Analysis
-
max time kernel
144s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
15-09-2022 10:15
Static task
static1
Behavioral task
behavioral1
Sample
24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe
Resource
win10-20220812-en
General
-
Target
24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe
-
Size
3.3MB
-
MD5
4d05c920040c671e49187a179033c50b
-
SHA1
387a1318539ff16974c21ed6e78fbcbe8e73e3fa
-
SHA256
24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a
-
SHA512
f86f5a2e11ceed5a212ae1c61d1c1f31d125ee09cd007610db0db0720fedc08d874807defa029136e6c063ab1e03f47b67298d25a827ebe45ce7f774e5c79849
-
SSDEEP
49152:Duvjict75qI24MnFmAhxC5fGQRbZtU4axGtOEdzx5onb5EnWcq3jAvKUYgeGc:Duvjict4nFLxafGQNTUNxNMLoVtcWdP
Malware Config
Extracted
eternity
-
payload_urls
http://178.20.44.214/edgedownload.exe
http://178.20.44.214/a.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Downloads MZ/PE file
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2404 set thread context of 3680 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe Token: SeDebugPrivilege 3680 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2404 wrote to memory of 3680 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2404 wrote to memory of 3680 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2404 wrote to memory of 3680 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2404 wrote to memory of 3680 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2404 wrote to memory of 3680 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2404 wrote to memory of 3680 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2404 wrote to memory of 3680 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2404 wrote to memory of 3680 2404 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe"C:\Users\Admin\AppData\Local\Temp\24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3680
-