Overview
overview
10Static
static
3DriverBoosterPro.exe
windows7-x64
10DriverBoosterPro.exe
windows10-2004-x64
10Install.exe
windows7-x64
10Install.exe
windows10-2004-x64
10Installer.exe
windows7-x64
10Installer.exe
windows10-2004-x64
10Installlin...it.exe
windows7-x64
7Installlin...it.exe
windows10-2004-x64
7Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10Setup_1.exe
windows7-x64
10Setup_1.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:56
Static task
static1
Behavioral task
behavioral1
Sample
DriverBoosterPro.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DriverBoosterPro.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Install.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Install.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Installer.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Installer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
InstalllingFile_x64_x32mbit.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
InstalllingFile_x64_x32mbit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Setup_1.exe
Resource
win7-20241010-en
General
-
Target
Installer.exe
-
Size
386KB
-
MD5
5afbfa3023456a4d8df92e1ed7ed3f2b
-
SHA1
3d4f446d0e6094a0c9565104b04412b9d74842fe
-
SHA256
6bc0ced43000f97bc833b5af9663c3fad52ddf20847a6086daba4ac6c03267ef
-
SHA512
001cf602e8272074284a8b5cb45b70eb261589047ce6831d9bc8a4dd78c5d707f7c4ad96bf4f4c653fba23661e707d1efd332c120514b3043700ce0eeb03e752
-
SSDEEP
12288:ys2XdBRyYpDyOsf1Ug7HFrQeDrgDMcFD:t2XplJLR
Malware Config
Extracted
redline
@traxoeb4000
45.15.156.155:80
-
auth_value
b641aba23f2f7986b7337612ab13eddc
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral6/memory/2028-4-0x0000000000400000-0x0000000000432000-memory.dmp family_redline -
Redline family
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3212 set thread context of 2028 3212 Installer.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 2040 3212 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3212 wrote to memory of 2028 3212 Installer.exe 85 PID 3212 wrote to memory of 2028 3212 Installer.exe 85 PID 3212 wrote to memory of 2028 3212 Installer.exe 85 PID 3212 wrote to memory of 2028 3212 Installer.exe 85 PID 3212 wrote to memory of 2028 3212 Installer.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 2642⤵
- Program crash
PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3212 -ip 32121⤵PID:1528