Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
177s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
20/09/2022, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe
Resource
win10-20220812-en
General
-
Target
789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe
-
Size
2.6MB
-
MD5
0c717a4d5c7c6a0716fa3d788f0b2cdd
-
SHA1
ccebe3bfbd0f46942c27e898b67dcd56c2dd7e27
-
SHA256
789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05
-
SHA512
314e1c5b4569f7ca2db449f4fe5d86dd56972ae59c08ce82618d889c2c311b5d744cb4d52fd7f89411afc30c7e185d8ef46274e2b205076b584bb74a9dd997af
-
SSDEEP
49152:DmVRGHUBcBLZ3K5va9tNCyK4Vs9mOpLbO88y8kiaAm3EmB5hwVjrrkxCP3RcdlsG:DmVRbO5Za5voN2aso4bOKiaB3Em1wht5
Malware Config
Signatures
-
Detects Eternity clipper 2 IoCs
resource yara_rule behavioral2/memory/1608-337-0x000000000040AD8E-mapping.dmp eternity_clipper behavioral2/memory/1608-371-0x0000000000400000-0x0000000000410000-memory.dmp eternity_clipper -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Executes dropped EXE 1 IoCs
pid Process 5080 SteamsService.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run\SteamsService = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\SteamsService.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 5080 SteamsService.exe 5080 SteamsService.exe 5080 SteamsService.exe 5080 SteamsService.exe 5080 SteamsService.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5080 set thread context of 1608 5080 SteamsService.exe 71 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1608 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 5080 SteamsService.exe 5080 SteamsService.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe Token: SeDebugPrivilege 5080 SteamsService.exe Token: SeDebugPrivilege 1608 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 5080 SteamsService.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1524 wrote to memory of 4740 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 67 PID 1524 wrote to memory of 4740 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 67 PID 1524 wrote to memory of 4740 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 67 PID 4740 wrote to memory of 4872 4740 cmd.exe 69 PID 4740 wrote to memory of 4872 4740 cmd.exe 69 PID 4740 wrote to memory of 4872 4740 cmd.exe 69 PID 1524 wrote to memory of 5080 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 70 PID 1524 wrote to memory of 5080 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 70 PID 1524 wrote to memory of 5080 1524 789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe 70 PID 5080 wrote to memory of 1608 5080 SteamsService.exe 71 PID 5080 wrote to memory of 1608 5080 SteamsService.exe 71 PID 5080 wrote to memory of 1608 5080 SteamsService.exe 71 PID 5080 wrote to memory of 1608 5080 SteamsService.exe 71 PID 5080 wrote to memory of 1608 5080 SteamsService.exe 71 PID 5080 wrote to memory of 1608 5080 SteamsService.exe 71 PID 5080 wrote to memory of 1608 5080 SteamsService.exe 71 PID 5080 wrote to memory of 1608 5080 SteamsService.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe"C:\Users\Admin\AppData\Local\Temp\789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "SteamsService" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\SteamsService.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "SteamsService" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\SteamsService.exe"3⤵
- Adds Run key to start application
PID:4872
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\SteamsService.exe"C:\Users\Admin\AppData\Local\Microsoft\SteamsService.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD50c717a4d5c7c6a0716fa3d788f0b2cdd
SHA1ccebe3bfbd0f46942c27e898b67dcd56c2dd7e27
SHA256789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05
SHA512314e1c5b4569f7ca2db449f4fe5d86dd56972ae59c08ce82618d889c2c311b5d744cb4d52fd7f89411afc30c7e185d8ef46274e2b205076b584bb74a9dd997af
-
Filesize
2.6MB
MD50c717a4d5c7c6a0716fa3d788f0b2cdd
SHA1ccebe3bfbd0f46942c27e898b67dcd56c2dd7e27
SHA256789630c437ccf2d7df712ce174ba2336792977a27d203431957c79163f9b9a05
SHA512314e1c5b4569f7ca2db449f4fe5d86dd56972ae59c08ce82618d889c2c311b5d744cb4d52fd7f89411afc30c7e185d8ef46274e2b205076b584bb74a9dd997af