Resubmissions
13-06-2023 07:00
230613-hs3zbafg3w 1013-06-2023 06:39
230613-heq3lafg2t 1013-06-2023 03:28
230613-d1sq4aee98 1013-06-2023 03:07
230613-dmpghsfb3z 10Analysis
-
max time kernel
700s -
max time network
719s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 06:39
Static task
static1
Behavioral task
behavioral1
Sample
InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe
Resource
win10v2004-20230220-en
General
-
Target
InstallerExpress_v3v.0u.6s/InstallerExpress_v3v.0u.6s.exe
-
Size
693.0MB
-
MD5
fb757b3c077ec1976a8079ca0925e330
-
SHA1
a8a3c03094572e007b867b5bb9c26acfb182c509
-
SHA256
f2c3ec6f9869bb611d264d0a4a0dd0ba68b84d17672f07db44e90254b429a667
-
SHA512
6fe3c5aebf1e576215ebd283f967aa35d73339df82c8d06e54fcee6fd33dc4d98408d3916c1a683a71b41a4d2dfe54d18883538bd3f7933d857b72e7dd911502
-
SSDEEP
1572864:NphKtrquc1CVrmamaH0Zxz6RILY6/noAuKFiAC2J2:Npg+Z0VTmVxz1d/noAB72
Malware Config
Extracted
redline
@hendrolas
94.142.138.4:80
-
auth_value
71d16d25eddbb4fd3b98070432f1a757
Extracted
laplas
http://185.223.93.251
-
api_key
f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7
Signatures
-
Detects Lobshot family 5 IoCs
resource yara_rule behavioral1/files/0x0006000000023526-196.dat family_lobshot behavioral1/files/0x0006000000023526-198.dat family_lobshot behavioral1/files/0x0006000000023526-199.dat family_lobshot behavioral1/files/0x000600000002352b-209.dat family_lobshot behavioral1/files/0x000600000002352b-210.dat family_lobshot -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 71 3688 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 1288 Installer-Expert_v7g.1.7b.exe 836 conhost.exe 1544 svchost.exe 4920 service.exe 3412 ntlhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Shell Extension = "C:\\ProgramData\\service.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" conhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
pid Process 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3688 set thread context of 3416 3688 powershell.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 85 Go-http-client/1.1 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 688 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3688 powershell.exe Token: SeShutdownPrivilege 3688 powershell.exe Token: SeCreatePagefilePrivilege 3688 powershell.exe Token: SeDebugPrivilege 3416 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4384 wrote to memory of 1288 4384 InstallerExpress_v3v.0u.6s.exe 82 PID 4384 wrote to memory of 1288 4384 InstallerExpress_v3v.0u.6s.exe 82 PID 4384 wrote to memory of 1288 4384 InstallerExpress_v3v.0u.6s.exe 82 PID 1288 wrote to memory of 3688 1288 Installer-Expert_v7g.1.7b.exe 90 PID 1288 wrote to memory of 3688 1288 Installer-Expert_v7g.1.7b.exe 90 PID 1288 wrote to memory of 3688 1288 Installer-Expert_v7g.1.7b.exe 90 PID 3688 wrote to memory of 3416 3688 powershell.exe 92 PID 3688 wrote to memory of 3416 3688 powershell.exe 92 PID 3688 wrote to memory of 3416 3688 powershell.exe 92 PID 3688 wrote to memory of 3416 3688 powershell.exe 92 PID 3688 wrote to memory of 3416 3688 powershell.exe 92 PID 3688 wrote to memory of 3416 3688 powershell.exe 92 PID 3688 wrote to memory of 3416 3688 powershell.exe 92 PID 3688 wrote to memory of 3416 3688 powershell.exe 92 PID 3416 wrote to memory of 836 3416 aspnet_compiler.exe 93 PID 3416 wrote to memory of 836 3416 aspnet_compiler.exe 93 PID 3416 wrote to memory of 1544 3416 aspnet_compiler.exe 94 PID 3416 wrote to memory of 1544 3416 aspnet_compiler.exe 94 PID 3416 wrote to memory of 1544 3416 aspnet_compiler.exe 94 PID 1544 wrote to memory of 2124 1544 svchost.exe 95 PID 1544 wrote to memory of 2124 1544 svchost.exe 95 PID 1544 wrote to memory of 2124 1544 svchost.exe 95 PID 2124 wrote to memory of 688 2124 cmd.exe 97 PID 2124 wrote to memory of 688 2124 cmd.exe 97 PID 2124 wrote to memory of 688 2124 cmd.exe 97 PID 2124 wrote to memory of 4920 2124 cmd.exe 98 PID 2124 wrote to memory of 4920 2124 cmd.exe 98 PID 2124 wrote to memory of 4920 2124 cmd.exe 98 PID 836 wrote to memory of 3412 836 conhost.exe 99 PID 836 wrote to memory of 3412 836 conhost.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe"C:\Users\Admin\AppData\Local\Temp\InstallerExpress_v3v.0u.6s\InstallerExpress_v3v.0u.6s.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe"C:\Users\Admin\AppData\Local\Temp\Installer-Expert_v7g.1.7b\Installer-Expert_v7g.1.7b.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET/Framework/v4.0.30319/aspnet_compiler.exe4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\conhost.exe"C:\Users\Admin\AppData\Local\Temp\conhost.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe6⤵
- Executes dropped EXE
PID:3412
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.execmd.exe /c (ping 127.0.0.1) & (del /F /Q "C:\Users\Admin\AppData\Local\Temp\svchost.exe") & (start "" "C:\ProgramData\service.exe")6⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.17⤵
- Runs ping.exe
PID:688
-
-
C:\ProgramData\service.exe"C:\ProgramData\service.exe"7⤵
- Executes dropped EXE
PID:4920
-
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4604
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
761.8MB
MD5469b4eb3d9e71ace8bc01d46fe8ec6f3
SHA1489aa9ab8aa9a3f20eacdd418c9c91c1326edac4
SHA2560cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562
SHA512207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c
-
Filesize
761.8MB
MD5469b4eb3d9e71ace8bc01d46fe8ec6f3
SHA1489aa9ab8aa9a3f20eacdd418c9c91c1326edac4
SHA2560cd926d1bd253876141aa8aa3bf9e97755512d812edad22995525fd3447e8562
SHA512207aebf104491d1ccc63f490d07c2f5fe70cdb6161f26c8d7b3ada9e9a0752c957f6c174ee076fa5a552bc51df9d958188784f209a903ac9855df6c84fe9855c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
4.0MB
MD5feccda803ece2e7a3b7e9798714ad47e
SHA1e97182adccf8a7692e6ad2614b0fb7fd3898a1a2
SHA25614529dca41abfea65abb51c84ec34ba0a951581586f98cef60213ae949a78320
SHA512dec5fd4d184772ca590333b2382706c6e5a7b5050f9ae98af813192e06500424870e8332a1406c763e5cc6d266ddd7e09280b6bf118392fa6edea6fab5843287
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
80KB
MD5b8d23f55d8924b617a57035db1cd3eb0
SHA194f84b29f47762afa6f44b39dea910286381f296
SHA256921db56e4de5605b3759de43727f62be0f4c158a2837cf08ff376c427b85bec8
SHA512656c74a552e068e20f234a7f66fd49a2c2477b991385c563443856d0b1e7668cb79f839f06f846eed14cfb009dd0fb4b1ad9f96fd1d0313d38cfb6d213e68099
-
Filesize
747.0MB
MD57e0bbb7f25bdd1f0b3e328e191987464
SHA1c8ccf5e9d1e1b3718c8574b60d929052e5ec7751
SHA25627e03594419567de0c9ba12887f421fce8fcfb9ddddc0b900542c1f8425568c3
SHA512e039895943227a086ed0b926620e838c9eced64af63e1f96a21d5164e504fcc0b26f376c7f1c061b2bc27f4f8dfdca109a5fcce1dd9579a0727cc4d229f4d598
-
Filesize
747.0MB
MD57e0bbb7f25bdd1f0b3e328e191987464
SHA1c8ccf5e9d1e1b3718c8574b60d929052e5ec7751
SHA25627e03594419567de0c9ba12887f421fce8fcfb9ddddc0b900542c1f8425568c3
SHA512e039895943227a086ed0b926620e838c9eced64af63e1f96a21d5164e504fcc0b26f376c7f1c061b2bc27f4f8dfdca109a5fcce1dd9579a0727cc4d229f4d598