Analysis
-
max time kernel
142s -
max time network
133s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-09-2024 23:45
Static task
static1
Behavioral task
behavioral1
Sample
02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe
Resource
win11-20240802-en
General
-
Target
02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe
-
Size
1.8MB
-
MD5
717cd959c9f0a0c003140d53afe9386f
-
SHA1
e02291bff502711ae21fdab51ecfb457cbd1ceb9
-
SHA256
02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2
-
SHA512
860f63d419a3ede63a02a6cd4c852c8403f6d78c4d2c0b1ba7365bf3ce1b7837c1f233f955f2c998349a2844dd4a426dfd5112ba46ee745212aa87ffe6bc1712
-
SSDEEP
49152:dq1jN7emvw9/b4MMWmB4rnBSy4wmRZ/uxqda:deFemvm/b4MMSBSyYXuQda
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
38.180.109.140:20007
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
91.194.55.146:29862
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/files/0x0002000000025c5c-26.dat family_redline behavioral2/memory/4072-41-0x0000000000CD0000-0x0000000000D22000-memory.dmp family_redline behavioral2/memory/652-89-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe -
Executes dropped EXE 5 IoCs
pid Process 1312 axplong.exe 4072 kiyan.exe 4420 crypted.exe 4660 axplong.exe 1408 axplong.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Wine 02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe Key opened \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Wine axplong.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1956 02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe 1312 axplong.exe 4660 axplong.exe 1408 axplong.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4420 set thread context of 652 4420 crypted.exe 83 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job 02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kiyan.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 kiyan.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 kiyan.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1956 02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe 1956 02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe 1312 axplong.exe 1312 axplong.exe 652 RegAsm.exe 652 RegAsm.exe 652 RegAsm.exe 652 RegAsm.exe 652 RegAsm.exe 4072 kiyan.exe 4072 kiyan.exe 4072 kiyan.exe 4072 kiyan.exe 4072 kiyan.exe 4660 axplong.exe 4660 axplong.exe 1408 axplong.exe 1408 axplong.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 652 RegAsm.exe Token: SeDebugPrivilege 4072 kiyan.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1312 1956 02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe 79 PID 1956 wrote to memory of 1312 1956 02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe 79 PID 1956 wrote to memory of 1312 1956 02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe 79 PID 1312 wrote to memory of 4072 1312 axplong.exe 80 PID 1312 wrote to memory of 4072 1312 axplong.exe 80 PID 1312 wrote to memory of 4072 1312 axplong.exe 80 PID 1312 wrote to memory of 4420 1312 axplong.exe 81 PID 1312 wrote to memory of 4420 1312 axplong.exe 81 PID 1312 wrote to memory of 4420 1312 axplong.exe 81 PID 4420 wrote to memory of 652 4420 crypted.exe 83 PID 4420 wrote to memory of 652 4420 crypted.exe 83 PID 4420 wrote to memory of 652 4420 crypted.exe 83 PID 4420 wrote to memory of 652 4420 crypted.exe 83 PID 4420 wrote to memory of 652 4420 crypted.exe 83 PID 4420 wrote to memory of 652 4420 crypted.exe 83 PID 4420 wrote to memory of 652 4420 crypted.exe 83 PID 4420 wrote to memory of 652 4420 crypted.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe"C:\Users\Admin\AppData\Local\Temp\02f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\1000289001\kiyan.exe"C:\Users\Admin\AppData\Local\Temp\1000289001\kiyan.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1408
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD544e17821665477b21d6c50cee97c84ef
SHA14fc146790747758f49f1fd4375144f000099a6cb
SHA2565adac427a6eff8b0c1674c6095e2719d5ee46945fd4e397384af02b8ec691045
SHA512ab98a8151b41b56d7e59c375541c366df2f83c01ee26a5d1f079f74fb69eac4d229df62d3900eb8db6fd8cae1e420c21b7b9b2b3a44a8b135cb6659b6b70b6dc
-
Filesize
313KB
MD5d66daa20d13a4471446dfef15efa6b64
SHA121a38e7bd543dec86d52db66913353b01c1d6466
SHA2562e91e53e039b8cead9d25b9218fbdc9d7132785cd516d8e642dc331bdce93c27
SHA512c584348d8db6705172b179d0c4fcddd8e036fb2e7968319215547dd8ff8af13a5f84b3464e58d22e4d3a7c32ad7af83c22453dab12a6a90572ae70e63164987e
-
Filesize
1.8MB
MD5717cd959c9f0a0c003140d53afe9386f
SHA1e02291bff502711ae21fdab51ecfb457cbd1ceb9
SHA25602f99156a351c59b8a7b57ea8bf18717375861b7700083ebca42808263a949b2
SHA512860f63d419a3ede63a02a6cd4c852c8403f6d78c4d2c0b1ba7365bf3ce1b7837c1f233f955f2c998349a2844dd4a426dfd5112ba46ee745212aa87ffe6bc1712
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3761892313-3378554128-2287991803-1000\76b53b3ec448f7ccdda2063b15d2bfc3_1a4dc33f-c784-4d28-8db2-389663d94aeb
Filesize2KB
MD5c057276ef9a0682fb51002e34570d152
SHA18e7dfa2387fa3d935edaf29b1518ebb2a63c5ff7
SHA256cf6ecec69741c29137d0df26c30649de6d91de23d06271975ac5e20ba573761c
SHA51279f5db1be5f8b7e2e09eae876d5e2c9f18f7a9375a9d78dbaf4f54709b488aa345781152a96ee9a87f5d9962e4a3964c22590a0ba3a3593d9da13c096d656eda
-
Filesize
2KB
MD56a4472d4c7abec00310b234ea0c28547
SHA14171fb4c397752ec698de83792768845ccd2d529
SHA2564dc3c62597461ffcf8ba29dc8ec65361b4ceb86a004ba03a5cabab724d117c5c
SHA5124341c8ef29c8d1a030b0778463bf5426df381dd9a5c61d8ccf2071891e13b29333b6b2004755e57297ac47db084560dab17a950f2989ebb0d42a7205f26a4d60
-
Filesize
2KB
MD5c76fbef985ab379c9e911d2f9b48041d
SHA11a34bf7262aa31adfa1728f21159a545c8ae331b
SHA256036f1cf1929d43398566c74ff519b4b378201f9d1b455f33a00f761ed9e1da11
SHA5127eebb9b34186e448df4b98e70a8bba70e16927d616379e06c5dd622f6fcc234492c6d14971e34bc19bd3225ba71e5dd480c004b4cdee173fb8c956112db05deb