Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    01-11-2020 07:01

General

  • Target

    cb4255d73d0fd4ce9a13464ddae05d54.exe

  • Size

    781KB

  • MD5

    cb4255d73d0fd4ce9a13464ddae05d54

  • SHA1

    75c531c0bf974395be88ea678b95561de4e8966d

  • SHA256

    7b6c0334b1cc26e87e6a071ed278dd0781634460e0de56245fc306624340fb21

  • SHA512

    63b885330de0e8a07919a267b751cab364c302a35d093ca73a42ca4599365675a7cdb4278134b7bb10fe2dc72d039ad3704e7bc0eca8ac9db93ed7ee0dd56ed4

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 52 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 14 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb4255d73d0fd4ce9a13464ddae05d54.exe
    "C:\Users\Admin\AppData\Local\Temp\cb4255d73d0fd4ce9a13464ddae05d54.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 760
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:184
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 868
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3268
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 1212
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:956
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 1260
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1348
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 1592
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1204
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 1632
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3992
    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
      bestof.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2428
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 540
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:2620
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 504
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:1088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 1052
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:904
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 1120
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3048
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 1276
        3⤵
        • Program crash
        PID:3984
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 1640
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3616
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 1920
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2656
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 1968
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2204

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
    MD5

    6943b3380427465a7998ddf3a96945a0

    SHA1

    abb680ef5e005da1610828d518c15a250b001fd9

    SHA256

    94e489927f1f04b50d80382b4ebbb245d8b0cd55f36dac8d7de3c543cbf361fb

    SHA512

    5c8fb35986df56b3f6f7b850a98455ab3d767372b57838d54c9faf280826975a0f2a0828fa977469a3d5e02ce9f7bea23e8b574cf793f4264f385e871de8277d

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
    MD5

    6943b3380427465a7998ddf3a96945a0

    SHA1

    abb680ef5e005da1610828d518c15a250b001fd9

    SHA256

    94e489927f1f04b50d80382b4ebbb245d8b0cd55f36dac8d7de3c543cbf361fb

    SHA512

    5c8fb35986df56b3f6f7b850a98455ab3d767372b57838d54c9faf280826975a0f2a0828fa977469a3d5e02ce9f7bea23e8b574cf793f4264f385e871de8277d

  • memory/184-7-0x0000000004C10000-0x0000000004C11000-memory.dmp
    Filesize

    4KB

  • memory/184-8-0x0000000004C10000-0x0000000004C11000-memory.dmp
    Filesize

    4KB

  • memory/184-10-0x0000000005240000-0x0000000005241000-memory.dmp
    Filesize

    4KB

  • memory/904-114-0x00000000050E0000-0x00000000050E1000-memory.dmp
    Filesize

    4KB

  • memory/904-104-0x00000000048B0000-0x00000000048B1000-memory.dmp
    Filesize

    4KB

  • memory/956-21-0x0000000004620000-0x0000000004621000-memory.dmp
    Filesize

    4KB

  • memory/956-24-0x0000000004E50000-0x0000000004E51000-memory.dmp
    Filesize

    4KB

  • memory/1088-82-0x0000000005390000-0x0000000005391000-memory.dmp
    Filesize

    4KB

  • memory/1088-70-0x0000000004E60000-0x0000000004E61000-memory.dmp
    Filesize

    4KB

  • memory/1172-20-0x0000000004250000-0x0000000004251000-memory.dmp
    Filesize

    4KB

  • memory/1172-15-0x0000000004250000-0x0000000004251000-memory.dmp
    Filesize

    4KB

  • memory/1172-14-0x0000000004250000-0x0000000004251000-memory.dmp
    Filesize

    4KB

  • memory/1172-13-0x0000000004250000-0x0000000004251000-memory.dmp
    Filesize

    4KB

  • memory/1172-1-0x0000000004110000-0x0000000004111000-memory.dmp
    Filesize

    4KB

  • memory/1172-0-0x0000000002626000-0x0000000002628000-memory.dmp
    Filesize

    8KB

  • memory/1204-29-0x0000000004960000-0x0000000004961000-memory.dmp
    Filesize

    4KB

  • memory/1204-32-0x0000000005290000-0x0000000005291000-memory.dmp
    Filesize

    4KB

  • memory/1348-25-0x0000000004910000-0x0000000004911000-memory.dmp
    Filesize

    4KB

  • memory/1348-28-0x0000000004F40000-0x0000000004F41000-memory.dmp
    Filesize

    4KB

  • memory/2204-101-0x0000000005550000-0x0000000005551000-memory.dmp
    Filesize

    4KB

  • memory/2204-97-0x0000000004E20000-0x0000000004E21000-memory.dmp
    Filesize

    4KB

  • memory/2428-80-0x0000000000000000-mapping.dmp
  • memory/2428-96-0x0000000006A80000-0x0000000006A81000-memory.dmp
    Filesize

    4KB

  • memory/2428-43-0x0000000072E40000-0x000000007352E000-memory.dmp
    Filesize

    6.9MB

  • memory/2428-138-0x0000000000000000-mapping.dmp
  • memory/2428-139-0x0000000000000000-mapping.dmp
  • memory/2428-137-0x0000000000000000-mapping.dmp
  • memory/2428-54-0x0000000000000000-mapping.dmp
  • memory/2428-55-0x0000000000000000-mapping.dmp
  • memory/2428-57-0x0000000000000000-mapping.dmp
  • memory/2428-56-0x0000000000000000-mapping.dmp
  • memory/2428-58-0x0000000000000000-mapping.dmp
  • memory/2428-59-0x0000000000000000-mapping.dmp
  • memory/2428-61-0x0000000000000000-mapping.dmp
  • memory/2428-62-0x0000000000000000-mapping.dmp
  • memory/2428-63-0x0000000000000000-mapping.dmp
  • memory/2428-64-0x0000000000000000-mapping.dmp
  • memory/2428-65-0x0000000000000000-mapping.dmp
  • memory/2428-134-0x0000000000000000-mapping.dmp
  • memory/2428-41-0x0000000004170000-0x0000000004171000-memory.dmp
    Filesize

    4KB

  • memory/2428-133-0x0000000000000000-mapping.dmp
  • memory/2428-77-0x0000000000000000-mapping.dmp
  • memory/2428-76-0x0000000000000000-mapping.dmp
  • memory/2428-135-0x0000000000000000-mapping.dmp
  • memory/2428-78-0x0000000000000000-mapping.dmp
  • memory/2428-79-0x0000000000000000-mapping.dmp
  • memory/2428-81-0x0000000000000000-mapping.dmp
  • memory/2428-40-0x0000000002454000-0x0000000002455000-memory.dmp
    Filesize

    4KB

  • memory/2428-37-0x0000000000000000-mapping.dmp
  • memory/2428-83-0x0000000000000000-mapping.dmp
  • memory/2428-84-0x0000000000000000-mapping.dmp
  • memory/2428-85-0x0000000000000000-mapping.dmp
  • memory/2428-86-0x0000000000000000-mapping.dmp
  • memory/2428-87-0x0000000000000000-mapping.dmp
  • memory/2428-136-0x0000000000000000-mapping.dmp
  • memory/2428-91-0x0000000004430000-0x0000000004454000-memory.dmp
    Filesize

    144KB

  • memory/2428-92-0x0000000006B00000-0x0000000006B01000-memory.dmp
    Filesize

    4KB

  • memory/2428-130-0x0000000000000000-mapping.dmp
  • memory/2428-94-0x00000000044C0000-0x00000000044E2000-memory.dmp
    Filesize

    136KB

  • memory/2428-95-0x0000000007000000-0x0000000007001000-memory.dmp
    Filesize

    4KB

  • memory/2428-42-0x0000000004520000-0x0000000004521000-memory.dmp
    Filesize

    4KB

  • memory/2428-98-0x0000000006AC0000-0x0000000006AC1000-memory.dmp
    Filesize

    4KB

  • memory/2428-131-0x0000000000000000-mapping.dmp
  • memory/2428-127-0x0000000000000000-mapping.dmp
  • memory/2428-102-0x0000000007630000-0x0000000007631000-memory.dmp
    Filesize

    4KB

  • memory/2428-103-0x00000000077B0000-0x00000000077B1000-memory.dmp
    Filesize

    4KB

  • memory/2428-129-0x0000000000000000-mapping.dmp
  • memory/2428-108-0x0000000000000000-mapping.dmp
  • memory/2428-109-0x0000000000000000-mapping.dmp
  • memory/2428-110-0x0000000000000000-mapping.dmp
  • memory/2428-111-0x0000000000000000-mapping.dmp
  • memory/2428-112-0x0000000000000000-mapping.dmp
  • memory/2428-113-0x0000000000000000-mapping.dmp
  • memory/2428-107-0x0000000000000000-mapping.dmp
  • memory/2428-128-0x0000000000000000-mapping.dmp
  • memory/2428-115-0x0000000000000000-mapping.dmp
  • memory/2428-116-0x0000000000000000-mapping.dmp
  • memory/2428-117-0x0000000000000000-mapping.dmp
  • memory/2428-118-0x0000000000000000-mapping.dmp
  • memory/2428-120-0x0000000000000000-mapping.dmp
  • memory/2428-119-0x0000000000000000-mapping.dmp
  • memory/2428-124-0x0000000000000000-mapping.dmp
  • memory/2428-125-0x0000000000000000-mapping.dmp
  • memory/2428-126-0x0000000000000000-mapping.dmp
  • memory/2620-46-0x0000000004450000-0x0000000004451000-memory.dmp
    Filesize

    4KB

  • memory/2620-47-0x0000000004450000-0x0000000004451000-memory.dmp
    Filesize

    4KB

  • memory/2620-51-0x0000000004450000-0x0000000004451000-memory.dmp
    Filesize

    4KB

  • memory/2656-93-0x0000000004840000-0x0000000004841000-memory.dmp
    Filesize

    4KB

  • memory/2656-88-0x0000000004410000-0x0000000004411000-memory.dmp
    Filesize

    4KB

  • memory/3048-121-0x0000000004410000-0x0000000004411000-memory.dmp
    Filesize

    4KB

  • memory/3048-132-0x0000000004A40000-0x0000000004A41000-memory.dmp
    Filesize

    4KB

  • memory/3268-16-0x0000000004AC0000-0x0000000004AC1000-memory.dmp
    Filesize

    4KB

  • memory/3268-19-0x0000000004FF0000-0x0000000004FF1000-memory.dmp
    Filesize

    4KB

  • memory/3616-74-0x0000000004410000-0x0000000004411000-memory.dmp
    Filesize

    4KB

  • memory/3616-66-0x0000000004410000-0x0000000004411000-memory.dmp
    Filesize

    4KB

  • memory/3616-75-0x0000000004900000-0x0000000004901000-memory.dmp
    Filesize

    4KB

  • memory/3984-140-0x0000000004620000-0x0000000004621000-memory.dmp
    Filesize

    4KB

  • memory/3992-36-0x0000000004B40000-0x0000000004B41000-memory.dmp
    Filesize

    4KB

  • memory/3992-33-0x0000000004410000-0x0000000004411000-memory.dmp
    Filesize

    4KB