Analysis

  • max time kernel
    132s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    02-11-2020 09:15

General

  • Target

    c124c4991ef8209fb59cf06fc7b6fd89.exe

  • Size

    669KB

  • MD5

    c124c4991ef8209fb59cf06fc7b6fd89

  • SHA1

    da3cf2cf528793016d15ad9a69e64a66086c3a2e

  • SHA256

    0c870ab1638e4106f0c1b29649e9f00d527619b54dd39ced78bfed0d265c9eed

  • SHA512

    877f9d93f8a44c3315bd7df3dc5c6a9d5735026e68fb30f59e78b008267a33788ab8e9970c304e0418bb07a677598b17c51b6456e663914c80ba734e83027fdc

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 35 IoCs
  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 11 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c124c4991ef8209fb59cf06fc7b6fd89.exe
    "C:\Users\Admin\AppData\Local\Temp\c124c4991ef8209fb59cf06fc7b6fd89.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 756
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2792
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 768
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:200
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 1224
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2888
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 1564
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3212
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 1552
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1816
    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
      bestof.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        3⤵
          PID:2752
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2992
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3972
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 3
              5⤵
              • Runs ping.exe
              PID:3896
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 1588
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3828
      • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
        bestofd.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2864
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 656
          3⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:560
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 688
          3⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:3508
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 1264
          3⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:3484
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 1276
          3⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:1368
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 1312
          3⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:564

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Remote System Discovery

    1
    T1018

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
      MD5

      b77a1d58626a5d4a77202afbf717accb

      SHA1

      1a37bf11e2b75384785d05780fe17fe1167bfbb1

      SHA256

      a0a1952f947eaea5f54da2c343da0dc0ef5cd7bc58fe27f1dbf4e7199e757a13

      SHA512

      d12789afcdf0b6dc4dfd5c944c56466c3305b1f87670a038401e22a27ee8980b11a6039e73c4729c731dfd241fdb84c7c850c6ee2cd04bdfac6d5f5b2c8fff26

    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
      MD5

      b77a1d58626a5d4a77202afbf717accb

      SHA1

      1a37bf11e2b75384785d05780fe17fe1167bfbb1

      SHA256

      a0a1952f947eaea5f54da2c343da0dc0ef5cd7bc58fe27f1dbf4e7199e757a13

      SHA512

      d12789afcdf0b6dc4dfd5c944c56466c3305b1f87670a038401e22a27ee8980b11a6039e73c4729c731dfd241fdb84c7c850c6ee2cd04bdfac6d5f5b2c8fff26

    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
      MD5

      72131adb0e2315281aae445db11e09a2

      SHA1

      712ca2ebaa7d9bc9bbe18f7843954cfb0d22b08e

      SHA256

      9ea7a66f0c3dc13ddfc6f05d95049dd7f641053a380578a12013db9f72367f65

      SHA512

      bbc68fa0c586aaa7227da59848407672e7629e8f1289384add8638c21bab69d41495bcfc7881446b527e5aa4db14e1babc4f71dfee32b69705e6d3b64bf46a22

    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
      MD5

      72131adb0e2315281aae445db11e09a2

      SHA1

      712ca2ebaa7d9bc9bbe18f7843954cfb0d22b08e

      SHA256

      9ea7a66f0c3dc13ddfc6f05d95049dd7f641053a380578a12013db9f72367f65

      SHA512

      bbc68fa0c586aaa7227da59848407672e7629e8f1289384add8638c21bab69d41495bcfc7881446b527e5aa4db14e1babc4f71dfee32b69705e6d3b64bf46a22

    • memory/200-7-0x0000000004BB0000-0x0000000004BB1000-memory.dmp
      Filesize

      4KB

    • memory/200-10-0x00000000051E0000-0x00000000051E1000-memory.dmp
      Filesize

      4KB

    • memory/560-56-0x00000000049E0000-0x00000000049E1000-memory.dmp
      Filesize

      4KB

    • memory/560-55-0x00000000049E0000-0x00000000049E1000-memory.dmp
      Filesize

      4KB

    • memory/564-177-0x0000000004C70000-0x0000000004C71000-memory.dmp
      Filesize

      4KB

    • memory/564-191-0x00000000054A0000-0x00000000054A1000-memory.dmp
      Filesize

      4KB

    • memory/1368-167-0x0000000004AE0000-0x0000000004AE1000-memory.dmp
      Filesize

      4KB

    • memory/1368-156-0x00000000041B0000-0x00000000041B1000-memory.dmp
      Filesize

      4KB

    • memory/1420-26-0x0000000072AC0000-0x00000000731AE000-memory.dmp
      Filesize

      6.9MB

    • memory/1420-23-0x0000000000000000-mapping.dmp
    • memory/1420-27-0x0000000000F60000-0x0000000000F61000-memory.dmp
      Filesize

      4KB

    • memory/1816-19-0x0000000004BD0000-0x0000000004BD1000-memory.dmp
      Filesize

      4KB

    • memory/1816-22-0x0000000005500000-0x0000000005501000-memory.dmp
      Filesize

      4KB

    • memory/2792-3-0x0000000004A90000-0x0000000004A91000-memory.dmp
      Filesize

      4KB

    • memory/2792-4-0x0000000004A90000-0x0000000004A91000-memory.dmp
      Filesize

      4KB

    • memory/2792-6-0x00000000052C0000-0x00000000052C1000-memory.dmp
      Filesize

      4KB

    • memory/2864-77-0x0000000000000000-mapping.dmp
    • memory/2864-132-0x0000000004210000-0x0000000004232000-memory.dmp
      Filesize

      136KB

    • memory/2864-189-0x0000000000000000-mapping.dmp
    • memory/2864-188-0x0000000000000000-mapping.dmp
    • memory/2864-187-0x0000000000000000-mapping.dmp
    • memory/2864-186-0x0000000000000000-mapping.dmp
    • memory/2864-185-0x0000000000000000-mapping.dmp
    • memory/2864-184-0x0000000000000000-mapping.dmp
    • memory/2864-41-0x0000000000000000-mapping.dmp
    • memory/2864-183-0x0000000000000000-mapping.dmp
    • memory/2864-182-0x0000000000000000-mapping.dmp
    • memory/2864-181-0x0000000000000000-mapping.dmp
    • memory/2864-180-0x0000000000000000-mapping.dmp
    • memory/2864-172-0x0000000000000000-mapping.dmp
    • memory/2864-47-0x0000000002464000-0x0000000002465000-memory.dmp
      Filesize

      4KB

    • memory/2864-175-0x0000000000000000-mapping.dmp
    • memory/2864-49-0x0000000003FB0000-0x0000000003FB1000-memory.dmp
      Filesize

      4KB

    • memory/2864-50-0x0000000003FB0000-0x0000000003FE2000-memory.dmp
      Filesize

      200KB

    • memory/2864-51-0x00000000042F0000-0x00000000042F1000-memory.dmp
      Filesize

      4KB

    • memory/2864-52-0x0000000072AC0000-0x00000000731AE000-memory.dmp
      Filesize

      6.9MB

    • memory/2864-173-0x0000000000000000-mapping.dmp
    • memory/2864-171-0x0000000000000000-mapping.dmp
    • memory/2864-58-0x0000000000000000-mapping.dmp
    • memory/2864-59-0x0000000000000000-mapping.dmp
    • memory/2864-60-0x0000000000000000-mapping.dmp
    • memory/2864-61-0x0000000000000000-mapping.dmp
    • memory/2864-62-0x0000000000000000-mapping.dmp
    • memory/2864-170-0x0000000000000000-mapping.dmp
    • memory/2864-65-0x0000000000000000-mapping.dmp
    • memory/2864-66-0x0000000000000000-mapping.dmp
    • memory/2864-67-0x0000000000000000-mapping.dmp
    • memory/2864-68-0x0000000000000000-mapping.dmp
    • memory/2864-69-0x00000000040B0000-0x00000000040D4000-memory.dmp
      Filesize

      144KB

    • memory/2864-169-0x0000000000000000-mapping.dmp
    • memory/2864-74-0x0000000000000000-mapping.dmp
    • memory/2864-73-0x0000000000000000-mapping.dmp
    • memory/2864-75-0x0000000000000000-mapping.dmp
    • memory/2864-76-0x0000000000000000-mapping.dmp
    • memory/2864-168-0x0000000000000000-mapping.dmp
    • memory/2864-166-0x0000000000000000-mapping.dmp
    • memory/2864-164-0x0000000000000000-mapping.dmp
    • memory/2864-165-0x0000000000000000-mapping.dmp
    • memory/2864-163-0x0000000000000000-mapping.dmp
    • memory/2864-162-0x0000000000000000-mapping.dmp
    • memory/2864-159-0x0000000000000000-mapping.dmp
    • memory/2864-128-0x0000000000000000-mapping.dmp
    • memory/2864-127-0x0000000000000000-mapping.dmp
    • memory/2864-129-0x0000000000000000-mapping.dmp
    • memory/2864-130-0x0000000000000000-mapping.dmp
    • memory/2864-160-0x0000000000000000-mapping.dmp
    • memory/2864-161-0x0000000000000000-mapping.dmp
    • memory/2864-155-0x0000000000000000-mapping.dmp
    • memory/2864-142-0x0000000000000000-mapping.dmp
    • memory/2864-143-0x0000000000000000-mapping.dmp
    • memory/2864-144-0x0000000000000000-mapping.dmp
    • memory/2864-145-0x0000000000000000-mapping.dmp
    • memory/2864-146-0x0000000000000000-mapping.dmp
    • memory/2864-147-0x0000000000000000-mapping.dmp
    • memory/2864-148-0x0000000000000000-mapping.dmp
    • memory/2864-154-0x0000000000000000-mapping.dmp
    • memory/2864-150-0x0000000000000000-mapping.dmp
    • memory/2864-151-0x0000000000000000-mapping.dmp
    • memory/2864-152-0x0000000000000000-mapping.dmp
    • memory/2864-153-0x0000000000000000-mapping.dmp
    • memory/2888-14-0x00000000050B0000-0x00000000050B1000-memory.dmp
      Filesize

      4KB

    • memory/2888-11-0x0000000004880000-0x0000000004881000-memory.dmp
      Filesize

      4KB

    • memory/2992-116-0x0000000006C60000-0x0000000006C61000-memory.dmp
      Filesize

      4KB

    • memory/2992-38-0x0000000002AD0000-0x0000000002AF4000-memory.dmp
      Filesize

      144KB

    • memory/2992-64-0x0000000005460000-0x0000000005461000-memory.dmp
      Filesize

      4KB

    • memory/2992-121-0x0000000006D80000-0x0000000006D81000-memory.dmp
      Filesize

      4KB

    • memory/2992-120-0x0000000006D00000-0x0000000006D01000-memory.dmp
      Filesize

      4KB

    • memory/2992-37-0x0000000072AC0000-0x00000000731AE000-memory.dmp
      Filesize

      6.9MB

    • memory/2992-104-0x00000000070F0000-0x00000000070F1000-memory.dmp
      Filesize

      4KB

    • memory/2992-102-0x00000000069F0000-0x00000000069F1000-memory.dmp
      Filesize

      4KB

    • memory/2992-39-0x0000000005600000-0x0000000005601000-memory.dmp
      Filesize

      4KB

    • memory/2992-40-0x0000000002B30000-0x0000000002B52000-memory.dmp
      Filesize

      136KB

    • memory/2992-35-0x0000000000400000-0x0000000000436000-memory.dmp
      Filesize

      216KB

    • memory/2992-33-0x0000000000400000-0x0000000000436000-memory.dmp
      Filesize

      216KB

    • memory/2992-34-0x000000000040CD2F-mapping.dmp
    • memory/2992-137-0x00000000078B0000-0x00000000078B1000-memory.dmp
      Filesize

      4KB

    • memory/2992-44-0x0000000006110000-0x0000000006111000-memory.dmp
      Filesize

      4KB

    • memory/2992-174-0x0000000007720000-0x0000000007721000-memory.dmp
      Filesize

      4KB

    • memory/2992-48-0x00000000051D0000-0x00000000051D1000-memory.dmp
      Filesize

      4KB

    • memory/2992-46-0x0000000005160000-0x0000000005161000-memory.dmp
      Filesize

      4KB

    • memory/2992-176-0x00000000087C0000-0x00000000087C1000-memory.dmp
      Filesize

      4KB

    • memory/2992-36-0x0000000002B70000-0x0000000002B71000-memory.dmp
      Filesize

      4KB

    • memory/2992-45-0x0000000005180000-0x0000000005181000-memory.dmp
      Filesize

      4KB

    • memory/3212-15-0x00000000041E0000-0x00000000041E1000-memory.dmp
      Filesize

      4KB

    • memory/3212-18-0x0000000004A10000-0x0000000004A11000-memory.dmp
      Filesize

      4KB

    • memory/3484-149-0x00000000057C0000-0x00000000057C1000-memory.dmp
      Filesize

      4KB

    • memory/3484-139-0x0000000004F80000-0x0000000004F81000-memory.dmp
      Filesize

      4KB

    • memory/3508-70-0x00000000048E0000-0x00000000048E1000-memory.dmp
      Filesize

      4KB

    • memory/3508-79-0x0000000005090000-0x0000000005091000-memory.dmp
      Filesize

      4KB

    • memory/3828-29-0x0000000004540000-0x0000000004541000-memory.dmp
      Filesize

      4KB

    • memory/3828-32-0x0000000004E70000-0x0000000004E71000-memory.dmp
      Filesize

      4KB

    • memory/3896-204-0x0000000000000000-mapping.dmp
    • memory/3972-196-0x0000000000000000-mapping.dmp
    • memory/4076-0-0x00000000026E9000-0x00000000026EB000-memory.dmp
      Filesize

      8KB

    • memory/4076-1-0x00000000041D0000-0x00000000041D1000-memory.dmp
      Filesize

      4KB