Analysis

  • max time kernel
    84s
  • max time network
    128s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    02-11-2020 09:10

General

  • Target

    6c7fb633e47217a514f4c739558cbc92.exe

  • Size

    667KB

  • MD5

    6c7fb633e47217a514f4c739558cbc92

  • SHA1

    bd7d155ffcf2d7e53f63834a873f453b3ad5783d

  • SHA256

    2d5d3ed366994f5e1fc9ca69d7a5bafb242ee071c1ad021b6d255f2f09b0e269

  • SHA512

    66f2cd1902dbd2dc56c7e5e731f133720147a1e5ef5ab4e5094cf6fa0845c2efdb0128b44148f3664aba904cab4b8266223df17647b6cdf83b1de89ad93dfb95

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 55 IoCs
  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 12 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c7fb633e47217a514f4c739558cbc92.exe
    "C:\Users\Admin\AppData\Local\Temp\6c7fb633e47217a514f4c739558cbc92.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 756
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2788
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 880
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2448
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 1208
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3008
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 1568
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2668
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 1572
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:224
    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
      bestof.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:456
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2084
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2844
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 3
            5⤵
            • Runs ping.exe
            PID:1412
    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
      bestofd.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 532
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 688
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3636
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 1256
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:1548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 1316
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:2256
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 1336
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:1464
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 1272
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:2412
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 1380
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3300

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
    MD5

    b77a1d58626a5d4a77202afbf717accb

    SHA1

    1a37bf11e2b75384785d05780fe17fe1167bfbb1

    SHA256

    a0a1952f947eaea5f54da2c343da0dc0ef5cd7bc58fe27f1dbf4e7199e757a13

    SHA512

    d12789afcdf0b6dc4dfd5c944c56466c3305b1f87670a038401e22a27ee8980b11a6039e73c4729c731dfd241fdb84c7c850c6ee2cd04bdfac6d5f5b2c8fff26

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
    MD5

    b77a1d58626a5d4a77202afbf717accb

    SHA1

    1a37bf11e2b75384785d05780fe17fe1167bfbb1

    SHA256

    a0a1952f947eaea5f54da2c343da0dc0ef5cd7bc58fe27f1dbf4e7199e757a13

    SHA512

    d12789afcdf0b6dc4dfd5c944c56466c3305b1f87670a038401e22a27ee8980b11a6039e73c4729c731dfd241fdb84c7c850c6ee2cd04bdfac6d5f5b2c8fff26

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
    MD5

    72131adb0e2315281aae445db11e09a2

    SHA1

    712ca2ebaa7d9bc9bbe18f7843954cfb0d22b08e

    SHA256

    9ea7a66f0c3dc13ddfc6f05d95049dd7f641053a380578a12013db9f72367f65

    SHA512

    bbc68fa0c586aaa7227da59848407672e7629e8f1289384add8638c21bab69d41495bcfc7881446b527e5aa4db14e1babc4f71dfee32b69705e6d3b64bf46a22

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
    MD5

    72131adb0e2315281aae445db11e09a2

    SHA1

    712ca2ebaa7d9bc9bbe18f7843954cfb0d22b08e

    SHA256

    9ea7a66f0c3dc13ddfc6f05d95049dd7f641053a380578a12013db9f72367f65

    SHA512

    bbc68fa0c586aaa7227da59848407672e7629e8f1289384add8638c21bab69d41495bcfc7881446b527e5aa4db14e1babc4f71dfee32b69705e6d3b64bf46a22

  • memory/224-94-0x0000000004C00000-0x0000000004C01000-memory.dmp
    Filesize

    4KB

  • memory/224-91-0x0000000004250000-0x0000000004251000-memory.dmp
    Filesize

    4KB

  • memory/456-97-0x0000000000000000-mapping.dmp
  • memory/456-100-0x0000000072DD0000-0x00000000734BE000-memory.dmp
    Filesize

    6.9MB

  • memory/456-101-0x0000000000E70000-0x0000000000E71000-memory.dmp
    Filesize

    4KB

  • memory/940-124-0x0000000004E50000-0x0000000004E51000-memory.dmp
    Filesize

    4KB

  • memory/940-123-0x0000000004E50000-0x0000000004E51000-memory.dmp
    Filesize

    4KB

  • memory/940-131-0x0000000005580000-0x0000000005581000-memory.dmp
    Filesize

    4KB

  • memory/1124-1-0x0000000002A00000-0x0000000002A01000-memory.dmp
    Filesize

    4KB

  • memory/1124-0-0x00000000025B3000-0x00000000025B4000-memory.dmp
    Filesize

    4KB

  • memory/1412-252-0x0000000000000000-mapping.dmp
  • memory/1464-198-0x0000000004D30000-0x0000000004D31000-memory.dmp
    Filesize

    4KB

  • memory/1464-209-0x0000000005560000-0x0000000005561000-memory.dmp
    Filesize

    4KB

  • memory/1548-160-0x00000000047D0000-0x00000000047D1000-memory.dmp
    Filesize

    4KB

  • memory/1548-169-0x0000000005100000-0x0000000005101000-memory.dmp
    Filesize

    4KB

  • memory/2084-132-0x00000000053D0000-0x00000000053D1000-memory.dmp
    Filesize

    4KB

  • memory/2084-171-0x0000000006C70000-0x0000000006C71000-memory.dmp
    Filesize

    4KB

  • memory/2084-230-0x00000000087E0000-0x00000000087E1000-memory.dmp
    Filesize

    4KB

  • memory/2084-105-0x0000000000400000-0x0000000000436000-memory.dmp
    Filesize

    216KB

  • memory/2084-106-0x0000000002940000-0x0000000002941000-memory.dmp
    Filesize

    4KB

  • memory/2084-170-0x0000000006BD0000-0x0000000006BD1000-memory.dmp
    Filesize

    4KB

  • memory/2084-109-0x0000000005670000-0x0000000005671000-memory.dmp
    Filesize

    4KB

  • memory/2084-103-0x0000000000400000-0x0000000000436000-memory.dmp
    Filesize

    216KB

  • memory/2084-173-0x0000000006CF0000-0x0000000006CF1000-memory.dmp
    Filesize

    4KB

  • memory/2084-113-0x0000000002B80000-0x0000000002BA2000-memory.dmp
    Filesize

    136KB

  • memory/2084-114-0x0000000006180000-0x0000000006181000-memory.dmp
    Filesize

    4KB

  • memory/2084-115-0x00000000050E0000-0x00000000050E1000-memory.dmp
    Filesize

    4KB

  • memory/2084-116-0x00000000050C0000-0x00000000050C1000-memory.dmp
    Filesize

    4KB

  • memory/2084-189-0x0000000007020000-0x0000000007021000-memory.dmp
    Filesize

    4KB

  • memory/2084-118-0x0000000005170000-0x0000000005171000-memory.dmp
    Filesize

    4KB

  • memory/2084-104-0x000000000040CD2F-mapping.dmp
  • memory/2084-158-0x0000000006960000-0x0000000006961000-memory.dmp
    Filesize

    4KB

  • memory/2084-107-0x0000000072DD0000-0x00000000734BE000-memory.dmp
    Filesize

    6.9MB

  • memory/2084-159-0x0000000007060000-0x0000000007061000-memory.dmp
    Filesize

    4KB

  • memory/2084-108-0x0000000002810000-0x0000000002834000-memory.dmp
    Filesize

    144KB

  • memory/2084-224-0x00000000086C0000-0x00000000086C1000-memory.dmp
    Filesize

    4KB

  • memory/2256-178-0x00000000046A0000-0x00000000046A1000-memory.dmp
    Filesize

    4KB

  • memory/2256-190-0x0000000005050000-0x0000000005051000-memory.dmp
    Filesize

    4KB

  • memory/2412-218-0x00000000043A0000-0x00000000043A1000-memory.dmp
    Filesize

    4KB

  • memory/2412-232-0x0000000004BD0000-0x0000000004BD1000-memory.dmp
    Filesize

    4KB

  • memory/2448-7-0x0000000005000000-0x0000000005001000-memory.dmp
    Filesize

    4KB

  • memory/2448-10-0x0000000005640000-0x0000000005641000-memory.dmp
    Filesize

    4KB

  • memory/2668-19-0x0000000005450000-0x0000000005451000-memory.dmp
    Filesize

    4KB

  • memory/2668-15-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
    Filesize

    4KB

  • memory/2788-4-0x00000000049A0000-0x00000000049A1000-memory.dmp
    Filesize

    4KB

  • memory/2788-3-0x00000000049A0000-0x00000000049A1000-memory.dmp
    Filesize

    4KB

  • memory/2788-6-0x00000000050D0000-0x00000000050D1000-memory.dmp
    Filesize

    4KB

  • memory/2844-248-0x0000000000000000-mapping.dmp
  • memory/3008-14-0x0000000005320000-0x0000000005321000-memory.dmp
    Filesize

    4KB

  • memory/3008-11-0x0000000004AE0000-0x0000000004AE1000-memory.dmp
    Filesize

    4KB

  • memory/3300-241-0x0000000004B30000-0x0000000004B31000-memory.dmp
    Filesize

    4KB

  • memory/3300-256-0x0000000005270000-0x0000000005271000-memory.dmp
    Filesize

    4KB

  • memory/3636-145-0x00000000055F0000-0x00000000055F1000-memory.dmp
    Filesize

    4KB

  • memory/3636-137-0x0000000004EC0000-0x0000000004EC1000-memory.dmp
    Filesize

    4KB

  • memory/4080-176-0x0000000000000000-mapping.dmp
  • memory/4080-128-0x0000000000000000-mapping.dmp
  • memory/4080-147-0x0000000000000000-mapping.dmp
  • memory/4080-146-0x0000000000000000-mapping.dmp
  • memory/4080-150-0x0000000004300000-0x0000000004324000-memory.dmp
    Filesize

    144KB

  • memory/4080-152-0x0000000004330000-0x0000000004352000-memory.dmp
    Filesize

    136KB

  • memory/4080-149-0x0000000000000000-mapping.dmp
  • memory/4080-144-0x0000000000000000-mapping.dmp
  • memory/4080-143-0x0000000000000000-mapping.dmp
  • memory/4080-163-0x0000000000000000-mapping.dmp
  • memory/4080-164-0x0000000000000000-mapping.dmp
  • memory/4080-166-0x0000000000000000-mapping.dmp
  • memory/4080-165-0x0000000000000000-mapping.dmp
  • memory/4080-168-0x0000000000000000-mapping.dmp
  • memory/4080-167-0x0000000000000000-mapping.dmp
  • memory/4080-142-0x0000000000000000-mapping.dmp
  • memory/4080-141-0x0000000000000000-mapping.dmp
  • memory/4080-140-0x0000000000000000-mapping.dmp
  • memory/4080-134-0x0000000000000000-mapping.dmp
  • memory/4080-174-0x0000000000000000-mapping.dmp
  • memory/4080-175-0x0000000000000000-mapping.dmp
  • memory/4080-172-0x0000000000000000-mapping.dmp
  • memory/4080-135-0x0000000000000000-mapping.dmp
  • memory/4080-177-0x0000000000000000-mapping.dmp
  • memory/4080-136-0x0000000000000000-mapping.dmp
  • memory/4080-181-0x0000000000000000-mapping.dmp
  • memory/4080-182-0x0000000000000000-mapping.dmp
  • memory/4080-183-0x0000000000000000-mapping.dmp
  • memory/4080-185-0x0000000000000000-mapping.dmp
  • memory/4080-184-0x0000000000000000-mapping.dmp
  • memory/4080-186-0x0000000000000000-mapping.dmp
  • memory/4080-187-0x0000000000000000-mapping.dmp
  • memory/4080-188-0x0000000000000000-mapping.dmp
  • memory/4080-133-0x0000000000000000-mapping.dmp
  • memory/4080-130-0x0000000000000000-mapping.dmp
  • memory/4080-191-0x0000000000000000-mapping.dmp
  • memory/4080-192-0x0000000000000000-mapping.dmp
  • memory/4080-193-0x0000000000000000-mapping.dmp
  • memory/4080-194-0x0000000000000000-mapping.dmp
  • memory/4080-195-0x0000000000000000-mapping.dmp
  • memory/4080-196-0x0000000000000000-mapping.dmp
  • memory/4080-197-0x0000000000000000-mapping.dmp
  • memory/4080-129-0x0000000000000000-mapping.dmp
  • memory/4080-202-0x0000000000000000-mapping.dmp
  • memory/4080-201-0x0000000000000000-mapping.dmp
  • memory/4080-204-0x0000000000000000-mapping.dmp
  • memory/4080-205-0x0000000000000000-mapping.dmp
  • memory/4080-203-0x0000000000000000-mapping.dmp
  • memory/4080-207-0x0000000000000000-mapping.dmp
  • memory/4080-208-0x0000000000000000-mapping.dmp
  • memory/4080-206-0x0000000000000000-mapping.dmp
  • memory/4080-148-0x0000000000000000-mapping.dmp
  • memory/4080-210-0x0000000000000000-mapping.dmp
  • memory/4080-212-0x0000000000000000-mapping.dmp
  • memory/4080-211-0x0000000000000000-mapping.dmp
  • memory/4080-213-0x0000000000000000-mapping.dmp
  • memory/4080-214-0x0000000000000000-mapping.dmp
  • memory/4080-216-0x0000000000000000-mapping.dmp
  • memory/4080-215-0x0000000000000000-mapping.dmp
  • memory/4080-217-0x0000000000000000-mapping.dmp
  • memory/4080-127-0x0000000000000000-mapping.dmp
  • memory/4080-222-0x0000000000000000-mapping.dmp
  • memory/4080-221-0x0000000000000000-mapping.dmp
  • memory/4080-223-0x0000000000000000-mapping.dmp
  • memory/4080-225-0x0000000000000000-mapping.dmp
  • memory/4080-226-0x0000000000000000-mapping.dmp
  • memory/4080-126-0x0000000000000000-mapping.dmp
  • memory/4080-227-0x0000000000000000-mapping.dmp
  • memory/4080-228-0x0000000000000000-mapping.dmp
  • memory/4080-229-0x0000000000000000-mapping.dmp
  • memory/4080-231-0x0000000000000000-mapping.dmp
  • memory/4080-122-0x0000000072DD0000-0x00000000734BE000-memory.dmp
    Filesize

    6.9MB

  • memory/4080-121-0x0000000004390000-0x0000000004391000-memory.dmp
    Filesize

    4KB

  • memory/4080-233-0x0000000000000000-mapping.dmp
  • memory/4080-234-0x0000000000000000-mapping.dmp
  • memory/4080-235-0x0000000000000000-mapping.dmp
  • memory/4080-236-0x0000000000000000-mapping.dmp
  • memory/4080-238-0x0000000000000000-mapping.dmp
  • memory/4080-237-0x0000000000000000-mapping.dmp
  • memory/4080-239-0x0000000000000000-mapping.dmp
  • memory/4080-240-0x0000000000000000-mapping.dmp
  • memory/4080-120-0x0000000004010000-0x0000000004011000-memory.dmp
    Filesize

    4KB

  • memory/4080-244-0x0000000000000000-mapping.dmp
  • memory/4080-245-0x0000000000000000-mapping.dmp
  • memory/4080-246-0x0000000000000000-mapping.dmp
  • memory/4080-249-0x0000000000000000-mapping.dmp
  • memory/4080-119-0x0000000004010000-0x0000000004011000-memory.dmp
    Filesize

    4KB

  • memory/4080-250-0x0000000000000000-mapping.dmp
  • memory/4080-251-0x0000000000000000-mapping.dmp
  • memory/4080-247-0x0000000000000000-mapping.dmp
  • memory/4080-253-0x0000000000000000-mapping.dmp
  • memory/4080-117-0x0000000002694000-0x0000000002695000-memory.dmp
    Filesize

    4KB

  • memory/4080-254-0x0000000000000000-mapping.dmp
  • memory/4080-255-0x0000000000000000-mapping.dmp
  • memory/4080-110-0x0000000000000000-mapping.dmp
  • memory/4080-257-0x0000000000000000-mapping.dmp
  • memory/4080-258-0x0000000000000000-mapping.dmp
  • memory/4080-259-0x0000000000000000-mapping.dmp
  • memory/4080-260-0x0000000000000000-mapping.dmp
  • memory/4080-261-0x0000000000000000-mapping.dmp
  • memory/4080-265-0x0000000000000000-mapping.dmp
  • memory/4080-264-0x0000000000000000-mapping.dmp
  • memory/4080-263-0x0000000000000000-mapping.dmp
  • memory/4080-262-0x0000000000000000-mapping.dmp