Analysis

  • max time kernel
    128s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    02-11-2020 09:13

General

  • Target

    11d2577be7df1bee2931c1d27b56eac5.exe

  • Size

    667KB

  • MD5

    11d2577be7df1bee2931c1d27b56eac5

  • SHA1

    9cc5191d0761d74d6b34c4e89cb0ce06d133ae04

  • SHA256

    20b8b1c1b7aa1a707819434f2ce27db4d8d2b613da99b491f94ad44db1d241e0

  • SHA512

    d50a9356017650e28598a46a28c0bed59bf7d09c2bfd3375c2eedcd298dca19f2768aa42e8a8fb740d5887f6b9fcbfae27d9083c39ad87b4122bbf37dd16b961

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 40 IoCs
  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 11 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11d2577be7df1bee2931c1d27b56eac5.exe
    "C:\Users\Admin\AppData\Local\Temp\11d2577be7df1bee2931c1d27b56eac5.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 764
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 844
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1616
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 1212
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1080
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 1232
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:636
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 1592
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3516
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 1556
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:688
    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
      bestof.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1344
    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
      bestofd.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2324
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 536
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3456
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 508
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:740
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1264
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:2008
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1312
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:2260
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 1240
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4088

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
    MD5

    b77a1d58626a5d4a77202afbf717accb

    SHA1

    1a37bf11e2b75384785d05780fe17fe1167bfbb1

    SHA256

    a0a1952f947eaea5f54da2c343da0dc0ef5cd7bc58fe27f1dbf4e7199e757a13

    SHA512

    d12789afcdf0b6dc4dfd5c944c56466c3305b1f87670a038401e22a27ee8980b11a6039e73c4729c731dfd241fdb84c7c850c6ee2cd04bdfac6d5f5b2c8fff26

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
    MD5

    b77a1d58626a5d4a77202afbf717accb

    SHA1

    1a37bf11e2b75384785d05780fe17fe1167bfbb1

    SHA256

    a0a1952f947eaea5f54da2c343da0dc0ef5cd7bc58fe27f1dbf4e7199e757a13

    SHA512

    d12789afcdf0b6dc4dfd5c944c56466c3305b1f87670a038401e22a27ee8980b11a6039e73c4729c731dfd241fdb84c7c850c6ee2cd04bdfac6d5f5b2c8fff26

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
    MD5

    72131adb0e2315281aae445db11e09a2

    SHA1

    712ca2ebaa7d9bc9bbe18f7843954cfb0d22b08e

    SHA256

    9ea7a66f0c3dc13ddfc6f05d95049dd7f641053a380578a12013db9f72367f65

    SHA512

    bbc68fa0c586aaa7227da59848407672e7629e8f1289384add8638c21bab69d41495bcfc7881446b527e5aa4db14e1babc4f71dfee32b69705e6d3b64bf46a22

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
    MD5

    72131adb0e2315281aae445db11e09a2

    SHA1

    712ca2ebaa7d9bc9bbe18f7843954cfb0d22b08e

    SHA256

    9ea7a66f0c3dc13ddfc6f05d95049dd7f641053a380578a12013db9f72367f65

    SHA512

    bbc68fa0c586aaa7227da59848407672e7629e8f1289384add8638c21bab69d41495bcfc7881446b527e5aa4db14e1babc4f71dfee32b69705e6d3b64bf46a22

  • memory/636-71-0x0000000004CB0000-0x0000000004CB1000-memory.dmp
    Filesize

    4KB

  • memory/636-74-0x00000000052F0000-0x00000000052F1000-memory.dmp
    Filesize

    4KB

  • memory/688-81-0x0000000004560000-0x0000000004561000-memory.dmp
    Filesize

    4KB

  • memory/688-84-0x0000000004D90000-0x0000000004D91000-memory.dmp
    Filesize

    4KB

  • memory/740-126-0x0000000004790000-0x0000000004791000-memory.dmp
    Filesize

    4KB

  • memory/740-131-0x0000000004790000-0x0000000004791000-memory.dmp
    Filesize

    4KB

  • memory/1080-67-0x0000000004D60000-0x0000000004D61000-memory.dmp
    Filesize

    4KB

  • memory/1080-70-0x0000000005590000-0x0000000005591000-memory.dmp
    Filesize

    4KB

  • memory/1344-91-0x0000000000400000-0x0000000000436000-memory.dmp
    Filesize

    216KB

  • memory/1344-99-0x0000000002C60000-0x0000000002C84000-memory.dmp
    Filesize

    144KB

  • memory/1344-139-0x0000000005690000-0x0000000005691000-memory.dmp
    Filesize

    4KB

  • memory/1344-112-0x0000000005380000-0x0000000005381000-memory.dmp
    Filesize

    4KB

  • memory/1344-110-0x00000000053A0000-0x00000000053A1000-memory.dmp
    Filesize

    4KB

  • memory/1344-152-0x0000000006D50000-0x0000000006D51000-memory.dmp
    Filesize

    4KB

  • memory/1344-153-0x0000000007450000-0x0000000007451000-memory.dmp
    Filesize

    4KB

  • memory/1344-92-0x000000000040CD2F-mapping.dmp
  • memory/1344-121-0x00000000053F0000-0x00000000053F1000-memory.dmp
    Filesize

    4KB

  • memory/1344-93-0x0000000000400000-0x0000000000436000-memory.dmp
    Filesize

    216KB

  • memory/1344-94-0x0000000002CF0000-0x0000000002CF1000-memory.dmp
    Filesize

    4KB

  • memory/1344-159-0x0000000006FA0000-0x0000000006FA1000-memory.dmp
    Filesize

    4KB

  • memory/1344-95-0x0000000072670000-0x0000000072D5E000-memory.dmp
    Filesize

    6.9MB

  • memory/1344-174-0x00000000073E0000-0x00000000073E1000-memory.dmp
    Filesize

    4KB

  • memory/1344-105-0x0000000006470000-0x0000000006471000-memory.dmp
    Filesize

    4KB

  • memory/1344-157-0x0000000006CB0000-0x0000000006CB1000-memory.dmp
    Filesize

    4KB

  • memory/1344-100-0x0000000005960000-0x0000000005961000-memory.dmp
    Filesize

    4KB

  • memory/1344-158-0x0000000006F20000-0x0000000006F21000-memory.dmp
    Filesize

    4KB

  • memory/1344-102-0x0000000002F70000-0x0000000002F92000-memory.dmp
    Filesize

    136KB

  • memory/1400-0-0x0000000002543000-0x0000000002544000-memory.dmp
    Filesize

    4KB

  • memory/1400-1-0x0000000002890000-0x0000000002891000-memory.dmp
    Filesize

    4KB

  • memory/1616-63-0x00000000043D0000-0x00000000043D1000-memory.dmp
    Filesize

    4KB

  • memory/1616-66-0x0000000004710000-0x0000000004711000-memory.dmp
    Filesize

    4KB

  • memory/2008-168-0x0000000005970000-0x0000000005971000-memory.dmp
    Filesize

    4KB

  • memory/2008-154-0x0000000005040000-0x0000000005041000-memory.dmp
    Filesize

    4KB

  • memory/2260-177-0x0000000004C50000-0x0000000004C51000-memory.dmp
    Filesize

    4KB

  • memory/2260-189-0x0000000005500000-0x0000000005501000-memory.dmp
    Filesize

    4KB

  • memory/2264-89-0x00000000007C0000-0x00000000007C1000-memory.dmp
    Filesize

    4KB

  • memory/2264-88-0x0000000072670000-0x0000000072D5E000-memory.dmp
    Filesize

    6.9MB

  • memory/2264-85-0x0000000000000000-mapping.dmp
  • memory/2324-141-0x0000000000000000-mapping.dmp
  • memory/2324-170-0x0000000000000000-mapping.dmp
  • memory/2324-119-0x0000000000000000-mapping.dmp
  • memory/2324-212-0x0000000000000000-mapping.dmp
  • memory/2324-117-0x0000000000000000-mapping.dmp
  • memory/2324-122-0x0000000000000000-mapping.dmp
  • memory/2324-123-0x0000000000000000-mapping.dmp
  • memory/2324-124-0x0000000000000000-mapping.dmp
  • memory/2324-125-0x0000000000000000-mapping.dmp
  • memory/2324-116-0x0000000000000000-mapping.dmp
  • memory/2324-115-0x0000000000000000-mapping.dmp
  • memory/2324-133-0x0000000000000000-mapping.dmp
  • memory/2324-134-0x0000000000000000-mapping.dmp
  • memory/2324-135-0x0000000000000000-mapping.dmp
  • memory/2324-136-0x0000000000000000-mapping.dmp
  • memory/2324-137-0x0000000000000000-mapping.dmp
  • memory/2324-208-0x0000000000000000-mapping.dmp
  • memory/2324-140-0x0000000000000000-mapping.dmp
  • memory/2324-210-0x0000000000000000-mapping.dmp
  • memory/2324-142-0x0000000000000000-mapping.dmp
  • memory/2324-143-0x0000000000000000-mapping.dmp
  • memory/2324-144-0x00000000040B0000-0x00000000040D4000-memory.dmp
    Filesize

    144KB

  • memory/2324-146-0x0000000004370000-0x0000000004392000-memory.dmp
    Filesize

    136KB

  • memory/2324-107-0x0000000072670000-0x0000000072D5E000-memory.dmp
    Filesize

    6.9MB

  • memory/2324-106-0x0000000004270000-0x0000000004271000-memory.dmp
    Filesize

    4KB

  • memory/2324-104-0x0000000004020000-0x0000000004021000-memory.dmp
    Filesize

    4KB

  • memory/2324-103-0x0000000004020000-0x0000000004021000-memory.dmp
    Filesize

    4KB

  • memory/2324-101-0x00000000024D4000-0x00000000024D5000-memory.dmp
    Filesize

    4KB

  • memory/2324-161-0x0000000000000000-mapping.dmp
  • memory/2324-160-0x0000000000000000-mapping.dmp
  • memory/2324-163-0x0000000000000000-mapping.dmp
  • memory/2324-162-0x0000000000000000-mapping.dmp
  • memory/2324-164-0x0000000000000000-mapping.dmp
  • memory/2324-96-0x0000000000000000-mapping.dmp
  • memory/2324-165-0x0000000000000000-mapping.dmp
  • memory/2324-167-0x0000000000000000-mapping.dmp
  • memory/2324-166-0x0000000000000000-mapping.dmp
  • memory/2324-209-0x0000000000000000-mapping.dmp
  • memory/2324-169-0x0000000000000000-mapping.dmp
  • memory/2324-118-0x0000000000000000-mapping.dmp
  • memory/2324-171-0x0000000000000000-mapping.dmp
  • memory/2324-172-0x0000000000000000-mapping.dmp
  • memory/2324-207-0x0000000000000000-mapping.dmp
  • memory/2324-175-0x0000000000000000-mapping.dmp
  • memory/2324-176-0x0000000000000000-mapping.dmp
  • memory/2324-173-0x0000000000000000-mapping.dmp
  • memory/2324-206-0x0000000000000000-mapping.dmp
  • memory/2324-181-0x0000000000000000-mapping.dmp
  • memory/2324-182-0x0000000000000000-mapping.dmp
  • memory/2324-180-0x0000000000000000-mapping.dmp
  • memory/2324-183-0x0000000000000000-mapping.dmp
  • memory/2324-184-0x0000000000000000-mapping.dmp
  • memory/2324-185-0x0000000000000000-mapping.dmp
  • memory/2324-186-0x0000000000000000-mapping.dmp
  • memory/2324-187-0x0000000000000000-mapping.dmp
  • memory/2324-188-0x0000000000000000-mapping.dmp
  • memory/2324-205-0x0000000000000000-mapping.dmp
  • memory/2324-190-0x0000000000000000-mapping.dmp
  • memory/2324-191-0x0000000000000000-mapping.dmp
  • memory/2324-192-0x0000000000000000-mapping.dmp
  • memory/2324-193-0x0000000000000000-mapping.dmp
  • memory/2324-194-0x0000000000000000-mapping.dmp
  • memory/2324-195-0x0000000000000000-mapping.dmp
  • memory/2324-196-0x0000000000000000-mapping.dmp
  • memory/2324-197-0x0000000000000000-mapping.dmp
  • memory/2324-204-0x0000000000000000-mapping.dmp
  • memory/2324-201-0x0000000000000000-mapping.dmp
  • memory/2324-202-0x0000000000000000-mapping.dmp
  • memory/2324-203-0x0000000000000000-mapping.dmp
  • memory/3456-111-0x00000000049D0000-0x00000000049D1000-memory.dmp
    Filesize

    4KB

  • memory/3456-113-0x00000000049D0000-0x00000000049D1000-memory.dmp
    Filesize

    4KB

  • memory/3456-120-0x0000000005000000-0x0000000005001000-memory.dmp
    Filesize

    4KB

  • memory/3516-77-0x00000000047A0000-0x00000000047A1000-memory.dmp
    Filesize

    4KB

  • memory/3836-2-0x0000000004F00000-0x0000000004F01000-memory.dmp
    Filesize

    4KB

  • memory/3836-3-0x0000000004F00000-0x0000000004F01000-memory.dmp
    Filesize

    4KB

  • memory/3836-6-0x0000000005530000-0x0000000005531000-memory.dmp
    Filesize

    4KB

  • memory/4088-198-0x00000000043D0000-0x00000000043D1000-memory.dmp
    Filesize

    4KB

  • memory/4088-211-0x0000000004A10000-0x0000000004A11000-memory.dmp
    Filesize

    4KB