Malware Analysis Report

2024-11-13 16:39

Sample ID 241106-thc6pasmat
Target dbb4dd16882685410e70b1babfaf6b832be4183a
SHA256 1df95ebb57c93ce4374ff3ba6fcdad3662af67015abade8925c242a04e1b6b6c
Tags
purecrypter redline notepad_2 discovery downloader infostealer loader persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1df95ebb57c93ce4374ff3ba6fcdad3662af67015abade8925c242a04e1b6b6c

Threat Level: Known bad

The file dbb4dd16882685410e70b1babfaf6b832be4183a was found to be: Known bad.

Malicious Activity Summary

purecrypter redline notepad_2 discovery downloader infostealer loader persistence

Purecrypter family

RedLine payload

Redline family

Detect PureCrypter injector

PureCrypter

RedLine

Loads dropped DLL

Executes dropped EXE

Checks computer location settings

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Delays execution with timeout.exe

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-06 16:03

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-06 16:03

Reported

2024-11-06 16:06

Platform

win10v2004-20241007-en

Max time kernel

91s

Max time network

151s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\combase.dll",#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\combase.dll",#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 67.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-06 16:03

Reported

2024-11-06 16:06

Platform

win7-20240903-en

Max time kernel

117s

Max time network

120s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\freebl3.dll",#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\freebl3.dll",#1

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-11-06 16:03

Reported

2024-11-06 16:06

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

140s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\freebl3.dll",#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\freebl3.dll",#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 75.117.19.2.in-addr.arpa udp
US 8.8.8.8:53 70.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 107.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-11-06 16:03

Reported

2024-11-06 16:06

Platform

win7-20240729-en

Max time kernel

138s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"

Signatures

Detect PureCrypter injector

loader
Description Indicator Process Target
N/A N/A N/A N/A

PureCrypter

loader downloader purecrypter

Purecrypter family

purecrypter

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2164 set thread context of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\timeout.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2096 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2096 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2096 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2096 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2164 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2164 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2164 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2164 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2708 wrote to memory of 2572 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2708 wrote to memory of 2572 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2708 wrote to memory of 2572 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2708 wrote to memory of 2572 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2164 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2164 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2164 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2164 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2164 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2164 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2164 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2164 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2164 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2164 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2164 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2164 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2164 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2164 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2164 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2164 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2164 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2164 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2164 wrote to memory of 2876 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Processes

C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout 10

C:\Windows\SysWOW64\timeout.exe

timeout 10

C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Network

Country Destination Domain Proto
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp

Files

memory/2164-6-0x0000000074D5E000-0x0000000074D5F000-memory.dmp

memory/2164-7-0x0000000000160000-0x000000000060E000-memory.dmp

memory/2164-8-0x00000000051B0000-0x0000000005638000-memory.dmp

memory/2164-9-0x0000000074D50000-0x000000007543E000-memory.dmp

memory/2164-10-0x0000000074D5E000-0x0000000074D5F000-memory.dmp

memory/2164-11-0x0000000074D50000-0x000000007543E000-memory.dmp

memory/2164-12-0x0000000006320000-0x00000000067AA000-memory.dmp

memory/2164-13-0x0000000002230000-0x000000000227C000-memory.dmp

\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

MD5 542c0f910db312aa76c75d5cdbf76844
SHA1 18f608b6220c392ddde0194352b3faf7a10608d1
SHA256 6d80dcfdb5a979eb11de1ebbf5733a101fbe4cd8f7c1ac10f651e71fadf52e4a
SHA512 087f415c20d485cc322be24ae43f730ae7edfa6f64fe78828727a8cf47a0207d18a9b45769f9f3228cd5012c7d34244ccc7edb3e93ba0cc263c4370153fe4a0d

\Users\Admin\AppData\Local\Temp\nst7715.tmp\System.dll

MD5 cff85c549d536f651d4fb8387f1976f2
SHA1 d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA256 8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512 531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

\Users\Admin\AppData\Local\Temp\nst7715.tmp\LangDLL.dll

MD5 68b287f4067ba013e34a1339afdb1ea8
SHA1 45ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA256 18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA512 06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb

memory/2876-31-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2876-40-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2876-42-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2876-41-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2876-39-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2876-37-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2876-35-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2876-33-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2164-43-0x0000000074D50000-0x000000007543E000-memory.dmp

\Users\Admin\AppData\Local\Temp\nst7715.tmp\InstallOptions.dll

MD5 ece25721125d55aa26cdfe019c871476
SHA1 b87685ae482553823bf95e73e790de48dc0c11ba
SHA256 c7fef6457989d97fecc0616a69947927da9d8c493f7905dc8475c748f044f3cf
SHA512 4e384735d03c943f5eb3396bb3a9cb42c9d8a5479fe2871de5b8bc18db4bbd6e2c5f8fd71b6840512a7249e12a1c63e0e760417e4baa3dc30f51375588410480

C:\Users\Admin\AppData\Local\Temp\nst7715.tmp\ioSpecial.ini

MD5 4c2328fac017565af42cf258393e58ed
SHA1 c2cb110faf4d6366374d95814eacb0f4c467ce64
SHA256 fcb670929f48856ed6fb8ae3fbd90dd296e3f71cf01b765fefce36f9c99372d9
SHA512 dcef4e011790420002fe4fd78060c79d799e0dd12834cd7f38c7965a867285a4629449b968f1b2290719586bd65a5775518fcf8275e920b7b507c225d70b2ee4

\Users\Admin\AppData\Local\Temp\nst7715.tmp\nsDialogs.dll

MD5 6c3f8c94d0727894d706940a8a980543
SHA1 0d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA256 56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA512 2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355

Analysis: behavioral6

Detonation Overview

Submitted

2024-11-06 16:03

Reported

2024-11-06 16:06

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"

Signatures

Detect PureCrypter injector

loader
Description Indicator Process Target
N/A N/A N/A N/A

PureCrypter

loader downloader purecrypter

Purecrypter family

purecrypter

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2848 set thread context of 3160 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\timeout.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4804 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 4804 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 4804 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2848 wrote to memory of 2828 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2848 wrote to memory of 2828 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2848 wrote to memory of 2828 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2828 wrote to memory of 3240 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2828 wrote to memory of 3240 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2828 wrote to memory of 3240 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2848 wrote to memory of 3968 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2848 wrote to memory of 3968 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2848 wrote to memory of 3968 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2848 wrote to memory of 3160 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2848 wrote to memory of 3160 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2848 wrote to memory of 3160 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2848 wrote to memory of 3160 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2848 wrote to memory of 3160 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2848 wrote to memory of 3160 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2848 wrote to memory of 3160 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2848 wrote to memory of 3160 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Processes

C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout 10

C:\Windows\SysWOW64\timeout.exe

timeout 10

C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
DE 194.36.177.124:39456 tcp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
DE 194.36.177.124:39456 tcp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
US 8.8.8.8:53 93.65.42.20.in-addr.arpa udp

Files

memory/2848-5-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

memory/2848-6-0x0000000000C70000-0x000000000111E000-memory.dmp

memory/2848-7-0x0000000005AE0000-0x0000000005F68000-memory.dmp

memory/2848-8-0x0000000074D80000-0x0000000075530000-memory.dmp

memory/2848-9-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

memory/2848-10-0x0000000074D80000-0x0000000075530000-memory.dmp

memory/2848-11-0x0000000005F70000-0x00000000063FA000-memory.dmp

memory/2848-12-0x00000000053D0000-0x000000000541C000-memory.dmp

memory/2848-13-0x0000000008470000-0x00000000084D6000-memory.dmp

memory/2848-14-0x0000000009200000-0x0000000009292000-memory.dmp

memory/2848-15-0x0000000009850000-0x0000000009DF4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

MD5 542c0f910db312aa76c75d5cdbf76844
SHA1 18f608b6220c392ddde0194352b3faf7a10608d1
SHA256 6d80dcfdb5a979eb11de1ebbf5733a101fbe4cd8f7c1ac10f651e71fadf52e4a
SHA512 087f415c20d485cc322be24ae43f730ae7edfa6f64fe78828727a8cf47a0207d18a9b45769f9f3228cd5012c7d34244ccc7edb3e93ba0cc263c4370153fe4a0d

memory/3160-26-0x0000000000400000-0x0000000000420000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\nss2548.tmp\System.dll

MD5 cff85c549d536f651d4fb8387f1976f2
SHA1 d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA256 8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512 531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

C:\Users\Admin\AppData\Local\Temp\nss2548.tmp\LangDLL.dll

MD5 68b287f4067ba013e34a1339afdb1ea8
SHA1 45ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA256 18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA512 06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb

memory/3160-38-0x00000000059E0000-0x0000000005FF8000-memory.dmp

memory/3160-40-0x0000000005580000-0x000000000568A000-memory.dmp

memory/3160-39-0x0000000005450000-0x0000000005462000-memory.dmp

memory/3160-41-0x00000000054B0000-0x00000000054EC000-memory.dmp

memory/2848-35-0x0000000074D80000-0x0000000075530000-memory.dmp

memory/3160-42-0x00000000054F0000-0x000000000553C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\nss2548.tmp\InstallOptions.dll

MD5 ece25721125d55aa26cdfe019c871476
SHA1 b87685ae482553823bf95e73e790de48dc0c11ba
SHA256 c7fef6457989d97fecc0616a69947927da9d8c493f7905dc8475c748f044f3cf
SHA512 4e384735d03c943f5eb3396bb3a9cb42c9d8a5479fe2871de5b8bc18db4bbd6e2c5f8fd71b6840512a7249e12a1c63e0e760417e4baa3dc30f51375588410480

C:\Users\Admin\AppData\Local\Temp\nss2548.tmp\ioSpecial.ini

MD5 933ebba1892092abff0e1344feb65dc5
SHA1 272a37935cfac1ae456d43aff277adcb22265203
SHA256 3d10a171a930e6782a588723514dd55c937eea7326a2f55f6519e93b352788d4
SHA512 5b3ab09e1f03b61050ff82be58b204683d7ef6663db7e27e5c0c13ce07c63bfef8a8426082ea419d89161c8eb204535f26cf9874332a86818b79aa66dbcae89e

C:\Users\Admin\AppData\Local\Temp\nss2548.tmp\nsDialogs.dll

MD5 6c3f8c94d0727894d706940a8a980543
SHA1 0d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA256 56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA512 2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-06 16:03

Reported

2024-11-06 16:06

Platform

win7-20240903-en

Max time kernel

119s

Max time network

125s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\combase.dll",#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\combase.dll",#1

Network

N/A

Files

N/A