Analysis
-
max time kernel
148s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09/03/2023, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
b24ef80de413285aa22eeaffca8b002e.exe
Resource
win7-20230220-en
General
-
Target
b24ef80de413285aa22eeaffca8b002e.exe
-
Size
4.3MB
-
MD5
b24ef80de413285aa22eeaffca8b002e
-
SHA1
0a282ec02d4065afa895e9737e0fddcf08e824ae
-
SHA256
93f3c7749e51bf4699e6a7fd9a8153c67f128e7fb3a2e69321ddfb09d064f800
-
SHA512
3174f834b3c58d303cb8849b7ef5e67d090bbd94786d9e6132c8cb110b89b63d805669b1ad68cb51dd5859d7f00fd1b68f8446fa6f9e0a79fd56aa3a1dd26a51
-
SSDEEP
49152:je2w+P9xbVSwuXTYbGIggh7GIkeMgz/2rcrCG7r5mdiPt93RLlkuFX:je2wubAzTA8+7n52oV7FNlj
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
http://167.88.170.23/swo/sw.exe
http://167.88.170.23/swo/swo.exe
Extracted
redline
5555
167.235.141.81:36255
-
auth_value
842c595ff01a0b4b161f122d875170f5
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 944 5555.exe 2000 tmp210.tmp.exe 1560 tmp210.tmp.exe 848 tmp210.tmp.exe -
Loads dropped DLL 4 IoCs
pid Process 1792 InstallUtil.exe 1792 InstallUtil.exe 2000 tmp210.tmp.exe 1852 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 864 set thread context of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 2000 set thread context of 1560 2000 tmp210.tmp.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1752 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1300 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe 864 b24ef80de413285aa22eeaffca8b002e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 864 b24ef80de413285aa22eeaffca8b002e.exe Token: SeDebugPrivilege 944 5555.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 864 wrote to memory of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 864 wrote to memory of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 864 wrote to memory of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 864 wrote to memory of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 864 wrote to memory of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 864 wrote to memory of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 864 wrote to memory of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 864 wrote to memory of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 864 wrote to memory of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 864 wrote to memory of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 864 wrote to memory of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 864 wrote to memory of 1792 864 b24ef80de413285aa22eeaffca8b002e.exe 28 PID 1792 wrote to memory of 944 1792 InstallUtil.exe 29 PID 1792 wrote to memory of 944 1792 InstallUtil.exe 29 PID 1792 wrote to memory of 944 1792 InstallUtil.exe 29 PID 1792 wrote to memory of 944 1792 InstallUtil.exe 29 PID 1792 wrote to memory of 2000 1792 InstallUtil.exe 30 PID 1792 wrote to memory of 2000 1792 InstallUtil.exe 30 PID 1792 wrote to memory of 2000 1792 InstallUtil.exe 30 PID 1792 wrote to memory of 2000 1792 InstallUtil.exe 30 PID 2000 wrote to memory of 1560 2000 tmp210.tmp.exe 32 PID 2000 wrote to memory of 1560 2000 tmp210.tmp.exe 32 PID 2000 wrote to memory of 1560 2000 tmp210.tmp.exe 32 PID 2000 wrote to memory of 1560 2000 tmp210.tmp.exe 32 PID 2000 wrote to memory of 1560 2000 tmp210.tmp.exe 32 PID 2000 wrote to memory of 1560 2000 tmp210.tmp.exe 32 PID 2000 wrote to memory of 1560 2000 tmp210.tmp.exe 32 PID 2000 wrote to memory of 1560 2000 tmp210.tmp.exe 32 PID 2000 wrote to memory of 1560 2000 tmp210.tmp.exe 32 PID 1560 wrote to memory of 1852 1560 tmp210.tmp.exe 33 PID 1560 wrote to memory of 1852 1560 tmp210.tmp.exe 33 PID 1560 wrote to memory of 1852 1560 tmp210.tmp.exe 33 PID 1560 wrote to memory of 1852 1560 tmp210.tmp.exe 33 PID 1852 wrote to memory of 1260 1852 cmd.exe 35 PID 1852 wrote to memory of 1260 1852 cmd.exe 35 PID 1852 wrote to memory of 1260 1852 cmd.exe 35 PID 1852 wrote to memory of 1260 1852 cmd.exe 35 PID 1852 wrote to memory of 1300 1852 cmd.exe 36 PID 1852 wrote to memory of 1300 1852 cmd.exe 36 PID 1852 wrote to memory of 1300 1852 cmd.exe 36 PID 1852 wrote to memory of 1300 1852 cmd.exe 36 PID 1852 wrote to memory of 1752 1852 cmd.exe 37 PID 1852 wrote to memory of 1752 1852 cmd.exe 37 PID 1852 wrote to memory of 1752 1852 cmd.exe 37 PID 1852 wrote to memory of 1752 1852 cmd.exe 37 PID 1852 wrote to memory of 848 1852 cmd.exe 38 PID 1852 wrote to memory of 848 1852 cmd.exe 38 PID 1852 wrote to memory of 848 1852 cmd.exe 38 PID 1852 wrote to memory of 848 1852 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b24ef80de413285aa22eeaffca8b002e.exe"C:\Users\Admin\AppData\Local\Temp\b24ef80de413285aa22eeaffca8b002e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\5555.exe"C:\Users\Admin\AppData\Local\Temp\5555.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\tmp210.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp210.tmp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\tmp210.tmp.exe"{path}"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "tmp210.tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\tmp210.tmp.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\tmp210.tmp.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\tmp210.tmp.exe"5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\chcp.comchcp 650016⤵PID:1260
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:1300
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "tmp210.tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\tmp210.tmp.exe" /rl HIGHEST /f6⤵
- Creates scheduled task(s)
PID:1752
-
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp210.tmp.exe"C:\Users\Admin\AppData\Local\ServiceHub\tmp210.tmp.exe"6⤵
- Executes dropped EXE
PID:848
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
175KB
MD57382598795e61668556c9ba865acf062
SHA199c60e85e0df408bf4e97f0d144b9f6b1d890a1b
SHA256663866740811ad99b5a34d8c0a31bc6e49b662d7476e46fbe6001a83c464d622
SHA512093f2b0d7dbd5772e89aa85852b378c2f18403fd7efc243a06b182a62d13716bd9d09b19b5a2024baadd0df9567a5e1d968c34174207998a7865a594505fd432
-
Filesize
175KB
MD57382598795e61668556c9ba865acf062
SHA199c60e85e0df408bf4e97f0d144b9f6b1d890a1b
SHA256663866740811ad99b5a34d8c0a31bc6e49b662d7476e46fbe6001a83c464d622
SHA512093f2b0d7dbd5772e89aa85852b378c2f18403fd7efc243a06b182a62d13716bd9d09b19b5a2024baadd0df9567a5e1d968c34174207998a7865a594505fd432
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
175KB
MD57382598795e61668556c9ba865acf062
SHA199c60e85e0df408bf4e97f0d144b9f6b1d890a1b
SHA256663866740811ad99b5a34d8c0a31bc6e49b662d7476e46fbe6001a83c464d622
SHA512093f2b0d7dbd5772e89aa85852b378c2f18403fd7efc243a06b182a62d13716bd9d09b19b5a2024baadd0df9567a5e1d968c34174207998a7865a594505fd432
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b