Analysis
-
max time kernel
85s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 10:15
Static task
static1
Behavioral task
behavioral1
Sample
24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe
Resource
win10-20220812-en
General
-
Target
24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe
-
Size
3.3MB
-
MD5
4d05c920040c671e49187a179033c50b
-
SHA1
387a1318539ff16974c21ed6e78fbcbe8e73e3fa
-
SHA256
24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a
-
SHA512
f86f5a2e11ceed5a212ae1c61d1c1f31d125ee09cd007610db0db0720fedc08d874807defa029136e6c063ab1e03f47b67298d25a827ebe45ce7f774e5c79849
-
SSDEEP
49152:Duvjict75qI24MnFmAhxC5fGQRbZtU4axGtOEdzx5onb5EnWcq3jAvKUYgeGc:Duvjict4nFLxafGQNTUNxNMLoVtcWdP
Malware Config
Extracted
eternity
-
payload_urls
http://178.20.44.214/edgedownload.exe
http://178.20.44.214/a.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Downloads MZ/PE file
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe Token: SeDebugPrivilege 624 InstallUtil.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1276 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 27 PID 2032 wrote to memory of 1276 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 27 PID 2032 wrote to memory of 1276 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 27 PID 2032 wrote to memory of 1276 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 27 PID 2032 wrote to memory of 1276 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 27 PID 2032 wrote to memory of 1276 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 27 PID 2032 wrote to memory of 1276 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 27 PID 2032 wrote to memory of 1276 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 27 PID 2032 wrote to memory of 1276 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 27 PID 2032 wrote to memory of 1276 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 27 PID 2032 wrote to memory of 1276 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 27 PID 2032 wrote to memory of 1276 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 27 PID 2032 wrote to memory of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28 PID 2032 wrote to memory of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28 PID 2032 wrote to memory of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28 PID 2032 wrote to memory of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28 PID 2032 wrote to memory of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28 PID 2032 wrote to memory of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28 PID 2032 wrote to memory of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28 PID 2032 wrote to memory of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28 PID 2032 wrote to memory of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28 PID 2032 wrote to memory of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28 PID 2032 wrote to memory of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28 PID 2032 wrote to memory of 624 2032 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe"C:\Users\Admin\AppData\Local\Temp\24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:1276
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:624
-