Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe
Resource
win10v2004-20240802-en
General
-
Target
75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe
-
Size
1.8MB
-
MD5
02939e494407b4f1b7d569c8e2e4f670
-
SHA1
4e23852b7de7c0216cf82578febb708a64d0985a
-
SHA256
75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65
-
SHA512
c45aa10b5bf5df8cd75557adf18c378e762da9d8f183cfcad4899a31023f7fe9f7992f480499958d23e73192fb8a6279a56420c671cf63f025de9427a9e76216
-
SSDEEP
49152:gg8e7qvElALaCreZ27DH2XeZ8h+4t+iIUgI:gg2kALaPEH2OZ++4XZ
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
BUY TG @FATHEROFCARDERS
45.66.231.214:9932
Signatures
-
Detects Monster Stealer. 2 IoCs
resource yara_rule behavioral1/files/0x00050000000194e9-89.dat family_monster behavioral1/memory/1304-94-0x000000013FC30000-0x0000000140C56000-memory.dmp family_monster -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0006000000018716-27.dat family_redline behavioral1/memory/336-37-0x0000000000FE0000-0x0000000001032000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rorukal.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions rorukal.exe -
Downloads MZ/PE file
-
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools rorukal.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe -
Executes dropped EXE 6 IoCs
pid Process 2864 axplong.exe 336 MYNEWRDX.exe 2076 zzzz1.exe 1304 stub.exe 2328 rorukal.exe 1164 Process not Found -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Wine 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe Key opened \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Wine axplong.exe -
Loads dropped DLL 13 IoCs
pid Process 2532 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe 2864 axplong.exe 2864 axplong.exe 2076 zzzz1.exe 1304 stub.exe 2864 axplong.exe 2924 Process not Found 2924 Process not Found 2924 Process not Found 2924 Process not Found 2924 Process not Found 2924 Process not Found 2924 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2532 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe 2864 axplong.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MYNEWRDX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 axplong.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2532 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe 2864 axplong.exe 336 MYNEWRDX.exe 336 MYNEWRDX.exe 336 MYNEWRDX.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 336 MYNEWRDX.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2864 2532 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe 30 PID 2532 wrote to memory of 2864 2532 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe 30 PID 2532 wrote to memory of 2864 2532 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe 30 PID 2532 wrote to memory of 2864 2532 75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe 30 PID 2864 wrote to memory of 336 2864 axplong.exe 32 PID 2864 wrote to memory of 336 2864 axplong.exe 32 PID 2864 wrote to memory of 336 2864 axplong.exe 32 PID 2864 wrote to memory of 336 2864 axplong.exe 32 PID 2864 wrote to memory of 2076 2864 axplong.exe 35 PID 2864 wrote to memory of 2076 2864 axplong.exe 35 PID 2864 wrote to memory of 2076 2864 axplong.exe 35 PID 2864 wrote to memory of 2076 2864 axplong.exe 35 PID 2076 wrote to memory of 1304 2076 zzzz1.exe 36 PID 2076 wrote to memory of 1304 2076 zzzz1.exe 36 PID 2076 wrote to memory of 1304 2076 zzzz1.exe 36 PID 2864 wrote to memory of 2328 2864 axplong.exe 37 PID 2864 wrote to memory of 2328 2864 axplong.exe 37 PID 2864 wrote to memory of 2328 2864 axplong.exe 37 PID 2864 wrote to memory of 2328 2864 axplong.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe"C:\Users\Admin\AppData\Local\Temp\75880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\1000112001\MYNEWRDX.exe"C:\Users\Admin\AppData\Local\Temp\1000112001\MYNEWRDX.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Users\Admin\AppData\Local\Temp\1000118001\zzzz1.exe"C:\Users\Admin\AppData\Local\Temp\1000118001\zzzz1.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\onefile_2076_133678988090636000\stub.exeC:\Users\Admin\AppData\Local\Temp\1000118001\zzzz1.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1304
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000120101\rorukal.exe"C:\Users\Admin\AppData\Local\Temp\1000120101\rorukal.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Executes dropped EXE
PID:2328
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD50f02da56dab4bc19fca05d6d93e74dcf
SHA1a809c7e9c3136b8030727f128004aa2c31edc7a9
SHA256e1d0fe3bada7fdec17d7279e6294731e2684399905f05e5a3449ba14542b1379
SHA512522ec9042680a94a73cefa56e7902bacb166e23484f041c9e06dce033d3d16d13f7508f4d1e160c81198f61aa8c9a5aecfa62068150705ecf4803733f7e01ded
-
Filesize
10.5MB
MD5a5c740eb48fafb9b25d06c22b6f4a7e9
SHA170a24d83379e205bbbcda72da177fa0baae2be7f
SHA25693429472073d0794c411a71f2f161aa8d7b8c51606ab497175cc5863fea7fba8
SHA512524b83c112064bafbec17b43ef03f5f41888c584fc0baf2da59e58befa40b4cb7920f6e4a6f598289749919fbf7394a74352c0b301d1d1594e133aaf96cd3808
-
Filesize
3.3MB
MD577ecafee1b0ba32bd4e3b90b6d92a81f
SHA159d3e7bd118a34918e3a39d5a680ff75568482bb
SHA25614d8c36fbab22c95764169e90e4985f90a171b201bb206bd6ea8883b492083e3
SHA512aa8aaf0c455c80d0dfd17ce67eff54f75f9cdbb92287693bf395cf33cec19ab8063a0e5766c96aa5fc75825db6e9a57d90ccf3698796f4e6875075225a9e1baf
-
Filesize
1.8MB
MD502939e494407b4f1b7d569c8e2e4f670
SHA14e23852b7de7c0216cf82578febb708a64d0985a
SHA25675880562b0e3a5354afeab50d1bdea6c6d822b140abd2abc944ca6badaab8e65
SHA512c45aa10b5bf5df8cd75557adf18c378e762da9d8f183cfcad4899a31023f7fe9f7992f480499958d23e73192fb8a6279a56420c671cf63f025de9427a9e76216
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
15.9MB
MD5fd8750fd175eb370b023e8c537e9c3fe
SHA17e97e886cc82b71781562944eb6b3f792d809739
SHA256f45051c87cc2e70f1da0ba5ad074f2ff3e29eb02afd4b3a65a7b15506966fc9b
SHA51273312816a2778aeb4876ccf61559196d8ba44f87d6149f0c1da7b34b1af983f055eb541b82d36d533a2d5f42a8f4bf61d9b0adaf10bb49bf08549293c77de57f