Analysis

  • max time kernel
    111s
  • max time network
    114s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01/03/2023, 04:08

General

  • Target

    uWZ67ET52.exe

  • Size

    176KB

  • MD5

    6ffe34cfe1ae31a9834b565b5c129c35

  • SHA1

    f4b632f5d9e9d3a5b66ea05e01509c09a119f220

  • SHA256

    c6fa14ab6d416039d8c2885c90fa015de0c0752f0529b83b6e38f0b40adf47ff

  • SHA512

    dbf11754671c95454c1cb6c2d3c01e2633f5d8a16da737ce97bf8f8a9771a493b84b8d9dedd3592db0355b554b0b438bdc52044e3e06fc2905e0cfa59ed02f3f

  • SSDEEP

    3072:OxqZWXragQx+/Z5reN5FchA/xNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+cU:0qZWZ5gch

Malware Config

Extracted

Family

redline

Botnet

forma

C2

193.233.20.24:4123

Attributes
  • auth_value

    50b8e065d7cb1e9e30786f7a370368f9

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\uWZ67ET52.exe
    "C:\Users\Admin\AppData\Local\Temp\uWZ67ET52.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1320

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1320-54-0x0000000000B20000-0x0000000000B52000-memory.dmp

    Filesize

    200KB

  • memory/1320-55-0x0000000000330000-0x0000000000370000-memory.dmp

    Filesize

    256KB

  • memory/1320-56-0x0000000000330000-0x0000000000370000-memory.dmp

    Filesize

    256KB