Analysis

  • max time kernel
    36s
  • max time network
    36s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    02-11-2020 09:10

General

  • Target

    cfa3fbe4fcd80eabc714b98b532bcb21.exe

  • Size

    667KB

  • MD5

    cfa3fbe4fcd80eabc714b98b532bcb21

  • SHA1

    730fdcea25571f6a2ba16361a534b167d47da56b

  • SHA256

    d740674533d5c0fb220dceec7eb0d440a1f01231a728030b355361b9f0aeff77

  • SHA512

    74f1b86bfd89daac5568e3f43c8adb1f0e96dad09897a59d5ce6b7ac884b05f9f9a5987803bb8645b7275634b25d073a7c88053561a661df5f95ad9a15e007a5

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfa3fbe4fcd80eabc714b98b532bcb21.exe
    "C:\Users\Admin\AppData\Local\Temp\cfa3fbe4fcd80eabc714b98b532bcb21.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
      bestof.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        3⤵
          PID:828
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          3⤵
            PID:884
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:328
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:612
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 3
                5⤵
                • Runs ping.exe
                PID:780
        • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
          bestofd.exe
          2⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1120
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:920
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 3
              4⤵
              • Runs ping.exe
              PID:1456

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      1
      T1082

      Remote System Discovery

      1
      T1018

      Collection

      Data from Local System

      1
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
        MD5

        b77a1d58626a5d4a77202afbf717accb

        SHA1

        1a37bf11e2b75384785d05780fe17fe1167bfbb1

        SHA256

        a0a1952f947eaea5f54da2c343da0dc0ef5cd7bc58fe27f1dbf4e7199e757a13

        SHA512

        d12789afcdf0b6dc4dfd5c944c56466c3305b1f87670a038401e22a27ee8980b11a6039e73c4729c731dfd241fdb84c7c850c6ee2cd04bdfac6d5f5b2c8fff26

      • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
        MD5

        b77a1d58626a5d4a77202afbf717accb

        SHA1

        1a37bf11e2b75384785d05780fe17fe1167bfbb1

        SHA256

        a0a1952f947eaea5f54da2c343da0dc0ef5cd7bc58fe27f1dbf4e7199e757a13

        SHA512

        d12789afcdf0b6dc4dfd5c944c56466c3305b1f87670a038401e22a27ee8980b11a6039e73c4729c731dfd241fdb84c7c850c6ee2cd04bdfac6d5f5b2c8fff26

      • C:\Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
        MD5

        72131adb0e2315281aae445db11e09a2

        SHA1

        712ca2ebaa7d9bc9bbe18f7843954cfb0d22b08e

        SHA256

        9ea7a66f0c3dc13ddfc6f05d95049dd7f641053a380578a12013db9f72367f65

        SHA512

        bbc68fa0c586aaa7227da59848407672e7629e8f1289384add8638c21bab69d41495bcfc7881446b527e5aa4db14e1babc4f71dfee32b69705e6d3b64bf46a22

      • \Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
        MD5

        b77a1d58626a5d4a77202afbf717accb

        SHA1

        1a37bf11e2b75384785d05780fe17fe1167bfbb1

        SHA256

        a0a1952f947eaea5f54da2c343da0dc0ef5cd7bc58fe27f1dbf4e7199e757a13

        SHA512

        d12789afcdf0b6dc4dfd5c944c56466c3305b1f87670a038401e22a27ee8980b11a6039e73c4729c731dfd241fdb84c7c850c6ee2cd04bdfac6d5f5b2c8fff26

      • \Users\Admin\AppData\Roaming\gfersesurity\bestofd.exe
        MD5

        72131adb0e2315281aae445db11e09a2

        SHA1

        712ca2ebaa7d9bc9bbe18f7843954cfb0d22b08e

        SHA256

        9ea7a66f0c3dc13ddfc6f05d95049dd7f641053a380578a12013db9f72367f65

        SHA512

        bbc68fa0c586aaa7227da59848407672e7629e8f1289384add8638c21bab69d41495bcfc7881446b527e5aa4db14e1babc4f71dfee32b69705e6d3b64bf46a22

      • memory/328-16-0x0000000000A40000-0x0000000000A51000-memory.dmp
        Filesize

        68KB

      • memory/328-19-0x0000000000810000-0x0000000000832000-memory.dmp
        Filesize

        136KB

      • memory/328-18-0x00000000005D0000-0x00000000005F4000-memory.dmp
        Filesize

        144KB

      • memory/328-17-0x00000000746A0000-0x0000000074D8E000-memory.dmp
        Filesize

        6.9MB

      • memory/328-13-0x0000000000400000-0x0000000000436000-memory.dmp
        Filesize

        216KB

      • memory/328-14-0x000000000040CD2F-mapping.dmp
      • memory/328-15-0x0000000000400000-0x0000000000436000-memory.dmp
        Filesize

        216KB

      • memory/612-28-0x0000000000000000-mapping.dmp
      • memory/780-29-0x0000000000000000-mapping.dmp
      • memory/920-26-0x0000000000000000-mapping.dmp
      • memory/1120-22-0x0000000003D80000-0x0000000003D91000-memory.dmp
        Filesize

        68KB

      • memory/1120-23-0x00000000746A0000-0x0000000074D8E000-memory.dmp
        Filesize

        6.9MB

      • memory/1120-25-0x0000000003F50000-0x0000000003F72000-memory.dmp
        Filesize

        136KB

      • memory/1120-24-0x0000000003EC0000-0x0000000003EE4000-memory.dmp
        Filesize

        144KB

      • memory/1120-20-0x00000000023E9000-0x00000000023EA000-memory.dmp
        Filesize

        4KB

      • memory/1120-21-0x0000000003D80000-0x0000000003D91000-memory.dmp
        Filesize

        68KB

      • memory/1120-11-0x0000000000000000-mapping.dmp
      • memory/1304-2-0x000007FEF7F80000-0x000007FEF81FA000-memory.dmp
        Filesize

        2.5MB

      • memory/1420-7-0x00000000746A0000-0x0000000074D8E000-memory.dmp
        Filesize

        6.9MB

      • memory/1420-8-0x00000000001C0000-0x00000000001C1000-memory.dmp
        Filesize

        4KB

      • memory/1420-4-0x0000000000000000-mapping.dmp
      • memory/1456-27-0x0000000000000000-mapping.dmp
      • memory/1764-0-0x0000000002454000-0x0000000002465000-memory.dmp
        Filesize

        68KB

      • memory/1764-1-0x0000000002730000-0x0000000002741000-memory.dmp
        Filesize

        68KB