Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/02/2025, 23:45

General

  • Target

    quarantine/xqWgymz.exe

  • Size

    1.7MB

  • MD5

    971c0e70de5bb3de0c9911cf96d11743

  • SHA1

    43badfc19a7e07671817cf05b39bc28a6c22e122

  • SHA256

    67c9bb968cd0de2bfb2c24b00cfb2b98ac7403135ea47d98961652518584e45d

  • SHA512

    a46523d8c71c0df25a043e2250ee1b6792e147314ec2097870a7972c892fd1a2022994f10823dadf54f161d11e808251b85a18efb9db9450d97af4b2f173f3c2

  • SSDEEP

    49152:PILW3W4OH2ImHQRD2H8Vs1sfh8h08GhPdYJblsacEadrrtNb24q:i+eJNbHq

Malware Config

Extracted

Family

redline

Botnet

testproliv

C2

45.155.103.183:1488

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\quarantine\xqWgymz.exe
    "C:\Users\Admin\AppData\Local\Temp\quarantine\xqWgymz.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2848-0-0x000002448B110000-0x000002448B210000-memory.dmp

    Filesize

    1024KB

  • memory/2848-1-0x00007FF916F53000-0x00007FF916F55000-memory.dmp

    Filesize

    8KB

  • memory/2848-2-0x000002448CB30000-0x000002448CB82000-memory.dmp

    Filesize

    328KB

  • memory/2848-3-0x00007FF916F50000-0x00007FF917A11000-memory.dmp

    Filesize

    10.8MB

  • memory/2848-4-0x00007FF916F50000-0x00007FF917A11000-memory.dmp

    Filesize

    10.8MB

  • memory/2848-5-0x00007FF916F50000-0x00007FF917A11000-memory.dmp

    Filesize

    10.8MB

  • memory/2848-6-0x00007FF6EA3E0000-0x00007FF6EA58E000-memory.dmp

    Filesize

    1.7MB

  • memory/2848-7-0x00000244A62A0000-0x00000244A63AA000-memory.dmp

    Filesize

    1.0MB

  • memory/2848-8-0x000002448CBC0000-0x000002448CBD2000-memory.dmp

    Filesize

    72KB

  • memory/2848-9-0x00000244A60C0000-0x00000244A60FC000-memory.dmp

    Filesize

    240KB

  • memory/2848-10-0x000002448B110000-0x000002448B210000-memory.dmp

    Filesize

    1024KB

  • memory/2848-11-0x00000244A6750000-0x00000244A6912000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-12-0x00000244A7760000-0x00000244A7C88000-memory.dmp

    Filesize

    5.2MB

  • memory/2848-13-0x00000244A63B0000-0x00000244A6400000-memory.dmp

    Filesize

    320KB

  • memory/2848-14-0x00007FF916F53000-0x00007FF916F55000-memory.dmp

    Filesize

    8KB

  • memory/2848-15-0x00007FF916F50000-0x00007FF917A11000-memory.dmp

    Filesize

    10.8MB

  • memory/2848-16-0x00007FF916F50000-0x00007FF917A11000-memory.dmp

    Filesize

    10.8MB

  • memory/2848-18-0x00007FF916F50000-0x00007FF917A11000-memory.dmp

    Filesize

    10.8MB