Analysis Overview
SHA256
d146edf9a86f3040e1ea98d4500318c31f272759e492776f221ef68bc8abd465
Threat Level: Known bad
The file d146edf9a86f3040e1ea98d4500318c31f272759e492776f221ef68bc8abd465 was found to be: Known bad.
Malicious Activity Summary
RedLine
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Unsigned PE
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-08-09 23:10
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-08-09 23:10
Reported
2023-08-09 23:12
Platform
win10-20230703-en
Max time kernel
128s
Max time network
138s
Command Line
Signatures
RedLine
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\d146edf9a86f3040e1ea98d4500318c31f272759e492776f221ef68bc8abd465.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\d146edf9a86f3040e1ea98d4500318c31f272759e492776f221ef68bc8abd465.exe
"C:\Users\Admin\AppData\Local\Temp\d146edf9a86f3040e1ea98d4500318c31f272759e492776f221ef68bc8abd465.exe"
Network
| Country | Destination | Domain | Proto |
| NL | 209.250.248.11:33522 | tcp | |
| US | 8.8.8.8:53 | 11.248.250.209.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa | udp |
| US | 8.8.8.8:53 | 233.141.123.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 38.148.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.173.189.20.in-addr.arpa | udp |
Files
memory/3216-117-0x00000000018F0000-0x0000000001919000-memory.dmp
memory/3216-118-0x0000000003420000-0x000000000345F000-memory.dmp
memory/3216-119-0x0000000000400000-0x00000000018CF000-memory.dmp
memory/3216-120-0x0000000006190000-0x00000000061A0000-memory.dmp
memory/3216-121-0x00000000038C0000-0x00000000038F8000-memory.dmp
memory/3216-122-0x0000000073630000-0x0000000073D1E000-memory.dmp
memory/3216-123-0x0000000006190000-0x00000000061A0000-memory.dmp
memory/3216-124-0x0000000006190000-0x00000000061A0000-memory.dmp
memory/3216-125-0x00000000061A0000-0x000000000669E000-memory.dmp
memory/3216-126-0x0000000003940000-0x0000000003974000-memory.dmp
memory/3216-127-0x0000000008A20000-0x0000000008A26000-memory.dmp
memory/3216-128-0x00000000066A0000-0x0000000006CA6000-memory.dmp
memory/3216-129-0x0000000006CB0000-0x0000000006DBA000-memory.dmp
memory/3216-130-0x0000000006190000-0x00000000061A0000-memory.dmp
memory/3216-131-0x0000000006DF0000-0x0000000006E02000-memory.dmp
memory/3216-132-0x0000000006E10000-0x0000000006E4E000-memory.dmp
memory/3216-133-0x0000000006EB0000-0x0000000006EFB000-memory.dmp
memory/3216-134-0x00000000018F0000-0x0000000001919000-memory.dmp
memory/3216-135-0x0000000000400000-0x00000000018CF000-memory.dmp
memory/3216-136-0x0000000003420000-0x000000000345F000-memory.dmp
memory/3216-137-0x0000000073630000-0x0000000073D1E000-memory.dmp
memory/3216-138-0x0000000006FF0000-0x0000000007066000-memory.dmp
memory/3216-139-0x0000000007070000-0x0000000007102000-memory.dmp
memory/3216-140-0x0000000007110000-0x0000000007176000-memory.dmp
memory/3216-141-0x0000000006190000-0x00000000061A0000-memory.dmp
memory/3216-142-0x0000000007A60000-0x0000000007C22000-memory.dmp
memory/3216-143-0x0000000007C30000-0x000000000815C000-memory.dmp
memory/3216-144-0x0000000006190000-0x00000000061A0000-memory.dmp
memory/3216-145-0x000000000A4E0000-0x000000000A530000-memory.dmp
memory/3216-146-0x0000000006190000-0x00000000061A0000-memory.dmp
memory/3216-148-0x0000000000400000-0x00000000018CF000-memory.dmp
memory/3216-149-0x0000000073630000-0x0000000073D1E000-memory.dmp