Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    273s
  • max time network
    276s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/09/2022, 10:15

General

  • Target

    24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe

  • Size

    3.3MB

  • MD5

    4d05c920040c671e49187a179033c50b

  • SHA1

    387a1318539ff16974c21ed6e78fbcbe8e73e3fa

  • SHA256

    24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a

  • SHA512

    f86f5a2e11ceed5a212ae1c61d1c1f31d125ee09cd007610db0db0720fedc08d874807defa029136e6c063ab1e03f47b67298d25a827ebe45ce7f774e5c79849

  • SSDEEP

    49152:Duvjict75qI24MnFmAhxC5fGQRbZtU4axGtOEdzx5onb5EnWcq3jAvKUYgeGc:Duvjict4nFLxafGQNTUNxNMLoVtcWdP

Score
10/10

Malware Config

Extracted

Family

eternity

Attributes
  • payload_urls

    http://178.20.44.214/edgedownload.exe

    http://178.20.44.214/a.exe

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe
    "C:\Users\Admin\AppData\Local\Temp\24b99a15afb676da6886b5b020d938c82704799876d4fcb4d611c7c7188c1e8a.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
        PID:4608
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
          PID:4600
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4376
          • C:\Users\Admin\AppData\Local\Temp\a.exe
            "C:\Users\Admin\AppData\Local\Temp\a.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4160
            • C:\Windows\SysWOW64\cmd.exe
              "cmd" /c ping 127.0.0.1 -n 14 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "OneDrivex" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1040
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 14
                5⤵
                • Runs ping.exe
                PID:4280
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "OneDrivex" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"
                5⤵
                • Adds Run key to start application
                PID:3844
            • C:\Windows\SysWOW64\cmd.exe
              "cmd" /c ping 127.0.0.1 -n 17 > nul && copy "C:\Users\Admin\AppData\Local\Temp\a.exe" "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe" && ping 127.0.0.1 -n 17 > nul && "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4984
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 17
                5⤵
                • Runs ping.exe
                PID:1744
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 17
                5⤵
                • Runs ping.exe
                PID:1012
              • C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe
                "C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:5072
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                  6⤵
                    PID:4100

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe

          Filesize

          1.9MB

          MD5

          6ed2820a8cb483cf87846d4252ebb7f8

          SHA1

          9aa1b510dbf7e156b2ba47eea214172bd771ef47

          SHA256

          fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1

          SHA512

          e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74

        • C:\Users\Admin\AppData\Local\Microsoft\OneDrivex.exe

          Filesize

          1.9MB

          MD5

          6ed2820a8cb483cf87846d4252ebb7f8

          SHA1

          9aa1b510dbf7e156b2ba47eea214172bd771ef47

          SHA256

          fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1

          SHA512

          e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74

        • C:\Users\Admin\AppData\Local\Temp\a.exe

          Filesize

          1.9MB

          MD5

          6ed2820a8cb483cf87846d4252ebb7f8

          SHA1

          9aa1b510dbf7e156b2ba47eea214172bd771ef47

          SHA256

          fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1

          SHA512

          e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74

        • C:\Users\Admin\AppData\Local\Temp\a.exe

          Filesize

          1.9MB

          MD5

          6ed2820a8cb483cf87846d4252ebb7f8

          SHA1

          9aa1b510dbf7e156b2ba47eea214172bd771ef47

          SHA256

          fdf9b44f84e948dcdbfcaaee755d2a8e3768ffc2dbb23fe9352b1d92cf0891f1

          SHA512

          e977e4955a2551600bef095d7c06701d87472e08f6812f51c83e5213060c7dfadae16c13cca7a1bf08d4dd1b87da1aa6a6a154c6384e4ec842902d25037c2b74

        • memory/2204-168-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-173-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-125-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-126-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-127-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-128-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-129-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-130-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-131-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-132-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-133-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-134-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-135-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-136-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-137-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-139-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-138-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-140-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-141-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-142-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-172-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-144-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-145-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-146-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-147-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-148-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-149-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-150-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-151-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-152-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-153-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-154-0x0000000000D20000-0x00000000014EC000-memory.dmp

          Filesize

          7.8MB

        • memory/2204-155-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-156-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-157-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-160-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-161-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-162-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-163-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-164-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-165-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-166-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-167-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-123-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-169-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-170-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-124-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-171-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-143-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-174-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-175-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-176-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-177-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-178-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-179-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-180-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-181-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-182-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-183-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-184-0x00000000051B0000-0x000000000524C000-memory.dmp

          Filesize

          624KB

        • memory/2204-185-0x0000000005800000-0x0000000005CFE000-memory.dmp

          Filesize

          5.0MB

        • memory/2204-186-0x00000000053A0000-0x0000000005432000-memory.dmp

          Filesize

          584KB

        • memory/2204-187-0x0000000005440000-0x0000000005790000-memory.dmp

          Filesize

          3.3MB

        • memory/2204-188-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-189-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-190-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-208-0x0000000006560000-0x000000000677E000-memory.dmp

          Filesize

          2.1MB

        • memory/2204-209-0x0000000006780000-0x00000000067B4000-memory.dmp

          Filesize

          208KB

        • memory/2204-212-0x00000000069D0000-0x00000000069DA000-memory.dmp

          Filesize

          40KB

        • memory/2204-216-0x0000000007290000-0x00000000072A8000-memory.dmp

          Filesize

          96KB

        • memory/2204-219-0x00000000076C0000-0x00000000076DA000-memory.dmp

          Filesize

          104KB

        • memory/2204-220-0x0000000008BE0000-0x0000000008BE6000-memory.dmp

          Filesize

          24KB

        • memory/2204-120-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-121-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/2204-122-0x0000000077540000-0x00000000776CE000-memory.dmp

          Filesize

          1.6MB

        • memory/4100-639-0x0000000000400000-0x000000000043E000-memory.dmp

          Filesize

          248KB

        • memory/4160-383-0x0000000000ED0000-0x0000000000F2C000-memory.dmp

          Filesize

          368KB

        • memory/4160-384-0x0000000000F30000-0x0000000000F64000-memory.dmp

          Filesize

          208KB

        • memory/4160-332-0x0000000000270000-0x000000000054A000-memory.dmp

          Filesize

          2.9MB

        • memory/4160-362-0x0000000004FF0000-0x0000000005340000-memory.dmp

          Filesize

          3.3MB

        • memory/4376-417-0x0000000007490000-0x00000000074E0000-memory.dmp

          Filesize

          320KB

        • memory/4376-423-0x00000000076E0000-0x000000000782A000-memory.dmp

          Filesize

          1.3MB

        • memory/4376-424-0x0000000007340000-0x0000000007462000-memory.dmp

          Filesize

          1.1MB

        • memory/4376-425-0x0000000007470000-0x000000000748A000-memory.dmp

          Filesize

          104KB

        • memory/4376-453-0x0000000005D60000-0x0000000005DDA000-memory.dmp

          Filesize

          488KB

        • memory/4376-254-0x0000000000400000-0x0000000000552000-memory.dmp

          Filesize

          1.3MB

        • memory/5072-575-0x0000000005500000-0x0000000005850000-memory.dmp

          Filesize

          3.3MB

        • memory/5072-545-0x0000000000E00000-0x00000000010DA000-memory.dmp

          Filesize

          2.9MB