Analysis

  • max time kernel
    129s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    02-11-2020 09:15

General

  • Target

    1bf918f0f3aabf771a2cac4e84ea59ce.exe

  • Size

    667KB

  • MD5

    1bf918f0f3aabf771a2cac4e84ea59ce

  • SHA1

    b2934a11dc758b17d75eec1f3b6add296688f1ab

  • SHA256

    326b911dfdd41599d7297f2e54ef03956d0f9ff4e5518144a2dc2b1bda6eb84c

  • SHA512

    76d44bd8d7d76137f168d91680afaf3fdddd297ae58222087e1a0a15b9e7f045a43b37e1555758ad0f4d1a7f46e3e7f5f7725869ce51540b20652ad83ec9d6c6

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 54 IoCs
  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 11 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bf918f0f3aabf771a2cac4e84ea59ce.exe
    "C:\Users\Admin\AppData\Local\Temp\1bf918f0f3aabf771a2cac4e84ea59ce.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 764
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2924
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 864
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4036
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 1212
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1312
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 1572
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2112
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 1576
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2828
    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
      bestof.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3504
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3744
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 3
            5⤵
            • Runs ping.exe
            PID:1548
    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
      bestofd.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2984
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 532
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 700
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:1120
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 1044
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:2220
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 1132
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:4060
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 1280
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:1316
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 1312
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:700

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
    MD5

    b77a1d58626a5d4a77202afbf717accb

    SHA1

    1a37bf11e2b75384785d05780fe17fe1167bfbb1

    SHA256

    a0a1952f947eaea5f54da2c343da0dc0ef5cd7bc58fe27f1dbf4e7199e757a13

    SHA512

    d12789afcdf0b6dc4dfd5c944c56466c3305b1f87670a038401e22a27ee8980b11a6039e73c4729c731dfd241fdb84c7c850c6ee2cd04bdfac6d5f5b2c8fff26

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
    MD5

    b77a1d58626a5d4a77202afbf717accb

    SHA1

    1a37bf11e2b75384785d05780fe17fe1167bfbb1

    SHA256

    a0a1952f947eaea5f54da2c343da0dc0ef5cd7bc58fe27f1dbf4e7199e757a13

    SHA512

    d12789afcdf0b6dc4dfd5c944c56466c3305b1f87670a038401e22a27ee8980b11a6039e73c4729c731dfd241fdb84c7c850c6ee2cd04bdfac6d5f5b2c8fff26

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
    MD5

    72131adb0e2315281aae445db11e09a2

    SHA1

    712ca2ebaa7d9bc9bbe18f7843954cfb0d22b08e

    SHA256

    9ea7a66f0c3dc13ddfc6f05d95049dd7f641053a380578a12013db9f72367f65

    SHA512

    bbc68fa0c586aaa7227da59848407672e7629e8f1289384add8638c21bab69d41495bcfc7881446b527e5aa4db14e1babc4f71dfee32b69705e6d3b64bf46a22

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
    MD5

    72131adb0e2315281aae445db11e09a2

    SHA1

    712ca2ebaa7d9bc9bbe18f7843954cfb0d22b08e

    SHA256

    9ea7a66f0c3dc13ddfc6f05d95049dd7f641053a380578a12013db9f72367f65

    SHA512

    bbc68fa0c586aaa7227da59848407672e7629e8f1289384add8638c21bab69d41495bcfc7881446b527e5aa4db14e1babc4f71dfee32b69705e6d3b64bf46a22

  • memory/700-199-0x0000000004DC0000-0x0000000004DC1000-memory.dmp
    Filesize

    4KB

  • memory/700-213-0x00000000056F0000-0x00000000056F1000-memory.dmp
    Filesize

    4KB

  • memory/1120-126-0x0000000004EB0000-0x0000000004EB1000-memory.dmp
    Filesize

    4KB

  • memory/1120-118-0x0000000004780000-0x0000000004781000-memory.dmp
    Filesize

    4KB

  • memory/1312-67-0x0000000004AE0000-0x0000000004AE1000-memory.dmp
    Filesize

    4KB

  • memory/1312-70-0x0000000005310000-0x0000000005311000-memory.dmp
    Filesize

    4KB

  • memory/1316-177-0x0000000004670000-0x0000000004671000-memory.dmp
    Filesize

    4KB

  • memory/1316-188-0x0000000004EA0000-0x0000000004EA1000-memory.dmp
    Filesize

    4KB

  • memory/1548-201-0x0000000000000000-mapping.dmp
  • memory/2112-74-0x0000000005620000-0x0000000005621000-memory.dmp
    Filesize

    4KB

  • memory/2112-71-0x0000000004EF0000-0x0000000004EF1000-memory.dmp
    Filesize

    4KB

  • memory/2220-144-0x0000000004EB0000-0x0000000004EB1000-memory.dmp
    Filesize

    4KB

  • memory/2220-153-0x00000000057E0000-0x00000000057E1000-memory.dmp
    Filesize

    4KB

  • memory/2760-88-0x0000000002790000-0x0000000002791000-memory.dmp
    Filesize

    4KB

  • memory/2760-143-0x0000000006C30000-0x0000000006C31000-memory.dmp
    Filesize

    4KB

  • memory/2760-86-0x000000000040CD2F-mapping.dmp
  • memory/2760-87-0x0000000000400000-0x0000000000436000-memory.dmp
    Filesize

    216KB

  • memory/2760-191-0x0000000008680000-0x0000000008681000-memory.dmp
    Filesize

    4KB

  • memory/2760-89-0x0000000072B40000-0x000000007322E000-memory.dmp
    Filesize

    6.9MB

  • memory/2760-90-0x0000000004D10000-0x0000000004D34000-memory.dmp
    Filesize

    144KB

  • memory/2760-91-0x0000000005250000-0x0000000005251000-memory.dmp
    Filesize

    4KB

  • memory/2760-92-0x0000000004D90000-0x0000000004DB2000-memory.dmp
    Filesize

    136KB

  • memory/2760-93-0x0000000005D60000-0x0000000005D61000-memory.dmp
    Filesize

    4KB

  • memory/2760-94-0x0000000004EA0000-0x0000000004EA1000-memory.dmp
    Filesize

    4KB

  • memory/2760-95-0x0000000004E80000-0x0000000004E81000-memory.dmp
    Filesize

    4KB

  • memory/2760-138-0x00000000067C0000-0x00000000067C1000-memory.dmp
    Filesize

    4KB

  • memory/2760-139-0x0000000006EC0000-0x0000000006EC1000-memory.dmp
    Filesize

    4KB

  • memory/2760-141-0x0000000006990000-0x0000000006991000-memory.dmp
    Filesize

    4KB

  • memory/2760-99-0x0000000004EF0000-0x0000000004EF1000-memory.dmp
    Filesize

    4KB

  • memory/2760-167-0x0000000006760000-0x0000000006761000-memory.dmp
    Filesize

    4KB

  • memory/2760-189-0x0000000007790000-0x0000000007791000-memory.dmp
    Filesize

    4KB

  • memory/2760-142-0x0000000006A30000-0x0000000006A31000-memory.dmp
    Filesize

    4KB

  • memory/2760-85-0x0000000000400000-0x0000000000436000-memory.dmp
    Filesize

    216KB

  • memory/2760-104-0x0000000005750000-0x0000000005751000-memory.dmp
    Filesize

    4KB

  • memory/2828-78-0x0000000004A50000-0x0000000004A51000-memory.dmp
    Filesize

    4KB

  • memory/2828-75-0x0000000004320000-0x0000000004321000-memory.dmp
    Filesize

    4KB

  • memory/2924-3-0x0000000004DF0000-0x0000000004DF1000-memory.dmp
    Filesize

    4KB

  • memory/2924-5-0x0000000005420000-0x0000000005421000-memory.dmp
    Filesize

    4KB

  • memory/2924-2-0x0000000004DF0000-0x0000000004DF1000-memory.dmp
    Filesize

    4KB

  • memory/2984-101-0x0000000003F50000-0x0000000003F51000-memory.dmp
    Filesize

    4KB

  • memory/2984-171-0x0000000000000000-mapping.dmp
  • memory/2984-217-0x0000000000000000-mapping.dmp
  • memory/2984-114-0x0000000000000000-mapping.dmp
  • memory/2984-115-0x0000000000000000-mapping.dmp
  • memory/2984-116-0x0000000000000000-mapping.dmp
  • memory/2984-117-0x0000000000000000-mapping.dmp
  • memory/2984-111-0x0000000000000000-mapping.dmp
  • memory/2984-121-0x0000000000000000-mapping.dmp
  • memory/2984-122-0x0000000000000000-mapping.dmp
  • memory/2984-123-0x0000000000000000-mapping.dmp
  • memory/2984-125-0x0000000000000000-mapping.dmp
  • memory/2984-124-0x0000000000000000-mapping.dmp
  • memory/2984-110-0x0000000000000000-mapping.dmp
  • memory/2984-127-0x0000000000000000-mapping.dmp
  • memory/2984-128-0x0000000000000000-mapping.dmp
  • memory/2984-129-0x0000000000000000-mapping.dmp
  • memory/2984-130-0x0000000000000000-mapping.dmp
  • memory/2984-131-0x00000000040B0000-0x00000000040D4000-memory.dmp
    Filesize

    144KB

  • memory/2984-133-0x0000000004430000-0x0000000004452000-memory.dmp
    Filesize

    136KB

  • memory/2984-109-0x0000000000000000-mapping.dmp
  • memory/2984-108-0x0000000000000000-mapping.dmp
  • memory/2984-219-0x0000000000000000-mapping.dmp
  • memory/2984-218-0x0000000000000000-mapping.dmp
  • memory/2984-103-0x0000000072B40000-0x000000007322E000-memory.dmp
    Filesize

    6.9MB

  • memory/2984-102-0x0000000004310000-0x0000000004311000-memory.dmp
    Filesize

    4KB

  • memory/2984-147-0x0000000000000000-mapping.dmp
  • memory/2984-149-0x0000000000000000-mapping.dmp
  • memory/2984-148-0x0000000000000000-mapping.dmp
  • memory/2984-150-0x0000000000000000-mapping.dmp
  • memory/2984-151-0x0000000000000000-mapping.dmp
  • memory/2984-152-0x0000000000000000-mapping.dmp
  • memory/2984-216-0x0000000000000000-mapping.dmp
  • memory/2984-154-0x0000000000000000-mapping.dmp
  • memory/2984-155-0x0000000000000000-mapping.dmp
  • memory/2984-156-0x0000000000000000-mapping.dmp
  • memory/2984-158-0x0000000000000000-mapping.dmp
  • memory/2984-157-0x0000000000000000-mapping.dmp
  • memory/2984-215-0x0000000000000000-mapping.dmp
  • memory/2984-162-0x0000000000000000-mapping.dmp
  • memory/2984-163-0x0000000000000000-mapping.dmp
  • memory/2984-164-0x0000000000000000-mapping.dmp
  • memory/2984-165-0x0000000000000000-mapping.dmp
  • memory/2984-100-0x0000000002494000-0x0000000002495000-memory.dmp
    Filesize

    4KB

  • memory/2984-166-0x0000000000000000-mapping.dmp
  • memory/2984-168-0x0000000000000000-mapping.dmp
  • memory/2984-169-0x0000000000000000-mapping.dmp
  • memory/2984-214-0x0000000000000000-mapping.dmp
  • memory/2984-112-0x0000000000000000-mapping.dmp
  • memory/2984-172-0x0000000000000000-mapping.dmp
  • memory/2984-173-0x0000000000000000-mapping.dmp
  • memory/2984-175-0x0000000000000000-mapping.dmp
  • memory/2984-174-0x0000000000000000-mapping.dmp
  • memory/2984-176-0x0000000000000000-mapping.dmp
  • memory/2984-96-0x0000000000000000-mapping.dmp
  • memory/2984-181-0x0000000000000000-mapping.dmp
  • memory/2984-182-0x0000000000000000-mapping.dmp
  • memory/2984-183-0x0000000000000000-mapping.dmp
  • memory/2984-184-0x0000000000000000-mapping.dmp
  • memory/2984-185-0x0000000000000000-mapping.dmp
  • memory/2984-186-0x0000000000000000-mapping.dmp
  • memory/2984-180-0x0000000000000000-mapping.dmp
  • memory/2984-187-0x0000000000000000-mapping.dmp
  • memory/2984-212-0x0000000000000000-mapping.dmp
  • memory/2984-211-0x0000000000000000-mapping.dmp
  • memory/2984-192-0x0000000000000000-mapping.dmp
  • memory/2984-193-0x0000000000000000-mapping.dmp
  • memory/2984-194-0x0000000000000000-mapping.dmp
  • memory/2984-210-0x0000000000000000-mapping.dmp
  • memory/2984-190-0x0000000000000000-mapping.dmp
  • memory/2984-195-0x0000000000000000-mapping.dmp
  • memory/2984-196-0x0000000000000000-mapping.dmp
  • memory/2984-197-0x0000000000000000-mapping.dmp
  • memory/2984-209-0x0000000000000000-mapping.dmp
  • memory/2984-208-0x0000000000000000-mapping.dmp
  • memory/2984-207-0x0000000000000000-mapping.dmp
  • memory/2984-204-0x0000000000000000-mapping.dmp
  • memory/2984-203-0x0000000000000000-mapping.dmp
  • memory/2984-205-0x0000000000000000-mapping.dmp
  • memory/2984-206-0x0000000000000000-mapping.dmp
  • memory/3504-82-0x0000000072B40000-0x000000007322E000-memory.dmp
    Filesize

    6.9MB

  • memory/3504-83-0x0000000000CA0000-0x0000000000CA1000-memory.dmp
    Filesize

    4KB

  • memory/3504-79-0x0000000000000000-mapping.dmp
  • memory/3744-198-0x0000000000000000-mapping.dmp
  • memory/3980-1-0x0000000002900000-0x0000000002901000-memory.dmp
    Filesize

    4KB

  • memory/3980-0-0x00000000023F3000-0x00000000023F4000-memory.dmp
    Filesize

    4KB

  • memory/4036-10-0x0000000004C70000-0x0000000004C71000-memory.dmp
    Filesize

    4KB

  • memory/4036-6-0x0000000004740000-0x0000000004741000-memory.dmp
    Filesize

    4KB

  • memory/4060-170-0x0000000004A60000-0x0000000004A61000-memory.dmp
    Filesize

    4KB

  • memory/4060-159-0x00000000040B0000-0x00000000040B1000-memory.dmp
    Filesize

    4KB

  • memory/4092-105-0x00000000045F0000-0x00000000045F1000-memory.dmp
    Filesize

    4KB

  • memory/4092-106-0x00000000045F0000-0x00000000045F1000-memory.dmp
    Filesize

    4KB

  • memory/4092-113-0x0000000004D20000-0x0000000004D21000-memory.dmp
    Filesize

    4KB