Analysis
-
max time kernel
150s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/01/2023, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp.exe
-
Size
347KB
-
MD5
dafc8e7ccd381af36f19267a2a9b3f9b
-
SHA1
742c9021f4f0fb264c32a59a66e3ac514b8e166b
-
SHA256
3cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
-
SHA512
70779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
SSDEEP
6144:58CS6KWJ0XJWcPZ1PiqbeiS8XDMs9HHCUA:KC9IgWrPiN0YEHHFA
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Executes dropped EXE 4 IoCs
pid Process 1688 tmp.exe 1352 tmp.exe 1648 tmp.exe 1388 tmp.exe -
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\OpenRead.raw => C:\Users\Admin\Pictures\OpenRead.raw.ecrp tmp.exe File renamed C:\Users\Admin\Pictures\ResumeUninstall.png => C:\Users\Admin\Pictures\ResumeUninstall.png.ecrp tmp.exe File renamed C:\Users\Admin\Pictures\UndoProtect.raw => C:\Users\Admin\Pictures\UndoProtect.raw.ecrp tmp.exe File opened for modification C:\Users\Admin\Pictures\NewWrite.tiff tmp.exe File renamed C:\Users\Admin\Pictures\NewWrite.tiff => C:\Users\Admin\Pictures\NewWrite.tiff.ecrp tmp.exe -
Loads dropped DLL 3 IoCs
pid Process 1072 cmd.exe 1688 tmp.exe 1648 tmp.exe -
Drops desktop.ini file(s) 6 IoCs
description ioc Process File created C:\Users\Admin\Pictures\desktop.ini tmp.exe File created C:\Users\Admin\Desktop\desktop.ini tmp.exe File created C:\Users\Admin\Downloads\desktop.ini tmp.exe File created C:\Users\Admin\Pictures\desktop.ini tmp.exe File created C:\Users\Admin\Desktop\desktop.ini tmp.exe File created C:\Users\Admin\Downloads\desktop.ini tmp.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 368 set thread context of 1452 368 tmp.exe 26 PID 1688 set thread context of 1352 1688 tmp.exe 33 PID 1648 set thread context of 1388 1648 tmp.exe 45 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1796 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1472 vssadmin.exe 1976 vssadmin.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.ecrp\shell\open\command tmp.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.ecrp\shell tmp.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.ecrp\shell\open tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.ecrp\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\ServiceHub\\tmp.exe %1" tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.ecrp\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\ServiceHub\\tmp.exe %1" tmp.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.ecrp tmp.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1708 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe 1352 tmp.exe 1388 tmp.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1352 tmp.exe Token: SeBackupPrivilege 1928 vssvc.exe Token: SeRestorePrivilege 1928 vssvc.exe Token: SeAuditPrivilege 1928 vssvc.exe Token: SeDebugPrivilege 1388 tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 368 wrote to memory of 1452 368 tmp.exe 26 PID 368 wrote to memory of 1452 368 tmp.exe 26 PID 368 wrote to memory of 1452 368 tmp.exe 26 PID 368 wrote to memory of 1452 368 tmp.exe 26 PID 368 wrote to memory of 1452 368 tmp.exe 26 PID 368 wrote to memory of 1452 368 tmp.exe 26 PID 368 wrote to memory of 1452 368 tmp.exe 26 PID 368 wrote to memory of 1452 368 tmp.exe 26 PID 368 wrote to memory of 1452 368 tmp.exe 26 PID 368 wrote to memory of 1452 368 tmp.exe 26 PID 368 wrote to memory of 1452 368 tmp.exe 26 PID 368 wrote to memory of 1452 368 tmp.exe 26 PID 1452 wrote to memory of 1072 1452 tmp.exe 27 PID 1452 wrote to memory of 1072 1452 tmp.exe 27 PID 1452 wrote to memory of 1072 1452 tmp.exe 27 PID 1452 wrote to memory of 1072 1452 tmp.exe 27 PID 1072 wrote to memory of 1096 1072 cmd.exe 29 PID 1072 wrote to memory of 1096 1072 cmd.exe 29 PID 1072 wrote to memory of 1096 1072 cmd.exe 29 PID 1072 wrote to memory of 1096 1072 cmd.exe 29 PID 1072 wrote to memory of 1708 1072 cmd.exe 30 PID 1072 wrote to memory of 1708 1072 cmd.exe 30 PID 1072 wrote to memory of 1708 1072 cmd.exe 30 PID 1072 wrote to memory of 1708 1072 cmd.exe 30 PID 1072 wrote to memory of 1796 1072 cmd.exe 31 PID 1072 wrote to memory of 1796 1072 cmd.exe 31 PID 1072 wrote to memory of 1796 1072 cmd.exe 31 PID 1072 wrote to memory of 1796 1072 cmd.exe 31 PID 1072 wrote to memory of 1688 1072 cmd.exe 32 PID 1072 wrote to memory of 1688 1072 cmd.exe 32 PID 1072 wrote to memory of 1688 1072 cmd.exe 32 PID 1072 wrote to memory of 1688 1072 cmd.exe 32 PID 1072 wrote to memory of 1688 1072 cmd.exe 32 PID 1072 wrote to memory of 1688 1072 cmd.exe 32 PID 1072 wrote to memory of 1688 1072 cmd.exe 32 PID 1688 wrote to memory of 1352 1688 tmp.exe 33 PID 1688 wrote to memory of 1352 1688 tmp.exe 33 PID 1688 wrote to memory of 1352 1688 tmp.exe 33 PID 1688 wrote to memory of 1352 1688 tmp.exe 33 PID 1688 wrote to memory of 1352 1688 tmp.exe 33 PID 1688 wrote to memory of 1352 1688 tmp.exe 33 PID 1688 wrote to memory of 1352 1688 tmp.exe 33 PID 1688 wrote to memory of 1352 1688 tmp.exe 33 PID 1688 wrote to memory of 1352 1688 tmp.exe 33 PID 1688 wrote to memory of 1352 1688 tmp.exe 33 PID 1688 wrote to memory of 1352 1688 tmp.exe 33 PID 1688 wrote to memory of 1352 1688 tmp.exe 33 PID 1352 wrote to memory of 1964 1352 tmp.exe 38 PID 1352 wrote to memory of 1964 1352 tmp.exe 38 PID 1352 wrote to memory of 1964 1352 tmp.exe 38 PID 1352 wrote to memory of 1964 1352 tmp.exe 38 PID 1964 wrote to memory of 1708 1964 cmd.exe 40 PID 1964 wrote to memory of 1708 1964 cmd.exe 40 PID 1964 wrote to memory of 1708 1964 cmd.exe 40 PID 1964 wrote to memory of 1708 1964 cmd.exe 40 PID 1964 wrote to memory of 1472 1964 cmd.exe 41 PID 1964 wrote to memory of 1472 1964 cmd.exe 41 PID 1964 wrote to memory of 1472 1964 cmd.exe 41 PID 1964 wrote to memory of 1472 1964 cmd.exe 41 PID 976 wrote to memory of 1648 976 taskeng.exe 44 PID 976 wrote to memory of 1648 976 taskeng.exe 44 PID 976 wrote to memory of 1648 976 taskeng.exe 44 PID 976 wrote to memory of 1648 976 taskeng.exe 44 PID 976 wrote to memory of 1648 976 taskeng.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\tmp.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1096
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:1708
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1796
-
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"5⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && vssadmin delete shadows /all /quiet6⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:1708
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet7⤵
- Interacts with shadow copies
PID:1472
-
-
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
C:\Windows\system32\taskeng.exetaskeng.exe {5AE1CE2E-428E-42B8-8467-E89FDDF6DD9C} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exeC:\Users\Admin\AppData\Local\ServiceHub\tmp.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1648 -
C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"C:\Users\Admin\AppData\Local\ServiceHub\tmp.exe"3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && vssadmin delete shadows /all /quiet4⤵PID:1912
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:1988
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:1976
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
Filesize
347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
Filesize
347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
Filesize
347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
Filesize
347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
Filesize
347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
Filesize
347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e
-
Filesize
347KB
MD5dafc8e7ccd381af36f19267a2a9b3f9b
SHA1742c9021f4f0fb264c32a59a66e3ac514b8e166b
SHA2563cded3354fbcfaad7112c599b3622680a632e601602ea4f5faa07a6bcc8cbeaf
SHA51270779917d042e4dc65dbac4fda2f521721f9deb42e67e4cfe3eb3a82ff508da3303b96e71bff37b2e95f51d8be7fc6e8987bb0244bd6d2be857c0e0bd44bfa4e