Analysis
-
max time kernel
143s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
11/02/2023, 08:54
Behavioral task
behavioral1
Sample
5be16092369c11fc13c6bf74d8433513.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5be16092369c11fc13c6bf74d8433513.exe
Resource
win10v2004-20221111-en
General
-
Target
5be16092369c11fc13c6bf74d8433513.exe
-
Size
1.3MB
-
MD5
5be16092369c11fc13c6bf74d8433513
-
SHA1
030010418b8bcacead3e80cb419628d905f90712
-
SHA256
e4aa364614621c16aa32375dba2ef49f4aadc0c4d460d25d9ef0b644398e5dfa
-
SHA512
3c346e8d8f48d500d28710f24de40803040bf5075320fb1168f9ed06435ef1463d958e7dbe0f221fdf113799a2d03d4a3b8bd46ff0ef6d669f6e4589c8734e58
-
SSDEEP
24576:x+7CkH+O5MMsj/8oJ0HOgwzMIdEyaXC772Q9NXw2/wPOjdGxYM:x+zHZ5MMpoJOp+MIVai7Tq24GjdGS
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
http://167.88.170.23/swo/sw.exe
http://167.88.170.23/swo/swo.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Deletes itself 1 IoCs
pid Process 1468 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1820 5be16092369c11fc13c6bf74d8433513.exe 772 5be16092369c11fc13c6bf74d8433513.exe 692 5be16092369c11fc13c6bf74d8433513.exe -
Loads dropped DLL 1 IoCs
pid Process 1468 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1508 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 564 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1820 5be16092369c11fc13c6bf74d8433513.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1468 1964 5be16092369c11fc13c6bf74d8433513.exe 28 PID 1964 wrote to memory of 1468 1964 5be16092369c11fc13c6bf74d8433513.exe 28 PID 1964 wrote to memory of 1468 1964 5be16092369c11fc13c6bf74d8433513.exe 28 PID 1964 wrote to memory of 1468 1964 5be16092369c11fc13c6bf74d8433513.exe 28 PID 1468 wrote to memory of 556 1468 cmd.exe 30 PID 1468 wrote to memory of 556 1468 cmd.exe 30 PID 1468 wrote to memory of 556 1468 cmd.exe 30 PID 1468 wrote to memory of 556 1468 cmd.exe 30 PID 1468 wrote to memory of 564 1468 cmd.exe 31 PID 1468 wrote to memory of 564 1468 cmd.exe 31 PID 1468 wrote to memory of 564 1468 cmd.exe 31 PID 1468 wrote to memory of 564 1468 cmd.exe 31 PID 1468 wrote to memory of 1508 1468 cmd.exe 32 PID 1468 wrote to memory of 1508 1468 cmd.exe 32 PID 1468 wrote to memory of 1508 1468 cmd.exe 32 PID 1468 wrote to memory of 1508 1468 cmd.exe 32 PID 1468 wrote to memory of 1820 1468 cmd.exe 33 PID 1468 wrote to memory of 1820 1468 cmd.exe 33 PID 1468 wrote to memory of 1820 1468 cmd.exe 33 PID 1468 wrote to memory of 1820 1468 cmd.exe 33 PID 1544 wrote to memory of 772 1544 taskeng.exe 35 PID 1544 wrote to memory of 772 1544 taskeng.exe 35 PID 1544 wrote to memory of 772 1544 taskeng.exe 35 PID 1544 wrote to memory of 772 1544 taskeng.exe 35 PID 1544 wrote to memory of 692 1544 taskeng.exe 36 PID 1544 wrote to memory of 692 1544 taskeng.exe 36 PID 1544 wrote to memory of 692 1544 taskeng.exe 36 PID 1544 wrote to memory of 692 1544 taskeng.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\5be16092369c11fc13c6bf74d8433513.exe"C:\Users\Admin\AppData\Local\Temp\5be16092369c11fc13c6bf74d8433513.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "5be16092369c11fc13c6bf74d8433513" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\5be16092369c11fc13c6bf74d8433513.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\5be16092369c11fc13c6bf74d8433513.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\5be16092369c11fc13c6bf74d8433513.exe"2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:556
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:564
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "5be16092369c11fc13c6bf74d8433513" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\5be16092369c11fc13c6bf74d8433513.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1508
-
-
C:\Users\Admin\AppData\Local\ServiceHub\5be16092369c11fc13c6bf74d8433513.exe"C:\Users\Admin\AppData\Local\ServiceHub\5be16092369c11fc13c6bf74d8433513.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1A581CD7-DAB8-4064-A039-5DF90FA8D496} S-1-5-21-3385717845-2518323428-350143044-1000:SABDUHNY\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\ServiceHub\5be16092369c11fc13c6bf74d8433513.exeC:\Users\Admin\AppData\Local\ServiceHub\5be16092369c11fc13c6bf74d8433513.exe2⤵
- Executes dropped EXE
PID:772
-
-
C:\Users\Admin\AppData\Local\ServiceHub\5be16092369c11fc13c6bf74d8433513.exeC:\Users\Admin\AppData\Local\ServiceHub\5be16092369c11fc13c6bf74d8433513.exe2⤵
- Executes dropped EXE
PID:692
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD55be16092369c11fc13c6bf74d8433513
SHA1030010418b8bcacead3e80cb419628d905f90712
SHA256e4aa364614621c16aa32375dba2ef49f4aadc0c4d460d25d9ef0b644398e5dfa
SHA5123c346e8d8f48d500d28710f24de40803040bf5075320fb1168f9ed06435ef1463d958e7dbe0f221fdf113799a2d03d4a3b8bd46ff0ef6d669f6e4589c8734e58
-
Filesize
1.3MB
MD55be16092369c11fc13c6bf74d8433513
SHA1030010418b8bcacead3e80cb419628d905f90712
SHA256e4aa364614621c16aa32375dba2ef49f4aadc0c4d460d25d9ef0b644398e5dfa
SHA5123c346e8d8f48d500d28710f24de40803040bf5075320fb1168f9ed06435ef1463d958e7dbe0f221fdf113799a2d03d4a3b8bd46ff0ef6d669f6e4589c8734e58
-
Filesize
1.3MB
MD55be16092369c11fc13c6bf74d8433513
SHA1030010418b8bcacead3e80cb419628d905f90712
SHA256e4aa364614621c16aa32375dba2ef49f4aadc0c4d460d25d9ef0b644398e5dfa
SHA5123c346e8d8f48d500d28710f24de40803040bf5075320fb1168f9ed06435ef1463d958e7dbe0f221fdf113799a2d03d4a3b8bd46ff0ef6d669f6e4589c8734e58
-
Filesize
1.3MB
MD55be16092369c11fc13c6bf74d8433513
SHA1030010418b8bcacead3e80cb419628d905f90712
SHA256e4aa364614621c16aa32375dba2ef49f4aadc0c4d460d25d9ef0b644398e5dfa
SHA5123c346e8d8f48d500d28710f24de40803040bf5075320fb1168f9ed06435ef1463d958e7dbe0f221fdf113799a2d03d4a3b8bd46ff0ef6d669f6e4589c8734e58
-
Filesize
1.3MB
MD55be16092369c11fc13c6bf74d8433513
SHA1030010418b8bcacead3e80cb419628d905f90712
SHA256e4aa364614621c16aa32375dba2ef49f4aadc0c4d460d25d9ef0b644398e5dfa
SHA5123c346e8d8f48d500d28710f24de40803040bf5075320fb1168f9ed06435ef1463d958e7dbe0f221fdf113799a2d03d4a3b8bd46ff0ef6d669f6e4589c8734e58