Overview
overview
10Static
static
3FORTNITECHEAT.exe
windows7-x64
10FORTNITECHEAT.exe
windows10-2004-x64
10Installer2.exe
windows7-x64
10Installer2.exe
windows10-2004-x64
10Zeus.exe
windows7-x64
10Zeus.exe
windows10-2004-x64
10installer.exe
windows7-x64
10installer.exe
windows10-2004-x64
10lnjector.exe
windows7-x64
10lnjector.exe
windows10-2004-x64
10setup.exe
windows7-x64
10setup.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 08:55
Static task
static1
Behavioral task
behavioral1
Sample
FORTNITECHEAT.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FORTNITECHEAT.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Installer2.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Installer2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Zeus.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Zeus.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
installer.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
installer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
lnjector.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
lnjector.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
setup.exe
Resource
win7-20241023-en
General
-
Target
Installer2.exe
-
Size
425KB
-
MD5
40dc8f4a6bfb79a50691143b66fa2ff3
-
SHA1
5f051dfe0134e4a1002dda56670f7d1cde6c5bdf
-
SHA256
9190fb6dc4fe6f169c44804424dcfd418a373a0200aa4618c2ea0005a197e91c
-
SHA512
db2ac9c43e931fa235f79904dcd02d4ef8c25109638a4a7601dc5ecac480c99761925d9105ff0b96e909230dd1d25d48859d409333fa7dbf7b6db4b038320549
-
SSDEEP
12288:WOkKE07y8D09eRqFSZdg19n9Q9l9h9K9W9v9919z9b9u9U9f9e9b98989l9R9d9G:sky8OWqFSI19n9Q9l9h9K9W9v9919z93
Malware Config
Extracted
redline
@foruman
82.115.223.138:35316
-
auth_value
07b91b1fbc2cf38591e4b4015a53bf5c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral4/memory/3004-1-0x0000000000400000-0x0000000000438000-memory.dmp family_redline -
Redline family
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 452 set thread context of 3004 452 Installer2.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 4872 452 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 452 wrote to memory of 3004 452 Installer2.exe 87 PID 452 wrote to memory of 3004 452 Installer2.exe 87 PID 452 wrote to memory of 3004 452 Installer2.exe 87 PID 452 wrote to memory of 3004 452 Installer2.exe 87 PID 452 wrote to memory of 3004 452 Installer2.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer2.exe"C:\Users\Admin\AppData\Local\Temp\Installer2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 2522⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 452 -ip 4521⤵PID:2860