Malware Analysis Report

2024-11-13 16:39

Sample ID 241109-s4tvwsxdpr
Target 9a2c573e882d31251e1bcd07ba90585f
SHA256 9f7b0e7b7254df1f1f723f5f048c7d5a864cbed4bb875732befd33ecda645e54
Tags
purecrypter redline notepad_2 discovery downloader infostealer loader persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9f7b0e7b7254df1f1f723f5f048c7d5a864cbed4bb875732befd33ecda645e54

Threat Level: Known bad

The file 9a2c573e882d31251e1bcd07ba90585f was found to be: Known bad.

Malicious Activity Summary

purecrypter redline notepad_2 discovery downloader infostealer loader persistence

RedLine

Redline family

RedLine payload

Purecrypter family

Detect PureCrypter injector

PureCrypter

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Delays execution with timeout.exe

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-09 15:41

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-09 15:41

Reported

2024-11-09 15:44

Platform

win7-20240903-en

Max time kernel

120s

Max time network

124s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\combase.dll",#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\combase.dll",#1

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-09 15:41

Reported

2024-11-09 15:44

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

152s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\combase.dll",#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\combase.dll",#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 75.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 16.173.189.20.in-addr.arpa udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-09 15:41

Reported

2024-11-09 15:44

Platform

win7-20241010-en

Max time kernel

120s

Max time network

134s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\freebl3.dll",#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\freebl3.dll",#1

Network

N/A

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-11-09 15:41

Reported

2024-11-09 15:44

Platform

win10v2004-20241007-en

Max time kernel

92s

Max time network

153s

Command Line

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\freebl3.dll",#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe "C:\Users\Admin\AppData\Local\Temp\DATA PROTECTION\freebl3.dll",#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 102.208.201.84.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2024-11-09 15:41

Reported

2024-11-09 15:44

Platform

win7-20240729-en

Max time kernel

138s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"

Signatures

Detect PureCrypter injector

loader
Description Indicator Process Target
N/A N/A N/A N/A

PureCrypter

loader downloader purecrypter

Purecrypter family

purecrypter

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Redline family

redline

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2240 set thread context of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\timeout.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1820 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 1820 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 1820 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 1820 wrote to memory of 2240 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2240 wrote to memory of 2936 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2240 wrote to memory of 2936 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2240 wrote to memory of 2936 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2240 wrote to memory of 2936 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 2936 wrote to memory of 1136 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2936 wrote to memory of 1136 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2936 wrote to memory of 1136 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2936 wrote to memory of 1136 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 2240 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2240 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2240 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2240 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2240 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2240 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2240 wrote to memory of 2756 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 2240 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2240 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2240 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2240 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2240 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2240 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2240 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2240 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2240 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2240 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2240 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 2240 wrote to memory of 2688 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Processes

C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout 10

C:\Windows\SysWOW64\timeout.exe

timeout 10

C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Network

Country Destination Domain Proto
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp

Files

memory/2240-6-0x00000000746EE000-0x00000000746EF000-memory.dmp

memory/2240-7-0x0000000000D00000-0x00000000011AE000-memory.dmp

memory/2240-8-0x00000000053C0000-0x0000000005848000-memory.dmp

memory/2240-9-0x00000000746E0000-0x0000000074DCE000-memory.dmp

memory/2240-10-0x00000000746EE000-0x00000000746EF000-memory.dmp

memory/2240-11-0x00000000746E0000-0x0000000074DCE000-memory.dmp

memory/2240-12-0x0000000006530000-0x00000000069BA000-memory.dmp

memory/2240-13-0x0000000000500000-0x000000000054C000-memory.dmp

\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

MD5 542c0f910db312aa76c75d5cdbf76844
SHA1 18f608b6220c392ddde0194352b3faf7a10608d1
SHA256 6d80dcfdb5a979eb11de1ebbf5733a101fbe4cd8f7c1ac10f651e71fadf52e4a
SHA512 087f415c20d485cc322be24ae43f730ae7edfa6f64fe78828727a8cf47a0207d18a9b45769f9f3228cd5012c7d34244ccc7edb3e93ba0cc263c4370153fe4a0d

\Users\Admin\AppData\Local\Temp\nsz6E9D.tmp\System.dll

MD5 cff85c549d536f651d4fb8387f1976f2
SHA1 d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA256 8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512 531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

\Users\Admin\AppData\Local\Temp\nsz6E9D.tmp\LangDLL.dll

MD5 68b287f4067ba013e34a1339afdb1ea8
SHA1 45ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA256 18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA512 06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb

memory/2688-37-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2688-41-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2688-42-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2688-40-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2688-39-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2688-35-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2688-33-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2688-31-0x0000000000400000-0x0000000000420000-memory.dmp

memory/2240-43-0x00000000746E0000-0x0000000074DCE000-memory.dmp

\Users\Admin\AppData\Local\Temp\nsz6E9D.tmp\InstallOptions.dll

MD5 ece25721125d55aa26cdfe019c871476
SHA1 b87685ae482553823bf95e73e790de48dc0c11ba
SHA256 c7fef6457989d97fecc0616a69947927da9d8c493f7905dc8475c748f044f3cf
SHA512 4e384735d03c943f5eb3396bb3a9cb42c9d8a5479fe2871de5b8bc18db4bbd6e2c5f8fd71b6840512a7249e12a1c63e0e760417e4baa3dc30f51375588410480

C:\Users\Admin\AppData\Local\Temp\nsz6E9D.tmp\ioSpecial.ini

MD5 73d9e5792a757895053e801200ec4d9f
SHA1 e0701da96bf3f62ce4ec6c1a707f8ee5ad7358de
SHA256 c7b8694382f393f794409f0c15a7c77f4847006284081e577cf7227383a1f307
SHA512 7337dbda430b12ad90c01abca00edf50156b7bf1f1e8b2aacaaf6ff498dffe5a0be4a54273dbf0324435b3407b448b997876910ae209286620d71666eb255b19

\Users\Admin\AppData\Local\Temp\nsz6E9D.tmp\nsDialogs.dll

MD5 6c3f8c94d0727894d706940a8a980543
SHA1 0d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA256 56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA512 2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355

Analysis: behavioral6

Detonation Overview

Submitted

2024-11-09 15:41

Reported

2024-11-09 15:44

Platform

win10v2004-20241007-en

Max time kernel

146s

Max time network

157s

Command Line

"C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"

Signatures

Detect PureCrypter injector

loader
Description Indicator Process Target
N/A N/A N/A N/A

PureCrypter

loader downloader purecrypter

Purecrypter family

purecrypter

RedLine

infostealer redline

RedLine payload

Description Indicator Process Target
N/A N/A N/A N/A

Redline family

redline

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1940 set thread context of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\timeout.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe N/A

Delays execution with timeout.exe

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\timeout.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2912 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2912 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 2912 wrote to memory of 1940 N/A C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE
PID 1940 wrote to memory of 232 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 1940 wrote to memory of 232 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 1940 wrote to memory of 232 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\SysWOW64\cmd.exe
PID 232 wrote to memory of 1624 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 232 wrote to memory of 1624 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 232 wrote to memory of 1624 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\timeout.exe
PID 1940 wrote to memory of 764 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 1940 wrote to memory of 764 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 1940 wrote to memory of 764 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe
PID 1940 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 1940 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 1940 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 1940 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 1940 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 1940 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 1940 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
PID 1940 wrote to memory of 1912 N/A C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Processes

C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\npp.8.4.1.Installer.x64.exe"

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\DRIVER~1.EXE

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c timeout 10

C:\Windows\SysWOW64\timeout.exe

timeout 10

C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

"C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
DE 194.36.177.124:39456 tcp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
DE 194.36.177.124:39456 tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp
DE 194.36.177.124:39456 tcp

Files

memory/1940-5-0x000000007450E000-0x000000007450F000-memory.dmp

memory/1940-6-0x0000000000480000-0x000000000092E000-memory.dmp

memory/1940-7-0x0000000005470000-0x00000000058F8000-memory.dmp

memory/1940-8-0x0000000074500000-0x0000000074CB0000-memory.dmp

memory/1940-9-0x000000007450E000-0x000000007450F000-memory.dmp

memory/1940-10-0x0000000074500000-0x0000000074CB0000-memory.dmp

memory/1940-11-0x0000000006210000-0x000000000669A000-memory.dmp

memory/1940-12-0x0000000002C20000-0x0000000002C6C000-memory.dmp

memory/1940-13-0x0000000005370000-0x00000000053D6000-memory.dmp

memory/1940-14-0x0000000035060000-0x00000000350F2000-memory.dmp

memory/1940-15-0x00000000356B0000-0x0000000035C54000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Mppzqonpp.8.4.1.installer.x64.exe

MD5 542c0f910db312aa76c75d5cdbf76844
SHA1 18f608b6220c392ddde0194352b3faf7a10608d1
SHA256 6d80dcfdb5a979eb11de1ebbf5733a101fbe4cd8f7c1ac10f651e71fadf52e4a
SHA512 087f415c20d485cc322be24ae43f730ae7edfa6f64fe78828727a8cf47a0207d18a9b45769f9f3228cd5012c7d34244ccc7edb3e93ba0cc263c4370153fe4a0d

memory/1912-26-0x0000000000400000-0x0000000000420000-memory.dmp

memory/1940-28-0x0000000074500000-0x0000000074CB0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\nsl53F9.tmp\System.dll

MD5 cff85c549d536f651d4fb8387f1976f2
SHA1 d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA256 8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512 531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

C:\Users\Admin\AppData\Local\Temp\nsl53F9.tmp\LangDLL.dll

MD5 68b287f4067ba013e34a1339afdb1ea8
SHA1 45ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA256 18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA512 06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb

memory/1912-38-0x0000000005500000-0x0000000005B18000-memory.dmp

memory/1912-39-0x0000000004F90000-0x0000000004FA2000-memory.dmp

memory/1912-40-0x00000000050C0000-0x00000000051CA000-memory.dmp

memory/1912-41-0x0000000004FF0000-0x000000000502C000-memory.dmp

memory/1912-42-0x0000000005030000-0x000000000507C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\nsl53F9.tmp\InstallOptions.dll

MD5 ece25721125d55aa26cdfe019c871476
SHA1 b87685ae482553823bf95e73e790de48dc0c11ba
SHA256 c7fef6457989d97fecc0616a69947927da9d8c493f7905dc8475c748f044f3cf
SHA512 4e384735d03c943f5eb3396bb3a9cb42c9d8a5479fe2871de5b8bc18db4bbd6e2c5f8fd71b6840512a7249e12a1c63e0e760417e4baa3dc30f51375588410480

C:\Users\Admin\AppData\Local\Temp\nsl53F9.tmp\ioSpecial.ini

MD5 81c282c0f163cd8770701146991f3dfe
SHA1 08f0b6462a744545e6b439a6d270b49166286cd2
SHA256 64131b24f66e51ec89b00a0c002f849dbb75868ff6d380ae0bfd9fb3a6b0e38d
SHA512 ea2fd3082cb18bfc85da2d988e1de04f6d6a5cd22d81f9427b85642273df15ef328bb1bfdc0e56ba47652aa1eacb6cbc9951fd9385b3434f371de0e1dc03f073

C:\Users\Admin\AppData\Local\Temp\nsl53F9.tmp\ioSpecial.ini

MD5 f065cf220d2730c0707f09e0f0295ea9
SHA1 d7f234c43e1de66554f152f59f42207804cb93c7
SHA256 f3f7b3b1ef2da5b12c83f4ae9788292fae43f487101c3c3d8b30442c4f3113cc
SHA512 d614cfe0c858aacac5efd6073dee8966d57ba35cd4ddb05eb2cf8fe586fa4bef88da99ca4655ad1931190485758f29b7a3aaf9ed58d63709b76ee568d5a86b83

C:\Users\Admin\AppData\Local\Temp\nsl53F9.tmp\nsDialogs.dll

MD5 6c3f8c94d0727894d706940a8a980543
SHA1 0d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA256 56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA512 2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355