Analysis
-
max time kernel
25s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
01-11-2020 06:47
Static task
static1
Behavioral task
behavioral1
Sample
6943b3380427465a7998ddf3a96945a0.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
6943b3380427465a7998ddf3a96945a0.exe
Resource
win10v20201028
General
-
Target
6943b3380427465a7998ddf3a96945a0.exe
-
Size
343KB
-
MD5
6943b3380427465a7998ddf3a96945a0
-
SHA1
abb680ef5e005da1610828d518c15a250b001fd9
-
SHA256
94e489927f1f04b50d80382b4ebbb245d8b0cd55f36dac8d7de3c543cbf361fb
-
SHA512
5c8fb35986df56b3f6f7b850a98455ab3d767372b57838d54c9faf280826975a0f2a0828fa977469a3d5e02ce9f7bea23e8b574cf793f4264f385e871de8277d
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4708-12-0x00000000040B0000-0x00000000040D4000-memory.dmp family_redline behavioral2/memory/4708-14-0x00000000069C0000-0x00000000069E2000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 checkip.amazonaws.com -
Program crash 39 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3724 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 720 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4092 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4380 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4412 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4408 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4488 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 560 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 648 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 1276 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 1568 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 2024 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 2276 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4696 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4692 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 420 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 2176 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 2800 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 3176 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 3944 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 3428 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 1272 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4776 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 2172 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 2516 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 2288 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 2416 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 2952 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 2444 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4176 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4296 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4512 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 3948 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4440 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4460 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 2480 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4660 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 4256 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe 3968 4708 WerFault.exe 6943b3380427465a7998ddf3a96945a0.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 3724 WerFault.exe 3724 WerFault.exe 3724 WerFault.exe 3724 WerFault.exe 3724 WerFault.exe 3724 WerFault.exe 3724 WerFault.exe 3724 WerFault.exe 3724 WerFault.exe 3724 WerFault.exe 3724 WerFault.exe 3724 WerFault.exe 3724 WerFault.exe 3724 WerFault.exe 720 WerFault.exe 720 WerFault.exe 720 WerFault.exe 720 WerFault.exe 720 WerFault.exe 720 WerFault.exe 720 WerFault.exe 720 WerFault.exe 720 WerFault.exe 720 WerFault.exe 720 WerFault.exe 720 WerFault.exe 720 WerFault.exe 720 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4092 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4380 WerFault.exe 4412 WerFault.exe 4412 WerFault.exe 4412 WerFault.exe 4412 WerFault.exe 4412 WerFault.exe 4412 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
Processes:
WerFault.exeWerFault.exe6943b3380427465a7998ddf3a96945a0.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 3724 WerFault.exe Token: SeBackupPrivilege 3724 WerFault.exe Token: SeDebugPrivilege 3724 WerFault.exe Token: SeDebugPrivilege 720 WerFault.exe Token: SeDebugPrivilege 4708 6943b3380427465a7998ddf3a96945a0.exe Token: SeDebugPrivilege 4092 WerFault.exe Token: SeDebugPrivilege 4380 WerFault.exe Token: SeDebugPrivilege 4412 WerFault.exe Token: SeDebugPrivilege 4408 WerFault.exe Token: SeDebugPrivilege 4488 WerFault.exe Token: SeDebugPrivilege 560 WerFault.exe Token: SeDebugPrivilege 648 WerFault.exe Token: SeDebugPrivilege 1276 WerFault.exe Token: SeDebugPrivilege 1568 WerFault.exe Token: SeDebugPrivilege 2024 WerFault.exe Token: SeDebugPrivilege 2276 WerFault.exe Token: SeDebugPrivilege 4696 WerFault.exe Token: SeDebugPrivilege 4692 WerFault.exe Token: SeDebugPrivilege 420 WerFault.exe Token: SeDebugPrivilege 2176 WerFault.exe Token: SeDebugPrivilege 2800 WerFault.exe Token: SeDebugPrivilege 3176 WerFault.exe Token: SeDebugPrivilege 3944 WerFault.exe Token: SeDebugPrivilege 3428 WerFault.exe Token: SeDebugPrivilege 1272 WerFault.exe Token: SeDebugPrivilege 4776 WerFault.exe Token: SeDebugPrivilege 2172 WerFault.exe Token: SeDebugPrivilege 2516 WerFault.exe Token: SeDebugPrivilege 2288 WerFault.exe Token: SeDebugPrivilege 2416 WerFault.exe Token: SeDebugPrivilege 2952 WerFault.exe Token: SeDebugPrivilege 2444 WerFault.exe Token: SeDebugPrivilege 4176 WerFault.exe Token: SeDebugPrivilege 4296 WerFault.exe Token: SeDebugPrivilege 4512 WerFault.exe Token: SeDebugPrivilege 3948 WerFault.exe Token: SeDebugPrivilege 4440 WerFault.exe Token: SeDebugPrivilege 4460 WerFault.exe Token: SeDebugPrivilege 2480 WerFault.exe Token: SeDebugPrivilege 4660 WerFault.exe Token: SeDebugPrivilege 4256 WerFault.exe Token: SeDebugPrivilege 3968 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6943b3380427465a7998ddf3a96945a0.execmd.exedescription pid process target process PID 4708 wrote to memory of 192 4708 6943b3380427465a7998ddf3a96945a0.exe cmd.exe PID 4708 wrote to memory of 192 4708 6943b3380427465a7998ddf3a96945a0.exe cmd.exe PID 4708 wrote to memory of 192 4708 6943b3380427465a7998ddf3a96945a0.exe cmd.exe PID 192 wrote to memory of 4704 192 cmd.exe PING.EXE PID 192 wrote to memory of 4704 192 cmd.exe PING.EXE PID 192 wrote to memory of 4704 192 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6943b3380427465a7998ddf3a96945a0.exe"C:\Users\Admin\AppData\Local\Temp\6943b3380427465a7998ddf3a96945a0.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 5402⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 7002⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 12362⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 12602⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 13482⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 14282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 14722⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 15522⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 12242⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 17722⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 18682⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 19602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 17202⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 19282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 12122⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 21082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 21562⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 22482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 22882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 21162⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 22962⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 23922⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 12642⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 24002⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 22282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 24602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 23322⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 25922⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 24482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 22362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 22082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 26122⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 27442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 28442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 26322⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 26202⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 30122⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 28122⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4256 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""2⤵
- Suspicious use of WriteProcessMemory
PID:192 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 30442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3968