Analysis
-
max time kernel
147s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-05-2022 12:03
Static task
static1
Behavioral task
behavioral1
Sample
cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe
Resource
win7-20220414-en
General
-
Target
cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe
-
Size
75KB
-
MD5
8c4b137c90e1e658e26a9f7d583a6ae5
-
SHA1
5597377685c0649a0c6355b28b6c01a0e5a57f4f
-
SHA256
cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1
-
SHA512
c2d49fca4de25b559abb80f63fc34151bb484a4e3027a3a19837b71239e41ec0d2f7e249e6ca5108229f88a014bcba5858a5052fa64ae39c8ea64b9c1ba7ce77
Malware Config
Signatures
-
Detects Eternity clipper 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1968-54-0x00000000013C0000-0x00000000013DA000-memory.dmp eternity_clipper \Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe eternity_clipper C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe eternity_clipper C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe eternity_clipper behavioral1/memory/1100-64-0x0000000000EC0000-0x0000000000EDA000-memory.dmp eternity_clipper C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe eternity_clipper C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe eternity_clipper C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe eternity_clipper -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
suricata: ET MALWARE Eternity Stealer CnC Domain in DNS Lookup (wasabiwallet .online)
suricata: ET MALWARE Eternity Stealer CnC Domain in DNS Lookup (wasabiwallet .online)
-
Executes dropped EXE 4 IoCs
Processes:
cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.execc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.execc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.execc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exepid process 1100 cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe 1756 cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe 1484 cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe 888 cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1008 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1008 cmd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exepid process 1100 cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exedescription pid process Token: SeDebugPrivilege 1100 cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.execmd.exetaskeng.exedescription pid process target process PID 1968 wrote to memory of 1008 1968 cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe cmd.exe PID 1968 wrote to memory of 1008 1968 cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe cmd.exe PID 1968 wrote to memory of 1008 1968 cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe cmd.exe PID 1968 wrote to memory of 1008 1968 cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe cmd.exe PID 1008 wrote to memory of 1144 1008 cmd.exe chcp.com PID 1008 wrote to memory of 1144 1008 cmd.exe chcp.com PID 1008 wrote to memory of 1144 1008 cmd.exe chcp.com PID 1008 wrote to memory of 1144 1008 cmd.exe chcp.com PID 1008 wrote to memory of 1980 1008 cmd.exe PING.EXE PID 1008 wrote to memory of 1980 1008 cmd.exe PING.EXE PID 1008 wrote to memory of 1980 1008 cmd.exe PING.EXE PID 1008 wrote to memory of 1980 1008 cmd.exe PING.EXE PID 1008 wrote to memory of 1920 1008 cmd.exe schtasks.exe PID 1008 wrote to memory of 1920 1008 cmd.exe schtasks.exe PID 1008 wrote to memory of 1920 1008 cmd.exe schtasks.exe PID 1008 wrote to memory of 1920 1008 cmd.exe schtasks.exe PID 1008 wrote to memory of 1100 1008 cmd.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1008 wrote to memory of 1100 1008 cmd.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1008 wrote to memory of 1100 1008 cmd.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1008 wrote to memory of 1100 1008 cmd.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1784 wrote to memory of 1756 1784 taskeng.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1784 wrote to memory of 1756 1784 taskeng.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1784 wrote to memory of 1756 1784 taskeng.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1784 wrote to memory of 1756 1784 taskeng.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1784 wrote to memory of 1484 1784 taskeng.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1784 wrote to memory of 1484 1784 taskeng.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1784 wrote to memory of 1484 1784 taskeng.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1784 wrote to memory of 1484 1784 taskeng.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1784 wrote to memory of 888 1784 taskeng.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1784 wrote to memory of 888 1784 taskeng.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1784 wrote to memory of 888 1784 taskeng.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe PID 1784 wrote to memory of 888 1784 taskeng.exe cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe"C:\Users\Admin\AppData\Local\Temp\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe"2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1144
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1980
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1920
-
-
C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe"C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3AAC2F1A-BD79-4F0C-B0C2-A76CAC2915D0} S-1-5-21-1083475884-596052423-1669053738-1000:WYZSGDWS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exeC:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe2⤵
- Executes dropped EXE
PID:1756
-
-
C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exeC:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe2⤵
- Executes dropped EXE
PID:1484
-
-
C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exeC:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe2⤵
- Executes dropped EXE
PID:888
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe
Filesize75KB
MD58c4b137c90e1e658e26a9f7d583a6ae5
SHA15597377685c0649a0c6355b28b6c01a0e5a57f4f
SHA256cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1
SHA512c2d49fca4de25b559abb80f63fc34151bb484a4e3027a3a19837b71239e41ec0d2f7e249e6ca5108229f88a014bcba5858a5052fa64ae39c8ea64b9c1ba7ce77
-
C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe
Filesize75KB
MD58c4b137c90e1e658e26a9f7d583a6ae5
SHA15597377685c0649a0c6355b28b6c01a0e5a57f4f
SHA256cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1
SHA512c2d49fca4de25b559abb80f63fc34151bb484a4e3027a3a19837b71239e41ec0d2f7e249e6ca5108229f88a014bcba5858a5052fa64ae39c8ea64b9c1ba7ce77
-
C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe
Filesize75KB
MD58c4b137c90e1e658e26a9f7d583a6ae5
SHA15597377685c0649a0c6355b28b6c01a0e5a57f4f
SHA256cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1
SHA512c2d49fca4de25b559abb80f63fc34151bb484a4e3027a3a19837b71239e41ec0d2f7e249e6ca5108229f88a014bcba5858a5052fa64ae39c8ea64b9c1ba7ce77
-
C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe
Filesize75KB
MD58c4b137c90e1e658e26a9f7d583a6ae5
SHA15597377685c0649a0c6355b28b6c01a0e5a57f4f
SHA256cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1
SHA512c2d49fca4de25b559abb80f63fc34151bb484a4e3027a3a19837b71239e41ec0d2f7e249e6ca5108229f88a014bcba5858a5052fa64ae39c8ea64b9c1ba7ce77
-
C:\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe
Filesize75KB
MD58c4b137c90e1e658e26a9f7d583a6ae5
SHA15597377685c0649a0c6355b28b6c01a0e5a57f4f
SHA256cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1
SHA512c2d49fca4de25b559abb80f63fc34151bb484a4e3027a3a19837b71239e41ec0d2f7e249e6ca5108229f88a014bcba5858a5052fa64ae39c8ea64b9c1ba7ce77
-
\Users\Admin\AppData\Local\ServiceHub\cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1.exe
Filesize75KB
MD58c4b137c90e1e658e26a9f7d583a6ae5
SHA15597377685c0649a0c6355b28b6c01a0e5a57f4f
SHA256cc9506259aa9686fbd60c19f178481d7a4ae4fb14c01c9d85990f5fe2838f2c1
SHA512c2d49fca4de25b559abb80f63fc34151bb484a4e3027a3a19837b71239e41ec0d2f7e249e6ca5108229f88a014bcba5858a5052fa64ae39c8ea64b9c1ba7ce77