Analysis
-
max time kernel
285s -
max time network
179s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25/12/2022, 22:19
Behavioral task
behavioral1
Sample
9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe
Resource
win7-20221111-en
General
-
Target
9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe
-
Size
39KB
-
MD5
d773482a983fd33cc15127664886a4fa
-
SHA1
2fb93d865510a75e176a568f3ae45ce5f9df4ecc
-
SHA256
9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba
-
SHA512
57d6f8d9d367c448979ff8ee6ba96b32f669fec6b4bd77098afbd47f8364c589e1c9a5f6c19779c73716c2c75c27f545a52cfc11fe3af3854d052cf7152aaab6
-
SSDEEP
768:AfXqEtaK5FSVBaXDBGXWLEvx7nkbAfUA3sX2w4P4i/XMAN:+XqEtaKvwclAzkbSU1X2wkh/X3
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
457KbHnrw5UhiUYyGBvpSpbjL9QfnZDDdgsoPDEyh582AjaDbcg4jg4TJDAiFE7hcSHYFkabYPr2CabdMCBnixCMD5Mgro9
bc1qkzq3sld4p5azj28tq9z9j8p6rch9p3d8n3r7cs
qqa9as4ckr4lrlx67dv7774p48rurdjqcg3cjelvhl
0x97b46BA07f05ce352607280E9ebEBC72617C89b3
DMQ8aTrNGCtsFsGPZcY8mQeZuVm3rDjxR8
TUW4jEtXk6ZLvoFNBTMBY24ihznz3NJ6Ja
LXNpuiu1Q1g6SEkDw8N53itnEY57UVYuUU
rpLGegiSnditNEqF2zJC2XXomosWus8j3o
t1WdJExTzEkDJh4pKsVTDxLsgGGxHLZRq3G
XqPoh67MJLcfsxpTg8cuiT9JhP6kiPSutG
AbKoTUa4FhiduGqJoTYAkpfYN4rYQhwfUf
GCE3GHBNOMNGZZRL3XN6HMNTEMLWA6UBOBIBOYY7AFYQ5IVNBYIVRBPD
bnb1s524r4a2edst2k7634tfek8rrjry5nfq0paf6y
8z54uLQN91kc5NfA1s33oiv5q6sye6NemTNT2zZtvjFt
MYNPHZEKQ7Y4PFCN5SPSPKXXMDW5YZVQ42TFZMFNURPGLOGMX6NAFQJHFE
Signatures
-
Detects Eternity clipper 8 IoCs
resource yara_rule behavioral2/memory/2748-149-0x0000000000800000-0x0000000000810000-memory.dmp eternity_clipper behavioral2/files/0x000b00000001ac3d-228.dat eternity_clipper behavioral2/files/0x000b00000001ac3d-236.dat eternity_clipper behavioral2/files/0x000b00000001ac3d-304.dat eternity_clipper behavioral2/files/0x000b00000001ac3d-342.dat eternity_clipper behavioral2/files/0x000b00000001ac3d-380.dat eternity_clipper behavioral2/files/0x000b00000001ac3d-418.dat eternity_clipper behavioral2/files/0x000b00000001ac3d-456.dat eternity_clipper -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Executes dropped EXE 6 IoCs
pid Process 4272 9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe 5060 9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe 4476 9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe 1548 9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe 2624 9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe 2520 9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1508 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2492 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4272 9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4272 9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2748 wrote to memory of 5092 2748 9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe 66 PID 2748 wrote to memory of 5092 2748 9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe 66 PID 2748 wrote to memory of 5092 2748 9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe 66 PID 5092 wrote to memory of 3584 5092 cmd.exe 68 PID 5092 wrote to memory of 3584 5092 cmd.exe 68 PID 5092 wrote to memory of 3584 5092 cmd.exe 68 PID 5092 wrote to memory of 2492 5092 cmd.exe 69 PID 5092 wrote to memory of 2492 5092 cmd.exe 69 PID 5092 wrote to memory of 2492 5092 cmd.exe 69 PID 5092 wrote to memory of 1508 5092 cmd.exe 70 PID 5092 wrote to memory of 1508 5092 cmd.exe 70 PID 5092 wrote to memory of 1508 5092 cmd.exe 70 PID 5092 wrote to memory of 4272 5092 cmd.exe 71 PID 5092 wrote to memory of 4272 5092 cmd.exe 71 PID 5092 wrote to memory of 4272 5092 cmd.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe"C:\Users\Admin\AppData\Local\Temp\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3584
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2492
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1508
-
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe"C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exeC:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe1⤵
- Executes dropped EXE
PID:5060
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exeC:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe1⤵
- Executes dropped EXE
PID:4476
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exeC:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe1⤵
- Executes dropped EXE
PID:1548
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exeC:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe1⤵
- Executes dropped EXE
PID:2624
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exeC:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe1⤵
- Executes dropped EXE
PID:2520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe.log
Filesize321B
MD5076d7c48064de4effadfe36d1857322d
SHA1273f4d3f67c4ec0a637317ce2a536e52cc1c2090
SHA2567cdcfb48cb249895caa7d3b5ce9ad53c7185d426f0f5669fe79bc5e047ff29ed
SHA512e540c14a5093a1607dd47b0cdf96e21957d1b70aae24dcd99cdb3e3292451222760e8106b1e6e6091928b9998a6d307709e39081565a5e49d85c64e03bc55abf
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe
Filesize39KB
MD5d773482a983fd33cc15127664886a4fa
SHA12fb93d865510a75e176a568f3ae45ce5f9df4ecc
SHA2569789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba
SHA51257d6f8d9d367c448979ff8ee6ba96b32f669fec6b4bd77098afbd47f8364c589e1c9a5f6c19779c73716c2c75c27f545a52cfc11fe3af3854d052cf7152aaab6
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe
Filesize39KB
MD5d773482a983fd33cc15127664886a4fa
SHA12fb93d865510a75e176a568f3ae45ce5f9df4ecc
SHA2569789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba
SHA51257d6f8d9d367c448979ff8ee6ba96b32f669fec6b4bd77098afbd47f8364c589e1c9a5f6c19779c73716c2c75c27f545a52cfc11fe3af3854d052cf7152aaab6
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe
Filesize39KB
MD5d773482a983fd33cc15127664886a4fa
SHA12fb93d865510a75e176a568f3ae45ce5f9df4ecc
SHA2569789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba
SHA51257d6f8d9d367c448979ff8ee6ba96b32f669fec6b4bd77098afbd47f8364c589e1c9a5f6c19779c73716c2c75c27f545a52cfc11fe3af3854d052cf7152aaab6
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe
Filesize39KB
MD5d773482a983fd33cc15127664886a4fa
SHA12fb93d865510a75e176a568f3ae45ce5f9df4ecc
SHA2569789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba
SHA51257d6f8d9d367c448979ff8ee6ba96b32f669fec6b4bd77098afbd47f8364c589e1c9a5f6c19779c73716c2c75c27f545a52cfc11fe3af3854d052cf7152aaab6
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe
Filesize39KB
MD5d773482a983fd33cc15127664886a4fa
SHA12fb93d865510a75e176a568f3ae45ce5f9df4ecc
SHA2569789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba
SHA51257d6f8d9d367c448979ff8ee6ba96b32f669fec6b4bd77098afbd47f8364c589e1c9a5f6c19779c73716c2c75c27f545a52cfc11fe3af3854d052cf7152aaab6
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe
Filesize39KB
MD5d773482a983fd33cc15127664886a4fa
SHA12fb93d865510a75e176a568f3ae45ce5f9df4ecc
SHA2569789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba
SHA51257d6f8d9d367c448979ff8ee6ba96b32f669fec6b4bd77098afbd47f8364c589e1c9a5f6c19779c73716c2c75c27f545a52cfc11fe3af3854d052cf7152aaab6
-
C:\Users\Admin\AppData\Local\ServiceHub\9789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba.exe
Filesize39KB
MD5d773482a983fd33cc15127664886a4fa
SHA12fb93d865510a75e176a568f3ae45ce5f9df4ecc
SHA2569789094abf2701e86cb3032f347317ff4bc459a870456eec1cee893f69f2b9ba
SHA51257d6f8d9d367c448979ff8ee6ba96b32f669fec6b4bd77098afbd47f8364c589e1c9a5f6c19779c73716c2c75c27f545a52cfc11fe3af3854d052cf7152aaab6