Analysis
-
max time kernel
138s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 07:31
Static task
static1
Behavioral task
behavioral1
Sample
4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe
Resource
win10v2004-20221111-en
General
-
Target
4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe
-
Size
2.2MB
-
MD5
e2ce08aa7b23795d34d4fcc960663f05
-
SHA1
8fcc5510c9e43f5c8a12e8fa188d96f2351e64ca
-
SHA256
4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8
-
SHA512
bf91e0faee1fdfdcebccf2c2868c2d84b74414aa0857c147da44acdd6108ba9fe703045c1acfd52723683a9ea2cb72b38a15b4eb31bea23220897131bf496e5d
-
SSDEEP
49152:B0mY7jteX4+g8Zi5/sTGGnd9cB1IPszdv6sX79RP1YIPTF:WmY7jtu4+g8IOV+vjRZ5PT
Malware Config
Extracted
eternity
http://rlcjba7wduej3xcstcjo577eqgjsjvcjfsw4i23fqvf2y27ylylhmhad.onion
-
payload_urls
http://167.88.170.23/w99.exe
http://ndmit.com/test/501.exe,http://ndmit.com/test/star5.exe,http://ndmit.com/test/0079.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Executes dropped EXE 2 IoCs
Processes:
4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exepid process 1916 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe 316 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1376 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1376 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exedescription pid process target process PID 1784 set thread context of 928 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1136 schtasks.exe 1392 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.execmd.exetaskeng.exedescription pid process target process PID 1784 wrote to memory of 1136 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe schtasks.exe PID 1784 wrote to memory of 1136 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe schtasks.exe PID 1784 wrote to memory of 1136 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe schtasks.exe PID 1784 wrote to memory of 1136 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe schtasks.exe PID 1784 wrote to memory of 928 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1784 wrote to memory of 928 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1784 wrote to memory of 928 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1784 wrote to memory of 928 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1784 wrote to memory of 928 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1784 wrote to memory of 928 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1784 wrote to memory of 928 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1784 wrote to memory of 928 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1784 wrote to memory of 928 1784 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 928 wrote to memory of 1376 928 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe cmd.exe PID 928 wrote to memory of 1376 928 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe cmd.exe PID 928 wrote to memory of 1376 928 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe cmd.exe PID 928 wrote to memory of 1376 928 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe cmd.exe PID 1376 wrote to memory of 768 1376 cmd.exe chcp.com PID 1376 wrote to memory of 768 1376 cmd.exe chcp.com PID 1376 wrote to memory of 768 1376 cmd.exe chcp.com PID 1376 wrote to memory of 768 1376 cmd.exe chcp.com PID 1376 wrote to memory of 1548 1376 cmd.exe PING.EXE PID 1376 wrote to memory of 1548 1376 cmd.exe PING.EXE PID 1376 wrote to memory of 1548 1376 cmd.exe PING.EXE PID 1376 wrote to memory of 1548 1376 cmd.exe PING.EXE PID 1376 wrote to memory of 1392 1376 cmd.exe schtasks.exe PID 1376 wrote to memory of 1392 1376 cmd.exe schtasks.exe PID 1376 wrote to memory of 1392 1376 cmd.exe schtasks.exe PID 1376 wrote to memory of 1392 1376 cmd.exe schtasks.exe PID 1376 wrote to memory of 1916 1376 cmd.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1376 wrote to memory of 1916 1376 cmd.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1376 wrote to memory of 1916 1376 cmd.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1376 wrote to memory of 1916 1376 cmd.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1680 wrote to memory of 316 1680 taskeng.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1680 wrote to memory of 316 1680 taskeng.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1680 wrote to memory of 316 1680 taskeng.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe PID 1680 wrote to memory of 316 1680 taskeng.exe 4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe"C:\Users\Admin\AppData\Local\Temp\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zIjhAXoYufmHwh" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFFF2.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe"3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\ServiceHub\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe"C:\Users\Admin\AppData\Local\ServiceHub\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe"4⤵
- Executes dropped EXE
-
C:\Windows\system32\taskeng.exetaskeng.exe {540D78E1-6271-47B9-A69C-7505FA119097} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ServiceHub\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exeC:\Users\Admin\AppData\Local\ServiceHub\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ServiceHub\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exeFilesize
2.2MB
MD5e2ce08aa7b23795d34d4fcc960663f05
SHA18fcc5510c9e43f5c8a12e8fa188d96f2351e64ca
SHA2564cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8
SHA512bf91e0faee1fdfdcebccf2c2868c2d84b74414aa0857c147da44acdd6108ba9fe703045c1acfd52723683a9ea2cb72b38a15b4eb31bea23220897131bf496e5d
-
C:\Users\Admin\AppData\Local\ServiceHub\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exeFilesize
2.2MB
MD5e2ce08aa7b23795d34d4fcc960663f05
SHA18fcc5510c9e43f5c8a12e8fa188d96f2351e64ca
SHA2564cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8
SHA512bf91e0faee1fdfdcebccf2c2868c2d84b74414aa0857c147da44acdd6108ba9fe703045c1acfd52723683a9ea2cb72b38a15b4eb31bea23220897131bf496e5d
-
C:\Users\Admin\AppData\Local\ServiceHub\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exeFilesize
2.2MB
MD5e2ce08aa7b23795d34d4fcc960663f05
SHA18fcc5510c9e43f5c8a12e8fa188d96f2351e64ca
SHA2564cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8
SHA512bf91e0faee1fdfdcebccf2c2868c2d84b74414aa0857c147da44acdd6108ba9fe703045c1acfd52723683a9ea2cb72b38a15b4eb31bea23220897131bf496e5d
-
C:\Users\Admin\AppData\Local\Temp\tmpFFF2.tmpFilesize
1KB
MD5ae5822df237d56e3af2dc1e9cfb054ac
SHA1f58d6d3cdf91b5c8827e02580400168c245bcb70
SHA2560cc3fee1393d3974cd0d25fe984b23957ce3b8f706794b21497307ee2b1b5a42
SHA512ed39b92e4bd45052689999ff4108d078466bc915a4fa23e5f11ec85027d53523e2361c1c10ea22d22e19db9173fa87b365780fdaee73c11f6215a0ffe0b7b08d
-
\Users\Admin\AppData\Local\ServiceHub\4cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8.exeFilesize
2.2MB
MD5e2ce08aa7b23795d34d4fcc960663f05
SHA18fcc5510c9e43f5c8a12e8fa188d96f2351e64ca
SHA2564cbcdf2f7b00b024c5e2a59bc4f41a4c8631c6459e1afa0a83f2b261fa74def8
SHA512bf91e0faee1fdfdcebccf2c2868c2d84b74414aa0857c147da44acdd6108ba9fe703045c1acfd52723683a9ea2cb72b38a15b4eb31bea23220897131bf496e5d
-
memory/316-83-0x0000000000000000-mapping.dmp
-
memory/768-74-0x0000000000000000-mapping.dmp
-
memory/928-67-0x000000000054C77E-mapping.dmp
-
memory/928-61-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/928-65-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/928-66-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/928-64-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/928-69-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/928-71-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/928-62-0x0000000000400000-0x0000000000552000-memory.dmpFilesize
1.3MB
-
memory/1136-59-0x0000000000000000-mapping.dmp
-
memory/1376-73-0x0000000000000000-mapping.dmp
-
memory/1392-76-0x0000000000000000-mapping.dmp
-
memory/1548-75-0x0000000000000000-mapping.dmp
-
memory/1784-54-0x0000000000CB0000-0x0000000000EE4000-memory.dmpFilesize
2.2MB
-
memory/1784-58-0x0000000009BB0000-0x0000000009D02000-memory.dmpFilesize
1.3MB
-
memory/1784-57-0x0000000008A10000-0x0000000008BB6000-memory.dmpFilesize
1.6MB
-
memory/1784-56-0x0000000000360000-0x0000000000380000-memory.dmpFilesize
128KB
-
memory/1784-55-0x00000000762F1000-0x00000000762F3000-memory.dmpFilesize
8KB
-
memory/1916-79-0x0000000000000000-mapping.dmp
-
memory/1916-81-0x00000000012F0000-0x0000000001524000-memory.dmpFilesize
2.2MB