Analysis

  • max time kernel
    146s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-11-2024 15:41

General

  • Target

    npp.8.4.1.Installer.x64.exe

  • Size

    700.0MB

  • MD5

    9a2c573e882d31251e1bcd07ba90585f

  • SHA1

    d46878f2ad28df08972371a617bce73ae623523c

  • SHA256

    d7cd49477ad1b8c676dc3507372ca774a69af98280db45a1c9ad0c5f0a4c309e

  • SHA512

    40ac3d1cca6bb8eb7ccfb0d1ae0467423b0355ee5cded84b1095a284f08cecbd70325b808df933d47a7af60081470ad71ee1021e724759227379052302ff3894

  • SSDEEP

    98304:h9eCUTzzphq1G/jxZIo0YYUOJimJJQYts5JcyTcvg6BtufkCJ:PefTzVhqpP9JvgpTcvf7ufz

Malware Config

Extracted

Family

redline

Botnet

Notepad_2

C2

194.36.177.124:39456

Attributes
  • auth_value

    37464cc4dd294b9925a8c1092e1c72a9

Signatures

  • Detect PureCrypter injector 1 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Purecrypter family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe
    "C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 10
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:232
        • C:\Windows\SysWOW64\timeout.exe
          timeout 10
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:1624
      • C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
        "C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:764
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

    Filesize

    4.3MB

    MD5

    542c0f910db312aa76c75d5cdbf76844

    SHA1

    18f608b6220c392ddde0194352b3faf7a10608d1

    SHA256

    6d80dcfdb5a979eb11de1ebbf5733a101fbe4cd8f7c1ac10f651e71fadf52e4a

    SHA512

    087f415c20d485cc322be24ae43f730ae7edfa6f64fe78828727a8cf47a0207d18a9b45769f9f3228cd5012c7d34244ccc7edb3e93ba0cc263c4370153fe4a0d

  • C:\Users\Admin\AppData\Local\Temp\nsl53F9.tmp\InstallOptions.dll

    Filesize

    15KB

    MD5

    ece25721125d55aa26cdfe019c871476

    SHA1

    b87685ae482553823bf95e73e790de48dc0c11ba

    SHA256

    c7fef6457989d97fecc0616a69947927da9d8c493f7905dc8475c748f044f3cf

    SHA512

    4e384735d03c943f5eb3396bb3a9cb42c9d8a5479fe2871de5b8bc18db4bbd6e2c5f8fd71b6840512a7249e12a1c63e0e760417e4baa3dc30f51375588410480

  • C:\Users\Admin\AppData\Local\Temp\nsl53F9.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    68b287f4067ba013e34a1339afdb1ea8

    SHA1

    45ad585b3cc8e5a6af7b68f5d8269c97992130b3

    SHA256

    18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026

    SHA512

    06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb

  • C:\Users\Admin\AppData\Local\Temp\nsl53F9.tmp\System.dll

    Filesize

    12KB

    MD5

    cff85c549d536f651d4fb8387f1976f2

    SHA1

    d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

    SHA256

    8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

    SHA512

    531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

  • C:\Users\Admin\AppData\Local\Temp\nsl53F9.tmp\ioSpecial.ini

    Filesize

    790B

    MD5

    81c282c0f163cd8770701146991f3dfe

    SHA1

    08f0b6462a744545e6b439a6d270b49166286cd2

    SHA256

    64131b24f66e51ec89b00a0c002f849dbb75868ff6d380ae0bfd9fb3a6b0e38d

    SHA512

    ea2fd3082cb18bfc85da2d988e1de04f6d6a5cd22d81f9427b85642273df15ef328bb1bfdc0e56ba47652aa1eacb6cbc9951fd9385b3434f371de0e1dc03f073

  • C:\Users\Admin\AppData\Local\Temp\nsl53F9.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    f065cf220d2730c0707f09e0f0295ea9

    SHA1

    d7f234c43e1de66554f152f59f42207804cb93c7

    SHA256

    f3f7b3b1ef2da5b12c83f4ae9788292fae43f487101c3c3d8b30442c4f3113cc

    SHA512

    d614cfe0c858aacac5efd6073dee8966d57ba35cd4ddb05eb2cf8fe586fa4bef88da99ca4655ad1931190485758f29b7a3aaf9ed58d63709b76ee568d5a86b83

  • C:\Users\Admin\AppData\Local\Temp\nsl53F9.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    6c3f8c94d0727894d706940a8a980543

    SHA1

    0d1bcad901be377f38d579aafc0c41c0ef8dcefd

    SHA256

    56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2

    SHA512

    2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355

  • memory/1912-40-0x00000000050C0000-0x00000000051CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1912-38-0x0000000005500000-0x0000000005B18000-memory.dmp

    Filesize

    6.1MB

  • memory/1912-42-0x0000000005030000-0x000000000507C000-memory.dmp

    Filesize

    304KB

  • memory/1912-41-0x0000000004FF0000-0x000000000502C000-memory.dmp

    Filesize

    240KB

  • memory/1912-39-0x0000000004F90000-0x0000000004FA2000-memory.dmp

    Filesize

    72KB

  • memory/1912-26-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1940-28-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/1940-11-0x0000000006210000-0x000000000669A000-memory.dmp

    Filesize

    4.5MB

  • memory/1940-10-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/1940-13-0x0000000005370000-0x00000000053D6000-memory.dmp

    Filesize

    408KB

  • memory/1940-12-0x0000000002C20000-0x0000000002C6C000-memory.dmp

    Filesize

    304KB

  • memory/1940-5-0x000000007450E000-0x000000007450F000-memory.dmp

    Filesize

    4KB

  • memory/1940-15-0x00000000356B0000-0x0000000035C54000-memory.dmp

    Filesize

    5.6MB

  • memory/1940-14-0x0000000035060000-0x00000000350F2000-memory.dmp

    Filesize

    584KB

  • memory/1940-9-0x000000007450E000-0x000000007450F000-memory.dmp

    Filesize

    4KB

  • memory/1940-8-0x0000000074500000-0x0000000074CB0000-memory.dmp

    Filesize

    7.7MB

  • memory/1940-7-0x0000000005470000-0x00000000058F8000-memory.dmp

    Filesize

    4.5MB

  • memory/1940-6-0x0000000000480000-0x000000000092E000-memory.dmp

    Filesize

    4.7MB