Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2023, 01:06

General

  • Target

    6f58b413b2d7d36f56b46f4fa119806b9f3f335c90bdb5fb2a7313bb15c61748.exe

  • Size

    328KB

  • MD5

    0b2226a16d3c7e938cbe1e1c3133fddc

  • SHA1

    a0073232ca2d4495735ef74d899701ba8f7d139b

  • SHA256

    6f58b413b2d7d36f56b46f4fa119806b9f3f335c90bdb5fb2a7313bb15c61748

  • SHA512

    47f30dc7dee949fb63f3e6b378fd27d7eaf64e3702a310d5d04295e653447f56c4ace70b6dca4d275ea7cb1953aea6085956092ac5676bf12ac5e45386a6f1ef

  • SSDEEP

    6144:xcOCqSMGopjWOcF6s6vgWEUMmyUKD5uYiTwQwcZyY2rw:xcO+SjoFmgWVyUKRgy9rw

Score
10/10

Malware Config

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f58b413b2d7d36f56b46f4fa119806b9f3f335c90bdb5fb2a7313bb15c61748.exe
    "C:\Users\Admin\AppData\Local\Temp\6f58b413b2d7d36f56b46f4fa119806b9f3f335c90bdb5fb2a7313bb15c61748.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Users\Admin\AppData\Local\Temp\Microsoft.AAD.BrokerPlugin.exe
      "C:\Users\Admin\AppData\Local\Temp\Microsoft.AAD.BrokerPlugin.exe"
      2⤵
      • Executes dropped EXE
      PID:4128
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 4128 -s 452
        3⤵
        • Program crash
        PID:4732
    • C:\Users\Admin\AppData\Local\Temp\tmp1351.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp1351.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3356
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 484 -p 4128 -ip 4128
    1⤵
      PID:3344

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Microsoft.AAD.BrokerPlugin.exe

      Filesize

      232KB

      MD5

      c0f5ba80cf39ba6cd88707fbb81d7153

      SHA1

      4b3bd8624477dab4836806d21de5982421654bec

      SHA256

      f3bc209067ba31bac2084524af85e575439c265cb7a42ebc8ef28ccecb7ec85d

      SHA512

      e3c2cb1c031760d36ea491875e010fbd231f73c273214aa1b27ced0bc4a574df2517ce3fe178acbaca0458de73ba0b371e2174f6a1a854432d9ed79c89159102

    • C:\Users\Admin\AppData\Local\Temp\Microsoft.AAD.BrokerPlugin.exe

      Filesize

      232KB

      MD5

      c0f5ba80cf39ba6cd88707fbb81d7153

      SHA1

      4b3bd8624477dab4836806d21de5982421654bec

      SHA256

      f3bc209067ba31bac2084524af85e575439c265cb7a42ebc8ef28ccecb7ec85d

      SHA512

      e3c2cb1c031760d36ea491875e010fbd231f73c273214aa1b27ced0bc4a574df2517ce3fe178acbaca0458de73ba0b371e2174f6a1a854432d9ed79c89159102

    • C:\Users\Admin\AppData\Local\Temp\tmp1351.tmp.exe

      Filesize

      76KB

      MD5

      dbb92d6b3c324f8871bc508830b05c14

      SHA1

      4507d24c7d78a24fe5d92f916ed972709529ced0

      SHA256

      376294f1dd51cbb9591672655bb2720aeda8dd8004fcc0cb7c333b54ca5746f8

      SHA512

      d089dc29a1e982b7dd7e50698acdaf138455fb8b3e02b0874bec6734f261bf1a8ea5f10bcc43bb3c557812aeeeeb0410db157bfe341ee67516d6b8c3b758002a

    • C:\Users\Admin\AppData\Local\Temp\tmp1351.tmp.exe

      Filesize

      76KB

      MD5

      dbb92d6b3c324f8871bc508830b05c14

      SHA1

      4507d24c7d78a24fe5d92f916ed972709529ced0

      SHA256

      376294f1dd51cbb9591672655bb2720aeda8dd8004fcc0cb7c333b54ca5746f8

      SHA512

      d089dc29a1e982b7dd7e50698acdaf138455fb8b3e02b0874bec6734f261bf1a8ea5f10bcc43bb3c557812aeeeeb0410db157bfe341ee67516d6b8c3b758002a

    • C:\Users\Admin\AppData\Local\Temp\tmp1351.tmp.exe

      Filesize

      76KB

      MD5

      dbb92d6b3c324f8871bc508830b05c14

      SHA1

      4507d24c7d78a24fe5d92f916ed972709529ced0

      SHA256

      376294f1dd51cbb9591672655bb2720aeda8dd8004fcc0cb7c333b54ca5746f8

      SHA512

      d089dc29a1e982b7dd7e50698acdaf138455fb8b3e02b0874bec6734f261bf1a8ea5f10bcc43bb3c557812aeeeeb0410db157bfe341ee67516d6b8c3b758002a

    • memory/2800-133-0x0000000000740000-0x0000000000798000-memory.dmp

      Filesize

      352KB

    • memory/2800-135-0x0000000002B80000-0x0000000002B90000-memory.dmp

      Filesize

      64KB

    • memory/3356-159-0x0000000000450000-0x000000000046A000-memory.dmp

      Filesize

      104KB

    • memory/3356-160-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/3356-161-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB