Analysis

  • max time kernel
    28s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2023, 00:54

General

  • Target

    0x0007000000013990-93.exe

  • Size

    168KB

  • MD5

    8ab080c0c1162a8518deca87738ce207

  • SHA1

    4693d867aaa2a136a52921bb28340ae5327335af

  • SHA256

    1509bb72e43d5d58869a6875bccb56eeabb765d964ef55ea2b3b2fd32a09c6c5

  • SHA512

    935979e14344e0ca36a58697259eee00eb96f792e07bdd3da14a3a5dcc2db5b359f87362316c650605b6321000c63faa0d86a7fd9e6b8934d76b700e871e2e64

  • SSDEEP

    3072:I9s3StL8WCNV5yDqVgYRNYvSgvQF2kt8e8hY:I+36wNvyDvvvSgvQF2kt

Malware Config

Extracted

Family

redline

Botnet

mars

C2

83.97.73.127:19045

Attributes
  • auth_value

    91bd3682cfb50cdc64b6009eb977b766

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x0007000000013990-93.exe
    "C:\Users\Admin\AppData\Local\Temp\0x0007000000013990-93.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1372

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1372-54-0x0000000000830000-0x000000000085E000-memory.dmp

          Filesize

          184KB

        • memory/1372-55-0x00000000004C0000-0x00000000004C6000-memory.dmp

          Filesize

          24KB

        • memory/1372-56-0x0000000004180000-0x00000000041C0000-memory.dmp

          Filesize

          256KB