Resubmissions
13-06-2023 07:00
230613-hs3zbafg3w 1013-06-2023 06:39
230613-heq3lafg2t 1013-06-2023 03:28
230613-d1sq4aee98 1013-06-2023 03:07
230613-dmpghsfb3z 10Analysis
-
max time kernel
211s -
max time network
232s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 03:07
Static task
static1
Behavioral task
behavioral1
Sample
InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe
Resource
win10v2004-20230220-en
General
-
Target
InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe
-
Size
693.0MB
-
MD5
fb757b3c077ec1976a8079ca0925e330
-
SHA1
a8a3c03094572e007b867b5bb9c26acfb182c509
-
SHA256
f2c3ec6f9869bb611d264d0a4a0dd0ba68b84d17672f07db44e90254b429a667
-
SHA512
6fe3c5aebf1e576215ebd283f967aa35d73339df82c8d06e54fcee6fd33dc4d98408d3916c1a683a71b41a4d2dfe54d18883538bd3f7933d857b72e7dd911502
-
SSDEEP
1572864:NphKtrquc1CVrmamaH0Zxz6RILY6/noAuKFiAC2J2:Npg+Z0VTmVxz1d/noAB72
Malware Config
Extracted
redline
@hendrolas
94.142.138.4:80
-
auth_value
71d16d25eddbb4fd3b98070432f1a757
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Detects Lobshot family 5 IoCs
resource yara_rule behavioral2/files/0x000600000002352a-197.dat family_lobshot behavioral2/files/0x000600000002352a-199.dat family_lobshot behavioral2/files/0x000600000002352a-200.dat family_lobshot behavioral2/files/0x000600000002352d-207.dat family_lobshot behavioral2/files/0x000600000002352d-209.dat family_lobshot -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 40 2308 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 4976 Installer-Expert_v7g.1.7b.exe 4280 conhost.exe 1240 svchost.exe 4584 service.exe 3892 ntlhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell Extension = "C:\\ProgramData\\service.exe" svchost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 26 IoCs
pid Process 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2308 set thread context of 1592 2308 powershell.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 52 Go-http-client/1.1 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4708 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe 2308 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2308 powershell.exe Token: SeShutdownPrivilege 2308 powershell.exe Token: SeCreatePagefilePrivilege 2308 powershell.exe Token: SeDebugPrivilege 1592 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1000 wrote to memory of 4976 1000 InstallerExpress_v3v.0u.6s.exe 89 PID 1000 wrote to memory of 4976 1000 InstallerExpress_v3v.0u.6s.exe 89 PID 1000 wrote to memory of 4976 1000 InstallerExpress_v3v.0u.6s.exe 89 PID 4976 wrote to memory of 2308 4976 Installer-Expert_v7g.1.7b.exe 91 PID 4976 wrote to memory of 2308 4976 Installer-Expert_v7g.1.7b.exe 91 PID 4976 wrote to memory of 2308 4976 Installer-Expert_v7g.1.7b.exe 91 PID 2308 wrote to memory of 1592 2308 powershell.exe 94 PID 2308 wrote to memory of 1592 2308 powershell.exe 94 PID 2308 wrote to memory of 1592 2308 powershell.exe 94 PID 2308 wrote to memory of 1592 2308 powershell.exe 94 PID 2308 wrote to memory of 1592 2308 powershell.exe 94 PID 2308 wrote to memory of 1592 2308 powershell.exe 94 PID 2308 wrote to memory of 1592 2308 powershell.exe 94 PID 2308 wrote to memory of 1592 2308 powershell.exe 94 PID 1592 wrote to memory of 4280 1592 aspnet_compiler.exe 95 PID 1592 wrote to memory of 4280 1592 aspnet_compiler.exe 95 PID 1592 wrote to memory of 1240 1592 aspnet_compiler.exe 96 PID 1592 wrote to memory of 1240 1592 aspnet_compiler.exe 96 PID 1592 wrote to memory of 1240 1592 aspnet_compiler.exe 96 PID 1240 wrote to memory of 3308 1240 svchost.exe 97 PID 1240 wrote to memory of 3308 1240 svchost.exe 97 PID 1240 wrote to memory of 3308 1240 svchost.exe 97 PID 3308 wrote to memory of 4708 3308 cmd.exe 99 PID 3308 wrote to memory of 4708 3308 cmd.exe 99 PID 3308 wrote to memory of 4708 3308 cmd.exe 99 PID 3308 wrote to memory of 4584 3308 cmd.exe 100 PID 3308 wrote to memory of 4584 3308 cmd.exe 100 PID 3308 wrote to memory of 4584 3308 cmd.exe 100 PID 4280 wrote to memory of 3892 4280 conhost.exe 101 PID 4280 wrote to memory of 3892 4280 conhost.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe"C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe"C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe6⤵
- Executes dropped EXE
PID:3892
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\cmd.execmd.exe /c (ping 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\svchost.exe") & (start "" "C:\ProgramData\service.exe")6⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.17⤵
- Runs ping.exe
PID:4708
-
-
C:\ProgramData\service.exe"C:\ProgramData\service.exe"7⤵
- Executes dropped EXE
PID:4584
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
761.8MB
MD5469b4eb3d9e71ace8bc01d46fe8ec6f3
SHA1489aa9ab8aa9a3f20eacdd418c9c91c1326edac4
SHA2560cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562
SHA512207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c
-
Filesize
761.8MB
MD5469b4eb3d9e71ace8bc01d46fe8ec6f3
SHA1489aa9ab8aa9a3f20eacdd418c9c91c1326edac4
SHA2560cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562
SHA512207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
542.9MB
MD5011f46b0ee477bb46caa31654c1a386f
SHA1250b86561fc0f32fdda14ab10f7ed5990ef636e2
SHA2560a8a6de5eb060a63b215d9ef7c7ba72acb1069ee7ad916a7733fffbb2a7bf57d
SHA51283ba43c0cf3f2678236ca802c587e9931f1d0e202a30300b9dd67a8a05c545222dba533c6972e9c7673ca82731ce10a1e8d9342dd3a7132e4f636d854ae14345
-
Filesize
541.6MB
MD5088fce9345272b18eec436229040fda0
SHA19dbef53e0d54dcfcfc189df50fc6de6eb21f8663
SHA2560e246deeace57992818e598555b936e8535bda28791ee788839ce68d18046a39
SHA512953d0378a8a0faf2593b1ab47c5a232c5ae2bd4bd1e3a6d4b1ae28886bfae4522419fd805c8c123e3896659e431138d897c836e29c8722435f5cc11b084db59d