Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe
Resource
win7-20240611-en
General
-
Target
e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe
-
Size
1.9MB
-
MD5
5ad5e4f1f3126c5d6cfdbfbbe5597c84
-
SHA1
47b46cbe987e0e33c9d23f4c6cc304d116e5e80f
-
SHA256
e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0
-
SHA512
8c58379f3107cc67944d003df964f123848c9e7b55edbda3d256915cbbf666fa62e8878bb0c091c84e0057fe5097fef8e3eb49f2382519dc4a06f31a4c37b163
-
SSDEEP
49152:izPvPgeS5GaqaHrxCTZtEsO/kLMUunFvGA0WyUAD:YfgbNHrxCTkRWunZRyUA
Malware Config
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Extracted
redline
newlogs
85.28.47.7:17210
Extracted
stealc
ZOV
http://40.86.87.10
-
url_path
/108e010e8f91c38c.php
Extracted
redline
newbuild
185.215.113.67:40960
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe family_redline behavioral1/memory/1072-325-0x0000000000250000-0x00000000002A0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe family_redline behavioral1/memory/3040-359-0x0000000000360000-0x00000000003B0000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exeaxplong.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exeaxplong.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe -
Executes dropped EXE 10 IoCs
Processes:
axplong.exestreamer.exeTpWWMUpe0LEV.exeFreshbuild.execrypt6.exeHkbsse.exenewlogs.exestealc_zov.exenewbuild.exeZharkBOT.exepid process 2316 axplong.exe 1920 streamer.exe 1476 TpWWMUpe0LEV.exe 1672 Freshbuild.exe 2764 crypt6.exe 1068 Hkbsse.exe 1072 newlogs.exe 2716 stealc_zov.exe 3040 newbuild.exe 3052 ZharkBOT.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exeaxplong.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Wine e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe Key opened \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Wine axplong.exe -
Loads dropped DLL 19 IoCs
Processes:
e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exeaxplong.exeTpWWMUpe0LEV.exeFreshbuild.exeWerFault.exestealc_zov.exepid process 1808 e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe 2316 axplong.exe 2316 axplong.exe 2316 axplong.exe 1476 TpWWMUpe0LEV.exe 2316 axplong.exe 2316 axplong.exe 2316 axplong.exe 1672 Freshbuild.exe 1164 WerFault.exe 1164 WerFault.exe 1164 WerFault.exe 2316 axplong.exe 2316 axplong.exe 2316 axplong.exe 2316 axplong.exe 2316 axplong.exe 2716 stealc_zov.exe 2716 stealc_zov.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exeaxplong.exepid process 1808 e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe 2316 axplong.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ZharkBOT.exedescription pid process target process PID 3052 set thread context of 2816 3052 ZharkBOT.exe wab.exe -
Drops file in Windows directory 2 IoCs
Processes:
e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exeFreshbuild.exedescription ioc process File created C:\Windows\Tasks\axplong.job e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe File created C:\Windows\Tasks\Hkbsse.job Freshbuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1164 2764 WerFault.exe crypt6.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
stealc_zov.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_zov.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_zov.exe -
Processes:
axplong.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A axplong.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 axplong.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 axplong.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 0f00000001000000140000000f6aad4c3fe04619cdc8b2bd655aa1a26042e6500b000000010000005400000053007400610072006600690065006c006400200043006c00610073007300200032002000430065007200740069006600690063006100740069006f006e00200041007500740068006f007200690074007900000053000000010000004800000030463021060b6086480186fd6d0107170330123010060a2b0601040182373c0101030200c03021060b6086480186fd6e0107170330123010060a2b0601040182373c0101030200c009000000010000002a000000302806082b0601050507030106082b0601050507030206082b0601050507030406082b06010505070303140000000100000014000000bf5fb7d1cedd1f86f45b55acdcd710c20ea988e71d000000010000001000000090c4f4233b006b7bfaa6adcd8f577d77030000000100000014000000ad7e1c28b064ef8f6003402014c3d0e3370eb58a2000000001000000130400003082040f308202f7a003020102020100300d06092a864886f70d01010505003068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479301e170d3034303632393137333931365a170d3334303632393137333931365a3068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f7269747930820120300d06092a864886f70d01010105000382010d00308201080282010100b732c8fee971a60485ad0c1164dfce4defc80318873fa1abfb3ca69ff0c3a1dad4d86e2b5390fb24a43e84f09ee85fece52744f528a63f7bdee02af0c8af532f9eca0501931e8f661c39a74dfa5ab673042566eb777fe759c64a99251454eb26c7f37f19d530708fafb0462affadeb29edd79faa0487a3d4f989a5345fdb43918236d9663cb1b8b982fd9c3a3e10c83bef0665667a9b19183dff71513c302e5fbe3d7773b25d066cc323569a2b8526921ca702b3e43f0daf087982b8363dea9cd335b3bc69caf5cc9de8fd648d1780336e5e4a5d99c91e87b49d1ac0d56e1335235edf9b5f3defd6f776c2ea3ebb780d1c42676b04d8f8d6da6f8bf244a001ab020103a381c53081c2301d0603551d0e04160414bf5fb7d1cedd1f86f45b55acdcd710c20ea988e73081920603551d2304818a3081878014bf5fb7d1cedd1f86f45b55acdcd710c20ea988e7a16ca46a3068310b300906035504061302555331253023060355040a131c537461726669656c6420546563686e6f6c6f676965732c20496e632e31323030060355040b1329537461726669656c6420436c61737320322043657274696669636174696f6e20417574686f72697479820100300c0603551d13040530030101ff300d06092a864886f70d01010505000382010100059d3f889dd1c91a55a1ac69f3f359da9b01871a4f57a9a179092adbf72fb21eccc75e6ad88387a197ef49353e7706415862bf8e58b80a673fecb3dd21661fc954fa72cc3d4c40d881af779e837abba2c7f534178ed91140f4fc2c2a4d157fa7625d2e25d3000b201a1d68f917b8f4bd8bed2859dd4d168b1783c8b265c72d7aa5aabc53866ddd57a4caf820410b68f0f4fb74be565d7a79f5f91d85e32d95bef5719043cc8d1f9a000a8729e95522580023eae31243295b4708dd8c416a6506a8e521aa41b4952195b97dd134ab13d6adbcdce23d39cdbd3e7570a1185903c922b48f9cd55e2ad7a5b6d40a6df8b74011469a1f790e62bf0f97ece02f1f1794 axplong.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde axplong.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exeaxplong.exestealc_zov.exepowershell.exenewbuild.exepid process 1808 e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe 2316 axplong.exe 2716 stealc_zov.exe 1940 powershell.exe 3040 newbuild.exe 2716 stealc_zov.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exenewbuild.exedescription pid process Token: SeDebugPrivilege 1940 powershell.exe Token: SeDebugPrivilege 3040 newbuild.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exeFreshbuild.exepid process 1808 e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe 1672 Freshbuild.exe -
Suspicious use of WriteProcessMemory 57 IoCs
Processes:
e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exeaxplong.exeFreshbuild.execrypt6.exeZharkBOT.exedescription pid process target process PID 1808 wrote to memory of 2316 1808 e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe axplong.exe PID 1808 wrote to memory of 2316 1808 e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe axplong.exe PID 1808 wrote to memory of 2316 1808 e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe axplong.exe PID 1808 wrote to memory of 2316 1808 e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe axplong.exe PID 2316 wrote to memory of 1920 2316 axplong.exe streamer.exe PID 2316 wrote to memory of 1920 2316 axplong.exe streamer.exe PID 2316 wrote to memory of 1920 2316 axplong.exe streamer.exe PID 2316 wrote to memory of 1920 2316 axplong.exe streamer.exe PID 2316 wrote to memory of 1476 2316 axplong.exe TpWWMUpe0LEV.exe PID 2316 wrote to memory of 1476 2316 axplong.exe TpWWMUpe0LEV.exe PID 2316 wrote to memory of 1476 2316 axplong.exe TpWWMUpe0LEV.exe PID 2316 wrote to memory of 1476 2316 axplong.exe TpWWMUpe0LEV.exe PID 2316 wrote to memory of 1672 2316 axplong.exe Freshbuild.exe PID 2316 wrote to memory of 1672 2316 axplong.exe Freshbuild.exe PID 2316 wrote to memory of 1672 2316 axplong.exe Freshbuild.exe PID 2316 wrote to memory of 1672 2316 axplong.exe Freshbuild.exe PID 2316 wrote to memory of 2764 2316 axplong.exe crypt6.exe PID 2316 wrote to memory of 2764 2316 axplong.exe crypt6.exe PID 2316 wrote to memory of 2764 2316 axplong.exe crypt6.exe PID 2316 wrote to memory of 2764 2316 axplong.exe crypt6.exe PID 1672 wrote to memory of 1068 1672 Freshbuild.exe Hkbsse.exe PID 1672 wrote to memory of 1068 1672 Freshbuild.exe Hkbsse.exe PID 1672 wrote to memory of 1068 1672 Freshbuild.exe Hkbsse.exe PID 1672 wrote to memory of 1068 1672 Freshbuild.exe Hkbsse.exe PID 2764 wrote to memory of 1164 2764 crypt6.exe WerFault.exe PID 2764 wrote to memory of 1164 2764 crypt6.exe WerFault.exe PID 2764 wrote to memory of 1164 2764 crypt6.exe WerFault.exe PID 2764 wrote to memory of 1164 2764 crypt6.exe WerFault.exe PID 2316 wrote to memory of 1072 2316 axplong.exe newlogs.exe PID 2316 wrote to memory of 1072 2316 axplong.exe newlogs.exe PID 2316 wrote to memory of 1072 2316 axplong.exe newlogs.exe PID 2316 wrote to memory of 1072 2316 axplong.exe newlogs.exe PID 2316 wrote to memory of 2716 2316 axplong.exe stealc_zov.exe PID 2316 wrote to memory of 2716 2316 axplong.exe stealc_zov.exe PID 2316 wrote to memory of 2716 2316 axplong.exe stealc_zov.exe PID 2316 wrote to memory of 2716 2316 axplong.exe stealc_zov.exe PID 2316 wrote to memory of 3040 2316 axplong.exe newbuild.exe PID 2316 wrote to memory of 3040 2316 axplong.exe newbuild.exe PID 2316 wrote to memory of 3040 2316 axplong.exe newbuild.exe PID 2316 wrote to memory of 3040 2316 axplong.exe newbuild.exe PID 2316 wrote to memory of 3052 2316 axplong.exe ZharkBOT.exe PID 2316 wrote to memory of 3052 2316 axplong.exe ZharkBOT.exe PID 2316 wrote to memory of 3052 2316 axplong.exe ZharkBOT.exe PID 2316 wrote to memory of 3052 2316 axplong.exe ZharkBOT.exe PID 3052 wrote to memory of 1940 3052 ZharkBOT.exe powershell.exe PID 3052 wrote to memory of 1940 3052 ZharkBOT.exe powershell.exe PID 3052 wrote to memory of 1940 3052 ZharkBOT.exe powershell.exe PID 3052 wrote to memory of 2816 3052 ZharkBOT.exe wab.exe PID 3052 wrote to memory of 2816 3052 ZharkBOT.exe wab.exe PID 3052 wrote to memory of 2816 3052 ZharkBOT.exe wab.exe PID 3052 wrote to memory of 2816 3052 ZharkBOT.exe wab.exe PID 3052 wrote to memory of 2816 3052 ZharkBOT.exe wab.exe PID 3052 wrote to memory of 2816 3052 ZharkBOT.exe wab.exe PID 3052 wrote to memory of 2816 3052 ZharkBOT.exe wab.exe PID 3052 wrote to memory of 2816 3052 ZharkBOT.exe wab.exe PID 3052 wrote to memory of 2816 3052 ZharkBOT.exe wab.exe PID 3052 wrote to memory of 2816 3052 ZharkBOT.exe wab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe"C:\Users\Admin\AppData\Local\Temp\e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe"C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe"C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe"C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 964⤵
- Loads dropped DLL
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe"C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe"C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe"C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000149001\ZharkBOT.exe"C:\Users\Admin\AppData\Local\Temp\1000149001\ZharkBOT.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Windows Mail\wab.exe"C:\Program Files (x86)\Windows Mail\wab.exe"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e0fb0495698fcb849142f6df45129d84
SHA1cc9ace2e170e5b56ccb577c59e0821a5774e9a42
SHA256835d75a6220320c37950a115ddf947f26c12c95c56a507b6e5cace0c4d88ebcc
SHA512d95ee548115af914bfe13758a414705e95bd66c36198f3df1e091eb6ae8370c3cc49564fce176820f82f1f35ae7f67e38b43c12fedbddc34172422f765efd1fa
-
C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exeFilesize
7.7MB
MD52bc0db539a8fab08bf4104eb7f2de7e7
SHA1ff4a5defedb18c93ef815434b40e19b9452ca410
SHA256ec84ec11567566db3ba9096df164f0b7a8217d50ffab16fa3642f8f12d759b04
SHA512ffaeb6c876d2aeda75b6576d2b307964a7b5330a0ab73352a4c95ef18ac3b1b1bfff350805553833a754582ed54215337c376bce0abd44c117b5d8a0e1468d71
-
C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeFilesize
1.2MB
MD5242214131486132e33ceda794d66ca1f
SHA14ce34fd91f5c9e35b8694007b286635663ef9bf2
SHA256bac402b5749b2da2211db6d2404c1c621ccd0c2e5d492eb6f973b3e2d38dd361
SHA512031e0904d949cec515f2d6f2b5e4b9c0df03637787ff14f20c58e711c54eec77d1f22aa0cf0f6efd65362c1fc0066645d5d005c6a77fe5b169427cdd42555d29
-
C:\Users\Admin\AppData\Local\Temp\1000115001\build.exeFilesize
26KB
MD55fab3b9073e40ca5ee8ec7e09e4a9e83
SHA1e36e3be783e602e5fba6ae17d174dbc350cd6680
SHA256e667d516aecae694d79dad7c5a895866789e973c5e862c0ffa6f827c8f04f59b
SHA5120cc54ee493065fe94de649b1e6da31cf21e70e315c1d55041f204f386891a329426be6a1d457833103c98e7689e3735e371ddf83c9cf1cb2cb0ce5fb9c2a0d10
-
C:\Users\Admin\AppData\Local\Temp\1000116001\FILE1.exeFilesize
26KB
MD5b2122a84663441aec5fe576040ecbb32
SHA12494b61fb31751fd80fcf2855f8df925ce464b6c
SHA256b5e359d8d7120a4913156612f2b4ef29f1fded9c8dfcc251c1ff72da429ddd12
SHA512682c44812ed536fc22d089aaaeb4531e4e1d271b982348d4616eebd21ebef9c6e6104c1d3cbc9fd9bb7ce5276d5f47a3bbfe222522358b30ad6ebbf92b099ab8
-
C:\Users\Admin\AppData\Local\Temp\1000125001\Freshbuild.exeFilesize
415KB
MD507101cac5b9477ba636cd8ca7b9932cb
SHA159ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1
SHA256488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77
SHA51202240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887
-
C:\Users\Admin\AppData\Local\Temp\1000128001\crypt6.exeFilesize
512KB
MD5a957dc16d684fbd7e12fc87e8ee12fea
SHA120c73ccfdba13fd9b79c9e02432be39e48e4b37d
SHA256071b6c448d2546dea8caed872fca0d002f59a6b9849f0de2a565fc74b487fa37
SHA512fd6982587fba779d6febb84dfa65ec3e048e17733c2f01b61996bedb170bb4bb1cbb822c0dd2cf44a7e601373abaf499885b13b7957dd2a307bbd8f2120e9b3b
-
C:\Users\Admin\AppData\Local\Temp\1000130001\newlogs.exeFilesize
297KB
MD50970456d2e2bcb36f49d23f5f2eec4ce
SHA11e427bbeb209b636371d17801b14fabff87921be
SHA256264db4d677606c95912a93a457675d5ebaa24dc886da8bbcb800fe831c540a54
SHA51243c233e6c6fb20ee5830672f68eec2a1930aff6c3da185b7af56ede90970041157755b8893a86336711c8ba8cbe3f22818de8ddc1789ed65a7aacd596771909e
-
C:\Users\Admin\AppData\Local\Temp\1000131001\stealc_zov.exeFilesize
158KB
MD5253ccac8a47b80287f651987c0c779ea
SHA111db405849dbaa9b3759de921835df20fab35bc3
SHA256262a400b339deea5089433709ce559d23253e23d23c07595b515755114147e2f
SHA512af40e01bc3d36baf47eba1d5d6406220dfbcc52c6123dd8450e709fed3e72bed82aac6257fa7bdf7dd774f182919a5051e9712b2e7f1329defd0b159cb08385d
-
C:\Users\Admin\AppData\Local\Temp\1000132001\newbuild.exeFilesize
297KB
MD59ab4de8b2f2b99f009d32aa790cd091b
SHA1a86b16ee4676850bac14c50ee698a39454d0231e
SHA2568a254344702dc6560312a8028e08f844b16804b1fbf4c438c3ca5058d7b65ea1
SHA512a79341ec3407529daa0384de4cac25b665d3b0cb81e52ecada0ebfe37d7616b16da96b47b04f50ce0a6e46d5fced3298a459f78a087c6b6eac4ed444434c5fbe
-
C:\Users\Admin\AppData\Local\Temp\1000149001\ZharkBOT.exeFilesize
2.9MB
MD580958a4b85453f4df82ec131554a5412
SHA144cefe96467895934ec9d1c2461036704c971458
SHA25670afebe71346475e1f6d4a1c591f920f7ed1d055261eb5d6a4276831aef77783
SHA512cab01e1d63b4ff9a8d35c48fddd18b0959068510b1ca0e66997ed2d59a34b8903f23d3b3736180b52130a325eda3665f9babe2dcad91308f16526e8812fee1c8
-
C:\Users\Admin\AppData\Local\Temp\Cab82D8.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\Tar8348.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeFilesize
1.9MB
MD55ad5e4f1f3126c5d6cfdbfbbe5597c84
SHA147b46cbe987e0e33c9d23f4c6cc304d116e5e80f
SHA256e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0
SHA5128c58379f3107cc67944d003df964f123848c9e7b55edbda3d256915cbbf666fa62e8878bb0c091c84e0057fe5097fef8e3eb49f2382519dc4a06f31a4c37b163
-
\Users\Admin\AppData\Roaming\d3d9.dllFilesize
279KB
MD58fa26f1e37d3ff7f736fc93d520bc8ab
SHA1ad532e1cb4a1b3cd82c7a85647f8f6dd99833bb1
SHA2566c47da8fbd12f22d7272fbf223e054bf5093c0922d0e8fb7d6289a5913c2e45d
SHA5128a0b53cbc3a20e2f0fd41c486b1af1fbbcf7f2fed9f7368b672a07f25faaa2568bbdbcf0841233ac8c473a4d1dee099e90bf6098a6fa15e44b8526efdafc1287
-
memory/1072-325-0x0000000000250000-0x00000000002A0000-memory.dmpFilesize
320KB
-
memory/1476-245-0x00000000008F0000-0x0000000000A22000-memory.dmpFilesize
1.2MB
-
memory/1808-3-0x0000000000B10000-0x0000000000FE8000-memory.dmpFilesize
4.8MB
-
memory/1808-5-0x0000000000B10000-0x0000000000FE8000-memory.dmpFilesize
4.8MB
-
memory/1808-0-0x0000000000B10000-0x0000000000FE8000-memory.dmpFilesize
4.8MB
-
memory/1808-2-0x0000000000B11000-0x0000000000B3F000-memory.dmpFilesize
184KB
-
memory/1808-16-0x0000000000B10000-0x0000000000FE8000-memory.dmpFilesize
4.8MB
-
memory/1808-1-0x0000000077DB0000-0x0000000077DB2000-memory.dmpFilesize
8KB
-
memory/1808-9-0x0000000000B10000-0x0000000000FE8000-memory.dmpFilesize
4.8MB
-
memory/1920-228-0x000000013F3B0000-0x000000013FBFB000-memory.dmpFilesize
8.3MB
-
memory/1940-419-0x000000001B270000-0x000000001B552000-memory.dmpFilesize
2.9MB
-
memory/1940-420-0x0000000002690000-0x0000000002698000-memory.dmpFilesize
32KB
-
memory/2316-480-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-473-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-343-0x0000000007810000-0x0000000007A4C000-memory.dmpFilesize
2.2MB
-
memory/2316-342-0x0000000007810000-0x0000000007A4C000-memory.dmpFilesize
2.2MB
-
memory/2316-481-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-374-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-479-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-478-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-229-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-19-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-319-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-21-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-424-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-279-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-17-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-18-0x00000000003D1000-0x00000000003FF000-memory.dmpFilesize
184KB
-
memory/2316-470-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-477-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-472-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-476-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-474-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2316-475-0x00000000003D0000-0x00000000008A8000-memory.dmpFilesize
4.8MB
-
memory/2716-344-0x0000000000AA0000-0x0000000000CDC000-memory.dmpFilesize
2.2MB
-
memory/2716-471-0x0000000000AA0000-0x0000000000CDC000-memory.dmpFilesize
2.2MB
-
memory/2716-388-0x0000000061E00000-0x0000000061EF3000-memory.dmpFilesize
972KB
-
memory/2816-417-0x0000000000400000-0x00000000004D6000-memory.dmpFilesize
856KB
-
memory/2816-418-0x0000000000400000-0x00000000004D6000-memory.dmpFilesize
856KB
-
memory/3040-359-0x0000000000360000-0x00000000003B0000-memory.dmpFilesize
320KB