Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2023 09:11

General

  • Target

    file.exe

  • Size

    1.9MB

  • MD5

    b483c722d53182cb7b35e0604b6603c7

  • SHA1

    821a586245f977e3a6d2aae29c7a262c080cb5a2

  • SHA256

    c6fbb7022c7beb3b4c840cb4d46b35f237a29ef70d6c400e673eedc55698d3c4

  • SHA512

    efe2bc96cce1802c74277d72cd848b3c4a275bb5a1537ec59d1dc9b9a4ad60b6e733f14404d7cd07b479a8018a3872eb924befbd25256764d8f10f583a86372e

  • SSDEEP

    49152:vmMEPx6vQA7b0IyUWN/vgy0j3c6Byf1gTT:hHQAXtyBN/R0TE2X

Malware Config

Extracted

Family

eternity

C2

http://izrukvro5khcol3z7cvvdq3akeunlod2gshgn7ppo3a4jvse3z5hpiyd.onion

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4988
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:3956
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
            PID:3364
          • C:\Windows\SysWOW64\netsh.exe
            netsh wlan show profile
            4⤵
              PID:4612
            • C:\Windows\SysWOW64\findstr.exe
              findstr All
              4⤵
                PID:1692
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4320
              • C:\Windows\SysWOW64\chcp.com
                chcp 65001
                4⤵
                  PID:3836
                • C:\Windows\SysWOW64\netsh.exe
                  netsh wlan show profile name="65001" key=clear
                  4⤵
                    PID:4976
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr Key
                    4⤵
                      PID:1456

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log

                Filesize

                1KB

                MD5

                60c8003e2f816f12023254fdd5b2d734

                SHA1

                43dd8890e4dffbf0bc0c646f1fedb6edbe567677

                SHA256

                e148a6fa62202ed6cdb253f3ae65fc29bd1e7de0ca38c30224b0cde27d80ff99

                SHA512

                59580ba990f7b03269a66d533ba96e54fee1beb2bdb1ded6de07e51f600635304d4fb5a06e601f20338d57f44633566b557374ec80881803c540edc6e4fd01a2

              • memory/1804-18-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/1804-13-0x0000000000400000-0x00000000004CE000-memory.dmp

                Filesize

                824KB

              • memory/1804-12-0x0000000000400000-0x00000000004CE000-memory.dmp

                Filesize

                824KB

              • memory/1804-31-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/1804-20-0x00000000052B0000-0x00000000052C0000-memory.dmp

                Filesize

                64KB

              • memory/1804-19-0x00000000052B0000-0x00000000052C0000-memory.dmp

                Filesize

                64KB

              • memory/1804-16-0x00000000052B0000-0x00000000052C0000-memory.dmp

                Filesize

                64KB

              • memory/1804-15-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/3940-46-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/3940-39-0x0000000008F50000-0x0000000008FC6000-memory.dmp

                Filesize

                472KB

              • memory/3940-44-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/3940-45-0x00000000075D0000-0x00000000075E0000-memory.dmp

                Filesize

                64KB

              • memory/3940-36-0x00000000077E0000-0x00000000078EA000-memory.dmp

                Filesize

                1.0MB

              • memory/3940-34-0x00000000085F0000-0x0000000008C08000-memory.dmp

                Filesize

                6.1MB

              • memory/3940-38-0x0000000007710000-0x000000000775C000-memory.dmp

                Filesize

                304KB

              • memory/3940-37-0x00000000076D0000-0x000000000770C000-memory.dmp

                Filesize

                240KB

              • memory/3940-33-0x00000000075D0000-0x00000000075E0000-memory.dmp

                Filesize

                64KB

              • memory/3940-28-0x0000000000400000-0x000000000045A000-memory.dmp

                Filesize

                360KB

              • memory/3940-40-0x00000000091A0000-0x0000000009362000-memory.dmp

                Filesize

                1.8MB

              • memory/3940-41-0x00000000098A0000-0x0000000009DCC000-memory.dmp

                Filesize

                5.2MB

              • memory/3940-32-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/3940-42-0x0000000009090000-0x00000000090AE000-memory.dmp

                Filesize

                120KB

              • memory/3940-35-0x0000000007570000-0x0000000007582000-memory.dmp

                Filesize

                72KB

              • memory/3956-24-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/3956-21-0x0000000000400000-0x000000000045A000-memory.dmp

                Filesize

                360KB

              • memory/3956-27-0x0000000007070000-0x00000000070C0000-memory.dmp

                Filesize

                320KB

              • memory/3956-43-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/3956-25-0x0000000005820000-0x0000000005830000-memory.dmp

                Filesize

                64KB

              • memory/3956-26-0x00000000065D0000-0x0000000006636000-memory.dmp

                Filesize

                408KB

              • memory/4988-9-0x00000000069D0000-0x00000000069D6000-memory.dmp

                Filesize

                24KB

              • memory/4988-7-0x0000000005E20000-0x0000000005E2A000-memory.dmp

                Filesize

                40KB

              • memory/4988-14-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/4988-11-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/4988-10-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/4988-0-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/4988-8-0x00000000069B0000-0x00000000069CA000-memory.dmp

                Filesize

                104KB

              • memory/4988-17-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/4988-6-0x0000000005B30000-0x0000000005B74000-memory.dmp

                Filesize

                272KB

              • memory/4988-5-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

                Filesize

                64KB

              • memory/4988-4-0x0000000005470000-0x0000000005A14000-memory.dmp

                Filesize

                5.6MB

              • memory/4988-23-0x0000000074690000-0x0000000074E40000-memory.dmp

                Filesize

                7.7MB

              • memory/4988-2-0x0000000004BB0000-0x0000000004C4C000-memory.dmp

                Filesize

                624KB

              • memory/4988-3-0x0000000004C60000-0x0000000004CF2000-memory.dmp

                Filesize

                584KB

              • memory/4988-1-0x0000000000C50000-0x0000000000E30000-memory.dmp

                Filesize

                1.9MB