Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 16:48
Static task
static1
Behavioral task
behavioral1
Sample
214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe
Resource
win10v2004-20241007-en
General
-
Target
214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe
-
Size
823KB
-
MD5
cb969a52c9e39af129f9576a50ba4b3b
-
SHA1
7e7b5375e96f75908a27e902063d8361e609fcf9
-
SHA256
214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83
-
SHA512
635b37e227d4b68ab20468f7e250ff5354e1ab974a2e1112af7cdc4b366efb60f848958a5992c2ce0a52a13514f16bcffa327ce962db9c77534d00c287b5d15f
-
SSDEEP
12288:RIn4OoL0imc1pBWMmeeCWOxdI+uTi1chp/gj8pz5pfGBT68siS:xr0x6MeAmmrFfG96r
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Eternity family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/files/0x0035000000018669-24.dat family_redline behavioral1/memory/2584-30-0x0000000000EF0000-0x0000000000F18000-memory.dmp family_redline behavioral1/files/0x000700000001868b-32.dat family_redline behavioral1/memory/2992-37-0x0000000000B60000-0x0000000000B88000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
pid Process 2584 craz.exe 2992 3.exe -
Loads dropped DLL 2 IoCs
pid Process 2780 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 2780 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2244 set thread context of 2780 2244 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language craz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2780 2244 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 30 PID 2244 wrote to memory of 2780 2244 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 30 PID 2244 wrote to memory of 2780 2244 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 30 PID 2244 wrote to memory of 2780 2244 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 30 PID 2244 wrote to memory of 2780 2244 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 30 PID 2244 wrote to memory of 2780 2244 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 30 PID 2244 wrote to memory of 2780 2244 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 30 PID 2244 wrote to memory of 2780 2244 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 30 PID 2244 wrote to memory of 2780 2244 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 30 PID 2780 wrote to memory of 2584 2780 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 31 PID 2780 wrote to memory of 2584 2780 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 31 PID 2780 wrote to memory of 2584 2780 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 31 PID 2780 wrote to memory of 2584 2780 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 31 PID 2780 wrote to memory of 2992 2780 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 32 PID 2780 wrote to memory of 2992 2780 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 32 PID 2780 wrote to memory of 2992 2780 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 32 PID 2780 wrote to memory of 2992 2780 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe"C:\Users\Admin\AppData\Local\Temp\214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe"{path}"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\craz.exe"C:\Users\Admin\AppData\Local\Temp\craz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD54ed3e3d67b776bd34d89c9d4926394f9
SHA12c5ac5a4f94223d79b014f04473c92d6cdee5d39
SHA256c5529152927d396b686221f0a81ebb9b1db3b77264e5849d46ca63b788fd1934
SHA5122a5ee72ba3565c928a917c25bd5397c64898da0502f96074ea330c1796dea3d24e36e693bbf02dc579210fd47a1f0e16f595b10a490d7ed8088d69ae07d82ca4
-
Filesize
136KB
MD527e4683bb6f3fa546a3e8f3b95fb7bf4
SHA1904473fa006b1a1872e220757e1cd9876b326123
SHA256a6cc5b6ef6af82855e97568308a45fa307d4cd570a2ebf27f6b71b754fb1b958
SHA51205d4964eaddd7313035d44ed540c4bb4182b26f91d9a61f6d164c0288946298640562d9c84362eb5a549124f7a590591ef83a26831fbb2bcf4991d7bb64feb82