Analysis
-
max time kernel
137s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2023, 21:06
Behavioral task
behavioral1
Sample
1273da64dc656db522fcaffb819502f2.exe
Resource
win7-20230220-en
General
-
Target
1273da64dc656db522fcaffb819502f2.exe
-
Size
2.3MB
-
MD5
1273da64dc656db522fcaffb819502f2
-
SHA1
16163234aeeddc9cc66abe4a142d83f8710373de
-
SHA256
ca89ba2aabb1cbc5e063fc8064974dfa98bdbccdd97d47b02f2b1718808e7f87
-
SHA512
67f0b03c01d36402e931b812a75ebaccf9c86492f1164908df423324bd45a368c6566b24dbeabf6bea8b4aa0c8827f9a7878d3bbee848157d0ece4ab9bf7b63f
-
SSDEEP
49152:uLF6XruXkTRNbxhv5azk9Yg7HURNz3YC095D0+bs0VQQynYIYG7GFNSsYCWqO:Q8u0TRN0RhxQst7nsFNSsYCWqO
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
http://167.88.170.23/swo/sw.exe
http://167.88.170.23/swo/swo.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 1273da64dc656db522fcaffb819502f2.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation tmp940E.tmp.exe -
Executes dropped EXE 10 IoCs
pid Process 216 WinLines.exe 440 tmp940E.tmp.exe 2712 tmp940E.tmp.exe 3468 tmp940E.tmp.exe 4384 tmp940E.tmp.exe 3764 tmp940E.tmp.exe 336 tmp940E.tmp.exe 3384 tmp940E.tmp.exe 2044 tmp940E.tmp.exe 2768 tmp940E.tmp.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 440 set thread context of 2712 440 tmp940E.tmp.exe 100 PID 3468 set thread context of 3764 3468 tmp940E.tmp.exe 109 PID 4384 set thread context of 3384 4384 tmp940E.tmp.exe 111 PID 2044 set thread context of 2768 2044 tmp940E.tmp.exe 114 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4688 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1852 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4384 tmp940E.tmp.exe 4384 tmp940E.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3764 tmp940E.tmp.exe Token: SeDebugPrivilege 4384 tmp940E.tmp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 216 WinLines.exe 216 WinLines.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 4192 wrote to memory of 216 4192 1273da64dc656db522fcaffb819502f2.exe 86 PID 4192 wrote to memory of 216 4192 1273da64dc656db522fcaffb819502f2.exe 86 PID 4192 wrote to memory of 216 4192 1273da64dc656db522fcaffb819502f2.exe 86 PID 4192 wrote to memory of 440 4192 1273da64dc656db522fcaffb819502f2.exe 87 PID 4192 wrote to memory of 440 4192 1273da64dc656db522fcaffb819502f2.exe 87 PID 4192 wrote to memory of 440 4192 1273da64dc656db522fcaffb819502f2.exe 87 PID 440 wrote to memory of 2712 440 tmp940E.tmp.exe 100 PID 440 wrote to memory of 2712 440 tmp940E.tmp.exe 100 PID 440 wrote to memory of 2712 440 tmp940E.tmp.exe 100 PID 440 wrote to memory of 2712 440 tmp940E.tmp.exe 100 PID 440 wrote to memory of 2712 440 tmp940E.tmp.exe 100 PID 440 wrote to memory of 2712 440 tmp940E.tmp.exe 100 PID 440 wrote to memory of 2712 440 tmp940E.tmp.exe 100 PID 440 wrote to memory of 2712 440 tmp940E.tmp.exe 100 PID 2712 wrote to memory of 1288 2712 tmp940E.tmp.exe 101 PID 2712 wrote to memory of 1288 2712 tmp940E.tmp.exe 101 PID 2712 wrote to memory of 1288 2712 tmp940E.tmp.exe 101 PID 1288 wrote to memory of 3828 1288 cmd.exe 103 PID 1288 wrote to memory of 3828 1288 cmd.exe 103 PID 1288 wrote to memory of 3828 1288 cmd.exe 103 PID 1288 wrote to memory of 1852 1288 cmd.exe 104 PID 1288 wrote to memory of 1852 1288 cmd.exe 104 PID 1288 wrote to memory of 1852 1288 cmd.exe 104 PID 1288 wrote to memory of 4688 1288 cmd.exe 106 PID 1288 wrote to memory of 4688 1288 cmd.exe 106 PID 1288 wrote to memory of 4688 1288 cmd.exe 106 PID 1288 wrote to memory of 3468 1288 cmd.exe 107 PID 1288 wrote to memory of 3468 1288 cmd.exe 107 PID 1288 wrote to memory of 3468 1288 cmd.exe 107 PID 3468 wrote to memory of 3764 3468 tmp940E.tmp.exe 109 PID 3468 wrote to memory of 3764 3468 tmp940E.tmp.exe 109 PID 3468 wrote to memory of 3764 3468 tmp940E.tmp.exe 109 PID 3468 wrote to memory of 3764 3468 tmp940E.tmp.exe 109 PID 3468 wrote to memory of 3764 3468 tmp940E.tmp.exe 109 PID 3468 wrote to memory of 3764 3468 tmp940E.tmp.exe 109 PID 3468 wrote to memory of 3764 3468 tmp940E.tmp.exe 109 PID 3468 wrote to memory of 3764 3468 tmp940E.tmp.exe 109 PID 4384 wrote to memory of 336 4384 tmp940E.tmp.exe 110 PID 4384 wrote to memory of 336 4384 tmp940E.tmp.exe 110 PID 4384 wrote to memory of 336 4384 tmp940E.tmp.exe 110 PID 4384 wrote to memory of 3384 4384 tmp940E.tmp.exe 111 PID 4384 wrote to memory of 3384 4384 tmp940E.tmp.exe 111 PID 4384 wrote to memory of 3384 4384 tmp940E.tmp.exe 111 PID 4384 wrote to memory of 3384 4384 tmp940E.tmp.exe 111 PID 4384 wrote to memory of 3384 4384 tmp940E.tmp.exe 111 PID 4384 wrote to memory of 3384 4384 tmp940E.tmp.exe 111 PID 4384 wrote to memory of 3384 4384 tmp940E.tmp.exe 111 PID 4384 wrote to memory of 3384 4384 tmp940E.tmp.exe 111 PID 2044 wrote to memory of 2768 2044 tmp940E.tmp.exe 114 PID 2044 wrote to memory of 2768 2044 tmp940E.tmp.exe 114 PID 2044 wrote to memory of 2768 2044 tmp940E.tmp.exe 114 PID 2044 wrote to memory of 2768 2044 tmp940E.tmp.exe 114 PID 2044 wrote to memory of 2768 2044 tmp940E.tmp.exe 114 PID 2044 wrote to memory of 2768 2044 tmp940E.tmp.exe 114 PID 2044 wrote to memory of 2768 2044 tmp940E.tmp.exe 114 PID 2044 wrote to memory of 2768 2044 tmp940E.tmp.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\1273da64dc656db522fcaffb819502f2.exe"C:\Users\Admin\AppData\Local\Temp\1273da64dc656db522fcaffb819502f2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\WinLines.exe"C:\Users\Admin\AppData\Local\Temp\WinLines.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\tmp940E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp940E.tmp.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\tmp940E.tmp.exe"{path}"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "tmp940E.tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\tmp940E.tmp.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:3828
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:1852
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "tmp940E.tmp" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:4688
-
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe"C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe"{path}"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3764
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exeC:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe"{path}"2⤵
- Executes dropped EXE
PID:336
-
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe"{path}"2⤵
- Executes dropped EXE
PID:3384
-
-
C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exeC:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\ServiceHub\tmp940E.tmp.exe"{path}"2⤵
- Executes dropped EXE
PID:2768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bb3d30439ec1e6435c3eac4df8c1d2e3
SHA1c901d5946e53ae0a9e2417c8dfaf5786a0037422
SHA256182adf89e57f80a92db9a5e13105cd59544f37855ca35f98116a0182ddd3b2e6
SHA512d3547aadf665ce2552b3dfa350b80a5e813aa346870fb2b05a3b998096eebf563143bffe964e0f7243761b79420d1adf02f735779902901d1a41a1f35c557572
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
212KB
MD58b2a652e1d79b3e7bab6decdc9a9e6d6
SHA1423dcd79198aec4e24e2e39fc1d6ff7279404576
SHA25656a5028a5adf0e29e14792e46191e084ca63dabfa77923b0d12705eeab349b5d
SHA5127703b99c43f95245fcf696344baf85972b0d494cdf31960829ff89e86f27aa50d12770576e5376b2df280a5a6ba2c854e9fe5366e9feaf468dfdc247678e944c
-
Filesize
212KB
MD58b2a652e1d79b3e7bab6decdc9a9e6d6
SHA1423dcd79198aec4e24e2e39fc1d6ff7279404576
SHA25656a5028a5adf0e29e14792e46191e084ca63dabfa77923b0d12705eeab349b5d
SHA5127703b99c43f95245fcf696344baf85972b0d494cdf31960829ff89e86f27aa50d12770576e5376b2df280a5a6ba2c854e9fe5366e9feaf468dfdc247678e944c
-
Filesize
212KB
MD58b2a652e1d79b3e7bab6decdc9a9e6d6
SHA1423dcd79198aec4e24e2e39fc1d6ff7279404576
SHA25656a5028a5adf0e29e14792e46191e084ca63dabfa77923b0d12705eeab349b5d
SHA5127703b99c43f95245fcf696344baf85972b0d494cdf31960829ff89e86f27aa50d12770576e5376b2df280a5a6ba2c854e9fe5366e9feaf468dfdc247678e944c
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b