Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2022, 15:04

General

  • Target

    file.exe

  • Size

    405KB

  • MD5

    0fcb5acd8ddcd2e8114bf6e79ab0acfa

  • SHA1

    d2068994c63fb124adfd87aa0667577c4d60446a

  • SHA256

    2bb7d80cfc5a1154bee8090732523597ac7f7cb3ce909bdb97b3e3ec02c8887a

  • SHA512

    dc37f6a9d5e75ad501838e9e8216d0de3184c392723c1623705b690374c5e07e5d3f87f91f1aa5361d1085da76cec4120f12acb83561a4e83081417be0ca1293

  • SSDEEP

    6144:HonqiJMZegm3s/sDZr9tcvJ9TxpDgVjBqDxkiA2Pf:HUqsMAgm3sTJ9TLDIBYq

Malware Config

Extracted

Family

redline

Botnet

suk

C2

193.106.191.25:47242

Attributes
  • auth_value

    9762d5bcad64c7855837e80c232c7e77

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2032

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2032-54-0x00000000021D0000-0x000000000221A000-memory.dmp

          Filesize

          296KB

        • memory/2032-55-0x0000000002470000-0x00000000024BA000-memory.dmp

          Filesize

          296KB

        • memory/2032-57-0x00000000002E0000-0x000000000034E000-memory.dmp

          Filesize

          440KB

        • memory/2032-56-0x000000000093C000-0x000000000096F000-memory.dmp

          Filesize

          204KB

        • memory/2032-58-0x0000000000400000-0x0000000000868000-memory.dmp

          Filesize

          4.4MB

        • memory/2032-59-0x00000000766D1000-0x00000000766D3000-memory.dmp

          Filesize

          8KB

        • memory/2032-60-0x000000000093C000-0x000000000096F000-memory.dmp

          Filesize

          204KB

        • memory/2032-61-0x0000000000400000-0x0000000000868000-memory.dmp

          Filesize

          4.4MB