Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2023, 10:51

General

  • Target

    32d883d45ff52cbfde2ed8868c3a50c7.exe

  • Size

    2.1MB

  • MD5

    32d883d45ff52cbfde2ed8868c3a50c7

  • SHA1

    5aa654b6a616ea75370ac559df4421bf67eef265

  • SHA256

    e72ba123ab2230b92c80767c89f37989b3e342b6afb61d638c4ae92192cb744f

  • SHA512

    6df5e54ccfb4e7010add8db922fa5a65ddfe08142d93659830b9e5ea766dce70332834ba940b859921bdc074e2aa9697a50b16bf475ad7716c7c4a460de78d5e

  • SSDEEP

    24576:gsK5rYRnE8sdMmJD9RQSyeRH9xrofiiymJWIg7MQnrhSqnfFQypfV+Dg1DzeHPTQ:hK5rYRnraMmDkMXr6JGhgef6HjP4Ng0

Score
10/10

Malware Config

Extracted

Family

eternity

C2

http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion

Attributes
  • payload_urls

    http://167.88.170.23/swo/sw.exe

    http://167.88.170.23/swo/swo.exe

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32d883d45ff52cbfde2ed8868c3a50c7.exe
    "C:\Users\Admin\AppData\Local\Temp\32d883d45ff52cbfde2ed8868c3a50c7.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Email and Password List.txt
      2⤵
        PID:1292
      • C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe
        "C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2120
        • C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe
          "{path}"
          3⤵
          • Executes dropped EXE
          PID:4264
        • C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe
          "{path}"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1376
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "Email and Password List" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2368
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              5⤵
                PID:4484
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1
                5⤵
                • Runs ping.exe
                PID:2764
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn "Email and Password List" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe" /rl HIGHEST /f
                5⤵
                • Creates scheduled task(s)
                PID:1440
              • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe
                "C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3744
                • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe
                  "{path}"
                  6⤵
                  • Executes dropped EXE
                  PID:4044
                • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe
                  "{path}"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3648
      • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe
        "C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe
          "{path}"
          2⤵
          • Executes dropped EXE
          PID:1632
      • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe
        "C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2124
        • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe
          "{path}"
          2⤵
          • Executes dropped EXE
          PID:4092

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Email and Password List.exe.log

        Filesize

        1KB

        MD5

        bb3d30439ec1e6435c3eac4df8c1d2e3

        SHA1

        c901d5946e53ae0a9e2417c8dfaf5786a0037422

        SHA256

        182adf89e57f80a92db9a5e13105cd59544f37855ca35f98116a0182ddd3b2e6

        SHA512

        d3547aadf665ce2552b3dfa350b80a5e813aa346870fb2b05a3b998096eebf563143bffe964e0f7243761b79420d1adf02f735779902901d1a41a1f35c557572

      • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe

        Filesize

        2.1MB

        MD5

        633b0303b31c70c07ee65e0fcc895259

        SHA1

        c00053332bc05a57604147419660908d8ac0da1d

        SHA256

        11536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce

        SHA512

        a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b

      • C:\Users\Admin\AppData\Local\Temp\Email and Password List.txt

        Filesize

        430B

        MD5

        a5a443178bdaa30182c6e2b9b48df2ce

        SHA1

        73ec04586fd724f739f7f6fa2712b973415f9088

        SHA256

        733309d8140475365b046dc173093bc2e9e08e2b73b5f478f4f32ca750ac3add

        SHA512

        bdc06b923cd54cbd2444a29fca221587a8beb4218d1d408fef33b2468fdbfdbef63cb29382165b2cc20b6863c07bc83fb4c64b2307c31d965489c77b73f67524

      • memory/1376-163-0x0000000005130000-0x0000000005196000-memory.dmp

        Filesize

        408KB

      • memory/1376-159-0x0000000000400000-0x0000000000552000-memory.dmp

        Filesize

        1.3MB

      • memory/1404-172-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/1404-173-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/2120-150-0x0000000000180000-0x000000000039C000-memory.dmp

        Filesize

        2.1MB

      • memory/2120-151-0x0000000004C30000-0x0000000004CCC000-memory.dmp

        Filesize

        624KB

      • memory/2120-157-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/2120-153-0x0000000004CD0000-0x0000000004D62000-memory.dmp

        Filesize

        584KB

      • memory/2120-154-0x0000000004BE0000-0x0000000004BEA000-memory.dmp

        Filesize

        40KB

      • memory/2120-156-0x0000000004F30000-0x0000000004F86000-memory.dmp

        Filesize

        344KB

      • memory/2120-155-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/2120-152-0x0000000005280000-0x0000000005824000-memory.dmp

        Filesize

        5.6MB

      • memory/2124-133-0x00000000004B0000-0x00000000006D6000-memory.dmp

        Filesize

        2.1MB

      • memory/2124-181-0x0000000005AE0000-0x0000000005AF0000-memory.dmp

        Filesize

        64KB

      • memory/2124-182-0x0000000005AE0000-0x0000000005AF0000-memory.dmp

        Filesize

        64KB

      • memory/2124-136-0x0000000005030000-0x0000000005040000-memory.dmp

        Filesize

        64KB

      • memory/3648-177-0x0000000005570000-0x0000000005580000-memory.dmp

        Filesize

        64KB

      • memory/3744-170-0x00000000054F0000-0x0000000005500000-memory.dmp

        Filesize

        64KB

      • memory/3744-169-0x00000000054F0000-0x0000000005500000-memory.dmp

        Filesize

        64KB