Analysis

  • max time kernel
    31s
  • max time network
    111s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    03-11-2020 13:34

General

  • Target

    8684d32ce7d422c21d16332402ab0ea5.exe

  • Size

    325KB

  • MD5

    8684d32ce7d422c21d16332402ab0ea5

  • SHA1

    4515d7b81b406bcd90f8cc45cd445f5e241048f2

  • SHA256

    31239f4455170cbb223b36936011b6573c3a5a86ee32b55f0bba48d95f3c7f6d

  • SHA512

    af6d32a5bf30f912baed7beb834b5e7c36b40358032c9701af2bd58214caad0dc953d45cad2f8b6ee3e9b88f5037ac88ed6daffc14b8e221100815d811281b37

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Program crash 36 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8684d32ce7d422c21d16332402ab0ea5.exe
    "C:\Users\Admin\AppData\Local\Temp\8684d32ce7d422c21d16332402ab0ea5.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:508
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 532
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2880
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 508
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3412
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1228
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:740
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1248
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2064
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1312
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4040
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1368
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:1864
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1392
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1436
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2876
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1340
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2684
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1716
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1780
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2244
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1868
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2748
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1944
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2156
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1992
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3256
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 1880
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3996
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2100
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:4036
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2188
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2044
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2168
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2296
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2156
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2708
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2136
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:192
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2208
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3552
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2196
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3020
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2316
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2640
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2360
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2276
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2380
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:4060
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2436
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2180
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2448
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2256
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2440
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3264
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2156
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2592
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2228
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:1604
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2288
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3676
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2448
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3864
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2404
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2840
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2452
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2216
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2420
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2212
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 3
        3⤵
        • Runs ping.exe
        PID:1488
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 2644
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2224

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/192-460-0x0000000004D10000-0x0000000004D11000-memory.dmp

    Filesize

    4KB

  • memory/192-457-0x00000000045E0000-0x00000000045E1000-memory.dmp

    Filesize

    4KB

  • memory/508-17-0x0000000006970000-0x0000000006971000-memory.dmp

    Filesize

    4KB

  • memory/508-59-0x0000000008D10000-0x0000000008D11000-memory.dmp

    Filesize

    4KB

  • memory/508-52-0x0000000008460000-0x0000000008461000-memory.dmp

    Filesize

    4KB

  • memory/508-58-0x0000000008C70000-0x0000000008C71000-memory.dmp

    Filesize

    4KB

  • memory/508-18-0x00000000069C0000-0x00000000069C1000-memory.dmp

    Filesize

    4KB

  • memory/508-2-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB

  • memory/508-1-0x0000000002860000-0x0000000002861000-memory.dmp

    Filesize

    4KB

  • memory/508-12-0x00000000043D0000-0x00000000043F3000-memory.dmp

    Filesize

    140KB

  • memory/508-13-0x0000000006AF0000-0x0000000006AF1000-memory.dmp

    Filesize

    4KB

  • memory/508-14-0x0000000004470000-0x0000000004492000-memory.dmp

    Filesize

    136KB

  • memory/508-15-0x0000000006FF0000-0x0000000006FF1000-memory.dmp

    Filesize

    4KB

  • memory/508-16-0x0000000006930000-0x0000000006931000-memory.dmp

    Filesize

    4KB

  • memory/508-53-0x0000000008630000-0x0000000008631000-memory.dmp

    Filesize

    4KB

  • memory/508-3-0x0000000073760000-0x0000000073E4E000-memory.dmp

    Filesize

    6.9MB

  • memory/508-616-0x00000000093F0000-0x00000000093F1000-memory.dmp

    Filesize

    4KB

  • memory/508-60-0x0000000008DA0000-0x0000000008DA1000-memory.dmp

    Filesize

    4KB

  • memory/508-19-0x0000000007660000-0x0000000007661000-memory.dmp

    Filesize

    4KB

  • memory/508-167-0x0000000009110000-0x0000000009111000-memory.dmp

    Filesize

    4KB

  • memory/508-0-0x0000000002576000-0x0000000002577000-memory.dmp

    Filesize

    4KB

  • memory/740-23-0x00000000053A0000-0x00000000053A1000-memory.dmp

    Filesize

    4KB

  • memory/740-20-0x0000000004A70000-0x0000000004A71000-memory.dmp

    Filesize

    4KB

  • memory/1488-621-0x0000000000000000-mapping.dmp

  • memory/1604-591-0x0000000004D10000-0x0000000004D11000-memory.dmp

    Filesize

    4KB

  • memory/1604-594-0x0000000005540000-0x0000000005541000-memory.dmp

    Filesize

    4KB

  • memory/1864-32-0x0000000004C30000-0x0000000004C31000-memory.dmp

    Filesize

    4KB

  • memory/1864-35-0x0000000005560000-0x0000000005561000-memory.dmp

    Filesize

    4KB

  • memory/2044-263-0x00000000045C0000-0x00000000045C1000-memory.dmp

    Filesize

    4KB

  • memory/2044-267-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

    Filesize

    4KB

  • memory/2064-27-0x00000000054E0000-0x00000000054E1000-memory.dmp

    Filesize

    4KB

  • memory/2064-24-0x0000000004CB0000-0x0000000004CB1000-memory.dmp

    Filesize

    4KB

  • memory/2156-65-0x00000000041F0000-0x00000000041F1000-memory.dmp

    Filesize

    4KB

  • memory/2156-68-0x0000000004A20000-0x0000000004A21000-memory.dmp

    Filesize

    4KB

  • memory/2180-575-0x0000000004F90000-0x0000000004F91000-memory.dmp

    Filesize

    4KB

  • memory/2180-578-0x00000000057C0000-0x00000000057C1000-memory.dmp

    Filesize

    4KB

  • memory/2212-612-0x0000000005040000-0x0000000005041000-memory.dmp

    Filesize

    4KB

  • memory/2216-608-0x0000000004850000-0x0000000004851000-memory.dmp

    Filesize

    4KB

  • memory/2216-611-0x0000000005180000-0x0000000005181000-memory.dmp

    Filesize

    4KB

  • memory/2224-618-0x0000000004450000-0x0000000004451000-memory.dmp

    Filesize

    4KB

  • memory/2224-622-0x0000000004C80000-0x0000000004C81000-memory.dmp

    Filesize

    4KB

  • memory/2228-51-0x0000000004FE0000-0x0000000004FE1000-memory.dmp

    Filesize

    4KB

  • memory/2228-48-0x00000000046B0000-0x00000000046B1000-memory.dmp

    Filesize

    4KB

  • memory/2244-57-0x0000000005260000-0x0000000005261000-memory.dmp

    Filesize

    4KB

  • memory/2244-54-0x0000000004830000-0x0000000004831000-memory.dmp

    Filesize

    4KB

  • memory/2256-579-0x00000000043E0000-0x00000000043E1000-memory.dmp

    Filesize

    4KB

  • memory/2276-570-0x00000000053D0000-0x00000000053D1000-memory.dmp

    Filesize

    4KB

  • memory/2276-567-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

    Filesize

    4KB

  • memory/2296-358-0x0000000004590000-0x0000000004591000-memory.dmp

    Filesize

    4KB

  • memory/2296-361-0x0000000004DC0000-0x0000000004DC1000-memory.dmp

    Filesize

    4KB

  • memory/2592-590-0x0000000004C60000-0x0000000004C61000-memory.dmp

    Filesize

    4KB

  • memory/2592-587-0x0000000004530000-0x0000000004531000-memory.dmp

    Filesize

    4KB

  • memory/2640-476-0x0000000004E20000-0x0000000004E21000-memory.dmp

    Filesize

    4KB

  • memory/2640-472-0x00000000045F0000-0x00000000045F1000-memory.dmp

    Filesize

    4KB

  • memory/2684-44-0x0000000004E10000-0x0000000004E11000-memory.dmp

    Filesize

    4KB

  • memory/2684-47-0x0000000005640000-0x0000000005641000-memory.dmp

    Filesize

    4KB

  • memory/2708-362-0x0000000004560000-0x0000000004561000-memory.dmp

    Filesize

    4KB

  • memory/2708-366-0x0000000004C90000-0x0000000004C91000-memory.dmp

    Filesize

    4KB

  • memory/2748-64-0x0000000004FA0000-0x0000000004FA1000-memory.dmp

    Filesize

    4KB

  • memory/2748-61-0x0000000004860000-0x0000000004861000-memory.dmp

    Filesize

    4KB

  • memory/2752-36-0x00000000044D0000-0x00000000044D1000-memory.dmp

    Filesize

    4KB

  • memory/2752-39-0x0000000004A00000-0x0000000004A01000-memory.dmp

    Filesize

    4KB

  • memory/2840-604-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

    Filesize

    4KB

  • memory/2840-607-0x00000000055F0000-0x00000000055F1000-memory.dmp

    Filesize

    4KB

  • memory/2876-40-0x0000000004480000-0x0000000004481000-memory.dmp

    Filesize

    4KB

  • memory/2876-43-0x0000000004AC0000-0x0000000004AC1000-memory.dmp

    Filesize

    4KB

  • memory/2880-5-0x00000000047F0000-0x00000000047F1000-memory.dmp

    Filesize

    4KB

  • memory/2880-4-0x00000000047F0000-0x00000000047F1000-memory.dmp

    Filesize

    4KB

  • memory/2880-7-0x0000000004FA0000-0x0000000004FA1000-memory.dmp

    Filesize

    4KB

  • memory/3020-468-0x0000000004D00000-0x0000000004D01000-memory.dmp

    Filesize

    4KB

  • memory/3020-471-0x0000000005630000-0x0000000005631000-memory.dmp

    Filesize

    4KB

  • memory/3256-69-0x0000000004FB0000-0x0000000004FB1000-memory.dmp

    Filesize

    4KB

  • memory/3264-583-0x0000000004400000-0x0000000004401000-memory.dmp

    Filesize

    4KB

  • memory/3264-586-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

    Filesize

    4KB

  • memory/3412-8-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

    Filesize

    4KB

  • memory/3412-11-0x00000000051D0000-0x00000000051D1000-memory.dmp

    Filesize

    4KB

  • memory/3552-461-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/3552-464-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

    Filesize

    4KB

  • memory/3676-595-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/3676-598-0x0000000004670000-0x0000000004671000-memory.dmp

    Filesize

    4KB

  • memory/3864-600-0x0000000004630000-0x0000000004631000-memory.dmp

    Filesize

    4KB

  • memory/3864-603-0x0000000004E60000-0x0000000004E61000-memory.dmp

    Filesize

    4KB

  • memory/3996-166-0x00000000057F0000-0x00000000057F1000-memory.dmp

    Filesize

    4KB

  • memory/3996-163-0x00000000050B0000-0x00000000050B1000-memory.dmp

    Filesize

    4KB

  • memory/4036-172-0x0000000005380000-0x0000000005381000-memory.dmp

    Filesize

    4KB

  • memory/4036-168-0x0000000004A50000-0x0000000004A51000-memory.dmp

    Filesize

    4KB

  • memory/4040-28-0x0000000004400000-0x0000000004401000-memory.dmp

    Filesize

    4KB

  • memory/4040-31-0x0000000004C30000-0x0000000004C31000-memory.dmp

    Filesize

    4KB

  • memory/4060-574-0x00000000051F0000-0x00000000051F1000-memory.dmp

    Filesize

    4KB

  • memory/4060-571-0x00000000048C0000-0x00000000048C1000-memory.dmp

    Filesize

    4KB

  • memory/4072-617-0x0000000000000000-mapping.dmp