Analysis

  • max time kernel
    28s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2023 04:50

General

  • Target

    file.exe

  • Size

    168KB

  • MD5

    6f33cee4a80c10629b381a27e2cd4c7e

  • SHA1

    2e2b1aff25bc95d4c66da23ae8d46e5cfd888afb

  • SHA256

    63fa3c9886f2ecbfa8c4cd602e3862884d49f63e5c72d5e36314f5b1945bd18e

  • SHA512

    8f932ffceb5517009328f1f71a5959b75ed026150943bd6697e01d971437e3262ee36ce73ddcd6e45cc2ebded0a9328dfed153fafe801ffa36d38a60437d8eca

  • SSDEEP

    1536:hcKy3rBJqlVZRGWYdzrDtBg4Pk175BuD47TGqVWbuX01x+1N1V4183wYkU8e8hu:zA9DjsNkbqViT141N1V41S8e8hu

Malware Config

Extracted

Family

redline

Botnet

all

C2

185.225.74.51:44767

Attributes
  • auth_value

    c8891867d2974a449a3a05f4ae6cc2fd

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1416

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1416-54-0x00000000013E0000-0x0000000001410000-memory.dmp
    Filesize

    192KB

  • memory/1416-55-0x0000000000280000-0x0000000000286000-memory.dmp
    Filesize

    24KB

  • memory/1416-56-0x0000000000C70000-0x0000000000CB0000-memory.dmp
    Filesize

    256KB