Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
273s -
max time network
276s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
21/09/2022, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe
Resource
win10-20220812-en
General
-
Target
24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe
-
Size
3.3MB
-
MD5
4d05c920040c671e49187a179033c50b
-
SHA1
387a1318539ff16974c21ed6e78fbcbe8e73e3fa
-
SHA256
24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a
-
SHA512
f86f5a2e11ceed5a212ae1c61d1c1f31d125ee09cd007610db0db0720fedc08d874807defa029136e6c063ab1e03f47b67298d25a827ebe45ce7f774e5c79849
-
SSDEEP
49152:Duvjict75qI24MnFmAhxC5fGQRbZtU4axGtOEdzx5onb5EnWcq3jAvKUYgeGc:Duvjict4nFLxafGQNTUNxNMLoVtcWdP
Malware Config
Extracted
eternity
-
payload_urls
http://178.20.44.214/edgedownload.exe
http://178.20.44.214/a.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4160 a.exe 5072 OneDrivex.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDrivex = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrivex.exe" reg.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 4160 a.exe 4160 a.exe 5072 OneDrivex.exe 5072 OneDrivex.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2204 set thread context of 4376 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 69 PID 5072 set thread context of 4100 5072 OneDrivex.exe 81 -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1012 PING.EXE 4280 PING.EXE 1744 PING.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 4160 a.exe 5072 OneDrivex.exe 5072 OneDrivex.exe 5072 OneDrivex.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe Token: SeDebugPrivilege 4376 InstallUtil.exe Token: SeDebugPrivilege 4160 a.exe Token: SeDebugPrivilege 5072 OneDrivex.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 2204 wrote to memory of 4608 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2204 wrote to memory of 4608 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2204 wrote to memory of 4608 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2204 wrote to memory of 4608 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2204 wrote to memory of 4608 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2204 wrote to memory of 4608 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2204 wrote to memory of 4608 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2204 wrote to memory of 4608 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 67 PID 2204 wrote to memory of 4600 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 68 PID 2204 wrote to memory of 4600 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 68 PID 2204 wrote to memory of 4600 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 68 PID 2204 wrote to memory of 4600 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 68 PID 2204 wrote to memory of 4600 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 68 PID 2204 wrote to memory of 4600 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 68 PID 2204 wrote to memory of 4600 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 68 PID 2204 wrote to memory of 4600 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 68 PID 2204 wrote to memory of 4376 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 69 PID 2204 wrote to memory of 4376 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 69 PID 2204 wrote to memory of 4376 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 69 PID 2204 wrote to memory of 4376 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 69 PID 2204 wrote to memory of 4376 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 69 PID 2204 wrote to memory of 4376 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 69 PID 2204 wrote to memory of 4376 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 69 PID 2204 wrote to memory of 4376 2204 24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe 69 PID 4376 wrote to memory of 4160 4376 InstallUtil.exe 70 PID 4376 wrote to memory of 4160 4376 InstallUtil.exe 70 PID 4376 wrote to memory of 4160 4376 InstallUtil.exe 70 PID 4160 wrote to memory of 1040 4160 a.exe 71 PID 4160 wrote to memory of 1040 4160 a.exe 71 PID 4160 wrote to memory of 1040 4160 a.exe 71 PID 1040 wrote to memory of 4280 1040 cmd.exe 73 PID 1040 wrote to memory of 4280 1040 cmd.exe 73 PID 1040 wrote to memory of 4280 1040 cmd.exe 73 PID 4160 wrote to memory of 4984 4160 a.exe 75 PID 4160 wrote to memory of 4984 4160 a.exe 75 PID 4160 wrote to memory of 4984 4160 a.exe 75 PID 4984 wrote to memory of 1744 4984 cmd.exe 77 PID 4984 wrote to memory of 1744 4984 cmd.exe 77 PID 4984 wrote to memory of 1744 4984 cmd.exe 77 PID 1040 wrote to memory of 3844 1040 cmd.exe 78 PID 1040 wrote to memory of 3844 1040 cmd.exe 78 PID 1040 wrote to memory of 3844 1040 cmd.exe 78 PID 4984 wrote to memory of 1012 4984 cmd.exe 79 PID 4984 wrote to memory of 1012 4984 cmd.exe 79 PID 4984 wrote to memory of 1012 4984 cmd.exe 79 PID 4984 wrote to memory of 5072 4984 cmd.exe 80 PID 4984 wrote to memory of 5072 4984 cmd.exe 80 PID 4984 wrote to memory of 5072 4984 cmd.exe 80 PID 5072 wrote to memory of 4100 5072 OneDrivex.exe 81 PID 5072 wrote to memory of 4100 5072 OneDrivex.exe 81 PID 5072 wrote to memory of 4100 5072 OneDrivex.exe 81 PID 5072 wrote to memory of 4100 5072 OneDrivex.exe 81 PID 5072 wrote to memory of 4100 5072 OneDrivex.exe 81 PID 5072 wrote to memory of 4100 5072 OneDrivex.exe 81 PID 5072 wrote to memory of 4100 5072 OneDrivex.exe 81 PID 5072 wrote to memory of 4100 5072 OneDrivex.exe 81 PID 5072 wrote to memory of 4100 5072 OneDrivex.exe 81 PID 5072 wrote to memory of 4100 5072 OneDrivex.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe"C:\Users\Admin\AppData\Local\Temp\24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:4608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:4600
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 14 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "OneDrivex" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 145⤵
- Runs ping.exe
PID:4280
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "OneDrivex" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"5⤵
- Adds Run key to start application
PID:3844
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 17 > nul && copy "C:\Users\Admin\AppData\Local\Temp\a.exe" "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe" && ping 127.0.0.1 -n 17 > nul && "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 175⤵
- Runs ping.exe
PID:1744
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 175⤵
- Runs ping.exe
PID:1012
-
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"6⤵PID:4100
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD56ed2820a8cb483cf87846d4252ebb7f8
SHA19aa1b510dbf7e156b2ba47eea214172bd771ef47
SHA256fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1
SHA512e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74
-
Filesize
1.9MB
MD56ed2820a8cb483cf87846d4252ebb7f8
SHA19aa1b510dbf7e156b2ba47eea214172bd771ef47
SHA256fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1
SHA512e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74
-
Filesize
1.9MB
MD56ed2820a8cb483cf87846d4252ebb7f8
SHA19aa1b510dbf7e156b2ba47eea214172bd771ef47
SHA256fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1
SHA512e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74
-
Filesize
1.9MB
MD56ed2820a8cb483cf87846d4252ebb7f8
SHA19aa1b510dbf7e156b2ba47eea214172bd771ef47
SHA256fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1
SHA512e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74