Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 08:59
Behavioral task
behavioral1
Sample
AXEchecker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AXEchecker.exe
Resource
win10v2004-20241007-en
General
-
Target
AXEchecker.exe
-
Size
17.5MB
-
MD5
344abea4873a59faba12359e41f2001a
-
SHA1
2fb4bdc94fdb5318fe33a9810af081b854d734ef
-
SHA256
0f3f397fcac98792bdd64d7b005426561b853b651cd8581d88c329ba042e35da
-
SHA512
e742199db63940f085f036f147f3f709d9b67ce6fde2b95da83dcc442921a44d80536d5e220449946eb9728c9a7a3cf3b96df4251733e763304af9570618531c
-
SSDEEP
393216:3EkeCaLJwq3Obs2CluXMCHWUjkjx5WsqWxTA88eP8DLbLsXxIP:3GCaLJwq3ObRquXMb8DsqA2p/bLuiP
Malware Config
Extracted
amadey
5.10
0f3be6
http://185.81.68.147
http://185.81.68.148
-
install_dir
ee29ea508b
-
install_file
Gxtuum.exe
-
strings_key
d3a5912ea69ad34a2387af70c8be9e21
-
url_paths
/7vhfjke3/index.php
/8Fvu5jh4DbS/index.php
Extracted
redline
FJCX
185.81.68.147:1912
Signatures
-
Amadey family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000019382-304.dat family_redline behavioral1/memory/2012-313-0x0000000000E60000-0x0000000000EB2000-memory.dmp family_redline -
Redline family
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 2528 systemcc.exe 2264 systemaa.exe 2728 AxeCheckerLauncher.exe 2292 Gxtuum.exe 2448 AxeCheckerLauncher.exe 2012 ioc.exe 1076 zx.exe 1564 zx.exe -
Loads dropped DLL 32 IoCs
pid Process 2568 AXEchecker.exe 2568 AXEchecker.exe 2568 AXEchecker.exe 2768 Process not Found 2264 systemaa.exe 2728 AxeCheckerLauncher.exe 2448 AxeCheckerLauncher.exe 2292 Gxtuum.exe 2292 Gxtuum.exe 1076 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe 1564 zx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\BE7983DCF8301817704571\\BE7983DCF8301817704571.exe" systemcc.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job systemaa.exe -
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral1/files/0x000700000001747b-18.dat pyinstaller behavioral1/files/0x00060000000193c4-318.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ioc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2528 systemcc.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2528 systemcc.exe Token: SeSecurityPrivilege 2528 systemcc.exe Token: SeTakeOwnershipPrivilege 2528 systemcc.exe Token: SeLoadDriverPrivilege 2528 systemcc.exe Token: SeSystemProfilePrivilege 2528 systemcc.exe Token: SeSystemtimePrivilege 2528 systemcc.exe Token: SeProfSingleProcessPrivilege 2528 systemcc.exe Token: SeIncBasePriorityPrivilege 2528 systemcc.exe Token: SeCreatePagefilePrivilege 2528 systemcc.exe Token: SeBackupPrivilege 2528 systemcc.exe Token: SeRestorePrivilege 2528 systemcc.exe Token: SeShutdownPrivilege 2528 systemcc.exe Token: SeDebugPrivilege 2528 systemcc.exe Token: SeSystemEnvironmentPrivilege 2528 systemcc.exe Token: SeRemoteShutdownPrivilege 2528 systemcc.exe Token: SeUndockPrivilege 2528 systemcc.exe Token: SeManageVolumePrivilege 2528 systemcc.exe Token: 33 2528 systemcc.exe Token: 34 2528 systemcc.exe Token: 35 2528 systemcc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 systemaa.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2528 2568 AXEchecker.exe 30 PID 2568 wrote to memory of 2528 2568 AXEchecker.exe 30 PID 2568 wrote to memory of 2528 2568 AXEchecker.exe 30 PID 2568 wrote to memory of 2264 2568 AXEchecker.exe 31 PID 2568 wrote to memory of 2264 2568 AXEchecker.exe 31 PID 2568 wrote to memory of 2264 2568 AXEchecker.exe 31 PID 2568 wrote to memory of 2264 2568 AXEchecker.exe 31 PID 2568 wrote to memory of 2728 2568 AXEchecker.exe 32 PID 2568 wrote to memory of 2728 2568 AXEchecker.exe 32 PID 2568 wrote to memory of 2728 2568 AXEchecker.exe 32 PID 2264 wrote to memory of 2292 2264 systemaa.exe 34 PID 2264 wrote to memory of 2292 2264 systemaa.exe 34 PID 2264 wrote to memory of 2292 2264 systemaa.exe 34 PID 2264 wrote to memory of 2292 2264 systemaa.exe 34 PID 2728 wrote to memory of 2448 2728 AxeCheckerLauncher.exe 36 PID 2728 wrote to memory of 2448 2728 AxeCheckerLauncher.exe 36 PID 2728 wrote to memory of 2448 2728 AxeCheckerLauncher.exe 36 PID 2292 wrote to memory of 2012 2292 Gxtuum.exe 39 PID 2292 wrote to memory of 2012 2292 Gxtuum.exe 39 PID 2292 wrote to memory of 2012 2292 Gxtuum.exe 39 PID 2292 wrote to memory of 2012 2292 Gxtuum.exe 39 PID 2292 wrote to memory of 1076 2292 Gxtuum.exe 40 PID 2292 wrote to memory of 1076 2292 Gxtuum.exe 40 PID 2292 wrote to memory of 1076 2292 Gxtuum.exe 40 PID 2292 wrote to memory of 1076 2292 Gxtuum.exe 40 PID 1076 wrote to memory of 1564 1076 zx.exe 41 PID 1076 wrote to memory of 1564 1076 zx.exe 41 PID 1076 wrote to memory of 1564 1076 zx.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\AXEchecker.exe"C:\Users\Admin\AppData\Local\Temp\AXEchecker.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\systemcc.exe"C:\Users\Admin\AppData\Roaming\systemcc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Users\Admin\AppData\Roaming\systemaa.exe"C:\Users\Admin\AppData\Roaming\systemaa.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\10000030101\ioc.exe"C:\Users\Admin\AppData\Local\Temp\10000030101\ioc.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\10000040101\zx.exe"C:\Users\Admin\AppData\Local\Temp\10000040101\zx.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\10000040101\zx.exe"C:\Users\Admin\AppData\Local\Temp\10000040101\zx.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1564
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\AxeCheckerLauncher.exe"AxeCheckerLauncher.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\AxeCheckerLauncher.exe"AxeCheckerLauncher.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD5ae16de1c6c9e15f640b4d4b04310c4be
SHA10c8cf3050320256cbdcc32691f38181ec71a700e
SHA2563e1fd18a294c1e2903cce49b29b42fe5669043c6f4a7f2b4bae865b7cbc0169e
SHA512e42b0cd82857484ed0a796c767fd7c9cfdef637d6fba9759be52c124c90eea69f0a19a10bdaf2f17efaabb2e9ee69a9f771a3f3fc394c5b79cc89462f1351f37
-
Filesize
5.6MB
MD5543fb2fd6424b11d72633914571e016c
SHA17eae773db47c118455f416b5d93e065729d45cf0
SHA2560bc67c0fa17dcadfe8a827cb413c090f67b0cb00a14705d95ec37766de241665
SHA512590867fec7c63e0a58bb419464304c4abea7936c6030537e851b68cd3ca8fdb847352bbfa111d8867f66fc35148d3bbf56270573beed891c573679ebab3c1520
-
Filesize
73KB
MD5bd2278807e5f7ea4ecbe926cbbf9d250
SHA17fc7e4e039fed14af506518e0519166ceebdde6e
SHA25657128171d813e1875da91debae0ca74fa27fec08768d4ffc916f3550cbeb640b
SHA5126d9a4667f879ee1b66e29c3bc046c8ad024a82161b13cf4d3f104e8e4e7559233e71551c6db0171930cfc7f6a771da9a0897b887c673dc0baa3b04f316a50575
-
Filesize
21KB
MD5633dca52da4ebaa6f4bf268822c6dc88
SHA11ebfc0f881ce338d2f66fcc3f9c1cbb94cdc067e
SHA256424fd5d3d3297a8ab1227007ef8ded5a4f194f24bd573a5211be71937aa55d22
SHA512ed058525ee7b4cc7e12561c7d674c26759a4301322ff0b3239f3183911ce14993614e3199d8017b9bfde25c8cb9ac0990d318bb19f3992624b39ec0f084a8df1
-
Filesize
6.6MB
MD5166cc2f997cba5fc011820e6b46e8ea7
SHA1d6179213afea084f02566ea190202c752286ca1f
SHA256c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546
SHA51249d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
431KB
MD54962575a2378d5c72e7a836ea766e2ad
SHA1549964178b12017622d3cbdda6dbfdef0904e7e2
SHA256eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676
SHA512911a59f7a6785dd09a57dcd6d977b8abd5e160bd613786e871a1e92377c9e6f3b85fe3037431754bbdb1212e153776efca5fadac1de6b2ad474253da176e8e53
-
Filesize
299KB
MD5357726e357f783847a5d3c1c21873ed1
SHA1f344bc21a0ab3e37a6fc7587fd761a5c0667dd60
SHA256dfd562f0737ac0a4e3cc10610a4746ad69091f735e485b668c8bf9526ac0bf46
SHA5125fc36c7b3883384f3e242c102be66ddbd68cd069ea1570f878f56a3e6cf03198ea3e1a791bca9091f2dbe3c394f47b18ff5b92e14a1d56b1f4654ada186a39dc
-
Filesize
16.6MB
MD53952e69699bbabe8a794b8e251530119
SHA14dd911c459767553f2f4560f77dab15532794666
SHA256265722e4c0fb9999683bf58112930e6f5fb5204921382313bc3d80dca2e483b4
SHA5120b1a99dce8052caef99665bb66dff3cb47485cdbc764b77870c1ecc91ad58a459ce1e41419928cb3e233d5635cd1710677b52c6ea094fa5e80fbc07133d3981d
-
Filesize
87KB
MD50e675d4a7a5b7ccd69013386793f68eb
SHA16e5821ddd8fea6681bda4448816f39984a33596b
SHA256bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66
-
Filesize
19KB
MD5f0c73f7454a5ce6fb8e3d795fdb0235d
SHA1acdd6c5a359421d268b28ddf19d3bcb71f36c010
SHA2562a59dd891533a028fae7a81e690e4c28c9074c2f327393fab17329affe53fd7b
SHA512bd6cf4e37c3e7a1a3b36f42858af1b476f69caa4ba1fd836a7e32220e5eff7ccc811c903019560844af988a7c77cc41dc6216c0c949d8e04516a537da5821a3e
-
Filesize
19KB
MD57d4d4593b478b4357446c106b64e61f8
SHA18a4969c9e59d7a7485c8cc5723c037b20dea5c9d
SHA2560a6e2224cde90a0d41926e8863f9956848ffbf19848e8855bd08953112afc801
SHA5127bc9c473705ec98ba0c1da31c295937d97710cedefc660f6a5cb0512bae36ad23bebb2f6f14df7ce7f90ec3f817b02f577317fdd514560aab22cb0434d8e4e0b
-
Filesize
21KB
MD51d75e7b9f68c23a195d408cf02248119
SHA162179fc9a949d238bb221d7c2f71ba7c1680184c
SHA25667ebe168b7019627d68064043680674f9782fda7e30258748b29412c2b3d4c6b
SHA512c2ee84a9aeac34f7b51426d12f87bb35d8c3238bb26a6e14f412ea485e5bd3b8fb5b1231323d4b089cf69d8180a38ddd7fd593cc52cbdf250125ad02d66eea9d
-
Filesize
19KB
MD5d6ad0f2652460f428c0e8fc40b6f6115
SHA11a5152871abc5cf3d4868a218de665105563775e
SHA2564ef09fa6510eeebb4855b6f197b20a7a27b56368c63cc8a3d1014fa4231ab93a
SHA512ceafeee932919bc002b111d6d67b7c249c85d30da35dfbcebd1f37db51e506ac161e4ee047ff8f7bf0d08da6a7f8b97e802224920bd058f8e790e6fa0ee48b22
-
Filesize
19KB
MD5eab486e4719b916cad05d64cd4e72e43
SHA1876c256fb2aeb0b25a63c9ee87d79b7a3c157ead
SHA25605fe96faa8429992520451f4317fbceba1b17716fa2caf44ddc92ede88ce509d
SHA512c50c3e656cc28a2f4f6377ba24d126bdc248a3125dca490994f8cace0a4903e23346ae937bb5b0a333f7d39ece42665ae44fde2fd5600873489f3982151a0f5d
-
Filesize
20KB
MD522bfe210b767a667b0f3ed692a536e4e
SHA188e0ff9c141d8484b5e34eaaa5e4be0b414b8adf
SHA256f1a2499cc238e52d69c63a43d1e61847cf852173fe95c155056cfbd2cb76abc3
SHA512cbea3c690049a73b1a713a2183ff15d13b09982f8dd128546fd3db264af4252ccd390021dee54435f06827450da4bd388bd6ff11b084c0b43d50b181c928fd25
-
Filesize
23KB
MD5da5e087677c8ebbc0062eac758dfed49
SHA1ca69d48efa07090acb7ae7c1608f61e8d26d3985
SHA25608a43a53a66d8acb2e107e6fc71213cedd180363055a2dc5081fe5a837940dce
SHA5126262e9a0808d8f64e5f2dfad5242cd307e2f5eaa78f0a768f325e65c98db056c312d79f0b3e63c74e364af913a832c1d90f4604fe26cc5fb05f3a5a661b12573
-
Filesize
19KB
MD533a0fe1943c5a325f93679d6e9237fee
SHA1737d2537d602308fc022dbc0c29aa607bcdec702
SHA2565af7aa065ffdbf98d139246e198601bfde025d11a6c878201f4b99876d6c7eac
SHA512cab7fcaa305a9ace1f1cc7077b97526bebc0921adf23273e74cd42d7fe99401d4f7ede8ecb9847b6734a13760b9ebe4dbd2465a3db3139ed232dbef68fb62c54
-
Filesize
20KB
MD543bf2037bfd3fb60e1fedac634c6f86e
SHA1959eebe41d905ad3afa4254a52628ec13613cf70
SHA256735703c0597da278af8a6359fc051b9e657627f50ad5b486185c2ef328ad571b
SHA5127042846c009efea45ca5fafdc08016eca471a8c54486ba03f212abba47467f8744e9546c8f33214620f97dbcc994e3002788ad0db65b86d8a3e4ff0d8a9d0d05
-
Filesize
19KB
MD5d51bc845c4efbfdbd68e8ccffdad7375
SHA1c82e580ec68c48e613c63a4c2f9974bb59182cf6
SHA25689d9f54e6c9ae1cb8f914da1a2993a20de588c18f1aaf4d66efb20c3a282c866
SHA5122e353cf58ad218c3e068a345d1da6743f488789ef7c6b96492d48571dc64df8a71ad2db2e5976cfd04cf4b55455e99c70c7f32bd2c0f4a8bed1d29c2dafc17b0
-
Filesize
28KB
MD5487f72d0cf7dc1d85fa18788a1b46813
SHA10aabff6d4ee9a2a56d40ee61e4591d4ba7d14c0d
SHA256560baf1b87b692c284ccbb82f2458a688757231b315b6875482e08c8f5333b3d
SHA512b7f4e32f98bfdcf799331253faebb1fb08ec24f638d8526f02a6d9371c8490b27d03db3412128ced6d2bbb11604247f3f22c8380b1bf2a11fb3bb92f18980185
-
Filesize
20KB
MD554a8fca040976f2aac779a344b275c80
SHA1ea1f01d6dcdf688eb0f21a8cb8a38f03bc777883
SHA2567e90e7acc69aca4591ce421c302c7f6cdf8e44f3b4390f66ec43dff456ffea29
SHA512cb20bed4972e56f74de1b7bc50dc1e27f2422dbb302aecb749018b9f88e3e4a67c9fc69bbbb8c4b21d49a530cc8266172e7d237650512aafb293cdfe06d02228
-
Filesize
23KB
MD521b509d048418922b92985696710afca
SHA1c499dd098aab8c7e05b8b0fd55f994472d527203
SHA256fe7336d2fb3b13a00b5b4ce055a84f0957daefdace94f21b88e692e54b678ac3
SHA512c517b02d4e94cf8360d98fd093bca25e8ae303c1b4500cf4cf01f78a7d7ef5f581b99a0371f438c6805a0b3040a0e06994ba7b541213819bd07ec8c6251cb9bb
-
Filesize
25KB
MD5120a5dc2682cd2a838e0fc0efd45506e
SHA18710be5d5e9c878669ff8b25b67fb2deb32cd77a
SHA256c14f0d929a761a4505628c4eb5754d81b88aa1fdad2154a2f2b0215b983b6d89
SHA5124330edf9b84c541e5ed3bb672548f35efa75c6b257c3215fc29ba6e152294820347517ec9bd6bde38411efa9074324a276cf0d7d905ed5dd88e906d78780760c
-
Filesize
25KB
MD5f22faca49e4d5d80ec26ed31e7ecd0e0
SHA1473bcbfb78e6a63afd720b5cbe5c55d9495a3d88
SHA2561eb30ea95dae91054a33a12b1c73601518d28e3746db552d7ce120da589d4cf4
SHA512c8090758435f02e3659d303211d78102c71754ba12b0a7e25083fd3529b3894dc3ab200b02a2899418cc6ed3b8f483d36e6c2bf86ce2a34e5fd9ad0483b73040
-
Filesize
21KB
MD52fd0da47811b8ed4a0abdf9030419381
SHA146e3f21a9bd31013a804ba45dc90cc22331a60d1
SHA256de81c4d37833380a1c71a5401de3ab4fe1f8856fc40d46d0165719a81d7f3924
SHA5122e6f900628809bfd908590fe1ea38e0e36960235f9a6bbccb73bbb95c71bfd10f75e1df5e8cf93a682e4ada962b06c278afc9123ab5a4117f77d1686ff683d6f
-
Filesize
4.0MB
MD5d2a8a5e7380d5f4716016777818a32c5
SHA1fb12f31d1d0758fe3e056875461186056121ed0c
SHA25659ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9
SHA512ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7
-
Filesize
1021KB
MD54e326feeb3ebf1e3eb21eeb224345727
SHA1f156a272dbc6695cc170b6091ef8cd41db7ba040
SHA2563c60056371f82e4744185b6f2fa0c69042b1e78804685944132974dd13f3b6d9
SHA512be9420a85c82eeee685e18913a7ff152fcead72a90ddcc2bcc8ab53a4a1743ae98f49354023c0a32b3a1d919bda64b5d455f6c3a49d4842bbba4aa37c1d05d67