Analysis

  • max time kernel
    90s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2023, 01:04

General

  • Target

    file.exe

  • Size

    173KB

  • MD5

    115d00a03367c51c109d195239f60772

  • SHA1

    e1e7ef8dc4077c1139c67b129bf69ab5552cf9ab

  • SHA256

    989e06b1895a3580491046a25415d7b1249e9613ef42c1df93c7e14b1a74b479

  • SHA512

    63f117c63da8375e149cbe2194e2cceefbfc0ef4ea4d367b022064f9102d5b6f506d129cd152050942160c545216575deb6e9a4300adce610ec5dd826f511eb0

  • SSDEEP

    1536:8LCMmb36sv0W7T6brprHtRAMWQM2xNxcYQHBbuf8I7K8A0GkRk8e8hh:oCBh+DRzJM2xN5U9kK8An8e8hh

Malware Config

Extracted

Family

redline

Botnet

mast

C2

83.97.73.129:19068

Attributes
  • auth_value

    95784a9ad2d19498f84abcf8e48d8da8

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4296

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4296-133-0x00000000007B0000-0x00000000007E0000-memory.dmp

          Filesize

          192KB

        • memory/4296-134-0x000000000ABB0000-0x000000000B1C8000-memory.dmp

          Filesize

          6.1MB

        • memory/4296-135-0x000000000A720000-0x000000000A82A000-memory.dmp

          Filesize

          1.0MB

        • memory/4296-136-0x000000000A660000-0x000000000A672000-memory.dmp

          Filesize

          72KB

        • memory/4296-137-0x0000000005100000-0x0000000005110000-memory.dmp

          Filesize

          64KB

        • memory/4296-138-0x000000000A6C0000-0x000000000A6FC000-memory.dmp

          Filesize

          240KB

        • memory/4296-139-0x000000000A9D0000-0x000000000AA46000-memory.dmp

          Filesize

          472KB

        • memory/4296-140-0x000000000AAF0000-0x000000000AB82000-memory.dmp

          Filesize

          584KB

        • memory/4296-141-0x000000000AA50000-0x000000000AAB6000-memory.dmp

          Filesize

          408KB

        • memory/4296-142-0x000000000BBC0000-0x000000000C164000-memory.dmp

          Filesize

          5.6MB

        • memory/4296-143-0x0000000005100000-0x0000000005110000-memory.dmp

          Filesize

          64KB

        • memory/4296-144-0x000000000B700000-0x000000000B750000-memory.dmp

          Filesize

          320KB

        • memory/4296-145-0x000000000C170000-0x000000000C332000-memory.dmp

          Filesize

          1.8MB

        • memory/4296-146-0x000000000C870000-0x000000000CD9C000-memory.dmp

          Filesize

          5.2MB