Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2022 16:22

General

  • Target

    file.exe

  • Size

    405KB

  • MD5

    e1f91551d2d3a2756b84657e54586729

  • SHA1

    8d7aab49ab6bbe446173b1c5ff71ba1c95c634f0

  • SHA256

    7012132a463dd9ddd6d744e376f034fe8808eea2cfa3e7436e180176258090cd

  • SHA512

    a00d4605c1320963085c99282906ffb9a1e24c0e0c7fb2b27002e9f222862ead102476620d46fab74e81ee34e1fa7f289d9810ee32e6ec70f1499586176af4e7

  • SSDEEP

    6144:QjqfHMZvAcPkBFeuVvIXPA6wS+x6HSZHeCIajoJ8xFYyj0n6qhY:QjqPM5AcBuRCPVceDCa8PYyjk6

Malware Config

Extracted

Family

redline

Botnet

suk

C2

193.106.191.25:47242

Attributes
  • auth_value

    9762d5bcad64c7855837e80c232c7e77

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1788-54-0x0000000002510000-0x000000000255A000-memory.dmp

    Filesize

    296KB

  • memory/1788-55-0x00000000026C0000-0x000000000270A000-memory.dmp

    Filesize

    296KB

  • memory/1788-57-0x0000000000310000-0x000000000037E000-memory.dmp

    Filesize

    440KB

  • memory/1788-58-0x0000000000400000-0x0000000000868000-memory.dmp

    Filesize

    4.4MB

  • memory/1788-56-0x000000000096C000-0x000000000099F000-memory.dmp

    Filesize

    204KB

  • memory/1788-59-0x00000000761F1000-0x00000000761F3000-memory.dmp

    Filesize

    8KB

  • memory/1788-60-0x000000000096C000-0x000000000099F000-memory.dmp

    Filesize

    204KB

  • memory/1788-61-0x0000000000400000-0x0000000000868000-memory.dmp

    Filesize

    4.4MB