Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26/10/2022, 14:12

General

  • Target

    file.exe

  • Size

    369KB

  • MD5

    eaa05f191812aa654d5a31ae414e3600

  • SHA1

    b4b1b2aa42632e18ee016c86cd56cd7a75727cab

  • SHA256

    5de7480390c165160be72fe43824dbbddd6c16c605a19391ae37791d68405fb5

  • SHA512

    e07fc0287a51c3174dde5574d12b6c2fe1c00316ff9d396fa911a01c5ef66f1c444dae7a336196ec99e86aa51cc3f6ca159e5617b703d89bd786a0a7632c4723

  • SSDEEP

    6144:QyzvKLFSSTqxBG21z6SHs6XwA6QEU0hsluJRrvGSJ26t5XkxTzsn:Qyzy5SSTRSHsK6QlYNLCWt5XU2

Malware Config

Extracted

Family

redline

Botnet

dzkey

C2

193.106.191.19:47242

Attributes
  • auth_value

    52a449fd61ad73c3abc266d47c699ceb

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1564

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1564-54-0x0000000002380000-0x00000000023CC000-memory.dmp

          Filesize

          304KB

        • memory/1564-55-0x00000000023D0000-0x0000000002418000-memory.dmp

          Filesize

          288KB

        • memory/1564-57-0x0000000000230000-0x0000000000288000-memory.dmp

          Filesize

          352KB

        • memory/1564-58-0x0000000000400000-0x00000000005BA000-memory.dmp

          Filesize

          1.7MB

        • memory/1564-56-0x00000000006BB000-0x00000000006F1000-memory.dmp

          Filesize

          216KB

        • memory/1564-59-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

          Filesize

          8KB

        • memory/1564-60-0x0000000000400000-0x00000000005BA000-memory.dmp

          Filesize

          1.7MB