Analysis
-
max time kernel
139s -
max time network
183s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
10/09/2022, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe
Resource
win10-20220812-en
General
-
Target
789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe
-
Size
2.6MB
-
MD5
0c717a4d5c7c6a0716fa3d788f0b2cdd
-
SHA1
ccebe3bfbd0f46942c27e898b67dcd56c2dd7e27
-
SHA256
789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05
-
SHA512
314e1c5b4569f7ca2db449f4fe5d86dd56972ae59c08ce82618d889c2c311b5d744cb4d52fd7f89411afc30c7e185d8ef46274e2b205076b584bb74a9dd997af
-
SSDEEP
49152:DmVRGHUBcBLZ3K5va9tNCyK4Vs9mOpLbO88y8kiaAm3EmB5hwVjrrkxCP3RcdlsG:DmVRbO5Za5voN2aso4bOKiaB3Em1wht5
Malware Config
Signatures
-
Detects Eternity clipper 2 IoCs
resource yara_rule behavioral2/memory/496-336-0x000000000040AD8E-mapping.dmp eternity_clipper behavioral2/memory/496-370-0x0000000000400000-0x0000000000410000-memory.dmp eternity_clipper -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Executes dropped EXE 1 IoCs
pid Process 3080 SteamsService.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SteamsService = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\SteamsService.exe" reg.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 3080 SteamsService.exe 3080 SteamsService.exe 3080 SteamsService.exe 3080 SteamsService.exe 3080 SteamsService.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3080 set thread context of 496 3080 SteamsService.exe 71 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 496 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 3080 SteamsService.exe 3080 SteamsService.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe Token: SeDebugPrivilege 3080 SteamsService.exe Token: SeDebugPrivilege 496 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 3080 SteamsService.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1524 wrote to memory of 5064 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 67 PID 1524 wrote to memory of 5064 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 67 PID 1524 wrote to memory of 5064 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 67 PID 5064 wrote to memory of 4692 5064 cmd.exe 69 PID 5064 wrote to memory of 4692 5064 cmd.exe 69 PID 5064 wrote to memory of 4692 5064 cmd.exe 69 PID 1524 wrote to memory of 3080 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 70 PID 1524 wrote to memory of 3080 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 70 PID 1524 wrote to memory of 3080 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 70 PID 3080 wrote to memory of 496 3080 SteamsService.exe 71 PID 3080 wrote to memory of 496 3080 SteamsService.exe 71 PID 3080 wrote to memory of 496 3080 SteamsService.exe 71 PID 3080 wrote to memory of 496 3080 SteamsService.exe 71 PID 3080 wrote to memory of 496 3080 SteamsService.exe 71 PID 3080 wrote to memory of 496 3080 SteamsService.exe 71 PID 3080 wrote to memory of 496 3080 SteamsService.exe 71 PID 3080 wrote to memory of 496 3080 SteamsService.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe"C:\Users\Admin\AppData\Local\Temp\789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "SteamsService" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\SteamsService.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "SteamsService" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\SteamsService.exe"3⤵
- Adds Run key to start application
PID:4692
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\SteamsService.exe"C:\Users\Admin\AppData\Local\Microsoft\SteamsService.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:496
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD50c717a4d5c7c6a0716fa3d788f0b2cdd
SHA1ccebe3bfbd0f46942c27e898b67dcd56c2dd7e27
SHA256789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05
SHA512314e1c5b4569f7ca2db449f4fe5d86dd56972ae59c08ce82618d889c2c311b5d744cb4d52fd7f89411afc30c7e185d8ef46274e2b205076b584bb74a9dd997af
-
Filesize
2.6MB
MD50c717a4d5c7c6a0716fa3d788f0b2cdd
SHA1ccebe3bfbd0f46942c27e898b67dcd56c2dd7e27
SHA256789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05
SHA512314e1c5b4569f7ca2db449f4fe5d86dd56972ae59c08ce82618d889c2c311b5d744cb4d52fd7f89411afc30c7e185d8ef46274e2b205076b584bb74a9dd997af