Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 16:48
Static task
static1
Behavioral task
behavioral1
Sample
214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe
Resource
win10v2004-20241007-en
General
-
Target
214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe
-
Size
823KB
-
MD5
cb969a52c9e39af129f9576a50ba4b3b
-
SHA1
7e7b5375e96f75908a27e902063d8361e609fcf9
-
SHA256
214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83
-
SHA512
635b37e227d4b68ab20468f7e250ff5354e1ab974a2e1112af7cdc4b366efb60f848958a5992c2ce0a52a13514f16bcffa327ce962db9c77534d00c287b5d15f
-
SSDEEP
12288:RIn4OoL0imc1pBWMmeeCWOxdI+uTi1chp/gj8pz5pfGBT68siS:xr0x6MeAmmrFfG96r
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Eternity family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral2/files/0x0014000000023b9a-22.dat family_redline behavioral2/memory/3400-30-0x0000000000850000-0x0000000000878000-memory.dmp family_redline behavioral2/files/0x000a000000023b9b-41.dat family_redline behavioral2/memory/620-48-0x0000000000AB0000-0x0000000000AD8000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe -
Executes dropped EXE 2 IoCs
pid Process 3400 craz.exe 620 3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2764 set thread context of 1348 2764 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language craz.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2764 wrote to memory of 1348 2764 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 89 PID 2764 wrote to memory of 1348 2764 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 89 PID 2764 wrote to memory of 1348 2764 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 89 PID 2764 wrote to memory of 1348 2764 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 89 PID 2764 wrote to memory of 1348 2764 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 89 PID 2764 wrote to memory of 1348 2764 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 89 PID 2764 wrote to memory of 1348 2764 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 89 PID 2764 wrote to memory of 1348 2764 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 89 PID 1348 wrote to memory of 3400 1348 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 90 PID 1348 wrote to memory of 3400 1348 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 90 PID 1348 wrote to memory of 3400 1348 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 90 PID 1348 wrote to memory of 620 1348 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 91 PID 1348 wrote to memory of 620 1348 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 91 PID 1348 wrote to memory of 620 1348 214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe"C:\Users\Admin\AppData\Local\Temp\214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe"{path}"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\craz.exe"C:\Users\Admin\AppData\Local\Temp\craz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3400
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\214f529610a21cac472953e9fedcfd97dab4157cc4728e0359d0c8b43eec4e83.exe.log
Filesize1KB
MD517573558c4e714f606f997e5157afaac
SHA113e16e9415ceef429aaf124139671ebeca09ed23
SHA256c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553
SHA512f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc
-
Filesize
137KB
MD54ed3e3d67b776bd34d89c9d4926394f9
SHA12c5ac5a4f94223d79b014f04473c92d6cdee5d39
SHA256c5529152927d396b686221f0a81ebb9b1db3b77264e5849d46ca63b788fd1934
SHA5122a5ee72ba3565c928a917c25bd5397c64898da0502f96074ea330c1796dea3d24e36e693bbf02dc579210fd47a1f0e16f595b10a490d7ed8088d69ae07d82ca4
-
Filesize
136KB
MD527e4683bb6f3fa546a3e8f3b95fb7bf4
SHA1904473fa006b1a1872e220757e1cd9876b326123
SHA256a6cc5b6ef6af82855e97568308a45fa307d4cd570a2ebf27f6b71b754fb1b958
SHA51205d4964eaddd7313035d44ed540c4bb4182b26f91d9a61f6d164c0288946298640562d9c84362eb5a549124f7a590591ef83a26831fbb2bcf4991d7bb64feb82