Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-05-2023 10:51

General

  • Target

    0x0009000000012304-68.exe

  • Size

    168KB

  • MD5

    4eda5a2cd5d6e330a522a9a7a1b23c09

  • SHA1

    98012c480fee7a8c3b442aea61336d0c9a0569e5

  • SHA256

    985f6d8d549147f73b57e986bd89d65d161077ca7bbf08af13f146aebd2692f4

  • SHA512

    da83b2d29bd17e90e0ac9a57ccd93df13710e941d60ac8c617aa8c3d8258c66acb4034d736b73c6e847bb4788d569c05dd0d4c821ef6ccb9f5de3a29d1c80ae1

  • SSDEEP

    1536:Eq24CeDYZ5QqlVZRGWoysHrt3la3cOo+TGqV0buhoxW7/C6gX83wYk/8e8hK:EObYH2HaXEqVMVxI/C6gXh8e8hK

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x0009000000012304-68.exe
    "C:\Users\Admin\AppData\Local\Temp\0x0009000000012304-68.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3456-133-0x0000000000410000-0x000000000043E000-memory.dmp

    Filesize

    184KB

  • memory/3456-134-0x000000000A8A0000-0x000000000AEB8000-memory.dmp

    Filesize

    6.1MB

  • memory/3456-135-0x000000000A390000-0x000000000A49A000-memory.dmp

    Filesize

    1.0MB

  • memory/3456-136-0x000000000A2A0000-0x000000000A2B2000-memory.dmp

    Filesize

    72KB

  • memory/3456-137-0x000000000A300000-0x000000000A33C000-memory.dmp

    Filesize

    240KB

  • memory/3456-138-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/3456-139-0x000000000A700000-0x000000000A776000-memory.dmp

    Filesize

    472KB

  • memory/3456-140-0x000000000AEC0000-0x000000000AF52000-memory.dmp

    Filesize

    584KB

  • memory/3456-141-0x000000000A780000-0x000000000A7E6000-memory.dmp

    Filesize

    408KB

  • memory/3456-142-0x000000000B810000-0x000000000BDB4000-memory.dmp

    Filesize

    5.6MB

  • memory/3456-143-0x000000000B480000-0x000000000B4D0000-memory.dmp

    Filesize

    320KB

  • memory/3456-144-0x000000000BDC0000-0x000000000BF82000-memory.dmp

    Filesize

    1.8MB

  • memory/3456-145-0x000000000C4C0000-0x000000000C9EC000-memory.dmp

    Filesize

    5.2MB

  • memory/3456-146-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB