Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 20:54
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
5b0cafbcaf3c7af70e29404253e0c221
-
SHA1
740e7eaa4049b487dcb1fc54e94b8ba7cc11d4d7
-
SHA256
7a75386c6d897e8e96705836ffcf67f2f084f91cb1481826b31953da4e520966
-
SHA512
2e57490d70c8e031edc2e9dcbf83b25f77b968cb9b8733ce7f507874086f147bfb76c6542647d3fddbb69f497f13c4e188308e467860765606edf3dae2514ffe
-
SSDEEP
49152:/8sYa3tB9sVbp/GxXjpWaokMgbNwQeBi4:/HYktB+VbkzaUNwQeBi4
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
LiveTraffic
20.52.165.210:39030
Extracted
stealc
default
http://185.215.113.17
-
url_path
/2fb6c2cc8dce150a.php
Extracted
redline
BUY TG @FATHEROFCARDERS
45.66.231.214:9932
Extracted
redline
14082024
185.215.113.67:21405
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral2/memory/1524-42-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral2/files/0x0007000000023524-168.dat family_redline behavioral2/memory/4204-182-0x0000000000120000-0x0000000000172000-memory.dmp family_redline behavioral2/files/0x0007000000023550-317.dat family_redline behavioral2/memory/2164-331-0x0000000000320000-0x0000000000372000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation Hkbsse.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation axplong.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation anon.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Executes dropped EXE 15 IoCs
pid Process 2908 axplong.exe 4848 GOLD.exe 4944 crypteda.exe 1476 anon.exe 4048 Hkbsse.exe 3964 KYn76z38aZ.exe 3496 sZXFtKX85F.exe 4244 stealc_default.exe 4204 MYNEWRDX.exe 3268 3546345.exe 3084 axplong.exe 2292 Hkbsse.exe 4944 Hkbsse.exe 3268 axplong.exe 2164 14082024.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Wine axplong.exe -
Loads dropped DLL 2 IoCs
pid Process 4244 stealc_default.exe 4244 stealc_default.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4180 file.exe 2908 axplong.exe 3084 axplong.exe 3268 axplong.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4848 set thread context of 1524 4848 GOLD.exe 92 PID 4944 set thread context of 5092 4944 crypteda.exe 102 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\Hkbsse.job anon.exe File created C:\Windows\Tasks\axplong.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MYNEWRDX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOLD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypteda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language anon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3546345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hkbsse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KYn76z38aZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_default.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14082024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sZXFtKX85F.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_default.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3546345.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3546345.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_default.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4180 file.exe 4180 file.exe 2908 axplong.exe 2908 axplong.exe 4244 stealc_default.exe 4244 stealc_default.exe 3964 KYn76z38aZ.exe 3964 KYn76z38aZ.exe 3496 sZXFtKX85F.exe 3496 sZXFtKX85F.exe 4244 stealc_default.exe 4244 stealc_default.exe 4204 MYNEWRDX.exe 4204 MYNEWRDX.exe 4204 MYNEWRDX.exe 4204 MYNEWRDX.exe 3084 axplong.exe 3084 axplong.exe 3268 axplong.exe 3268 axplong.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3964 KYn76z38aZ.exe Token: SeBackupPrivilege 3964 KYn76z38aZ.exe Token: SeSecurityPrivilege 3964 KYn76z38aZ.exe Token: SeSecurityPrivilege 3964 KYn76z38aZ.exe Token: SeSecurityPrivilege 3964 KYn76z38aZ.exe Token: SeSecurityPrivilege 3964 KYn76z38aZ.exe Token: SeDebugPrivilege 3496 sZXFtKX85F.exe Token: SeBackupPrivilege 3496 sZXFtKX85F.exe Token: SeSecurityPrivilege 3496 sZXFtKX85F.exe Token: SeSecurityPrivilege 3496 sZXFtKX85F.exe Token: SeSecurityPrivilege 3496 sZXFtKX85F.exe Token: SeSecurityPrivilege 3496 sZXFtKX85F.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4180 file.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 4180 wrote to memory of 2908 4180 file.exe 89 PID 4180 wrote to memory of 2908 4180 file.exe 89 PID 4180 wrote to memory of 2908 4180 file.exe 89 PID 2908 wrote to memory of 4848 2908 axplong.exe 91 PID 2908 wrote to memory of 4848 2908 axplong.exe 91 PID 2908 wrote to memory of 4848 2908 axplong.exe 91 PID 4848 wrote to memory of 1524 4848 GOLD.exe 92 PID 4848 wrote to memory of 1524 4848 GOLD.exe 92 PID 4848 wrote to memory of 1524 4848 GOLD.exe 92 PID 4848 wrote to memory of 1524 4848 GOLD.exe 92 PID 4848 wrote to memory of 1524 4848 GOLD.exe 92 PID 4848 wrote to memory of 1524 4848 GOLD.exe 92 PID 4848 wrote to memory of 1524 4848 GOLD.exe 92 PID 4848 wrote to memory of 1524 4848 GOLD.exe 92 PID 2908 wrote to memory of 4944 2908 axplong.exe 97 PID 2908 wrote to memory of 4944 2908 axplong.exe 97 PID 2908 wrote to memory of 4944 2908 axplong.exe 97 PID 2908 wrote to memory of 1476 2908 axplong.exe 100 PID 2908 wrote to memory of 1476 2908 axplong.exe 100 PID 2908 wrote to memory of 1476 2908 axplong.exe 100 PID 1476 wrote to memory of 4048 1476 anon.exe 101 PID 1476 wrote to memory of 4048 1476 anon.exe 101 PID 1476 wrote to memory of 4048 1476 anon.exe 101 PID 4944 wrote to memory of 5092 4944 crypteda.exe 102 PID 4944 wrote to memory of 5092 4944 crypteda.exe 102 PID 4944 wrote to memory of 5092 4944 crypteda.exe 102 PID 4944 wrote to memory of 5092 4944 crypteda.exe 102 PID 4944 wrote to memory of 5092 4944 crypteda.exe 102 PID 4944 wrote to memory of 5092 4944 crypteda.exe 102 PID 4944 wrote to memory of 5092 4944 crypteda.exe 102 PID 4944 wrote to memory of 5092 4944 crypteda.exe 102 PID 4944 wrote to memory of 5092 4944 crypteda.exe 102 PID 4944 wrote to memory of 5092 4944 crypteda.exe 102 PID 5092 wrote to memory of 3964 5092 RegAsm.exe 103 PID 5092 wrote to memory of 3964 5092 RegAsm.exe 103 PID 5092 wrote to memory of 3964 5092 RegAsm.exe 103 PID 5092 wrote to memory of 3496 5092 RegAsm.exe 105 PID 5092 wrote to memory of 3496 5092 RegAsm.exe 105 PID 5092 wrote to memory of 3496 5092 RegAsm.exe 105 PID 2908 wrote to memory of 4244 2908 axplong.exe 107 PID 2908 wrote to memory of 4244 2908 axplong.exe 107 PID 2908 wrote to memory of 4244 2908 axplong.exe 107 PID 2908 wrote to memory of 4204 2908 axplong.exe 110 PID 2908 wrote to memory of 4204 2908 axplong.exe 110 PID 2908 wrote to memory of 4204 2908 axplong.exe 110 PID 4048 wrote to memory of 3268 4048 Hkbsse.exe 111 PID 4048 wrote to memory of 3268 4048 Hkbsse.exe 111 PID 4048 wrote to memory of 3268 4048 Hkbsse.exe 111 PID 2908 wrote to memory of 2164 2908 axplong.exe 124 PID 2908 wrote to memory of 2164 2908 axplong.exe 124 PID 2908 wrote to memory of 2164 2908 axplong.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\GOLD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1524
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\crypteda.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Roaming\KYn76z38aZ.exe"C:\Users\Admin\AppData\Roaming\KYn76z38aZ.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Users\Admin\AppData\Roaming\sZXFtKX85F.exe"C:\Users\Admin\AppData\Roaming\sZXFtKX85F.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000005001\anon.exe"C:\Users\Admin\AppData\Local\Temp\1000005001\anon.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\12584a06d7\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\12584a06d7\Hkbsse.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\1000002001\3546345.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\3546345.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"C:\Users\Admin\AppData\Local\Temp\1000066001\stealc_default.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
C:\Users\Admin\AppData\Local\Temp\1000112001\MYNEWRDX.exe"C:\Users\Admin\AppData\Local\Temp\1000112001\MYNEWRDX.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Users\Admin\AppData\Local\Temp\1000135001\14082024.exe"C:\Users\Admin\AppData\Local\Temp\1000135001\14082024.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
C:\Users\Admin\AppData\Local\Temp\12584a06d7\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\12584a06d7\Hkbsse.exe1⤵
- Executes dropped EXE
PID:2292
-
C:\Users\Admin\AppData\Local\Temp\12584a06d7\Hkbsse.exeC:\Users\Admin\AppData\Local\Temp\12584a06d7\Hkbsse.exe1⤵
- Executes dropped EXE
PID:4944
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3268
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD551879d2a5137615283001af4fb2c1642
SHA1473ef7d25eec1c6cfe2d0d05b54eab24036dae22
SHA256e8f4873f42909fba6b606cfa177d8de1b9ba6c1cc5fd47cfcc44ef38d2f4661b
SHA512ac474fcbb29a3db6cbf256fc38ffbbd5133ee84284fa82c27fa02993c931d50203d68207575fc94db907cb92cbc91e856e69c46ce2236a9577cbb8b4b98fa420
-
Filesize
2.7MB
MD5fd2defc436fc7960d6501a01c91d893e
SHA15faa092857c3c892eab49e7c0e5ac12d50bce506
SHA256ba13da01c41fa50ec5e340061973bc912b1f41cd1f96a7cae5d40afc00ff7945
SHA5129a3e1f2dc5104d8636dc27af4c0f46bdb153fcfada98831b5af95eeb09bb7ef3c7e19927d8f06884a6837e10889380645b6138644f0c08b9cb2e59453041ec42
-
Filesize
446KB
MD531fe55580f745a4387bee8cd699fc642
SHA18969869e4cbc37e16ddc4d88ea84bc16ce507b0f
SHA2565f2d697ebd6a4456c8550ea822432242c026ad515959949ca1b91de2324e7e9d
SHA51205138278c502815e96ef3395ce3b9d4d4c537300dc9ed32a6befd8a5bee4d76bf48e2f9bf14f79f35adebcf660c184bcd3a240c32e0667f9b1d9469475babef2
-
Filesize
1.4MB
MD504e90b2cf273efb3f6895cfcef1e59ba
SHA179afcc39db33426ee8b97ad7bfb48f3f2e4c3449
SHA256e015f535c8a9fab72f2e06863c559108b1a25af90468cb9f80292c3ba2c33f6e
SHA51272aa08242507f6dd39822a34c68d6185927f6772a3fc03a0850d7c8542b21a43e176f29e5fbb3a4e54bc02fa68c807a01091158ef68c5a2f425cc432c95ea555
-
Filesize
416KB
MD5897d350557c45f49b9fd780735b218e2
SHA1a8cfecfe05ed2d3765bf57178338f8a4e93ad6fb
SHA256ea4964f3eccefd735166a547f6fed7a123a292fab52f9a810936ccaabce8eaa9
SHA512b1b322f6b2044ec7a31508190eee60fc9502ad2d6ec302e4cd81f4cc05028f013ecedfabb3dda6037b85e94aebad85df394c00a35b679304328fd5ba4b96bae0
-
Filesize
187KB
MD5e78239a5b0223499bed12a752b893cad
SHA1a429b46db791f433180ae4993ebb656d2f9393a4
SHA25680befdb25413d68adbadd8f236a2e8c71b261d8befc04c99749e778b07bcde89
SHA512cee5d5d4d32e5575852a412f6b3e17f8c0cbafe97fd92c7024934234a23c240dcc1f7a0452e2e5da949dec09dcfeb006e73862c5bbc549a2ab1cfb0241eaddfc
-
Filesize
304KB
MD50f02da56dab4bc19fca05d6d93e74dcf
SHA1a809c7e9c3136b8030727f128004aa2c31edc7a9
SHA256e1d0fe3bada7fdec17d7279e6294731e2684399905f05e5a3449ba14542b1379
SHA512522ec9042680a94a73cefa56e7902bacb166e23484f041c9e06dce033d3d16d13f7508f4d1e160c81198f61aa8c9a5aecfa62068150705ecf4803733f7e01ded
-
Filesize
5.6MB
MD59e1bdcea409bb8145e007521c33308f2
SHA1b926b0c9333e40e5ea89b66499ef413fc46881a6
SHA256986a8f690f1146c630ab0b31506fe39b5ef96ba6c7c467398462a32430d08f9a
SHA51211b13fc7a14d956a25c72c42526841a61f854f990bd16d44be03cc72a0c78f425fd3cd0298f6c3740a54e82c98b27008a13f6bc193f6178f6aa178152f2da93b
-
Filesize
304KB
MD59bba979bb2972a3214a399054242109b
SHA160adcedb0f347580fb2c1faadb92345c602c54e9
SHA25617b71b1895978b7aaf5a0184948e33ac3d70ce979030d5a9a195a1c256f6b368
SHA51289285f67c4c40365f4028bc18dd658ad40b68ff3bcf15f2547fc8f9d9c3d8021e2950de8565e03451b9b4ebace7ed557df24732af632fdb74cbd9eb02cf08788
-
Filesize
1.8MB
MD55b0cafbcaf3c7af70e29404253e0c221
SHA1740e7eaa4049b487dcb1fc54e94b8ba7cc11d4d7
SHA2567a75386c6d897e8e96705836ffcf67f2f084f91cb1481826b31953da4e520966
SHA5122e57490d70c8e031edc2e9dcbf83b25f77b968cb9b8733ce7f507874086f147bfb76c6542647d3fddbb69f497f13c4e188308e467860765606edf3dae2514ffe
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
510KB
MD574e358f24a40f37c8ffd7fa40d98683a
SHA17a330075e6ea3d871eaeefcecdeb1d2feb2fc202
SHA2560928c96b35cd4cc5887fb205731aa91eb68886b816bcc5ec151aeee81ce4f9a6
SHA5121525e07712c35111b56664e1589b1db37965995cc8e6d9b6f931fa38b0aa8e8347fc08b870d03573d10f0d597a2cd9db2598845c82b6c085f0df04f2a3b46eaf
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-656926755-4116854191-210765258-1000\76b53b3ec448f7ccdda2063b15d2bfc3_6f95b8b4-c02b-43c9-8cd4-016780936b63
Filesize2KB
MD5372392db4478b7294a1376bf5c280142
SHA10d3edaadd777ac932ba90b019af1900748229b46
SHA25677991bb698eaf3a2a948719d4a232566a94a9a7c0c4329bf2439ffd44c756b3c
SHA512cc45051a00469d68c172f14495f80e0bc747b39acfbe1340b0250f57de04bacb4ea8313065ce1f3f680533b88785a8f42ff88ea12fa7be4bee27f8327cff6c69
-
Filesize
503KB
MD52c2be38fb507206d36dddb3d03096518
SHA1a16edb81610a080096376d998e5ddc3e4b54bbd6
SHA2560c7173daaa5ad8dabe7a2cde6dbd0eee1ca790071443aa13b01a1e731053491e
SHA512e436954d7d5b77feb32f200cc48cb01f94b449887443a1e75ebef2f6fa2139d989d65f5ea7a71f8562c3aae2fea4117efc87e8aae905e1ba466fbc8bb328b316
-
Filesize
2KB
MD5ae8215854610b6bf9f765633f6959820
SHA1505f0d29a5976a6091369802839d08a93c725bbd
SHA2561b0225d14d990acf9e77cef95b86fc3abd315a49894058fee3195cead841bc0e
SHA5129bbd10e2966fece395877f5d73118bdc0550246e8304cddbe2c1bd652cebacf5be44c395cbfdf23a22174199cd93f706129dded9035b79ae7fecc9b54d415890
-
Filesize
2KB
MD542785b396e8d6450f48d856d3545a80c
SHA1ca96517029cf5298033b502a403ad6342cae387d
SHA25692ca7f005ceee772b8bf301a367358c42a5f7a3b492ac822fa1b18b7d178f1bf
SHA5123950825e4a9ad60f4d2e3a7a4e556a8e879c61d60ffec0c9d0bebccc03ae55e0ded3e6d062f3a5838f7b41e62b9f440af4fe3d371bf4ceee1a2747109c4df323