Analysis
-
max time kernel
213s -
max time network
242s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 03:40
Static task
static1
Behavioral task
behavioral1
Sample
ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe
Resource
win10v2004-20221111-en
General
-
Target
ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe
-
Size
1.7MB
-
MD5
ce3c2e93978895a4195d6c094f40da7b
-
SHA1
0efb66a4f8abd84654e1bace4644f72af2e06d65
-
SHA256
ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288
-
SHA512
32056d7f7b8230e2e7c55e89a5c852ddb96b853bb9d180661dcba99f9f53e23e9fb1a7909e07f247fe9116b3ab9f84b5b0f5cb0626236bc51ced9c49923d731e
-
SSDEEP
24576:YIK4j/Sb6n6cFx0PNiAoGUMkGKwa92XbbNHJmNVhpvZlWW2cdXp14i8W2heqO:rI66TU0C2XvN4NVTqW2y+
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
http://167.88.170.23/w993.exe
http://167.88.170.23/s101.exe,http://167.88.170.23/101.exe,http://167.88.170.23/R101.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Executes dropped EXE 4 IoCs
Processes:
ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.execa1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.execa1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.execa1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exepid process 1776 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe 800 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe 4064 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe 3544 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.execa1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.execa1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exedescription pid process target process PID 3772 set thread context of 4316 3772 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 1776 set thread context of 800 1776 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 4064 set thread context of 3544 4064 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exedescription pid process Token: SeDebugPrivilege 800 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.execa1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.execmd.execa1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.execa1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exedescription pid process target process PID 3772 wrote to memory of 4316 3772 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 3772 wrote to memory of 4316 3772 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 3772 wrote to memory of 4316 3772 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 3772 wrote to memory of 4316 3772 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 3772 wrote to memory of 4316 3772 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 3772 wrote to memory of 4316 3772 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 3772 wrote to memory of 4316 3772 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 3772 wrote to memory of 4316 3772 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 4316 wrote to memory of 2768 4316 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe cmd.exe PID 4316 wrote to memory of 2768 4316 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe cmd.exe PID 4316 wrote to memory of 2768 4316 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe cmd.exe PID 2768 wrote to memory of 3156 2768 cmd.exe chcp.com PID 2768 wrote to memory of 3156 2768 cmd.exe chcp.com PID 2768 wrote to memory of 3156 2768 cmd.exe chcp.com PID 2768 wrote to memory of 3456 2768 cmd.exe PING.EXE PID 2768 wrote to memory of 3456 2768 cmd.exe PING.EXE PID 2768 wrote to memory of 3456 2768 cmd.exe PING.EXE PID 2768 wrote to memory of 4980 2768 cmd.exe schtasks.exe PID 2768 wrote to memory of 4980 2768 cmd.exe schtasks.exe PID 2768 wrote to memory of 4980 2768 cmd.exe schtasks.exe PID 2768 wrote to memory of 1776 2768 cmd.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 2768 wrote to memory of 1776 2768 cmd.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 2768 wrote to memory of 1776 2768 cmd.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 1776 wrote to memory of 800 1776 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 1776 wrote to memory of 800 1776 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 1776 wrote to memory of 800 1776 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 1776 wrote to memory of 800 1776 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 1776 wrote to memory of 800 1776 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 1776 wrote to memory of 800 1776 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 1776 wrote to memory of 800 1776 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 1776 wrote to memory of 800 1776 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 4064 wrote to memory of 3544 4064 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 4064 wrote to memory of 3544 4064 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 4064 wrote to memory of 3544 4064 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 4064 wrote to memory of 3544 4064 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 4064 wrote to memory of 3544 4064 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 4064 wrote to memory of 3544 4064 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 4064 wrote to memory of 3544 4064 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe PID 4064 wrote to memory of 3544 4064 ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe"C:\Users\Admin\AppData\Local\Temp\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe"C:\Users\Admin\AppData\Local\Temp\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe"C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe"C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exeC:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe"C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exe.logFilesize
805B
MD54b74e933d78bd5e8fb1cc4653fb2133c
SHA1f6e931eec700fa325bd40c3adc6f1c0eba806066
SHA256fd99bed17853f5ad196ca6d4a62f5e2405fbdf5b98cbf45af8b7cef83e4bcec3
SHA512b56ff89eff1a757a87dcb875206ae92d39ffdb5adf638600c21bc7c76ff4cc25502ae1060716488c7ed1641f8cdfad2a320443b7b4d9f09808eb86eb87f351ec
-
C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exeFilesize
1.7MB
MD5ce3c2e93978895a4195d6c094f40da7b
SHA10efb66a4f8abd84654e1bace4644f72af2e06d65
SHA256ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288
SHA51232056d7f7b8230e2e7c55e89a5c852ddb96b853bb9d180661dcba99f9f53e23e9fb1a7909e07f247fe9116b3ab9f84b5b0f5cb0626236bc51ced9c49923d731e
-
C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exeFilesize
1.7MB
MD5ce3c2e93978895a4195d6c094f40da7b
SHA10efb66a4f8abd84654e1bace4644f72af2e06d65
SHA256ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288
SHA51232056d7f7b8230e2e7c55e89a5c852ddb96b853bb9d180661dcba99f9f53e23e9fb1a7909e07f247fe9116b3ab9f84b5b0f5cb0626236bc51ced9c49923d731e
-
C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exeFilesize
1.7MB
MD5ce3c2e93978895a4195d6c094f40da7b
SHA10efb66a4f8abd84654e1bace4644f72af2e06d65
SHA256ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288
SHA51232056d7f7b8230e2e7c55e89a5c852ddb96b853bb9d180661dcba99f9f53e23e9fb1a7909e07f247fe9116b3ab9f84b5b0f5cb0626236bc51ced9c49923d731e
-
C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exeFilesize
1.7MB
MD5ce3c2e93978895a4195d6c094f40da7b
SHA10efb66a4f8abd84654e1bace4644f72af2e06d65
SHA256ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288
SHA51232056d7f7b8230e2e7c55e89a5c852ddb96b853bb9d180661dcba99f9f53e23e9fb1a7909e07f247fe9116b3ab9f84b5b0f5cb0626236bc51ced9c49923d731e
-
C:\Users\Admin\AppData\Local\ServiceHub\ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288.exeFilesize
1.7MB
MD5ce3c2e93978895a4195d6c094f40da7b
SHA10efb66a4f8abd84654e1bace4644f72af2e06d65
SHA256ca1a716191a8f670286367f8344bee6d9506720eb4b6c7485bf1477c93536288
SHA51232056d7f7b8230e2e7c55e89a5c852ddb96b853bb9d180661dcba99f9f53e23e9fb1a7909e07f247fe9116b3ab9f84b5b0f5cb0626236bc51ced9c49923d731e
-
memory/800-146-0x0000000000000000-mapping.dmp
-
memory/1776-143-0x0000000000000000-mapping.dmp
-
memory/2768-139-0x0000000000000000-mapping.dmp
-
memory/3156-140-0x0000000000000000-mapping.dmp
-
memory/3456-141-0x0000000000000000-mapping.dmp
-
memory/3544-150-0x0000000000000000-mapping.dmp
-
memory/3772-132-0x00000000002A0000-0x0000000000462000-memory.dmpFilesize
1.8MB
-
memory/3772-133-0x0000000005300000-0x00000000058A4000-memory.dmpFilesize
5.6MB
-
memory/3772-134-0x00000000050E0000-0x0000000005172000-memory.dmpFilesize
584KB
-
memory/4316-135-0x0000000000000000-mapping.dmp
-
memory/4316-138-0x0000000000610000-0x0000000000762000-memory.dmpFilesize
1.3MB
-
memory/4980-142-0x0000000000000000-mapping.dmp