Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe
Resource
win11-20240802-en
General
-
Target
eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe
-
Size
1.8MB
-
MD5
e4206a8ebbe7944ff69a29f1f64973bd
-
SHA1
1ace9b781576c20624f2afbfd40eab0756e34c4f
-
SHA256
eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9
-
SHA512
87dbfc6beeb7b26b389398748ef74e5667b2c0a2b1bbac2ff41c23220bdf29417d2019ec823721e084b5935ded283d88ec584bc4dfc91799b70df495df13b9ba
-
SSDEEP
49152:cEkXsfHWvvKxauoCCsT2heDFV5gde7DaT2k+z3uCz5G9BiEUv:5PoYS0DFDpOS3Xzqg
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
redline
38.180.109.140:20007
Extracted
redline
TG CLOUD @RLREBORN Admin @FATHEROFCARDERS
91.194.55.146:29862
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x000a00000002338f-27.dat family_redline behavioral1/memory/1548-42-0x0000000000010000-0x0000000000062000-memory.dmp family_redline behavioral1/memory/3432-96-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 5 IoCs
pid Process 2824 axplong.exe 1548 kiyan.exe 2656 crypted.exe 4624 axplong.exe 3064 axplong.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine axplong.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4660 eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe 2824 axplong.exe 4624 axplong.exe 3064 axplong.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2656 set thread context of 3432 2656 crypted.exe 99 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\axplong.job eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kiyan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 kiyan.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 kiyan.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4660 eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe 4660 eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe 2824 axplong.exe 2824 axplong.exe 3432 RegAsm.exe 4624 axplong.exe 4624 axplong.exe 3432 RegAsm.exe 3432 RegAsm.exe 3432 RegAsm.exe 3432 RegAsm.exe 1548 kiyan.exe 1548 kiyan.exe 1548 kiyan.exe 1548 kiyan.exe 1548 kiyan.exe 3064 axplong.exe 3064 axplong.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3432 RegAsm.exe Token: SeDebugPrivilege 1548 kiyan.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4660 eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4660 wrote to memory of 2824 4660 eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe 86 PID 4660 wrote to memory of 2824 4660 eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe 86 PID 4660 wrote to memory of 2824 4660 eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe 86 PID 2824 wrote to memory of 1548 2824 axplong.exe 87 PID 2824 wrote to memory of 1548 2824 axplong.exe 87 PID 2824 wrote to memory of 1548 2824 axplong.exe 87 PID 2824 wrote to memory of 2656 2824 axplong.exe 94 PID 2824 wrote to memory of 2656 2824 axplong.exe 94 PID 2824 wrote to memory of 2656 2824 axplong.exe 94 PID 2656 wrote to memory of 1564 2656 crypted.exe 98 PID 2656 wrote to memory of 1564 2656 crypted.exe 98 PID 2656 wrote to memory of 1564 2656 crypted.exe 98 PID 2656 wrote to memory of 3432 2656 crypted.exe 99 PID 2656 wrote to memory of 3432 2656 crypted.exe 99 PID 2656 wrote to memory of 3432 2656 crypted.exe 99 PID 2656 wrote to memory of 3432 2656 crypted.exe 99 PID 2656 wrote to memory of 3432 2656 crypted.exe 99 PID 2656 wrote to memory of 3432 2656 crypted.exe 99 PID 2656 wrote to memory of 3432 2656 crypted.exe 99 PID 2656 wrote to memory of 3432 2656 crypted.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe"C:\Users\Admin\AppData\Local\Temp\eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\1000289001\kiyan.exe"C:\Users\Admin\AppData\Local\Temp\1000289001\kiyan.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"C:\Users\Admin\AppData\Local\Temp\1000290001\crypted.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1564
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3064
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD544e17821665477b21d6c50cee97c84ef
SHA14fc146790747758f49f1fd4375144f000099a6cb
SHA2565adac427a6eff8b0c1674c6095e2719d5ee46945fd4e397384af02b8ec691045
SHA512ab98a8151b41b56d7e59c375541c366df2f83c01ee26a5d1f079f74fb69eac4d229df62d3900eb8db6fd8cae1e420c21b7b9b2b3a44a8b135cb6659b6b70b6dc
-
Filesize
313KB
MD5d66daa20d13a4471446dfef15efa6b64
SHA121a38e7bd543dec86d52db66913353b01c1d6466
SHA2562e91e53e039b8cead9d25b9218fbdc9d7132785cd516d8e642dc331bdce93c27
SHA512c584348d8db6705172b179d0c4fcddd8e036fb2e7968319215547dd8ff8af13a5f84b3464e58d22e4d3a7c32ad7af83c22453dab12a6a90572ae70e63164987e
-
Filesize
1.8MB
MD5e4206a8ebbe7944ff69a29f1f64973bd
SHA11ace9b781576c20624f2afbfd40eab0756e34c4f
SHA256eb730db12e7fde778270c7c828ca0cc2d152306dc2dd8051a4f67f05293f01c9
SHA51287dbfc6beeb7b26b389398748ef74e5667b2c0a2b1bbac2ff41c23220bdf29417d2019ec823721e084b5935ded283d88ec584bc4dfc91799b70df495df13b9ba
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-786284298-625481688-3210388970-1000\76b53b3ec448f7ccdda2063b15d2bfc3_1b74ca46-c49b-4c52-a57d-8cd1ff70c625
Filesize2KB
MD541faf865479ddf5c423010483fce3e78
SHA1ac0d2546fafa2c69df4393f49c19c7674c36863c
SHA25639b88381e629fe2b71a58c25b0c154a133162ca054fae833fa8c5b111ddbfac9
SHA512845d851554642440add9011de2debb745d47dfd689a0a70142e773aaed7d7c0d50d77ec076e9f65de78b5ce530b1ecd2372161ee9da3e61d016ec15f166b3758
-
Filesize
2KB
MD5aa60d7755d5a23aaba15d7e1555aa410
SHA186161ac3fc74599ef77c21e6d4525d4d2407a330
SHA256a9d7cb990c537410262c28d8017bd8c2ffbdcc9850133a81bf3cc5100f090e4e
SHA5122e51315c3704d082686ee84b93ea15e623e785280051e6482e172ddd9fa76c0234303132dbdff4174972877c00b004c43289782e1b27417ab863d852c8ae35e2
-
Filesize
2KB
MD5fba612eeb015040e2746998f014d48bb
SHA16a0b6255fd631eeb7a3e5c8378e71410464608a6
SHA256efed14402dbda73ef60c40cde4d6095269dd87531980a735f3bb35ad4b598a89
SHA5123370be0f65c58366664475d361be58253ad5eb8e8924f820c36b7f5a6980f420548152e2962efd4e2f20435b7e1003c896cc00f2df2185947edcb4ca6d34d1db