
-
Filesize
510KB
MD574e358f24a40f37c8ffd7fa40d98683a
SHA17a330075e6ea3d871eaeefcecdeb1d2feb2fc202
SHA2560928c96b35cd4cc5887fb205731aa91eb68886b816bcc5ec151aeee81ce4f9a6
SHA5121525e07712c35111b56664e1589b1db37965995cc8e6d9b6f931fa38b0aa8e8347fc08b870d03573d10f0d597a2cd9db2598845c82b6c085f0df04f2a3b46eaf
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
Filesize
2.9MB
MD5bc3e076ec6527a8bf74e9293be24630e
SHA12a58c06f16d1ba29e7f6945fd08896caa55df709
SHA25637b97e07cc1d88c49e382de22ce61ad6d684901114d475b96e2bc9645797903b
SHA5120dbf419d0652d143a36d4185d9b7ec2f35224b2467395826f55d53f538ef5539326bca03afa43676961c316de70b830f176a0056105d64f1205bf03fa84c4cf1
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571