Analysis
-
max time kernel
269s -
max time network
271s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2022, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe
Resource
win10-20220812-en
General
-
Target
e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe
-
Size
3.8MB
-
MD5
102d3fa40d97527969092a10edf227fa
-
SHA1
5c80cf703216391fd2eabfd726c433d721d16e2d
-
SHA256
e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a
-
SHA512
fe3f974a7204bf0dc582cbc5fa274248fc3a493a7c538d59920f6ebc0777bda37d70d614ecdee05856aa00023e2904f7e130ee4ed4f3161035dc27a05f2f3201
-
SSDEEP
98304:gAaWLv99o6OGCyps4mFlHPqmHzUkUz3paWw:BLvOKWblV0wJ
Malware Config
Extracted
eternity
-
payload_urls
http://178.20.44.214/edgedownload.exe
http://178.20.44.214/a.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2740 a.exe 5088 OneDrivex.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDrivex = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrivex.exe" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2740 a.exe 2740 a.exe 5088 OneDrivex.exe 5088 OneDrivex.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2764 set thread context of 3540 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 5088 set thread context of 4820 5088 OneDrivex.exe 78 -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1804 PING.EXE 2184 PING.EXE 2736 PING.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 2740 a.exe 5088 OneDrivex.exe 5088 OneDrivex.exe 5088 OneDrivex.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe Token: SeDebugPrivilege 3540 InstallUtil.exe Token: SeDebugPrivilege 2740 a.exe Token: SeDebugPrivilege 5088 OneDrivex.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2764 wrote to memory of 3540 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2764 wrote to memory of 3540 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2764 wrote to memory of 3540 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2764 wrote to memory of 3540 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2764 wrote to memory of 3540 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2764 wrote to memory of 3540 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2764 wrote to memory of 3540 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2764 wrote to memory of 3540 2764 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 3540 wrote to memory of 2740 3540 InstallUtil.exe 68 PID 3540 wrote to memory of 2740 3540 InstallUtil.exe 68 PID 3540 wrote to memory of 2740 3540 InstallUtil.exe 68 PID 2740 wrote to memory of 1176 2740 a.exe 69 PID 2740 wrote to memory of 1176 2740 a.exe 69 PID 2740 wrote to memory of 1176 2740 a.exe 69 PID 1176 wrote to memory of 1804 1176 cmd.exe 71 PID 1176 wrote to memory of 1804 1176 cmd.exe 71 PID 1176 wrote to memory of 1804 1176 cmd.exe 71 PID 2740 wrote to memory of 652 2740 a.exe 72 PID 2740 wrote to memory of 652 2740 a.exe 72 PID 2740 wrote to memory of 652 2740 a.exe 72 PID 652 wrote to memory of 2184 652 cmd.exe 74 PID 652 wrote to memory of 2184 652 cmd.exe 74 PID 652 wrote to memory of 2184 652 cmd.exe 74 PID 1176 wrote to memory of 2456 1176 cmd.exe 75 PID 1176 wrote to memory of 2456 1176 cmd.exe 75 PID 1176 wrote to memory of 2456 1176 cmd.exe 75 PID 652 wrote to memory of 2736 652 cmd.exe 76 PID 652 wrote to memory of 2736 652 cmd.exe 76 PID 652 wrote to memory of 2736 652 cmd.exe 76 PID 652 wrote to memory of 5088 652 cmd.exe 77 PID 652 wrote to memory of 5088 652 cmd.exe 77 PID 652 wrote to memory of 5088 652 cmd.exe 77 PID 5088 wrote to memory of 4820 5088 OneDrivex.exe 78 PID 5088 wrote to memory of 4820 5088 OneDrivex.exe 78 PID 5088 wrote to memory of 4820 5088 OneDrivex.exe 78 PID 5088 wrote to memory of 4820 5088 OneDrivex.exe 78 PID 5088 wrote to memory of 4820 5088 OneDrivex.exe 78 PID 5088 wrote to memory of 4820 5088 OneDrivex.exe 78 PID 5088 wrote to memory of 4820 5088 OneDrivex.exe 78 PID 5088 wrote to memory of 4820 5088 OneDrivex.exe 78 PID 5088 wrote to memory of 4820 5088 OneDrivex.exe 78 PID 5088 wrote to memory of 4820 5088 OneDrivex.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe"C:\Users\Admin\AppData\Local\Temp\e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 17 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "OneDrivex" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 175⤵
- Runs ping.exe
PID:1804
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "OneDrivex" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"5⤵
- Adds Run key to start application
PID:2456
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 23 > nul && copy "C:\Users\Admin\AppData\Local\Temp\a.exe" "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe" && ping 127.0.0.1 -n 23 > nul && "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 235⤵
- Runs ping.exe
PID:2184
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 235⤵
- Runs ping.exe
PID:2736
-
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"6⤵PID:4820
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD56ed2820a8cb483cf87846d4252ebb7f8
SHA19aa1b510dbf7e156b2ba47eea214172bd771ef47
SHA256fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1
SHA512e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74
-
Filesize
1.9MB
MD56ed2820a8cb483cf87846d4252ebb7f8
SHA19aa1b510dbf7e156b2ba47eea214172bd771ef47
SHA256fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1
SHA512e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74
-
Filesize
1.9MB
MD56ed2820a8cb483cf87846d4252ebb7f8
SHA19aa1b510dbf7e156b2ba47eea214172bd771ef47
SHA256fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1
SHA512e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74
-
Filesize
1.9MB
MD56ed2820a8cb483cf87846d4252ebb7f8
SHA19aa1b510dbf7e156b2ba47eea214172bd771ef47
SHA256fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1
SHA512e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74