Analysis Overview
SHA256
1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd
Threat Level: Known bad
The file 1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd was found to be: Known bad.
Malicious Activity Summary
RedLine
RedLine payload
Redline family
Unsigned PE
System Location Discovery: System Language Discovery
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-13 20:22
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-13 20:22
Reported
2024-11-13 20:24
Platform
win7-20240903-en
Max time kernel
149s
Max time network
138s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Redline family
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe
"C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe"
Network
| Country | Destination | Domain | Proto |
| RU | 185.161.248.153:38452 | tcp | |
| RU | 185.161.248.153:38452 | tcp | |
| RU | 185.161.248.153:38452 | tcp | |
| RU | 185.161.248.153:38452 | tcp | |
| RU | 185.161.248.153:38452 | tcp | |
| RU | 185.161.248.153:38452 | tcp | |
| RU | 185.161.248.153:38452 | tcp | |
| RU | 185.161.248.153:38452 | tcp |
Files
memory/1916-1-0x0000000000250000-0x0000000000350000-memory.dmp
memory/1916-2-0x0000000000400000-0x0000000000449000-memory.dmp
memory/1916-3-0x0000000004730000-0x000000000476C000-memory.dmp
memory/1916-4-0x0000000004770000-0x00000000047AA000-memory.dmp
memory/1916-5-0x0000000000400000-0x0000000002BC9000-memory.dmp
memory/1916-69-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-67-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-65-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-63-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-61-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-59-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-57-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-55-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-53-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-51-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-49-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-47-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-45-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-43-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-41-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-39-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-37-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-35-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-33-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-31-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-29-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-27-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-25-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-23-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-21-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-19-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-17-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-15-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-13-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-11-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-9-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-7-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-6-0x0000000004770000-0x00000000047A5000-memory.dmp
memory/1916-798-0x0000000000250000-0x0000000000350000-memory.dmp
memory/1916-799-0x0000000000400000-0x0000000000449000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-13 20:22
Reported
2024-11-13 20:24
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
RedLine
RedLine payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Redline family
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe
"C:\Users\Admin\AppData\Local\Temp\1cee0c30f7d1bd34c056a547104d0235fd33261bd6ff163fcc6c1ab461998acd.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.144.22.2.in-addr.arpa | udp |
| RU | 185.161.248.153:38452 | tcp | |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| RU | 185.161.248.153:38452 | tcp | |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.190.18.2.in-addr.arpa | udp |
| RU | 185.161.248.153:38452 | tcp | |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| RU | 185.161.248.153:38452 | tcp | |
| RU | 185.161.248.153:38452 | tcp | |
| US | 8.8.8.8:53 | 19.229.111.52.in-addr.arpa | udp |
| RU | 185.161.248.153:38452 | tcp | |
| RU | 185.161.248.153:38452 | tcp | |
| US | 8.8.8.8:53 | 200.64.52.20.in-addr.arpa | udp |
Files
memory/1020-1-0x0000000002C80000-0x0000000002D80000-memory.dmp
memory/1020-2-0x0000000004900000-0x0000000004946000-memory.dmp
memory/1020-3-0x0000000000400000-0x0000000000449000-memory.dmp
memory/1020-4-0x0000000004DF0000-0x0000000004E2C000-memory.dmp
memory/1020-5-0x0000000007410000-0x00000000079B4000-memory.dmp
memory/1020-6-0x00000000072D0000-0x000000000730A000-memory.dmp
memory/1020-87-0x0000000000400000-0x0000000002BC9000-memory.dmp
memory/1020-70-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-68-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-66-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-64-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-62-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-60-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-58-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-54-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-52-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-50-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-48-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-46-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-44-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-40-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-38-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-36-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-34-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-32-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-30-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-28-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-24-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-22-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-20-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-18-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-16-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-14-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-12-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-8-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-7-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-56-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-42-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-26-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-10-0x00000000072D0000-0x0000000007305000-memory.dmp
memory/1020-800-0x0000000009E40000-0x000000000A458000-memory.dmp
memory/1020-801-0x000000000A480000-0x000000000A492000-memory.dmp
memory/1020-802-0x000000000A4A0000-0x000000000A5AA000-memory.dmp
memory/1020-803-0x000000000A5D0000-0x000000000A60C000-memory.dmp
memory/1020-804-0x0000000004BE0000-0x0000000004C2C000-memory.dmp
memory/1020-805-0x0000000002C80000-0x0000000002D80000-memory.dmp
memory/1020-807-0x0000000004900000-0x0000000004946000-memory.dmp
memory/1020-808-0x0000000000400000-0x0000000000449000-memory.dmp