Analysis
-
max time kernel
46s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-06-2022 08:15
Static task
static1
Behavioral task
behavioral1
Sample
032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b.exe
Resource
win10v2004-20220414-en
General
-
Target
032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b.exe
-
Size
1.4MB
-
MD5
90874ebf82d294580f7e47427bccb738
-
SHA1
00fa1a1c93da4f85b2d8cffe39e9ccbcd90d9256
-
SHA256
032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b
-
SHA512
ec5af911b1f5be0ad2b8a10182eac760bafafb5f073ed3aa253f0298059bd9f7357745b0c9c8ab6838b65d7ad6d60d3ffc04e79076d33bf0ffadaeaa127ef56b
Malware Config
Extracted
eternity
http://lightnogu5owjjllyo4tj2sfos6fchnmcidlgo6c7e6fz2hgryhfhoyd.onion
-
payload_urls
http://soapbeginshops.com/kingz.exe
http://lightnogu5owjjllyo4tj2sfos6fchnmcidlgo6c7e6fz2hgryhfhoyd.onion/shared/telegram.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
EOWRVPQCCS.exepid Process 1856 EOWRVPQCCS.exe -
Loads dropped DLL 1 IoCs
Processes:
032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b.exepid Process 1700 032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
EOWRVPQCCS.exedescription pid Process Token: SeDebugPrivilege 1856 EOWRVPQCCS.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 1808 DllHost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b.exedescription pid Process procid_target PID 1700 wrote to memory of 1856 1700 032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b.exe 28 PID 1700 wrote to memory of 1856 1700 032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b.exe 28 PID 1700 wrote to memory of 1856 1700 032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b.exe 28 PID 1700 wrote to memory of 1856 1700 032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b.exe"C:\Users\Admin\AppData\Local\Temp\032911e0a222a0e4862c2aa023ec29907ea7fe8228b78fb36afafe991d61436b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\EOWRVPQCCS.exe"C:\Users\Admin\AppData\Local\Temp\EOWRVPQCCS.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5a5cb23b8b71b2eec6cf53c89a166d1ca
SHA1954152dabcfebfd04143c97eb814ffdcf9f622da
SHA25622d656a93589f45df7c71039fe808541105dc6927bca733933b67fa4843863f3
SHA5126281739cce2da2ddafcc2167d9f56067ee2650411d17fb30765afec33bf052e7ddc3bca62fd7328e694a0f7c0c1f316ecdade1e07f15296a185b972acc81b030
-
Filesize
1.3MB
MD5a5cb23b8b71b2eec6cf53c89a166d1ca
SHA1954152dabcfebfd04143c97eb814ffdcf9f622da
SHA25622d656a93589f45df7c71039fe808541105dc6927bca733933b67fa4843863f3
SHA5126281739cce2da2ddafcc2167d9f56067ee2650411d17fb30765afec33bf052e7ddc3bca62fd7328e694a0f7c0c1f316ecdade1e07f15296a185b972acc81b030
-
Filesize
1KB
MD5dd71b9c0322ad45992e56a9bce43fe82
SHA160945b6bc3027451a2e1cfa29d263a994f50e91a
SHA25619ac62fd471e562088365029f7b0672623511cf3e58f2ef6de1a15c14a2e94e7
SHA51286ea2b42feb542977fcf534b4708f7a07e09f4acc413307e660b905408bc4aa9e26c50e907fa02379ea3ebfd18c532cc9dc269b6ea5994e3290082e429caae03
-
Filesize
1.3MB
MD5a5cb23b8b71b2eec6cf53c89a166d1ca
SHA1954152dabcfebfd04143c97eb814ffdcf9f622da
SHA25622d656a93589f45df7c71039fe808541105dc6927bca733933b67fa4843863f3
SHA5126281739cce2da2ddafcc2167d9f56067ee2650411d17fb30765afec33bf052e7ddc3bca62fd7328e694a0f7c0c1f316ecdade1e07f15296a185b972acc81b030