Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/08/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe
Resource
win11-20240802-en
General
-
Target
44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe
-
Size
1.8MB
-
MD5
f6149f8ec64e0ee62354ff971634c522
-
SHA1
f72d9a920a26330974cee53482b286ea74245e88
-
SHA256
44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20
-
SHA512
576d5f6ae54e36b321c5beef29c774fb1a0e546b58f0d59974171652511235eaa2c18650511d46b8798efa68bd858e9760f8d3a75404f0f0baaaad6a584d1e4d
-
SSDEEP
49152:MBNSGlHKgzXEDbVVTnnmTKVr2djwIhy6ytDJ:MrS87AV7nmT+iUqyZt
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
20.52.165.210:39030
Extracted
redline
185.215.113.67:21405
Extracted
stealc
default
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
redline
BUY TG @FATHEROFCARDERS
45.66.231.214:9932
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral2/memory/2880-37-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral2/memory/2592-38-0x0000000000870000-0x0000000000963000-memory.dmp family_redline behavioral2/files/0x000100000002aaf9-126.dat family_redline behavioral2/memory/3552-140-0x0000000000100000-0x0000000000152000-memory.dmp family_redline behavioral2/files/0x000100000002ab10-233.dat family_redline behavioral2/memory/4572-247-0x0000000000B50000-0x0000000000BA2000-memory.dmp family_redline -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" FILE2233.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths FILE2233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe = "0" FILE2233.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1208 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4PzWVOx8obt0m2eKsHgZ4Foo.bat regsvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MjkT4i3FD2EKQhhPlHrRgxcm.bat regsvcs.exe -
Executes dropped EXE 17 IoCs
pid Process 4484 axplong.exe 2592 GOLD.exe 4796 crypteda.exe 2300 axplong.exe 4528 newalp.exe 2736 Hkbsse.exe 1424 bbJc7JXDzZ.exe 420 M4RxgbFJQU.exe 3552 06082025.exe 5012 stealc_default.exe 2972 FILE2233.exe 4572 MYNEWRDX.exe 4968 EeKUFo5Ui8wMSL3DRWDmHVaY.exe 2568 Hkbsse.exe 3780 axplong.exe 4728 axplong.exe 3480 Hkbsse.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000\Software\Wine axplong.exe -
Loads dropped DLL 2 IoCs
pid Process 5012 stealc_default.exe 5012 stealc_default.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths FILE2233.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions FILE2233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe = "0" FILE2233.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FILE2233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" FILE2233.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 30 raw.githubusercontent.com 32 iplogger.com 15 raw.githubusercontent.com 18 pastebin.com 18 iplogger.com 21 raw.githubusercontent.com 24 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2756 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe 4484 axplong.exe 2300 axplong.exe 3780 axplong.exe 4728 axplong.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2592 set thread context of 2880 2592 GOLD.exe 82 PID 4796 set thread context of 1924 4796 crypteda.exe 88 PID 2972 set thread context of 2244 2972 FILE2233.exe 101 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe File created C:\Windows\Tasks\Hkbsse.job newalp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language newalp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M4RxgbFJQU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EeKUFo5Ui8wMSL3DRWDmHVaY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbJc7JXDzZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MYNEWRDX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06082025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypteda.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EeKUFo5Ui8wMSL3DRWDmHVaY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EeKUFo5Ui8wMSL3DRWDmHVaY.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2756 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe 2756 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe 4484 axplong.exe 4484 axplong.exe 2300 axplong.exe 2300 axplong.exe 5012 stealc_default.exe 5012 stealc_default.exe 1424 bbJc7JXDzZ.exe 420 M4RxgbFJQU.exe 2880 RegAsm.exe 2880 RegAsm.exe 2880 RegAsm.exe 2880 RegAsm.exe 2880 RegAsm.exe 1208 powershell.exe 1208 powershell.exe 5012 stealc_default.exe 5012 stealc_default.exe 4572 MYNEWRDX.exe 4572 MYNEWRDX.exe 4572 MYNEWRDX.exe 4572 MYNEWRDX.exe 4572 MYNEWRDX.exe 3552 06082025.exe 3552 06082025.exe 3552 06082025.exe 3552 06082025.exe 3552 06082025.exe 3780 axplong.exe 3780 axplong.exe 4728 axplong.exe 4728 axplong.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 1424 bbJc7JXDzZ.exe Token: SeDebugPrivilege 420 M4RxgbFJQU.exe Token: SeBackupPrivilege 1424 bbJc7JXDzZ.exe Token: SeBackupPrivilege 420 M4RxgbFJQU.exe Token: SeSecurityPrivilege 1424 bbJc7JXDzZ.exe Token: SeSecurityPrivilege 420 M4RxgbFJQU.exe Token: SeSecurityPrivilege 420 M4RxgbFJQU.exe Token: SeSecurityPrivilege 1424 bbJc7JXDzZ.exe Token: SeSecurityPrivilege 420 M4RxgbFJQU.exe Token: SeSecurityPrivilege 1424 bbJc7JXDzZ.exe Token: SeSecurityPrivilege 420 M4RxgbFJQU.exe Token: SeSecurityPrivilege 1424 bbJc7JXDzZ.exe Token: SeDebugPrivilege 2880 RegAsm.exe Token: SeDebugPrivilege 2244 regsvcs.exe Token: SeDebugPrivilege 1208 powershell.exe Token: SeDebugPrivilege 4572 MYNEWRDX.exe Token: SeDebugPrivilege 3552 06082025.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2756 wrote to memory of 4484 2756 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe 78 PID 2756 wrote to memory of 4484 2756 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe 78 PID 2756 wrote to memory of 4484 2756 44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe 78 PID 4484 wrote to memory of 2592 4484 axplong.exe 79 PID 4484 wrote to memory of 2592 4484 axplong.exe 79 PID 4484 wrote to memory of 2592 4484 axplong.exe 79 PID 2592 wrote to memory of 4788 2592 GOLD.exe 81 PID 2592 wrote to memory of 4788 2592 GOLD.exe 81 PID 2592 wrote to memory of 4788 2592 GOLD.exe 81 PID 2592 wrote to memory of 2880 2592 GOLD.exe 82 PID 2592 wrote to memory of 2880 2592 GOLD.exe 82 PID 2592 wrote to memory of 2880 2592 GOLD.exe 82 PID 2592 wrote to memory of 2880 2592 GOLD.exe 82 PID 2592 wrote to memory of 2880 2592 GOLD.exe 82 PID 2592 wrote to memory of 2880 2592 GOLD.exe 82 PID 2592 wrote to memory of 2880 2592 GOLD.exe 82 PID 2592 wrote to memory of 2880 2592 GOLD.exe 82 PID 4484 wrote to memory of 4796 4484 axplong.exe 83 PID 4484 wrote to memory of 4796 4484 axplong.exe 83 PID 4484 wrote to memory of 4796 4484 axplong.exe 83 PID 4484 wrote to memory of 4528 4484 axplong.exe 86 PID 4484 wrote to memory of 4528 4484 axplong.exe 86 PID 4484 wrote to memory of 4528 4484 axplong.exe 86 PID 4528 wrote to memory of 2736 4528 newalp.exe 87 PID 4528 wrote to memory of 2736 4528 newalp.exe 87 PID 4528 wrote to memory of 2736 4528 newalp.exe 87 PID 4796 wrote to memory of 1924 4796 crypteda.exe 88 PID 4796 wrote to memory of 1924 4796 crypteda.exe 88 PID 4796 wrote to memory of 1924 4796 crypteda.exe 88 PID 4796 wrote to memory of 1924 4796 crypteda.exe 88 PID 4796 wrote to memory of 1924 4796 crypteda.exe 88 PID 4796 wrote to memory of 1924 4796 crypteda.exe 88 PID 4796 wrote to memory of 1924 4796 crypteda.exe 88 PID 4796 wrote to memory of 1924 4796 crypteda.exe 88 PID 4796 wrote to memory of 1924 4796 crypteda.exe 88 PID 4796 wrote to memory of 1924 4796 crypteda.exe 88 PID 1924 wrote to memory of 1424 1924 RegAsm.exe 89 PID 1924 wrote to memory of 1424 1924 RegAsm.exe 89 PID 1924 wrote to memory of 1424 1924 RegAsm.exe 89 PID 1924 wrote to memory of 420 1924 RegAsm.exe 91 PID 1924 wrote to memory of 420 1924 RegAsm.exe 91 PID 1924 wrote to memory of 420 1924 RegAsm.exe 91 PID 4484 wrote to memory of 3552 4484 axplong.exe 93 PID 4484 wrote to memory of 3552 4484 axplong.exe 93 PID 4484 wrote to memory of 3552 4484 axplong.exe 93 PID 4484 wrote to memory of 5012 4484 axplong.exe 94 PID 4484 wrote to memory of 5012 4484 axplong.exe 94 PID 4484 wrote to memory of 5012 4484 axplong.exe 94 PID 4484 wrote to memory of 2972 4484 axplong.exe 96 PID 4484 wrote to memory of 2972 4484 axplong.exe 96 PID 4484 wrote to memory of 4572 4484 axplong.exe 98 PID 4484 wrote to memory of 4572 4484 axplong.exe 98 PID 4484 wrote to memory of 4572 4484 axplong.exe 98 PID 2972 wrote to memory of 1208 2972 FILE2233.exe 99 PID 2972 wrote to memory of 1208 2972 FILE2233.exe 99 PID 2972 wrote to memory of 2244 2972 FILE2233.exe 101 PID 2972 wrote to memory of 2244 2972 FILE2233.exe 101 PID 2972 wrote to memory of 2244 2972 FILE2233.exe 101 PID 2972 wrote to memory of 2244 2972 FILE2233.exe 101 PID 2972 wrote to memory of 2244 2972 FILE2233.exe 101 PID 2972 wrote to memory of 2244 2972 FILE2233.exe 101 PID 2972 wrote to memory of 2244 2972 FILE2233.exe 101 PID 2972 wrote to memory of 2244 2972 FILE2233.exe 101 PID 2972 wrote to memory of 3136 2972 FILE2233.exe 102 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" FILE2233.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe"C:\Users\Admin\AppData\Local\Temp\44aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4788
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\bbJc7JXDzZ.exe"C:\Users\Admin\AppData\Roaming\bbJc7JXDzZ.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Users\Admin\AppData\Roaming\M4RxgbFJQU.exe"C:\Users\Admin\AppData\Roaming\M4RxgbFJQU.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\newalp.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"C:\Users\Admin\AppData\Local\Temp\1000050001\06082025.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe"C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe"3⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2972 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000069001\FILE2233.exe" -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2244 -
C:\Users\Admin\Pictures\EeKUFo5Ui8wMSL3DRWDmHVaY.exe"C:\Users\Admin\Pictures\EeKUFo5Ui8wMSL3DRWDmHVaY.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4968
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"4⤵PID:3136
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000090001\MYNEWRDX.exe"C:\Users\Admin\AppData\Local\Temp\1000090001\MYNEWRDX.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:2568
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3780
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
C:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\0ae19c9b3d\Hkbsse.exe1⤵
- Executes dropped EXE
PID:3480
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
954KB
MD5e71c0c5d72455dde6510ba23552d7d2f
SHA14dff851c07a9f9ebc9e71b7f675cc20b06a2439c
SHA256de1d7fe86a0b70a7a268d2960109833f4d126d5d9e3acb36697e8ff59c56017f
SHA512c6f4b1eb353a554ca49bab5e894a4d7c46e2674d32f2f0d5a9231400d14a9ea5604c079193cd0bed9fea409bb71b5779c0c03671e104cb0740fe8ade3e530ca6
-
Filesize
1.4MB
MD504e90b2cf273efb3f6895cfcef1e59ba
SHA179afcc39db33426ee8b97ad7bfb48f3f2e4c3449
SHA256e015f535c8a9fab72f2e06863c559108b1a25af90468cb9f80292c3ba2c33f6e
SHA51272aa08242507f6dd39822a34c68d6185927f6772a3fc03a0850d7c8542b21a43e176f29e5fbb3a4e54bc02fa68c807a01091158ef68c5a2f425cc432c95ea555
-
Filesize
416KB
MD56093bb59e7707afe20ca2d9b80327b49
SHA1fd599fa9d5ef5c980a445fc6c19efd1fcb80f2bc
SHA2563acc0b21db1f774d15a1f1d8080aff0b8f83eefb70c5c673f1c6ed7b676cd6d3
SHA512d28808686f73bcc13b8ad57c84585b9d55d1b6445807023897be45f229bcab89971fb320223772fa500a692ad0b6106eaa0b4cf35e807038a6050994106d18e1
-
Filesize
304KB
MD50d76d08b0f0a404604e7de4d28010abc
SHA1ef4270c06b84b0d43372c5827c807641a41f2374
SHA2566dcda2619b61b0cafbfdebb7fbb82c8c2c0b3f9855a4306782874625d6ff067e
SHA512979e0d3ec0dad1cc2acd5ec8b0a84a5161e46ee7a30f99d9a3ff3b7ce4eec7f5fa1f11fbe2a84267a7263e04434f4fc7fabc7858ef4c0b7667aeb6dcd3aa7165
-
Filesize
187KB
MD5e78239a5b0223499bed12a752b893cad
SHA1a429b46db791f433180ae4993ebb656d2f9393a4
SHA25680befdb25413d68adbadd8f236a2e8c71b261d8befc04c99749e778b07bcde89
SHA512cee5d5d4d32e5575852a412f6b3e17f8c0cbafe97fd92c7024934234a23c240dcc1f7a0452e2e5da949dec09dcfeb006e73862c5bbc549a2ab1cfb0241eaddfc
-
Filesize
3.2MB
MD503fe60596aa8f9b633ac360fd9ec42d8
SHA11e7bc8d80c7a2a315639b09d332a549dc7ddcb4b
SHA256e731f79ee3512fefe48e53b4424145efc6a1b2585220b9c6025038d5f1263055
SHA512d6f080881874112c2876ed691a6c725ce0cc87196934fd8fa9ff488619c84e6e4a9c244c0840999b6a6cce95b4b7375648cf3011d79927e90a0c786895c0cfdf
-
Filesize
304KB
MD50f02da56dab4bc19fca05d6d93e74dcf
SHA1a809c7e9c3136b8030727f128004aa2c31edc7a9
SHA256e1d0fe3bada7fdec17d7279e6294731e2684399905f05e5a3449ba14542b1379
SHA512522ec9042680a94a73cefa56e7902bacb166e23484f041c9e06dce033d3d16d13f7508f4d1e160c81198f61aa8c9a5aecfa62068150705ecf4803733f7e01ded
-
Filesize
1.8MB
MD5f6149f8ec64e0ee62354ff971634c522
SHA1f72d9a920a26330974cee53482b286ea74245e88
SHA25644aed17b439a1cfc27b01ceac161f72509c3a3d5896a287e73d7fbf3a4214a20
SHA512576d5f6ae54e36b321c5beef29c774fb1a0e546b58f0d59974171652511235eaa2c18650511d46b8798efa68bd858e9760f8d3a75404f0f0baaaad6a584d1e4d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
503KB
MD52c2be38fb507206d36dddb3d03096518
SHA1a16edb81610a080096376d998e5ddc3e4b54bbd6
SHA2560c7173daaa5ad8dabe7a2cde6dbd0eee1ca790071443aa13b01a1e731053491e
SHA512e436954d7d5b77feb32f200cc48cb01f94b449887443a1e75ebef2f6fa2139d989d65f5ea7a71f8562c3aae2fea4117efc87e8aae905e1ba466fbc8bb328b316
-
Filesize
510KB
MD574e358f24a40f37c8ffd7fa40d98683a
SHA17a330075e6ea3d871eaeefcecdeb1d2feb2fc202
SHA2560928c96b35cd4cc5887fb205731aa91eb68886b816bcc5ec151aeee81ce4f9a6
SHA5121525e07712c35111b56664e1589b1db37965995cc8e6d9b6f931fa38b0aa8e8347fc08b870d03573d10f0d597a2cd9db2598845c82b6c085f0df04f2a3b46eaf
-
Filesize
7KB
MD577f762f953163d7639dff697104e1470
SHA1ade9fff9ffc2d587d50c636c28e4cd8dd99548d3
SHA256d9e15bb8027ff52d6d8d4e294c0d690f4bbf9ef3abc6001f69dcf08896fbd4ea
SHA512d9041d02aaca5f06a0f82111486df1d58df3be7f42778c127ccc53b2e1804c57b42b263cc607d70e5240518280c7078e066c07dec2ea32ec13fb86aa0d4cb499
-
Filesize
2.9MB
MD5ed44f8677bf65b35ddd09cb63652dcc3
SHA1218bab3e80375398ea00b94f1d78faacdbe35b4a
SHA25631ded96a7e06729efbd409f297616062fe2aedd32791a78fe48a56224aaebb8a
SHA512702f698a09ca42a3595cf4f2ecdf720b7372dd020857b3a3d3c7ee16deb4699442a9f31f41878c911d6021bf4f23b8583dc2c9c803aca34c7969649fbe1d63f6