Analysis
-
max time kernel
31s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-11-2020 13:34
Static task
static1
Behavioral task
behavioral1
Sample
8684d32ce7d422c21d16332402ab0ea5.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
8684d32ce7d422c21d16332402ab0ea5.exe
Resource
win10v20201028
General
-
Target
8684d32ce7d422c21d16332402ab0ea5.exe
-
Size
325KB
-
MD5
8684d32ce7d422c21d16332402ab0ea5
-
SHA1
4515d7b81b406bcd90f8cc45cd445f5e241048f2
-
SHA256
31239f4455170cbb223b36936011b6573c3a5a86ee32b55f0bba48d95f3c7f6d
-
SHA512
af6d32a5bf30f912baed7beb834b5e7c36b40358032c9701af2bd58214caad0dc953d45cad2f8b6ee3e9b88f5037ac88ed6daffc14b8e221100815d811281b37
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/508-12-0x00000000043D0000-0x00000000043F3000-memory.dmp family_redline behavioral2/memory/508-14-0x0000000004470000-0x0000000004492000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 checkip.amazonaws.com -
Program crash 36 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2880 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 3412 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 740 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2064 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 4040 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 1864 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2752 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2876 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2684 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2228 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2244 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2748 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2156 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 3256 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 3996 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 4036 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2044 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2296 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2708 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 192 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 3552 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 3020 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2640 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2276 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 4060 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2180 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2256 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 3264 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2592 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 1604 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 3676 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 3864 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2840 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2216 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2212 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe 2224 508 WerFault.exe 8684d32ce7d422c21d16332402ab0ea5.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 3412 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 740 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe 4040 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
Processes:
WerFault.exeWerFault.exe8684d32ce7d422c21d16332402ab0ea5.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeRestorePrivilege 2880 WerFault.exe Token: SeBackupPrivilege 2880 WerFault.exe Token: SeDebugPrivilege 2880 WerFault.exe Token: SeDebugPrivilege 3412 WerFault.exe Token: SeDebugPrivilege 508 8684d32ce7d422c21d16332402ab0ea5.exe Token: SeDebugPrivilege 740 WerFault.exe Token: SeDebugPrivilege 2064 WerFault.exe Token: SeDebugPrivilege 4040 WerFault.exe Token: SeDebugPrivilege 1864 WerFault.exe Token: SeDebugPrivilege 2752 WerFault.exe Token: SeDebugPrivilege 2876 WerFault.exe Token: SeDebugPrivilege 2684 WerFault.exe Token: SeDebugPrivilege 2228 WerFault.exe Token: SeDebugPrivilege 2244 WerFault.exe Token: SeDebugPrivilege 2748 WerFault.exe Token: SeDebugPrivilege 2156 WerFault.exe Token: SeDebugPrivilege 3256 WerFault.exe Token: SeDebugPrivilege 3996 WerFault.exe Token: SeDebugPrivilege 4036 WerFault.exe Token: SeDebugPrivilege 2044 WerFault.exe Token: SeDebugPrivilege 2296 WerFault.exe Token: SeDebugPrivilege 2708 WerFault.exe Token: SeDebugPrivilege 192 WerFault.exe Token: SeDebugPrivilege 3552 WerFault.exe Token: SeDebugPrivilege 3020 WerFault.exe Token: SeDebugPrivilege 2640 WerFault.exe Token: SeDebugPrivilege 2276 WerFault.exe Token: SeDebugPrivilege 4060 WerFault.exe Token: SeDebugPrivilege 2180 WerFault.exe Token: SeDebugPrivilege 2256 WerFault.exe Token: SeDebugPrivilege 3264 WerFault.exe Token: SeDebugPrivilege 2592 WerFault.exe Token: SeDebugPrivilege 1604 WerFault.exe Token: SeDebugPrivilege 3676 WerFault.exe Token: SeDebugPrivilege 3864 WerFault.exe Token: SeDebugPrivilege 2840 WerFault.exe Token: SeDebugPrivilege 2216 WerFault.exe Token: SeDebugPrivilege 2212 WerFault.exe Token: SeDebugPrivilege 2224 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
8684d32ce7d422c21d16332402ab0ea5.execmd.exedescription pid process target process PID 508 wrote to memory of 4072 508 8684d32ce7d422c21d16332402ab0ea5.exe cmd.exe PID 508 wrote to memory of 4072 508 8684d32ce7d422c21d16332402ab0ea5.exe cmd.exe PID 508 wrote to memory of 4072 508 8684d32ce7d422c21d16332402ab0ea5.exe cmd.exe PID 4072 wrote to memory of 1488 4072 cmd.exe PING.EXE PID 4072 wrote to memory of 1488 4072 cmd.exe PING.EXE PID 4072 wrote to memory of 1488 4072 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\8684d32ce7d422c21d16332402ab0ea5.exe"C:\Users\Admin\AppData\Local\Temp\8684d32ce7d422c21d16332402ab0ea5.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 5322⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 5082⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 12282⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 12482⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 13122⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 13682⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 13922⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 14362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 13402⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 17162⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 17802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 18682⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 19442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 19922⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 18802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 21002⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 21882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 21682⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 21562⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 21362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 22082⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 21962⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 23162⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 23602⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 23802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:4060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 24362⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 24482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 24402⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 21562⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 22282⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 22882⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 24482⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 24042⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 24522⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 24202⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2212 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""2⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:1488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 26442⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:2224