Analysis
-
max time kernel
111s -
max time network
81s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-11-2022 05:54
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
5.6MB
-
MD5
c5ffb5f4c680fb5d2058b9ceb91bde35
-
SHA1
cd1e0ca1b84b046321d673b407989ffadfa594a7
-
SHA256
5cfd06074db0ce6e91f2ab7bdd8e927d283d7b828900ad130ed882d2c736903a
-
SHA512
ae52ffacb03ea319015e10a587139b4e3fed11f528027f7dab9323dc820b82e8b68ff8bdd7d657a304ceced529aef021574381ee06c7712daf0692c06d5e7d7d
-
SSDEEP
49152:nTjTA3G0ZNEfFf/u95P3HU7BHpJnbVa8ZTVs/BHywaad9sk/IRUnqnY48UzjcJ:nTeG07+FkNXUZpJnBlcywaK3Jaw
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
4BCCzZcSyS7L1229mxLRArhp2HPKwpBmHGDnZKnWFds856vvQcRiDSsLZWH2CjW6xigC3NSGE5Qq2gfixNyMMVc723mjiPs
bc1qn0zp2sps3zsqz2507yw7jyrjd678wct6mckeuy
qqlvllvrq5yg3cjwk4axl0unqlp2xpu6ccst2ywvp2
0xFbA9a8c4a5398585a2aF951aa2D5496dbeCdA4aE
DGWe2iVzYfpztsBFnb2KLmjwRXBD9RnJs4
TAtt7HTeBdUEZJKFfm7DUs4r6UQ6w1Y1bD
LZQHZCvWUijEASjGXW6rZu7PKHZJNJ97pf
rEBCk9SBcda7z58zS8c1PwkDVxMSk286W7
t1XzHsqCdWR8zfJ9hzWoNzPfjqeQrkU5XsZ
XyHAkGzeqQdad7edTAzk3heu4NqEbcY1cJ
AYpmFyNSzvHF5yT7pQXMXZcm1RzLBvWWEx
GD2UKPTYTMUOKZWIBYVVVE2ICH66AKBPW2HU7PS4JDDTFPPKEQUCEJOP
bnb1md0kze5z0laj8nyk2l82unccr45nmykfrfrp46
FiaNRohykfF1YiMPigDWqmKJbMCP32VpkiNC8B32nxhp
Signatures
-
Detects Eternity clipper 11 IoCs
Processes:
resource yara_rule behavioral1/memory/604-59-0x0000000000400000-0x0000000000410000-memory.dmp eternity_clipper behavioral1/memory/604-60-0x0000000000400000-0x0000000000410000-memory.dmp eternity_clipper behavioral1/memory/604-62-0x000000000040B3AE-mapping.dmp eternity_clipper behavioral1/memory/604-61-0x0000000000400000-0x0000000000410000-memory.dmp eternity_clipper behavioral1/memory/604-64-0x0000000000400000-0x0000000000410000-memory.dmp eternity_clipper behavioral1/memory/604-66-0x0000000000400000-0x0000000000410000-memory.dmp eternity_clipper behavioral1/memory/1700-88-0x0000000000400000-0x0000000000410000-memory.dmp eternity_clipper behavioral1/memory/1700-86-0x0000000000400000-0x0000000000410000-memory.dmp eternity_clipper behavioral1/memory/1700-83-0x000000000040B3AE-mapping.dmp eternity_clipper behavioral1/memory/1376-98-0x000000000040B3AE-mapping.dmp eternity_clipper behavioral1/memory/1964-112-0x000000000040B3AE-mapping.dmp eternity_clipper -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Executes dropped EXE 6 IoCs
Processes:
tmp.exetmp.exetmp.exetmp.exetmp.exetmp.exepid process 1608 tmp.exe 1700 tmp.exe 1840 tmp.exe 1376 tmp.exe 1524 tmp.exe 1964 tmp.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 956 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 956 cmd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 ip-api.com -
Suspicious use of SetThreadContext 4 IoCs
Processes:
tmp.exetmp.exetmp.exetmp.exedescription pid process target process PID 1348 set thread context of 604 1348 tmp.exe tmp.exe PID 1608 set thread context of 1700 1608 tmp.exe tmp.exe PID 1840 set thread context of 1376 1840 tmp.exe tmp.exe PID 1524 set thread context of 1964 1524 tmp.exe tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
tmp.exepid process 1700 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tmp.exedescription pid process Token: SeDebugPrivilege 1700 tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
tmp.exetmp.execmd.exetmp.exetaskeng.exetmp.exetmp.exedescription pid process target process PID 1348 wrote to memory of 604 1348 tmp.exe tmp.exe PID 1348 wrote to memory of 604 1348 tmp.exe tmp.exe PID 1348 wrote to memory of 604 1348 tmp.exe tmp.exe PID 1348 wrote to memory of 604 1348 tmp.exe tmp.exe PID 1348 wrote to memory of 604 1348 tmp.exe tmp.exe PID 1348 wrote to memory of 604 1348 tmp.exe tmp.exe PID 1348 wrote to memory of 604 1348 tmp.exe tmp.exe PID 1348 wrote to memory of 604 1348 tmp.exe tmp.exe PID 1348 wrote to memory of 604 1348 tmp.exe tmp.exe PID 604 wrote to memory of 956 604 tmp.exe cmd.exe PID 604 wrote to memory of 956 604 tmp.exe cmd.exe PID 604 wrote to memory of 956 604 tmp.exe cmd.exe PID 604 wrote to memory of 956 604 tmp.exe cmd.exe PID 956 wrote to memory of 980 956 cmd.exe chcp.com PID 956 wrote to memory of 980 956 cmd.exe chcp.com PID 956 wrote to memory of 980 956 cmd.exe chcp.com PID 956 wrote to memory of 980 956 cmd.exe chcp.com PID 956 wrote to memory of 936 956 cmd.exe PING.EXE PID 956 wrote to memory of 936 956 cmd.exe PING.EXE PID 956 wrote to memory of 936 956 cmd.exe PING.EXE PID 956 wrote to memory of 936 956 cmd.exe PING.EXE PID 956 wrote to memory of 752 956 cmd.exe schtasks.exe PID 956 wrote to memory of 752 956 cmd.exe schtasks.exe PID 956 wrote to memory of 752 956 cmd.exe schtasks.exe PID 956 wrote to memory of 752 956 cmd.exe schtasks.exe PID 956 wrote to memory of 1608 956 cmd.exe tmp.exe PID 956 wrote to memory of 1608 956 cmd.exe tmp.exe PID 956 wrote to memory of 1608 956 cmd.exe tmp.exe PID 956 wrote to memory of 1608 956 cmd.exe tmp.exe PID 1608 wrote to memory of 1700 1608 tmp.exe tmp.exe PID 1608 wrote to memory of 1700 1608 tmp.exe tmp.exe PID 1608 wrote to memory of 1700 1608 tmp.exe tmp.exe PID 1608 wrote to memory of 1700 1608 tmp.exe tmp.exe PID 1608 wrote to memory of 1700 1608 tmp.exe tmp.exe PID 1608 wrote to memory of 1700 1608 tmp.exe tmp.exe PID 1608 wrote to memory of 1700 1608 tmp.exe tmp.exe PID 1608 wrote to memory of 1700 1608 tmp.exe tmp.exe PID 1608 wrote to memory of 1700 1608 tmp.exe tmp.exe PID 1036 wrote to memory of 1840 1036 taskeng.exe tmp.exe PID 1036 wrote to memory of 1840 1036 taskeng.exe tmp.exe PID 1036 wrote to memory of 1840 1036 taskeng.exe tmp.exe PID 1036 wrote to memory of 1840 1036 taskeng.exe tmp.exe PID 1840 wrote to memory of 1376 1840 tmp.exe tmp.exe PID 1840 wrote to memory of 1376 1840 tmp.exe tmp.exe PID 1840 wrote to memory of 1376 1840 tmp.exe tmp.exe PID 1840 wrote to memory of 1376 1840 tmp.exe tmp.exe PID 1840 wrote to memory of 1376 1840 tmp.exe tmp.exe PID 1840 wrote to memory of 1376 1840 tmp.exe tmp.exe PID 1840 wrote to memory of 1376 1840 tmp.exe tmp.exe PID 1840 wrote to memory of 1376 1840 tmp.exe tmp.exe PID 1840 wrote to memory of 1376 1840 tmp.exe tmp.exe PID 1036 wrote to memory of 1524 1036 taskeng.exe tmp.exe PID 1036 wrote to memory of 1524 1036 taskeng.exe tmp.exe PID 1036 wrote to memory of 1524 1036 taskeng.exe tmp.exe PID 1036 wrote to memory of 1524 1036 taskeng.exe tmp.exe PID 1524 wrote to memory of 1964 1524 tmp.exe tmp.exe PID 1524 wrote to memory of 1964 1524 tmp.exe tmp.exe PID 1524 wrote to memory of 1964 1524 tmp.exe tmp.exe PID 1524 wrote to memory of 1964 1524 tmp.exe tmp.exe PID 1524 wrote to memory of 1964 1524 tmp.exe tmp.exe PID 1524 wrote to memory of 1964 1524 tmp.exe tmp.exe PID 1524 wrote to memory of 1964 1524 tmp.exe tmp.exe PID 1524 wrote to memory of 1964 1524 tmp.exe tmp.exe PID 1524 wrote to memory of 1964 1524 tmp.exe tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\tmp.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {BC9B2753-2464-4885-956A-9BECA31CC39D} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exeC:\Users\Admin\AppData\Local\ServiceHub\tmp.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exeC:\Users\Admin\AppData\Local\ServiceHub\tmp.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exeFilesize
5.6MB
MD5c5ffb5f4c680fb5d2058b9ceb91bde35
SHA1cd1e0ca1b84b046321d673b407989ffadfa594a7
SHA2565cfd06074db0ce6e91f2ab7bdd8e927d283d7b828900ad130ed882d2c736903a
SHA512ae52ffacb03ea319015e10a587139b4e3fed11f528027f7dab9323dc820b82e8b68ff8bdd7d657a304ceced529aef021574381ee06c7712daf0692c06d5e7d7d
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exeFilesize
5.6MB
MD5c5ffb5f4c680fb5d2058b9ceb91bde35
SHA1cd1e0ca1b84b046321d673b407989ffadfa594a7
SHA2565cfd06074db0ce6e91f2ab7bdd8e927d283d7b828900ad130ed882d2c736903a
SHA512ae52ffacb03ea319015e10a587139b4e3fed11f528027f7dab9323dc820b82e8b68ff8bdd7d657a304ceced529aef021574381ee06c7712daf0692c06d5e7d7d
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exeFilesize
5.6MB
MD5c5ffb5f4c680fb5d2058b9ceb91bde35
SHA1cd1e0ca1b84b046321d673b407989ffadfa594a7
SHA2565cfd06074db0ce6e91f2ab7bdd8e927d283d7b828900ad130ed882d2c736903a
SHA512ae52ffacb03ea319015e10a587139b4e3fed11f528027f7dab9323dc820b82e8b68ff8bdd7d657a304ceced529aef021574381ee06c7712daf0692c06d5e7d7d
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exeFilesize
5.6MB
MD5c5ffb5f4c680fb5d2058b9ceb91bde35
SHA1cd1e0ca1b84b046321d673b407989ffadfa594a7
SHA2565cfd06074db0ce6e91f2ab7bdd8e927d283d7b828900ad130ed882d2c736903a
SHA512ae52ffacb03ea319015e10a587139b4e3fed11f528027f7dab9323dc820b82e8b68ff8bdd7d657a304ceced529aef021574381ee06c7712daf0692c06d5e7d7d
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exeFilesize
5.6MB
MD5c5ffb5f4c680fb5d2058b9ceb91bde35
SHA1cd1e0ca1b84b046321d673b407989ffadfa594a7
SHA2565cfd06074db0ce6e91f2ab7bdd8e927d283d7b828900ad130ed882d2c736903a
SHA512ae52ffacb03ea319015e10a587139b4e3fed11f528027f7dab9323dc820b82e8b68ff8bdd7d657a304ceced529aef021574381ee06c7712daf0692c06d5e7d7d
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exeFilesize
5.6MB
MD5c5ffb5f4c680fb5d2058b9ceb91bde35
SHA1cd1e0ca1b84b046321d673b407989ffadfa594a7
SHA2565cfd06074db0ce6e91f2ab7bdd8e927d283d7b828900ad130ed882d2c736903a
SHA512ae52ffacb03ea319015e10a587139b4e3fed11f528027f7dab9323dc820b82e8b68ff8bdd7d657a304ceced529aef021574381ee06c7712daf0692c06d5e7d7d
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exeFilesize
5.6MB
MD5c5ffb5f4c680fb5d2058b9ceb91bde35
SHA1cd1e0ca1b84b046321d673b407989ffadfa594a7
SHA2565cfd06074db0ce6e91f2ab7bdd8e927d283d7b828900ad130ed882d2c736903a
SHA512ae52ffacb03ea319015e10a587139b4e3fed11f528027f7dab9323dc820b82e8b68ff8bdd7d657a304ceced529aef021574381ee06c7712daf0692c06d5e7d7d
-
\Users\Admin\AppData\Local\ServiceHub\tmp.exeFilesize
5.6MB
MD5c5ffb5f4c680fb5d2058b9ceb91bde35
SHA1cd1e0ca1b84b046321d673b407989ffadfa594a7
SHA2565cfd06074db0ce6e91f2ab7bdd8e927d283d7b828900ad130ed882d2c736903a
SHA512ae52ffacb03ea319015e10a587139b4e3fed11f528027f7dab9323dc820b82e8b68ff8bdd7d657a304ceced529aef021574381ee06c7712daf0692c06d5e7d7d
-
memory/604-64-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/604-66-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/604-67-0x0000000074F41000-0x0000000074F43000-memory.dmpFilesize
8KB
-
memory/604-56-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/604-60-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/604-59-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/604-57-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/604-61-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/604-62-0x000000000040B3AE-mapping.dmp
-
memory/752-71-0x0000000000000000-mapping.dmp
-
memory/936-70-0x0000000000000000-mapping.dmp
-
memory/956-68-0x0000000000000000-mapping.dmp
-
memory/980-69-0x0000000000000000-mapping.dmp
-
memory/1348-55-0x0000000007290000-0x0000000007420000-memory.dmpFilesize
1.6MB
-
memory/1348-54-0x0000000001240000-0x00000000017E4000-memory.dmpFilesize
5.6MB
-
memory/1376-98-0x000000000040B3AE-mapping.dmp
-
memory/1524-104-0x0000000000000000-mapping.dmp
-
memory/1608-76-0x0000000000970000-0x0000000000F14000-memory.dmpFilesize
5.6MB
-
memory/1608-74-0x0000000000000000-mapping.dmp
-
memory/1700-83-0x000000000040B3AE-mapping.dmp
-
memory/1700-86-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1700-88-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1840-90-0x0000000000000000-mapping.dmp
-
memory/1964-112-0x000000000040B3AE-mapping.dmp