Analysis

  • max time kernel
    68s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-06-2022 08:15

General

  • Target

    05821994caa06407e84a713aa141667d2b22f83318721a1edaed49c07fc273b3.exe

  • Size

    3.4MB

  • MD5

    2e4de9ef1804c3616638a00344425e45

  • SHA1

    5ee95d0a73e42a343afcd65f5f62c5fba58d7f82

  • SHA256

    05821994caa06407e84a713aa141667d2b22f83318721a1edaed49c07fc273b3

  • SHA512

    4f696e07d49f5ab9d0e70b5d0be6db71169c3608889bb105a32113acfac603d63ffa904f5c74a33151aa6d469a9bf166519f0607a66191cb68932ce392d91323

Score
10/10

Malware Config

Extracted

Family

eternity

C2

http://lightnogu5owjjllyo4tj2sfos6fchnmcidlgo6c7e6fz2hgryhfhoyd.onion

Attributes
  • payload_urls

    http://soapbeginshops.com/kingz.exe

    http://lightnogu5owjjllyo4tj2sfos6fchnmcidlgo6c7e6fz2hgryhfhoyd.onion/shared/telegram.exe

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05821994caa06407e84a713aa141667d2b22f83318721a1edaed49c07fc273b3.exe
    "C:\Users\Admin\AppData\Local\Temp\05821994caa06407e84a713aa141667d2b22f83318721a1edaed49c07fc273b3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Users\Admin\AppData\Local\Temp\JSDNGYCOWY.exe
      "C:\Users\Admin\AppData\Local\Temp\JSDNGYCOWY.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1764
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 36
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1568
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:1316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\JSDNGYCOWY.exe

    Filesize

    3.4MB

    MD5

    e79ffcc3a1d0bfa117f04fda77b2bfec

    SHA1

    83aba440c3173f418c790b87c076503c16cd5c13

    SHA256

    9f97fdeaa2c81fac2afb2a94616144c0773b5bec316ebc114c8d134eccd84cdc

    SHA512

    31620de499863235bdfd50800d09af59b3c1e38be8c0674e3bde5b97881bd69c0760a002dc8e108ceec4e408c0d756a38a7f70735d25f3e9bb3fc2bd7ad44344

  • C:\Users\Admin\AppData\Local\Temp\JSDNGYCOWY.png

    Filesize

    1KB

    MD5

    a002e80b55673139253599b753bdc01a

    SHA1

    6aeef831a5aab9155aaabb52d173859e20a86932

    SHA256

    f3484fa4e615d7134ac1bf4c3355c6ad63b32ac3cd096345c5ebf6b0ce6669a0

    SHA512

    d4a9257255ba4610e904c005f6734e65d5b0b4489e645792f3ab52afd59b4b76e4b0fce1f3457d7e5d3da3101daac80a926fa513b77dab01f2dac5f5c4304ca7

  • \Users\Admin\AppData\Local\Temp\JSDNGYCOWY.exe

    Filesize

    3.4MB

    MD5

    e79ffcc3a1d0bfa117f04fda77b2bfec

    SHA1

    83aba440c3173f418c790b87c076503c16cd5c13

    SHA256

    9f97fdeaa2c81fac2afb2a94616144c0773b5bec316ebc114c8d134eccd84cdc

    SHA512

    31620de499863235bdfd50800d09af59b3c1e38be8c0674e3bde5b97881bd69c0760a002dc8e108ceec4e408c0d756a38a7f70735d25f3e9bb3fc2bd7ad44344

  • \Users\Admin\AppData\Local\Temp\JSDNGYCOWY.exe

    Filesize

    3.4MB

    MD5

    e79ffcc3a1d0bfa117f04fda77b2bfec

    SHA1

    83aba440c3173f418c790b87c076503c16cd5c13

    SHA256

    9f97fdeaa2c81fac2afb2a94616144c0773b5bec316ebc114c8d134eccd84cdc

    SHA512

    31620de499863235bdfd50800d09af59b3c1e38be8c0674e3bde5b97881bd69c0760a002dc8e108ceec4e408c0d756a38a7f70735d25f3e9bb3fc2bd7ad44344

  • \Users\Admin\AppData\Local\Temp\JSDNGYCOWY.exe

    Filesize

    3.4MB

    MD5

    e79ffcc3a1d0bfa117f04fda77b2bfec

    SHA1

    83aba440c3173f418c790b87c076503c16cd5c13

    SHA256

    9f97fdeaa2c81fac2afb2a94616144c0773b5bec316ebc114c8d134eccd84cdc

    SHA512

    31620de499863235bdfd50800d09af59b3c1e38be8c0674e3bde5b97881bd69c0760a002dc8e108ceec4e408c0d756a38a7f70735d25f3e9bb3fc2bd7ad44344

  • \Users\Admin\AppData\Local\Temp\JSDNGYCOWY.exe

    Filesize

    3.4MB

    MD5

    e79ffcc3a1d0bfa117f04fda77b2bfec

    SHA1

    83aba440c3173f418c790b87c076503c16cd5c13

    SHA256

    9f97fdeaa2c81fac2afb2a94616144c0773b5bec316ebc114c8d134eccd84cdc

    SHA512

    31620de499863235bdfd50800d09af59b3c1e38be8c0674e3bde5b97881bd69c0760a002dc8e108ceec4e408c0d756a38a7f70735d25f3e9bb3fc2bd7ad44344

  • \Users\Admin\AppData\Local\Temp\JSDNGYCOWY.exe

    Filesize

    3.4MB

    MD5

    e79ffcc3a1d0bfa117f04fda77b2bfec

    SHA1

    83aba440c3173f418c790b87c076503c16cd5c13

    SHA256

    9f97fdeaa2c81fac2afb2a94616144c0773b5bec316ebc114c8d134eccd84cdc

    SHA512

    31620de499863235bdfd50800d09af59b3c1e38be8c0674e3bde5b97881bd69c0760a002dc8e108ceec4e408c0d756a38a7f70735d25f3e9bb3fc2bd7ad44344

  • \Users\Admin\AppData\Local\Temp\JSDNGYCOWY.exe

    Filesize

    3.4MB

    MD5

    e79ffcc3a1d0bfa117f04fda77b2bfec

    SHA1

    83aba440c3173f418c790b87c076503c16cd5c13

    SHA256

    9f97fdeaa2c81fac2afb2a94616144c0773b5bec316ebc114c8d134eccd84cdc

    SHA512

    31620de499863235bdfd50800d09af59b3c1e38be8c0674e3bde5b97881bd69c0760a002dc8e108ceec4e408c0d756a38a7f70735d25f3e9bb3fc2bd7ad44344

  • memory/1320-82-0x0000000000400000-0x0000000000669000-memory.dmp

    Filesize

    2.4MB

  • memory/1320-61-0x0000000000000000-mapping.dmp

  • memory/1568-76-0x0000000000000000-mapping.dmp

  • memory/1764-91-0x0000000072611000-0x0000000072613000-memory.dmp

    Filesize

    8KB

  • memory/1764-94-0x0000000005620000-0x000000000576A000-memory.dmp

    Filesize

    1.3MB

  • memory/1764-69-0x0000000000400000-0x000000000055A000-memory.dmp

    Filesize

    1.4MB

  • memory/1764-74-0x00000000005555DE-mapping.dmp

  • memory/1764-101-0x0000000073840000-0x0000000074250000-memory.dmp

    Filesize

    10.1MB

  • memory/1764-75-0x0000000000400000-0x000000000055A000-memory.dmp

    Filesize

    1.4MB

  • memory/1764-77-0x0000000000400000-0x000000000055A000-memory.dmp

    Filesize

    1.4MB

  • memory/1764-100-0x00000000706C0000-0x0000000071A4F000-memory.dmp

    Filesize

    19.6MB

  • memory/1764-99-0x0000000072EA0000-0x0000000073034000-memory.dmp

    Filesize

    1.6MB

  • memory/1764-98-0x0000000073060000-0x0000000073840000-memory.dmp

    Filesize

    7.9MB

  • memory/1764-97-0x00000000727C0000-0x000000007288F000-memory.dmp

    Filesize

    828KB

  • memory/1764-96-0x00000000009B0000-0x00000000009CA000-memory.dmp

    Filesize

    104KB

  • memory/1764-84-0x00000000706C0000-0x0000000071A4F000-memory.dmp

    Filesize

    19.6MB

  • memory/1764-85-0x0000000073840000-0x0000000074250000-memory.dmp

    Filesize

    10.1MB

  • memory/1764-86-0x0000000073060000-0x0000000073840000-memory.dmp

    Filesize

    7.9MB

  • memory/1764-87-0x0000000072EA0000-0x0000000073034000-memory.dmp

    Filesize

    1.6MB

  • memory/1764-88-0x000000006F9A0000-0x00000000706BD000-memory.dmp

    Filesize

    13.1MB

  • memory/1764-89-0x0000000072BD0000-0x0000000072CCC000-memory.dmp

    Filesize

    1008KB

  • memory/1764-90-0x000000006F260000-0x000000006F99E000-memory.dmp

    Filesize

    7.2MB

  • memory/1764-95-0x0000000005D00000-0x0000000005E22000-memory.dmp

    Filesize

    1.1MB

  • memory/1764-92-0x00000000706C0000-0x0000000071A4F000-memory.dmp

    Filesize

    19.6MB

  • memory/1764-93-0x0000000073840000-0x0000000074250000-memory.dmp

    Filesize

    10.1MB

  • memory/1764-67-0x0000000000400000-0x000000000055A000-memory.dmp

    Filesize

    1.4MB

  • memory/1872-54-0x0000000000CC0000-0x0000000001030000-memory.dmp

    Filesize

    3.4MB

  • memory/1872-55-0x0000000076461000-0x0000000076463000-memory.dmp

    Filesize

    8KB

  • memory/1872-57-0x0000000072EC0000-0x000000007424F000-memory.dmp

    Filesize

    19.6MB

  • memory/1872-58-0x00000000724B0000-0x0000000072EC0000-memory.dmp

    Filesize

    10.1MB

  • memory/1872-63-0x0000000074560000-0x0000000074D40000-memory.dmp

    Filesize

    7.9MB

  • memory/1872-64-0x0000000072EC0000-0x000000007424F000-memory.dmp

    Filesize

    19.6MB

  • memory/1872-65-0x00000000724B0000-0x0000000072EC0000-memory.dmp

    Filesize

    10.1MB