Analysis Overview
SHA256
33bb7d8584f1353b048c0227977e9531a4125188a960babbc2a26307ca158275
Threat Level: Known bad
The file 4a93f552d9a2747b134be963c4d1b044.exe was found to be: Known bad.
Malicious Activity Summary
RedLine
RedLine Payload
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2021-09-20 08:08
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2021-09-20 08:08
Reported
2021-09-20 08:11
Platform
win7-en-20210916
Max time kernel
145s
Max time network
153s
Command Line
Signatures
RedLine
RedLine Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4a93f552d9a2747b134be963c4d1b044.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\4a93f552d9a2747b134be963c4d1b044.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\4a93f552d9a2747b134be963c4d1b044.exe
"C:\Users\Admin\AppData\Local\Temp\4a93f552d9a2747b134be963c4d1b044.exe"
Network
| Country | Destination | Domain | Proto |
| DE | 157.90.156.89:6004 | tcp | |
| RU | 45.9.20.20:13441 | tcp | |
| US | 8.8.8.8:53 | api.ip.sb | udp |
| US | 172.67.75.172:443 | api.ip.sb | tcp |
| BE | 8.238.110.126:80 | tcp |
Files
memory/744-54-0x00000000003E0000-0x00000000003FF000-memory.dmp
memory/744-55-0x0000000000710000-0x000000000072E000-memory.dmp
memory/744-56-0x0000000000220000-0x0000000000250000-memory.dmp
memory/744-57-0x0000000000400000-0x0000000000460000-memory.dmp
memory/744-60-0x0000000004AD3000-0x0000000004AD4000-memory.dmp
memory/744-59-0x0000000004AD2000-0x0000000004AD3000-memory.dmp
memory/744-58-0x0000000004AD1000-0x0000000004AD2000-memory.dmp
memory/744-61-0x0000000004AD4000-0x0000000004AD6000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2021-09-20 08:08
Reported
2021-09-20 08:11
Platform
win10-en
Max time kernel
80s
Max time network
151s
Command Line
Signatures
RedLine
RedLine Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\4a93f552d9a2747b134be963c4d1b044.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\4a93f552d9a2747b134be963c4d1b044.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\4a93f552d9a2747b134be963c4d1b044.exe
"C:\Users\Admin\AppData\Local\Temp\4a93f552d9a2747b134be963c4d1b044.exe"
Network
| Country | Destination | Domain | Proto |
| US | 13.107.246.67:443 | tcp | |
| NL | 104.73.149.158:443 | tcp | |
| US | 13.107.246.67:443 | tcp | |
| NL | 104.73.149.158:443 | tcp | |
| NL | 104.73.149.158:443 | tcp | |
| RU | 45.9.20.20:13441 | tcp | |
| NL | 104.73.149.158:443 | tcp | |
| US | 8.8.8.8:53 | api.ip.sb | udp |
| US | 104.26.13.31:443 | api.ip.sb | tcp |
| US | 93.184.220.29:80 | tcp | |
| US | 93.184.220.29:80 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 13.107.246.67:443 | tcp | |
| US | 13.107.246.67:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 13.107.246.67:443 | tcp | |
| US | 13.107.246.67:443 | tcp | |
| US | 13.107.246.67:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 13.107.246.67:443 | tcp | |
| US | 13.107.246.67:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 13.107.246.67:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 140.82.113.4:443 | tcp | |
| US | 13.107.246.67:443 | tcp | |
| US | 13.107.246.67:443 | tcp |
Files
memory/4652-116-0x0000000000400000-0x0000000000460000-memory.dmp
memory/4652-115-0x00000000008C0000-0x00000000008F0000-memory.dmp
memory/4652-117-0x00000000009C0000-0x00000000009DF000-memory.dmp
memory/4652-118-0x0000000004BC0000-0x0000000004BC1000-memory.dmp
memory/4652-119-0x0000000004BD0000-0x0000000004BD1000-memory.dmp
memory/4652-120-0x0000000002650000-0x000000000266E000-memory.dmp
memory/4652-121-0x00000000050D0000-0x00000000050D1000-memory.dmp
memory/4652-123-0x0000000004A30000-0x0000000004A31000-memory.dmp
memory/4652-122-0x0000000004BC2000-0x0000000004BC3000-memory.dmp
memory/4652-124-0x0000000004BC3000-0x0000000004BC4000-memory.dmp
memory/4652-125-0x0000000004A60000-0x0000000004A61000-memory.dmp
memory/4652-126-0x0000000004B70000-0x0000000004B71000-memory.dmp
memory/4652-127-0x0000000005710000-0x0000000005711000-memory.dmp
memory/4652-128-0x0000000004BC4000-0x0000000004BC6000-memory.dmp
memory/4652-129-0x0000000006930000-0x0000000006931000-memory.dmp
memory/4652-130-0x0000000006B00000-0x0000000006B01000-memory.dmp
memory/4652-131-0x0000000007120000-0x0000000007121000-memory.dmp
memory/4652-132-0x00000000071F0000-0x00000000071F1000-memory.dmp
memory/4652-133-0x0000000007420000-0x0000000007421000-memory.dmp
memory/4652-134-0x0000000007480000-0x0000000007481000-memory.dmp