Analysis
-
max time kernel
201s -
max time network
203s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-11-2024 18:02
Static task
static1
Behavioral task
behavioral1
Sample
Eclipse RAT.zip
Resource
win11-20241007-en
General
-
Target
Eclipse RAT.zip
-
Size
12.5MB
-
MD5
30364181c2174678b94d74fcbd16f89d
-
SHA1
640ca938cd1497f0f7bff46de48d9765949c4214
-
SHA256
eca49914c9c9dbaad9e8ee1aaccfecb0d88a6fd610c02fbf873935467b7bf114
-
SHA512
d916e950d80f95d4061b1be6ec829f93631aa92272545b79c46d8bc7f01ba72e84a6e6a38a47ee7cd6723547de7d2c71ecde389154aec5c0a0efd2fa55bf8652
-
SSDEEP
393216:2xDA4Ulx6CHtKlswnb1q8EptEW7Zb2KOyUbYVNK:IUlxHHGd/E75ZSKjNK
Malware Config
Extracted
rhadamanthys
https://95.214.55.177:2474/fae624c5418d6/black.api
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4932-143-0x0000000000F90000-0x0000000000FE6000-memory.dmp family_redline -
Redline family
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Rhadamanthys family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
main.exedescription pid process target process PID 3724 created 2864 3724 main.exe sihost.exe -
Executes dropped EXE 4 IoCs
Processes:
Eclipse.exebuild.exeEclipse.exemain.exepid process 3656 Eclipse.exe 4932 build.exe 3112 Eclipse.exe 3724 main.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
build.exeEclipse.exemain.exedialer.exeEclipse.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eclipse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language main.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dialer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eclipse.exe -
Modifies registry class 1 IoCs
Processes:
MiniSearchHost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
main.exedialer.exepid process 3724 main.exe 3724 main.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe 4692 dialer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
7zFM.exepid process 432 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 432 7zFM.exe Token: 35 432 7zFM.exe Token: SeSecurityPrivilege 432 7zFM.exe Token: SeSecurityPrivilege 432 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
7zFM.exepid process 432 7zFM.exe 432 7zFM.exe 432 7zFM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MiniSearchHost.exepid process 2404 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Eclipse.exeEclipse.exemain.exedescription pid process target process PID 3656 wrote to memory of 4932 3656 Eclipse.exe build.exe PID 3656 wrote to memory of 4932 3656 Eclipse.exe build.exe PID 3656 wrote to memory of 4932 3656 Eclipse.exe build.exe PID 3656 wrote to memory of 3112 3656 Eclipse.exe Eclipse.exe PID 3656 wrote to memory of 3112 3656 Eclipse.exe Eclipse.exe PID 3656 wrote to memory of 3112 3656 Eclipse.exe Eclipse.exe PID 3112 wrote to memory of 3724 3112 Eclipse.exe main.exe PID 3112 wrote to memory of 3724 3112 Eclipse.exe main.exe PID 3112 wrote to memory of 3724 3112 Eclipse.exe main.exe PID 3724 wrote to memory of 4692 3724 main.exe dialer.exe PID 3724 wrote to memory of 4692 3724 main.exe dialer.exe PID 3724 wrote to memory of 4692 3724 main.exe dialer.exe PID 3724 wrote to memory of 4692 3724 main.exe dialer.exe PID 3724 wrote to memory of 4692 3724 main.exe dialer.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2864
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Eclipse RAT.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:432
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2404
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3056
-
C:\Users\Admin\Desktop\Eclipse RAT\Eclipse.exe"C:\Users\Admin\Desktop\Eclipse RAT\Eclipse.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\Eclipse.exe"C:\Users\Admin\AppData\Local\Temp\Eclipse.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5711f1a880c08e1f7867f1bdd117320b7
SHA150c2d0859f6fd41024d486e2ab537507b975991d
SHA256f868e98aa21c341e365d73e301d87c006b557033d8d7b2808fed207734fe5143
SHA512885c2abd9047727b33ea760836cbbe4eaf5fddc08375a8b37840c99332131f0f7164f87c0abeb4523f42262349ab12a1c22c12813a9d81d6955c7d20b41a9a0a
-
Filesize
11.6MB
MD5d1b974d3816357532a0de6b388c5c361
SHA1fef9e938027e649ebbcffb074c65d46b2d0a1621
SHA256f617be25cb6b894df7c180f0ac4ac93aa26b808c2c6b69821546b29158dc2499
SHA512c4025fd2cc9c08c7319fc9574913d793954ba93b01288a5f03cf12beeaa40617c182f850ab40c1be434c80024632f395a355622f1bc4d0ce4dae987d43868f35
-
Filesize
506KB
MD5e5fb57e8214483fd395bd431cb3d1c4b
SHA160e22fc9e0068c8156462f003760efdcac82766b
SHA256e389fc5782f754918a10b020adcd8faa11c25658b8d6f8cbc49f9ac3a7637684
SHA512dc2ed0421db7dd5a3afeacb6a9f5017c97fc07d0b2d1745b50ede50087a58245d31d6669077a672b32541dbfa233ef87260a37be48de3bd407d8c587fc903d89
-
Filesize
448KB
MD5e1e28c3acf184aa364c9ed9a30ab7289
SHA11a173a6f4ec39fe467f1b4b91c9fad794167ac1c
SHA25603c72cfabace07b6787d2d1fd66d6d6d9a2fbcb74a827ca4ab7e59aba40cb306
SHA512e8d38c9a144b7f4531e617de45dc240042a7b9ce7dd5766eb2f763b505d9786acccf54f3a03ff3639c36c957e2d14d34b5b59196170eb1b6b5f17e8a417d6991
-
Filesize
12.1MB
MD5e94abe514202de0a3e24c0f45ccea8a6
SHA127770fa35ea2ca6e1cd87f669e21f5e29cfaa381
SHA256c11314504d04b9714c1c3992ca673486a5c8ac96b60fbc892b2f94204296b606
SHA5121fe72a35e6e0da642c42848d5009538ab97d5e833466abd25f2aa03e96f8b637a2a9a30054c8ebdf4cdf80570e39f387c9b6a535105a3e9b36b846570114c0d3