Analysis Overview
SHA256
e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f
Threat Level: Known bad
The file e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f was found to be: Known bad.
Malicious Activity Summary
RedLine
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2023-08-15 06:05
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2023-08-15 06:05
Reported
2023-08-15 06:08
Platform
win10-20230703-en
Max time kernel
98s
Max time network
103s
Command Line
Signatures
RedLine
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f.exe
"C:\Users\Admin\AppData\Local\Temp\e04fa0e503137dfc2219c5c2e0f8644ab236a002d665ca3fb297428548d4580f.exe"
Network
| Country | Destination | Domain | Proto |
| PL | 51.83.170.21:19447 | tcp | |
| US | 8.8.8.8:53 | 21.170.83.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa | udp |
| US | 8.8.8.8:53 | 2.77.109.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 9.57.101.20.in-addr.arpa | udp |
Files
memory/656-121-0x0000000001B50000-0x0000000001B8F000-memory.dmp
memory/656-120-0x0000000001B20000-0x0000000001B49000-memory.dmp
memory/656-122-0x0000000000400000-0x00000000018D2000-memory.dmp
memory/656-123-0x0000000005F40000-0x0000000005F78000-memory.dmp
memory/656-124-0x0000000073280000-0x000000007396E000-memory.dmp
memory/656-126-0x0000000006120000-0x0000000006130000-memory.dmp
memory/656-125-0x0000000006120000-0x0000000006130000-memory.dmp
memory/656-127-0x0000000006120000-0x0000000006130000-memory.dmp
memory/656-128-0x0000000006130000-0x000000000662E000-memory.dmp
memory/656-129-0x0000000005FC0000-0x0000000005FF4000-memory.dmp
memory/656-130-0x00000000060A0000-0x00000000060A6000-memory.dmp
memory/656-131-0x000000000BF40000-0x000000000C546000-memory.dmp
memory/656-132-0x000000000C580000-0x000000000C68A000-memory.dmp
memory/656-134-0x0000000006120000-0x0000000006130000-memory.dmp
memory/656-133-0x000000000C6C0000-0x000000000C6D2000-memory.dmp
memory/656-135-0x000000000C720000-0x000000000C75E000-memory.dmp
memory/656-136-0x000000000C780000-0x000000000C7CB000-memory.dmp
memory/656-137-0x0000000001B20000-0x0000000001B49000-memory.dmp
memory/656-138-0x0000000000400000-0x00000000018D2000-memory.dmp
memory/656-139-0x0000000001B50000-0x0000000001B8F000-memory.dmp
memory/656-140-0x0000000073280000-0x000000007396E000-memory.dmp
memory/656-141-0x000000000C8C0000-0x000000000C936000-memory.dmp
memory/656-142-0x000000000C940000-0x000000000C9D2000-memory.dmp
memory/656-143-0x000000000C9E0000-0x000000000CA46000-memory.dmp
memory/656-144-0x0000000006120000-0x0000000006130000-memory.dmp
memory/656-145-0x0000000006120000-0x0000000006130000-memory.dmp
memory/656-146-0x000000000DF30000-0x000000000E0F2000-memory.dmp
memory/656-147-0x000000000E110000-0x000000000E63C000-memory.dmp
memory/656-148-0x0000000006120000-0x0000000006130000-memory.dmp
memory/656-149-0x000000000D440000-0x000000000D490000-memory.dmp
memory/656-150-0x0000000006120000-0x0000000006130000-memory.dmp
memory/656-152-0x0000000000400000-0x00000000018D2000-memory.dmp
memory/656-153-0x0000000073280000-0x000000007396E000-memory.dmp