Analysis

  • max time kernel
    269s
  • max time network
    271s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/09/2022, 10:25

General

  • Target

    e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe

  • Size

    3.8MB

  • MD5

    102d3fa40d97527969092a10edf227fa

  • SHA1

    5c80cf703216391fd2eabfd726c433d721d16e2d

  • SHA256

    e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a

  • SHA512

    fe3f974a7204bf0dc582cbc5fa274248fc3a493a7c538d59920f6ebc0777bda37d70d614ecdee05856aa00023e2904f7e130ee4ed4f3161035dc27a05f2f3201

  • SSDEEP

    98304:gAaWLv99o6OGCyps4mFlHPqmHzUkUz3paWw:BLvOKWblV0wJ

Score
10/10

Malware Config

Extracted

Family

eternity

Attributes
  • payload_urls

    http://178.20.44.214/edgedownload.exe

    http://178.20.44.214/a.exe

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe
    "C:\Users\Admin\AppData\Local\Temp\e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3540
      • C:\Users\Admin\AppData\Local\Temp\a.exe
        "C:\Users\Admin\AppData\Local\Temp\a.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c ping 127.0.0.1 -n 17 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "OneDrivex" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1176
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 17
            5⤵
            • Runs ping.exe
            PID:1804
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "OneDrivex" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"
            5⤵
            • Adds Run key to start application
            PID:2456
        • C:\Windows\SysWOW64\cmd.exe
          "cmd" /c ping 127.0.0.1 -n 23 > nul && copy "C:\Users\Admin\AppData\Local\Temp\a.exe" "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe" && ping 127.0.0.1 -n 23 > nul && "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:652
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 23
            5⤵
            • Runs ping.exe
            PID:2184
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 23
            5⤵
            • Runs ping.exe
            PID:2736
          • C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe
            "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5088
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
              6⤵
                PID:4820

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe

      Filesize

      1.9MB

      MD5

      6ed2820a8cb483cf87846d4252ebb7f8

      SHA1

      9aa1b510dbf7e156b2ba47eea214172bd771ef47

      SHA256

      fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1

      SHA512

      e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe

      Filesize

      1.9MB

      MD5

      6ed2820a8cb483cf87846d4252ebb7f8

      SHA1

      9aa1b510dbf7e156b2ba47eea214172bd771ef47

      SHA256

      fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1

      SHA512

      e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74

    • C:\Users\Admin\AppData\Local\Temp\a.exe

      Filesize

      1.9MB

      MD5

      6ed2820a8cb483cf87846d4252ebb7f8

      SHA1

      9aa1b510dbf7e156b2ba47eea214172bd771ef47

      SHA256

      fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1

      SHA512

      e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74

    • C:\Users\Admin\AppData\Local\Temp\a.exe

      Filesize

      1.9MB

      MD5

      6ed2820a8cb483cf87846d4252ebb7f8

      SHA1

      9aa1b510dbf7e156b2ba47eea214172bd771ef47

      SHA256

      fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1

      SHA512

      e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74

    • memory/2740-384-0x0000000006C40000-0x0000000006C58000-memory.dmp

      Filesize

      96KB

    • memory/2740-378-0x0000000006060000-0x0000000006094000-memory.dmp

      Filesize

      208KB

    • memory/2740-377-0x0000000006000000-0x000000000605C000-memory.dmp

      Filesize

      368KB

    • memory/2740-356-0x0000000004D60000-0x00000000050B0000-memory.dmp

      Filesize

      3.3MB

    • memory/2740-326-0x0000000000B20000-0x0000000000DFA000-memory.dmp

      Filesize

      2.9MB

    • memory/2764-168-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-181-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-133-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-135-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-136-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-137-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-139-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-140-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-138-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-141-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-142-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-143-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-145-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-147-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-146-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-144-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-148-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-149-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-150-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-151-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-152-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-153-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-154-0x000000007F610000-0x000000007F9E1000-memory.dmp

      Filesize

      3.8MB

    • memory/2764-156-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-155-0x0000000000310000-0x0000000000312000-memory.dmp

      Filesize

      8KB

    • memory/2764-158-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-157-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-159-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-160-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-161-0x0000000000310000-0x0000000000ECC000-memory.dmp

      Filesize

      11.7MB

    • memory/2764-162-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-163-0x0000000004560000-0x00000000045FC000-memory.dmp

      Filesize

      624KB

    • memory/2764-164-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-166-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-167-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-165-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-117-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-169-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-170-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-171-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-172-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-173-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-175-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-177-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-179-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-134-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-180-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-178-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-176-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-182-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-183-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-174-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-198-0x0000000000310000-0x0000000000ECC000-memory.dmp

      Filesize

      11.7MB

    • memory/2764-201-0x0000000003B80000-0x0000000003BBC000-memory.dmp

      Filesize

      240KB

    • memory/2764-202-0x0000000003BF0000-0x0000000003BF6000-memory.dmp

      Filesize

      24KB

    • memory/2764-204-0x000000000C240000-0x000000000C2D2000-memory.dmp

      Filesize

      584KB

    • memory/2764-203-0x000000000C940000-0x000000000CE3E000-memory.dmp

      Filesize

      5.0MB

    • memory/2764-206-0x0000000008120000-0x000000000812A000-memory.dmp

      Filesize

      40KB

    • memory/2764-208-0x000000007F610000-0x000000007F9E1000-memory.dmp

      Filesize

      3.8MB

    • memory/2764-212-0x0000000009370000-0x000000000938A000-memory.dmp

      Filesize

      104KB

    • memory/2764-213-0x000000000B390000-0x000000000B396000-memory.dmp

      Filesize

      24KB

    • memory/2764-118-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-223-0x0000000000310000-0x0000000000ECC000-memory.dmp

      Filesize

      11.7MB

    • memory/2764-119-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-132-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-131-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-130-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-128-0x0000000000310000-0x0000000000ECC000-memory.dmp

      Filesize

      11.7MB

    • memory/2764-129-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-127-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-126-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-125-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-124-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-123-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-116-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-120-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-121-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2764-122-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/3540-419-0x0000000006710000-0x0000000006832000-memory.dmp

      Filesize

      1.1MB

    • memory/3540-418-0x00000000065C0000-0x000000000670A000-memory.dmp

      Filesize

      1.3MB

    • memory/3540-412-0x0000000006370000-0x00000000063C0000-memory.dmp

      Filesize

      320KB

    • memory/3540-248-0x0000000000400000-0x0000000000552000-memory.dmp

      Filesize

      1.3MB

    • memory/3540-422-0x0000000006330000-0x000000000634A000-memory.dmp

      Filesize

      104KB

    • memory/4820-634-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/5088-538-0x0000000000070000-0x000000000034A000-memory.dmp

      Filesize

      2.9MB

    • memory/5088-568-0x0000000005100000-0x0000000005450000-memory.dmp

      Filesize

      3.3MB

    • memory/5088-596-0x0000000009540000-0x000000000955A000-memory.dmp

      Filesize

      104KB

    • memory/5088-597-0x000000000BEB0000-0x000000000BEB6000-memory.dmp

      Filesize

      24KB