Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2023, 01:00

General

  • Target

    55840078f2ca98ff5b225f321eeb7964b0a7c847c503ee9976bebf282eb93405.exe

  • Size

    3.2MB

  • MD5

    098b7eb23782750ddd8135a64f0aedac

  • SHA1

    0ac85b5f3767b0d6b79d311c8e8118c32f5d3230

  • SHA256

    55840078f2ca98ff5b225f321eeb7964b0a7c847c503ee9976bebf282eb93405

  • SHA512

    8d0d7d7e1b879dcf7fb69f01d09da74c7b002bcb3d18021bccec121257cc61e048ea4c286c4a4e6d1d5f289a96fa4abb4e7724564bbb597223c186e4477f8cb5

  • SSDEEP

    98304:puOMX20UBP7WqFZfQGb47IfRNNXQX3lBQ:AOgsScB8kNNXQXjQ

Score
10/10

Malware Config

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55840078f2ca98ff5b225f321eeb7964b0a7c847c503ee9976bebf282eb93405.exe
    "C:\Users\Admin\AppData\Local\Temp\55840078f2ca98ff5b225f321eeb7964b0a7c847c503ee9976bebf282eb93405.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Program Files\Java\jre7\bin\javaw.exe
      "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\tlauncher-resource-1.4.jar"
      2⤵
        PID:528
      • C:\Users\Admin\AppData\Local\Temp\tlauncher-resource-1.4.exe
        "C:\Users\Admin\AppData\Local\Temp\tlauncher-resource-1.4.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:688

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tlauncher-resource-1.4.exe

      Filesize

      76KB

      MD5

      dbb92d6b3c324f8871bc508830b05c14

      SHA1

      4507d24c7d78a24fe5d92f916ed972709529ced0

      SHA256

      376294f1dd51cbb9591672655bb2720aeda8dd8004fcc0cb7c333b54ca5746f8

      SHA512

      d089dc29a1e982b7dd7e50698acdaf138455fb8b3e02b0874bec6734f261bf1a8ea5f10bcc43bb3c557812aeeeeb0410db157bfe341ee67516d6b8c3b758002a

    • C:\Users\Admin\AppData\Local\Temp\tlauncher-resource-1.4.exe

      Filesize

      76KB

      MD5

      dbb92d6b3c324f8871bc508830b05c14

      SHA1

      4507d24c7d78a24fe5d92f916ed972709529ced0

      SHA256

      376294f1dd51cbb9591672655bb2720aeda8dd8004fcc0cb7c333b54ca5746f8

      SHA512

      d089dc29a1e982b7dd7e50698acdaf138455fb8b3e02b0874bec6734f261bf1a8ea5f10bcc43bb3c557812aeeeeb0410db157bfe341ee67516d6b8c3b758002a

    • C:\Users\Admin\AppData\Local\Temp\tlauncher-resource-1.4.jar

      Filesize

      3.2MB

      MD5

      acbc8aa5ba5cdddf5f1e67befe8cc597

      SHA1

      63b4bf89744b532e65c1afa3294743d2b3798f2b

      SHA256

      1f46b3a163012f9729905633b5e5e03ce385066ae43138a564729c942f9ca6b9

      SHA512

      d974a032d9af451c0dd51fbc0d64840f3e03eb502f40e4ab60d6722913b8a48d44a75752fcff60656e4d19089570a894222959745af11bcdf93ea1544192fee3

    • \Users\Admin\AppData\Local\Temp\tlauncher-resource-1.4.exe

      Filesize

      76KB

      MD5

      dbb92d6b3c324f8871bc508830b05c14

      SHA1

      4507d24c7d78a24fe5d92f916ed972709529ced0

      SHA256

      376294f1dd51cbb9591672655bb2720aeda8dd8004fcc0cb7c333b54ca5746f8

      SHA512

      d089dc29a1e982b7dd7e50698acdaf138455fb8b3e02b0874bec6734f261bf1a8ea5f10bcc43bb3c557812aeeeeb0410db157bfe341ee67516d6b8c3b758002a

    • memory/528-68-0x0000000000210000-0x0000000000211000-memory.dmp

      Filesize

      4KB

    • memory/688-75-0x0000000001330000-0x000000000134A000-memory.dmp

      Filesize

      104KB

    • memory/688-76-0x00000000003D0000-0x0000000000410000-memory.dmp

      Filesize

      256KB

    • memory/688-77-0x00000000003D0000-0x0000000000410000-memory.dmp

      Filesize

      256KB

    • memory/1724-54-0x0000000000160000-0x00000000004A6000-memory.dmp

      Filesize

      3.3MB

    • memory/1724-58-0x00000000022C0000-0x0000000002300000-memory.dmp

      Filesize

      256KB