Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
297s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
20/09/2022, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe
Resource
win10-20220812-en
General
-
Target
e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe
-
Size
3.8MB
-
MD5
102d3fa40d97527969092a10edf227fa
-
SHA1
5c80cf703216391fd2eabfd726c433d721d16e2d
-
SHA256
e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a
-
SHA512
fe3f974a7204bf0dc582cbc5fa274248fc3a493a7c538d59920f6ebc0777bda37d70d614ecdee05856aa00023e2904f7e130ee4ed4f3161035dc27a05f2f3201
-
SSDEEP
98304:gAaWLv99o6OGCyps4mFlHPqmHzUkUz3paWw:BLvOKWblV0wJ
Malware Config
Extracted
eternity
-
payload_urls
http://178.20.44.214/edgedownload.exe
http://178.20.44.214/a.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4716 a.exe 4932 OneDrivex.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDrivex = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrivex.exe" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 4716 a.exe 4716 a.exe 4932 OneDrivex.exe 4932 OneDrivex.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2208 set thread context of 4572 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 68 PID 4932 set thread context of 4548 4932 OneDrivex.exe 80 -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4884 PING.EXE 2040 PING.EXE 1972 PING.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4716 a.exe 4932 OneDrivex.exe 4932 OneDrivex.exe 4932 OneDrivex.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe Token: SeDebugPrivilege 4572 InstallUtil.exe Token: SeDebugPrivilege 4716 a.exe Token: SeDebugPrivilege 4932 OneDrivex.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2208 wrote to memory of 4180 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2208 wrote to memory of 4180 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2208 wrote to memory of 4180 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2208 wrote to memory of 4180 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2208 wrote to memory of 4180 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2208 wrote to memory of 4180 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2208 wrote to memory of 4180 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2208 wrote to memory of 4180 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 67 PID 2208 wrote to memory of 4572 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 68 PID 2208 wrote to memory of 4572 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 68 PID 2208 wrote to memory of 4572 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 68 PID 2208 wrote to memory of 4572 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 68 PID 2208 wrote to memory of 4572 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 68 PID 2208 wrote to memory of 4572 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 68 PID 2208 wrote to memory of 4572 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 68 PID 2208 wrote to memory of 4572 2208 e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe 68 PID 4572 wrote to memory of 4716 4572 InstallUtil.exe 69 PID 4572 wrote to memory of 4716 4572 InstallUtil.exe 69 PID 4572 wrote to memory of 4716 4572 InstallUtil.exe 69 PID 4716 wrote to memory of 568 4716 a.exe 70 PID 4716 wrote to memory of 568 4716 a.exe 70 PID 4716 wrote to memory of 568 4716 a.exe 70 PID 568 wrote to memory of 4884 568 cmd.exe 72 PID 568 wrote to memory of 4884 568 cmd.exe 72 PID 568 wrote to memory of 4884 568 cmd.exe 72 PID 4716 wrote to memory of 1396 4716 a.exe 74 PID 4716 wrote to memory of 1396 4716 a.exe 74 PID 4716 wrote to memory of 1396 4716 a.exe 74 PID 1396 wrote to memory of 2040 1396 cmd.exe 76 PID 1396 wrote to memory of 2040 1396 cmd.exe 76 PID 1396 wrote to memory of 2040 1396 cmd.exe 76 PID 568 wrote to memory of 2328 568 cmd.exe 77 PID 568 wrote to memory of 2328 568 cmd.exe 77 PID 568 wrote to memory of 2328 568 cmd.exe 77 PID 1396 wrote to memory of 1972 1396 cmd.exe 78 PID 1396 wrote to memory of 1972 1396 cmd.exe 78 PID 1396 wrote to memory of 1972 1396 cmd.exe 78 PID 1396 wrote to memory of 4932 1396 cmd.exe 79 PID 1396 wrote to memory of 4932 1396 cmd.exe 79 PID 1396 wrote to memory of 4932 1396 cmd.exe 79 PID 4932 wrote to memory of 4548 4932 OneDrivex.exe 80 PID 4932 wrote to memory of 4548 4932 OneDrivex.exe 80 PID 4932 wrote to memory of 4548 4932 OneDrivex.exe 80 PID 4932 wrote to memory of 4548 4932 OneDrivex.exe 80 PID 4932 wrote to memory of 4548 4932 OneDrivex.exe 80 PID 4932 wrote to memory of 4548 4932 OneDrivex.exe 80 PID 4932 wrote to memory of 4548 4932 OneDrivex.exe 80 PID 4932 wrote to memory of 4548 4932 OneDrivex.exe 80 PID 4932 wrote to memory of 4548 4932 OneDrivex.exe 80 PID 4932 wrote to memory of 4548 4932 OneDrivex.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe"C:\Users\Admin\AppData\Local\Temp\e0806ec8b5ef5a9d9c59bddbf6c946320c345a5d54ed5b808170fd7967f3889a.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:4180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 16 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "OneDrivex" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 165⤵
- Runs ping.exe
PID:4884
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "OneDrivex" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"5⤵
- Adds Run key to start application
PID:2328
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 27 > nul && copy "C:\Users\Admin\AppData\Local\Temp\a.exe" "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe" && ping 127.0.0.1 -n 27 > nul && "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 275⤵
- Runs ping.exe
PID:2040
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 275⤵
- Runs ping.exe
PID:1972
-
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"6⤵PID:4548
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD56ed2820a8cb483cf87846d4252ebb7f8
SHA19aa1b510dbf7e156b2ba47eea214172bd771ef47
SHA256fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1
SHA512e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74
-
Filesize
1.9MB
MD56ed2820a8cb483cf87846d4252ebb7f8
SHA19aa1b510dbf7e156b2ba47eea214172bd771ef47
SHA256fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1
SHA512e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74
-
Filesize
1.9MB
MD56ed2820a8cb483cf87846d4252ebb7f8
SHA19aa1b510dbf7e156b2ba47eea214172bd771ef47
SHA256fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1
SHA512e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74
-
Filesize
1.9MB
MD56ed2820a8cb483cf87846d4252ebb7f8
SHA19aa1b510dbf7e156b2ba47eea214172bd771ef47
SHA256fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1
SHA512e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74