Resubmissions
13-06-2023 07:00
230613-hs3zbafg3w 1013-06-2023 06:39
230613-heq3lafg2t 1013-06-2023 03:28
230613-d1sq4aee98 1013-06-2023 03:07
230613-dmpghsfb3z 10Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 03:28
Static task
static1
Behavioral task
behavioral1
Sample
InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe
Resource
win10v2004-20230220-en
General
-
Target
InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe
-
Size
693.0MB
-
MD5
fb757b3c077ec1976a8079ca0925e330
-
SHA1
a8a3c03094572e007b867b5bb9c26acfb182c509
-
SHA256
f2c3ec6f9869bb611d264d0a4a0dd0ba68b84d17672f07db44e90254b429a667
-
SHA512
6fe3c5aebf1e576215ebd283f967aa35d73339df82c8d06e54fcee6fd33dc4d98408d3916c1a683a71b41a4d2dfe54d18883538bd3f7933d857b72e7dd911502
-
SSDEEP
1572864:NphKtrquc1CVrmamaH0Zxz6RILY6/noAuKFiAC2J2:Npg+Z0VTmVxz1d/noAB72
Malware Config
Extracted
redline
@hendrolas
94.142.138.4:80
-
auth_value
71d16d25eddbb4fd3b98070432f1a757
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 64 3236 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 440 Installer-Expert_v7g.1.7b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 26 IoCs
pid Process 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3236 set thread context of 3848 3236 powershell.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3236 powershell.exe Token: SeShutdownPrivilege 3236 powershell.exe Token: SeCreatePagefilePrivilege 3236 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3516 wrote to memory of 440 3516 InstallerExpress_v3v.0u.6s.exe 89 PID 3516 wrote to memory of 440 3516 InstallerExpress_v3v.0u.6s.exe 89 PID 3516 wrote to memory of 440 3516 InstallerExpress_v3v.0u.6s.exe 89 PID 440 wrote to memory of 3236 440 Installer-Expert_v7g.1.7b.exe 92 PID 440 wrote to memory of 3236 440 Installer-Expert_v7g.1.7b.exe 92 PID 440 wrote to memory of 3236 440 Installer-Expert_v7g.1.7b.exe 92 PID 3236 wrote to memory of 1736 3236 powershell.exe 95 PID 3236 wrote to memory of 1736 3236 powershell.exe 95 PID 3236 wrote to memory of 1736 3236 powershell.exe 95 PID 3236 wrote to memory of 3848 3236 powershell.exe 96 PID 3236 wrote to memory of 3848 3236 powershell.exe 96 PID 3236 wrote to memory of 3848 3236 powershell.exe 96 PID 3236 wrote to memory of 3848 3236 powershell.exe 96 PID 3236 wrote to memory of 3848 3236 powershell.exe 96 PID 3236 wrote to memory of 3848 3236 powershell.exe 96 PID 3236 wrote to memory of 3848 3236 powershell.exe 96 PID 3236 wrote to memory of 3848 3236 powershell.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe"C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe"C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe4⤵PID:1736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe4⤵PID:3848
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
761.8MB
MD5469b4eb3d9e71ace8bc01d46fe8ec6f3
SHA1489aa9ab8aa9a3f20eacdd418c9c91c1326edac4
SHA2560cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562
SHA512207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c
-
Filesize
761.8MB
MD5469b4eb3d9e71ace8bc01d46fe8ec6f3
SHA1489aa9ab8aa9a3f20eacdd418c9c91c1326edac4
SHA2560cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562
SHA512207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82