Analysis

  • max time kernel
    137s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2023, 21:06

General

  • Target

    1273da64dc656db522fcaffb819502f2.exe

  • Size

    2.3MB

  • MD5

    1273da64dc656db522fcaffb819502f2

  • SHA1

    16163234aeeddc9cc66abe4a142d83f8710373de

  • SHA256

    ca89ba2aabb1cbc5e063fc8064974dfa98bdbccdd97d47b02f2b1718808e7f87

  • SHA512

    67f0b03c01d36402e931b812a75ebaccf9c86492f1164908df423324bd45a368c6566b24dbeabf6bea8b4aa0c8827f9a7878d3bbee848157d0ece4ab9bf7b63f

  • SSDEEP

    49152:uLF6XruXkTRNbxhv5azk9Yg7HURNz3YC095D0+bs0VQQynYIYG7GFNSsYCWqO:Q8u0TRN0RhxQst7nsFNSsYCWqO

Score
10/10

Malware Config

Extracted

Family

eternity

C2

http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion

Attributes
  • payload_urls

    http://167.88.170.23/swo/sw.exe

    http://167.88.170.23/swo/swo.exe

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1273da64dc656db522fcaffb819502f2.exe
    "C:\Users\Admin\AppData\Local\Temp\1273da64dc656db522fcaffb819502f2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\WinLines.exe
      "C:\Users\Admin\AppData\Local\Temp\WinLines.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:216
    • C:\Users\Admin\AppData\Local\Temp\tmp940E.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp940E.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:440
      • C:\Users\Admin\AppData\Local\Temp\tmp940E.tmp.exe
        "{path}"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "tmp940E.tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\tmp940E.tmp.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1288
          • C:\Windows\SysWOW64\chcp.com
            chcp 65001
            5⤵
              PID:3828
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1
              5⤵
              • Runs ping.exe
              PID:1852
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "tmp940E.tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe" /rl HIGHEST /f
              5⤵
              • Creates scheduled task(s)
              PID:4688
            • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe
              "C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3468
              • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe
                "{path}"
                6⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:3764
    • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe
      C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4384
      • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe
        "{path}"
        2⤵
        • Executes dropped EXE
        PID:336
      • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe
        "{path}"
        2⤵
        • Executes dropped EXE
        PID:3384
    • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe
      C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe
        "{path}"
        2⤵
        • Executes dropped EXE
        PID:2768

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tmp940E.tmp.exe.log

      Filesize

      1KB

      MD5

      bb3d30439ec1e6435c3eac4df8c1d2e3

      SHA1

      c901d5946e53ae0a9e2417c8dfaf5786a0037422

      SHA256

      182adf89e57f80a92db9a5e13105cd59544f37855ca35f98116a0182ddd3b2e6

      SHA512

      d3547aadf665ce2552b3dfa350b80a5e813aa346870fb2b05a3b998096eebf563143bffe964e0f7243761b79420d1adf02f735779902901d1a41a1f35c557572

    • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe

      Filesize

      2.1MB

      MD5

      633b0303b31c70c07ee65e0fcc895259

      SHA1

      c00053332bc05a57604147419660908d8ac0da1d

      SHA256

      11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

      SHA512

      a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

    • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe

      Filesize

      2.1MB

      MD5

      633b0303b31c70c07ee65e0fcc895259

      SHA1

      c00053332bc05a57604147419660908d8ac0da1d

      SHA256

      11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

      SHA512

      a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

    • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe

      Filesize

      2.1MB

      MD5

      633b0303b31c70c07ee65e0fcc895259

      SHA1

      c00053332bc05a57604147419660908d8ac0da1d

      SHA256

      11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

      SHA512

      a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

    • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe

      Filesize

      2.1MB

      MD5

      633b0303b31c70c07ee65e0fcc895259

      SHA1

      c00053332bc05a57604147419660908d8ac0da1d

      SHA256

      11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

      SHA512

      a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

    • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe

      Filesize

      2.1MB

      MD5

      633b0303b31c70c07ee65e0fcc895259

      SHA1

      c00053332bc05a57604147419660908d8ac0da1d

      SHA256

      11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

      SHA512

      a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

    • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe

      Filesize

      2.1MB

      MD5

      633b0303b31c70c07ee65e0fcc895259

      SHA1

      c00053332bc05a57604147419660908d8ac0da1d

      SHA256

      11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

      SHA512

      a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

    • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe

      Filesize

      2.1MB

      MD5

      633b0303b31c70c07ee65e0fcc895259

      SHA1

      c00053332bc05a57604147419660908d8ac0da1d

      SHA256

      11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

      SHA512

      a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

    • C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe

      Filesize

      2.1MB

      MD5

      633b0303b31c70c07ee65e0fcc895259

      SHA1

      c00053332bc05a57604147419660908d8ac0da1d

      SHA256

      11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

      SHA512

      a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

    • C:\Users\Admin\AppData\Local\Temp\WinLines.exe

      Filesize

      212KB

      MD5

      8b2a652e1d79b3e7bab6decdc9a9e6d6

      SHA1

      423dcd79198aec4e24e2e39fc1d6ff7279404576

      SHA256

      56a5028a5adf0e29e14792e46191e084ca63dabfa77923b0d12705eeab349b5d

      SHA512

      7703b99c43f95245fcf696344baf85972b0d494cdf31960829ff89e86f27aa50d12770576e5376b2df280a5a6ba2c854e9fe5366e9feaf468dfdc247678e944c

    • C:\Users\Admin\AppData\Local\Temp\WinLines.exe

      Filesize

      212KB

      MD5

      8b2a652e1d79b3e7bab6decdc9a9e6d6

      SHA1

      423dcd79198aec4e24e2e39fc1d6ff7279404576

      SHA256

      56a5028a5adf0e29e14792e46191e084ca63dabfa77923b0d12705eeab349b5d

      SHA512

      7703b99c43f95245fcf696344baf85972b0d494cdf31960829ff89e86f27aa50d12770576e5376b2df280a5a6ba2c854e9fe5366e9feaf468dfdc247678e944c

    • C:\Users\Admin\AppData\Local\Temp\WinLines.exe

      Filesize

      212KB

      MD5

      8b2a652e1d79b3e7bab6decdc9a9e6d6

      SHA1

      423dcd79198aec4e24e2e39fc1d6ff7279404576

      SHA256

      56a5028a5adf0e29e14792e46191e084ca63dabfa77923b0d12705eeab349b5d

      SHA512

      7703b99c43f95245fcf696344baf85972b0d494cdf31960829ff89e86f27aa50d12770576e5376b2df280a5a6ba2c854e9fe5366e9feaf468dfdc247678e944c

    • C:\Users\Admin\AppData\Local\Temp\tmp940E.tmp.exe

      Filesize

      2.1MB

      MD5

      633b0303b31c70c07ee65e0fcc895259

      SHA1

      c00053332bc05a57604147419660908d8ac0da1d

      SHA256

      11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

      SHA512

      a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

    • C:\Users\Admin\AppData\Local\Temp\tmp940E.tmp.exe

      Filesize

      2.1MB

      MD5

      633b0303b31c70c07ee65e0fcc895259

      SHA1

      c00053332bc05a57604147419660908d8ac0da1d

      SHA256

      11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

      SHA512

      a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

    • C:\Users\Admin\AppData\Local\Temp\tmp940E.tmp.exe

      Filesize

      2.1MB

      MD5

      633b0303b31c70c07ee65e0fcc895259

      SHA1

      c00053332bc05a57604147419660908d8ac0da1d

      SHA256

      11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

      SHA512

      a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

    • C:\Users\Admin\AppData\Local\Temp\tmp940E.tmp.exe

      Filesize

      2.1MB

      MD5

      633b0303b31c70c07ee65e0fcc895259

      SHA1

      c00053332bc05a57604147419660908d8ac0da1d

      SHA256

      11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

      SHA512

      a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

    • memory/440-163-0x0000000005920000-0x000000000592A000-memory.dmp

      Filesize

      40KB

    • memory/440-165-0x0000000005960000-0x0000000005970000-memory.dmp

      Filesize

      64KB

    • memory/440-164-0x0000000005B10000-0x0000000005B66000-memory.dmp

      Filesize

      344KB

    • memory/440-162-0x0000000005960000-0x0000000005970000-memory.dmp

      Filesize

      64KB

    • memory/440-161-0x0000000005A10000-0x0000000005AA2000-memory.dmp

      Filesize

      584KB

    • memory/440-160-0x0000000005FC0000-0x0000000006564000-memory.dmp

      Filesize

      5.6MB

    • memory/440-159-0x0000000005970000-0x0000000005A0C000-memory.dmp

      Filesize

      624KB

    • memory/440-158-0x0000000000E90000-0x00000000010AC000-memory.dmp

      Filesize

      2.1MB

    • memory/2044-189-0x0000000004E30000-0x0000000004E40000-memory.dmp

      Filesize

      64KB

    • memory/2712-166-0x0000000000400000-0x0000000000552000-memory.dmp

      Filesize

      1.3MB

    • memory/2712-170-0x0000000005070000-0x00000000050D6000-memory.dmp

      Filesize

      408KB

    • memory/3468-178-0x0000000005510000-0x0000000005520000-memory.dmp

      Filesize

      64KB

    • memory/3468-176-0x0000000005510000-0x0000000005520000-memory.dmp

      Filesize

      64KB

    • memory/3764-183-0x0000000005250000-0x0000000005260000-memory.dmp

      Filesize

      64KB

    • memory/3764-187-0x0000000005250000-0x0000000005260000-memory.dmp

      Filesize

      64KB

    • memory/4192-133-0x00000000009B0000-0x0000000000C06000-memory.dmp

      Filesize

      2.3MB

    • memory/4192-135-0x0000000005680000-0x0000000005690000-memory.dmp

      Filesize

      64KB

    • memory/4384-180-0x00000000055A0000-0x00000000055B0000-memory.dmp

      Filesize

      64KB

    • memory/4384-179-0x00000000055A0000-0x00000000055B0000-memory.dmp

      Filesize

      64KB