Analysis

  • max time kernel
    129s
  • max time network
    116s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-11-2020 06:37

General

  • Target

    05d8fd0f01dca3453f9a025f9866417c.exe

  • Size

    582KB

  • MD5

    05d8fd0f01dca3453f9a025f9866417c

  • SHA1

    524fb1af6fbb08365440a72f7cf20d7b90b88e7d

  • SHA256

    7d957b25b466f6b1eca625ad56a3472a83b2efc825a5d056a7d11b1b74f17fa3

  • SHA512

    958fb150a1439dca92498a739ce419ce4d4c8aa3a7d41e7138bfc91019e7ad2d47f8f1ffd8abfb7af7974c9ba40e0a220d0b00fccc7e74c378427c110800a4ba

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 30 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 15 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05d8fd0f01dca3453f9a025f9866417c.exe
    "C:\Users\Admin\AppData\Local\Temp\05d8fd0f01dca3453f9a025f9866417c.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:580
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 760
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2728
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 844
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:200
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 1212
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:948
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 1572
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2268
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 1540
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3444
    • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
      bestof.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 532
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 536
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3308
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 1012
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3972
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 1048
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3824
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 1244
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:760
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 1292
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3808
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 1352
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3668
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 1620
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:764
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 1916
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2720
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 1836
      2⤵
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3472

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
    MD5

    651026d3f1f58ca2718cac5272a53192

    SHA1

    f975cb02d4f348ae6cd3fd112b746445bd653e87

    SHA256

    fdc884b306b56d605844a30990a565fed93cbbf6d15c04c524ee606fbb1d8931

    SHA512

    9fe5bf0e4df06c0c67db69d6002366ee9897bdeb9c89940657f64852e9c287f1a2fc7ec2fac4377e77f97781045a4cc080318d2ec9e628da6ed9829a0ef929c3

  • C:\Users\Admin\AppData\Roaming\gfersesurity\bestof.exe
    MD5

    651026d3f1f58ca2718cac5272a53192

    SHA1

    f975cb02d4f348ae6cd3fd112b746445bd653e87

    SHA256

    fdc884b306b56d605844a30990a565fed93cbbf6d15c04c524ee606fbb1d8931

    SHA512

    9fe5bf0e4df06c0c67db69d6002366ee9897bdeb9c89940657f64852e9c287f1a2fc7ec2fac4377e77f97781045a4cc080318d2ec9e628da6ed9829a0ef929c3

  • memory/200-10-0x0000000004340000-0x0000000004341000-memory.dmp
    Filesize

    4KB

  • memory/200-13-0x0000000004770000-0x0000000004771000-memory.dmp
    Filesize

    4KB

  • memory/388-38-0x0000000004340000-0x0000000004341000-memory.dmp
    Filesize

    4KB

  • memory/388-33-0x0000000004340000-0x0000000004341000-memory.dmp
    Filesize

    4KB

  • memory/388-46-0x00000000047B0000-0x00000000047B1000-memory.dmp
    Filesize

    4KB

  • memory/388-34-0x0000000004340000-0x0000000004341000-memory.dmp
    Filesize

    4KB

  • memory/580-3-0x00000000045A0000-0x00000000045A1000-memory.dmp
    Filesize

    4KB

  • memory/580-2-0x00000000045A0000-0x00000000045A1000-memory.dmp
    Filesize

    4KB

  • memory/580-1-0x00000000041A0000-0x00000000041A1000-memory.dmp
    Filesize

    4KB

  • memory/580-0-0x0000000002551000-0x0000000002553000-memory.dmp
    Filesize

    8KB

  • memory/760-155-0x0000000004E20000-0x0000000004E21000-memory.dmp
    Filesize

    4KB

  • memory/760-144-0x00000000044F0000-0x00000000044F1000-memory.dmp
    Filesize

    4KB

  • memory/764-55-0x0000000004970000-0x0000000004971000-memory.dmp
    Filesize

    4KB

  • memory/764-52-0x0000000004340000-0x0000000004341000-memory.dmp
    Filesize

    4KB

  • memory/948-17-0x0000000005390000-0x0000000005391000-memory.dmp
    Filesize

    4KB

  • memory/948-14-0x0000000004C60000-0x0000000004C61000-memory.dmp
    Filesize

    4KB

  • memory/1616-125-0x0000000000000000-mapping.dmp
  • memory/1616-136-0x0000000000000000-mapping.dmp
  • memory/1616-30-0x0000000003FD0000-0x0000000003FD1000-memory.dmp
    Filesize

    4KB

  • memory/1616-29-0x000000000243B000-0x000000000243C000-memory.dmp
    Filesize

    4KB

  • memory/1616-41-0x0000000000000000-mapping.dmp
  • memory/1616-42-0x0000000000000000-mapping.dmp
  • memory/1616-43-0x0000000000000000-mapping.dmp
  • memory/1616-44-0x0000000000000000-mapping.dmp
  • memory/1616-45-0x0000000000000000-mapping.dmp
  • memory/1616-32-0x00000000730A0000-0x000000007378E000-memory.dmp
    Filesize

    6.9MB

  • memory/1616-198-0x0000000000000000-mapping.dmp
  • memory/1616-47-0x0000000000000000-mapping.dmp
  • memory/1616-48-0x0000000000000000-mapping.dmp
  • memory/1616-49-0x0000000000000000-mapping.dmp
  • memory/1616-50-0x0000000000000000-mapping.dmp
  • memory/1616-51-0x0000000000000000-mapping.dmp
  • memory/1616-196-0x0000000000000000-mapping.dmp
  • memory/1616-195-0x0000000000000000-mapping.dmp
  • memory/1616-194-0x0000000000000000-mapping.dmp
  • memory/1616-59-0x0000000000000000-mapping.dmp
  • memory/1616-60-0x0000000000000000-mapping.dmp
  • memory/1616-61-0x0000000000000000-mapping.dmp
  • memory/1616-62-0x0000000000000000-mapping.dmp
  • memory/1616-63-0x0000000000000000-mapping.dmp
  • memory/1616-64-0x0000000000000000-mapping.dmp
  • memory/1616-187-0x0000000000000000-mapping.dmp
  • memory/1616-66-0x0000000000000000-mapping.dmp
  • memory/1616-68-0x0000000000000000-mapping.dmp
  • memory/1616-69-0x0000000000000000-mapping.dmp
  • memory/1616-70-0x0000000000000000-mapping.dmp
  • memory/1616-193-0x0000000000000000-mapping.dmp
  • memory/1616-67-0x0000000000000000-mapping.dmp
  • memory/1616-72-0x0000000004310000-0x0000000004334000-memory.dmp
    Filesize

    144KB

  • memory/1616-75-0x0000000006AF0000-0x0000000006AF1000-memory.dmp
    Filesize

    4KB

  • memory/1616-76-0x00000000069B0000-0x00000000069D2000-memory.dmp
    Filesize

    136KB

  • memory/1616-192-0x0000000000000000-mapping.dmp
  • memory/1616-78-0x0000000006FF0000-0x0000000006FF1000-memory.dmp
    Filesize

    4KB

  • memory/1616-79-0x0000000006A70000-0x0000000006A71000-memory.dmp
    Filesize

    4KB

  • memory/1616-80-0x0000000006AB0000-0x0000000006AB1000-memory.dmp
    Filesize

    4KB

  • memory/1616-191-0x0000000000000000-mapping.dmp
  • memory/1616-190-0x0000000000000000-mapping.dmp
  • memory/1616-189-0x0000000000000000-mapping.dmp
  • memory/1616-188-0x0000000000000000-mapping.dmp
  • memory/1616-88-0x0000000007620000-0x0000000007621000-memory.dmp
    Filesize

    4KB

  • memory/1616-114-0x00000000077A0000-0x00000000077A1000-memory.dmp
    Filesize

    4KB

  • memory/1616-183-0x0000000000000000-mapping.dmp
  • memory/1616-123-0x0000000000000000-mapping.dmp
  • memory/1616-124-0x0000000000000000-mapping.dmp
  • memory/1616-182-0x0000000000000000-mapping.dmp
  • memory/1616-126-0x0000000000000000-mapping.dmp
  • memory/1616-181-0x0000000000000000-mapping.dmp
  • memory/1616-128-0x0000000000000000-mapping.dmp
  • memory/1616-129-0x0000000000000000-mapping.dmp
  • memory/1616-130-0x0000000000000000-mapping.dmp
  • memory/1616-179-0x0000000000000000-mapping.dmp
  • memory/1616-134-0x0000000000000000-mapping.dmp
  • memory/1616-135-0x0000000000000000-mapping.dmp
  • memory/1616-31-0x0000000004310000-0x0000000004311000-memory.dmp
    Filesize

    4KB

  • memory/1616-138-0x0000000000000000-mapping.dmp
  • memory/1616-137-0x0000000000000000-mapping.dmp
  • memory/1616-180-0x0000000000000000-mapping.dmp
  • memory/1616-140-0x0000000000000000-mapping.dmp
  • memory/1616-141-0x0000000000000000-mapping.dmp
  • memory/1616-143-0x0000000000000000-mapping.dmp
  • memory/1616-142-0x0000000000000000-mapping.dmp
  • memory/1616-178-0x0000000000000000-mapping.dmp
  • memory/1616-148-0x0000000000000000-mapping.dmp
  • memory/1616-149-0x0000000000000000-mapping.dmp
  • memory/1616-147-0x0000000000000000-mapping.dmp
  • memory/1616-154-0x0000000000000000-mapping.dmp
  • memory/1616-153-0x0000000000000000-mapping.dmp
  • memory/1616-152-0x0000000000000000-mapping.dmp
  • memory/1616-151-0x0000000000000000-mapping.dmp
  • memory/1616-150-0x0000000000000000-mapping.dmp
  • memory/1616-26-0x0000000000000000-mapping.dmp
  • memory/1616-157-0x0000000000000000-mapping.dmp
  • memory/1616-156-0x0000000000000000-mapping.dmp
  • memory/1616-159-0x0000000000000000-mapping.dmp
  • memory/1616-160-0x0000000000000000-mapping.dmp
  • memory/1616-161-0x0000000000000000-mapping.dmp
  • memory/1616-162-0x0000000000000000-mapping.dmp
  • memory/1616-158-0x0000000000000000-mapping.dmp
  • memory/1616-177-0x0000000000000000-mapping.dmp
  • memory/1616-166-0x0000000000000000-mapping.dmp
  • memory/1616-168-0x0000000000000000-mapping.dmp
  • memory/1616-169-0x0000000000000000-mapping.dmp
  • memory/1616-170-0x0000000000000000-mapping.dmp
  • memory/1616-171-0x0000000000000000-mapping.dmp
  • memory/1616-167-0x0000000000000000-mapping.dmp
  • memory/1616-173-0x0000000000000000-mapping.dmp
  • memory/1616-172-0x0000000000000000-mapping.dmp
  • memory/1616-174-0x0000000000000000-mapping.dmp
  • memory/1616-176-0x0000000000000000-mapping.dmp
  • memory/2268-18-0x0000000004A20000-0x0000000004A21000-memory.dmp
    Filesize

    4KB

  • memory/2268-21-0x0000000005250000-0x0000000005251000-memory.dmp
    Filesize

    4KB

  • memory/2720-71-0x0000000004E70000-0x0000000004E71000-memory.dmp
    Filesize

    4KB

  • memory/2720-77-0x0000000005720000-0x0000000005721000-memory.dmp
    Filesize

    4KB

  • memory/2728-7-0x00000000053B0000-0x00000000053B1000-memory.dmp
    Filesize

    4KB

  • memory/2728-5-0x0000000004D80000-0x0000000004D81000-memory.dmp
    Filesize

    4KB

  • memory/2728-4-0x0000000004D80000-0x0000000004D81000-memory.dmp
    Filesize

    4KB

  • memory/3308-56-0x00000000046E0000-0x00000000046E1000-memory.dmp
    Filesize

    4KB

  • memory/3308-65-0x0000000004D10000-0x0000000004D11000-memory.dmp
    Filesize

    4KB

  • memory/3444-25-0x0000000005600000-0x0000000005601000-memory.dmp
    Filesize

    4KB

  • memory/3444-22-0x0000000004DD0000-0x0000000004DD1000-memory.dmp
    Filesize

    4KB

  • memory/3472-81-0x0000000004A70000-0x0000000004A71000-memory.dmp
    Filesize

    4KB

  • memory/3472-85-0x00000000051A0000-0x00000000051A1000-memory.dmp
    Filesize

    4KB

  • memory/3668-184-0x0000000004340000-0x0000000004341000-memory.dmp
    Filesize

    4KB

  • memory/3668-197-0x0000000004C70000-0x0000000004C71000-memory.dmp
    Filesize

    4KB

  • memory/3808-175-0x0000000004C70000-0x0000000004C71000-memory.dmp
    Filesize

    4KB

  • memory/3808-163-0x0000000004340000-0x0000000004341000-memory.dmp
    Filesize

    4KB

  • memory/3824-131-0x0000000004E70000-0x0000000004E71000-memory.dmp
    Filesize

    4KB

  • memory/3824-139-0x00000000057A0000-0x00000000057A1000-memory.dmp
    Filesize

    4KB

  • memory/3972-120-0x00000000047E0000-0x00000000047E1000-memory.dmp
    Filesize

    4KB

  • memory/3972-127-0x0000000005010000-0x0000000005011000-memory.dmp
    Filesize

    4KB