Analysis

  • max time kernel
    28s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2023, 10:51

General

  • Target

    0x0009000000012304-68.exe

  • Size

    168KB

  • MD5

    4eda5a2cd5d6e330a522a9a7a1b23c09

  • SHA1

    98012c480fee7a8c3b442aea61336d0c9a0569e5

  • SHA256

    985f6d8d549147f73b57e986bd89d65d161077ca7bbf08af13f146aebd2692f4

  • SHA512

    da83b2d29bd17e90e0ac9a57ccd93df13710e941d60ac8c617aa8c3d8258c66acb4034d736b73c6e847bb4788d569c05dd0d4c821ef6ccb9f5de3a29d1c80ae1

  • SSDEEP

    1536:Eq24CeDYZ5QqlVZRGWoysHrt3la3cOo+TGqV0buhoxW7/C6gX83wYk/8e8hK:EObYH2HaXEqVMVxI/C6gXh8e8hK

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x0009000000012304-68.exe
    "C:\Users\Admin\AppData\Local\Temp\0x0009000000012304-68.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1992

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1992-54-0x0000000000B10000-0x0000000000B3E000-memory.dmp

    Filesize

    184KB

  • memory/1992-55-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/1992-56-0x0000000004A50000-0x0000000004A90000-memory.dmp

    Filesize

    256KB

  • memory/1992-57-0x0000000004A50000-0x0000000004A90000-memory.dmp

    Filesize

    256KB