Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2023, 10:51
Behavioral task
behavioral1
Sample
32d883d45ff52cbfde2ed8868c3a50c7.exe
Resource
win7-20230220-en
General
-
Target
32d883d45ff52cbfde2ed8868c3a50c7.exe
-
Size
2.1MB
-
MD5
32d883d45ff52cbfde2ed8868c3a50c7
-
SHA1
5aa654b6a616ea75370ac559df4421bf67eef265
-
SHA256
e72ba123ab2230b92c80767c89f37989b3e342b6afb61d638c4ae92192cb744f
-
SHA512
6df5e54ccfb4e7010add8db922fa5a65ddfe08142d93659830b9e5ea766dce70332834ba940b859921bdc074e2aa9697a50b16bf475ad7716c7c4a460de78d5e
-
SSDEEP
24576:gsK5rYRnE8sdMmJD9RQSyeRH9xrofiiymJWIg7MQnrhSqnfFQypfV+Dg1DzeHPTQ:hK5rYRnraMmDkMXr6JGhgef6HjP4Ng0
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
http://167.88.170.23/swo/sw.exe
http://167.88.170.23/swo/swo.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 32d883d45ff52cbfde2ed8868c3a50c7.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation Email and Password List.exe -
Executes dropped EXE 10 IoCs
pid Process 2120 Email and Password List.exe 4264 Email and Password List.exe 1376 Email and Password List.exe 3744 Email and Password List.exe 1404 Email and Password List.exe 4044 Email and Password List.exe 3648 Email and Password List.exe 1632 Email and Password List.exe 2124 Email and Password List.exe 4092 Email and Password List.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2120 set thread context of 1376 2120 Email and Password List.exe 98 PID 3744 set thread context of 3648 3744 Email and Password List.exe 115 PID 1404 set thread context of 1632 1404 Email and Password List.exe 116 PID 2124 set thread context of 4092 2124 Email and Password List.exe 119 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1440 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings 32d883d45ff52cbfde2ed8868c3a50c7.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2764 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2120 Email and Password List.exe 2120 Email and Password List.exe 3744 Email and Password List.exe 3744 Email and Password List.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2120 Email and Password List.exe Token: SeDebugPrivilege 3744 Email and Password List.exe Token: SeDebugPrivilege 3648 Email and Password List.exe -
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1292 2124 32d883d45ff52cbfde2ed8868c3a50c7.exe 88 PID 2124 wrote to memory of 1292 2124 32d883d45ff52cbfde2ed8868c3a50c7.exe 88 PID 2124 wrote to memory of 1292 2124 32d883d45ff52cbfde2ed8868c3a50c7.exe 88 PID 2124 wrote to memory of 2120 2124 32d883d45ff52cbfde2ed8868c3a50c7.exe 89 PID 2124 wrote to memory of 2120 2124 32d883d45ff52cbfde2ed8868c3a50c7.exe 89 PID 2124 wrote to memory of 2120 2124 32d883d45ff52cbfde2ed8868c3a50c7.exe 89 PID 2120 wrote to memory of 4264 2120 Email and Password List.exe 97 PID 2120 wrote to memory of 4264 2120 Email and Password List.exe 97 PID 2120 wrote to memory of 4264 2120 Email and Password List.exe 97 PID 2120 wrote to memory of 1376 2120 Email and Password List.exe 98 PID 2120 wrote to memory of 1376 2120 Email and Password List.exe 98 PID 2120 wrote to memory of 1376 2120 Email and Password List.exe 98 PID 2120 wrote to memory of 1376 2120 Email and Password List.exe 98 PID 2120 wrote to memory of 1376 2120 Email and Password List.exe 98 PID 2120 wrote to memory of 1376 2120 Email and Password List.exe 98 PID 2120 wrote to memory of 1376 2120 Email and Password List.exe 98 PID 2120 wrote to memory of 1376 2120 Email and Password List.exe 98 PID 1376 wrote to memory of 2368 1376 Email and Password List.exe 99 PID 1376 wrote to memory of 2368 1376 Email and Password List.exe 99 PID 1376 wrote to memory of 2368 1376 Email and Password List.exe 99 PID 2368 wrote to memory of 4484 2368 cmd.exe 101 PID 2368 wrote to memory of 4484 2368 cmd.exe 101 PID 2368 wrote to memory of 4484 2368 cmd.exe 101 PID 2368 wrote to memory of 2764 2368 cmd.exe 102 PID 2368 wrote to memory of 2764 2368 cmd.exe 102 PID 2368 wrote to memory of 2764 2368 cmd.exe 102 PID 2368 wrote to memory of 1440 2368 cmd.exe 103 PID 2368 wrote to memory of 1440 2368 cmd.exe 103 PID 2368 wrote to memory of 1440 2368 cmd.exe 103 PID 2368 wrote to memory of 3744 2368 cmd.exe 104 PID 2368 wrote to memory of 3744 2368 cmd.exe 104 PID 2368 wrote to memory of 3744 2368 cmd.exe 104 PID 3744 wrote to memory of 4044 3744 Email and Password List.exe 114 PID 3744 wrote to memory of 4044 3744 Email and Password List.exe 114 PID 3744 wrote to memory of 4044 3744 Email and Password List.exe 114 PID 3744 wrote to memory of 3648 3744 Email and Password List.exe 115 PID 3744 wrote to memory of 3648 3744 Email and Password List.exe 115 PID 3744 wrote to memory of 3648 3744 Email and Password List.exe 115 PID 3744 wrote to memory of 3648 3744 Email and Password List.exe 115 PID 3744 wrote to memory of 3648 3744 Email and Password List.exe 115 PID 3744 wrote to memory of 3648 3744 Email and Password List.exe 115 PID 3744 wrote to memory of 3648 3744 Email and Password List.exe 115 PID 3744 wrote to memory of 3648 3744 Email and Password List.exe 115 PID 1404 wrote to memory of 1632 1404 Email and Password List.exe 116 PID 1404 wrote to memory of 1632 1404 Email and Password List.exe 116 PID 1404 wrote to memory of 1632 1404 Email and Password List.exe 116 PID 1404 wrote to memory of 1632 1404 Email and Password List.exe 116 PID 1404 wrote to memory of 1632 1404 Email and Password List.exe 116 PID 1404 wrote to memory of 1632 1404 Email and Password List.exe 116 PID 1404 wrote to memory of 1632 1404 Email and Password List.exe 116 PID 1404 wrote to memory of 1632 1404 Email and Password List.exe 116 PID 2124 wrote to memory of 4092 2124 Email and Password List.exe 119 PID 2124 wrote to memory of 4092 2124 Email and Password List.exe 119 PID 2124 wrote to memory of 4092 2124 Email and Password List.exe 119 PID 2124 wrote to memory of 4092 2124 Email and Password List.exe 119 PID 2124 wrote to memory of 4092 2124 Email and Password List.exe 119 PID 2124 wrote to memory of 4092 2124 Email and Password List.exe 119 PID 2124 wrote to memory of 4092 2124 Email and Password List.exe 119 PID 2124 wrote to memory of 4092 2124 Email and Password List.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\32d883d45ff52cbfde2ed8868c3a50c7.exe"C:\Users\Admin\AppData\Local\Temp\32d883d45ff52cbfde2ed8868c3a50c7.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Email and Password List.txt2⤵PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe"C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe"{path}"3⤵
- Executes dropped EXE
PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe"{path}"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "Email and Password List" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:4484
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:2764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Email and Password List" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:1440
-
-
C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"{path}"6⤵
- Executes dropped EXE
PID:4044
-
-
C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"{path}"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"{path}"2⤵
- Executes dropped EXE
PID:1632
-
-
C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"{path}"2⤵
- Executes dropped EXE
PID:4092
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bb3d30439ec1e6435c3eac4df8c1d2e3
SHA1c901d5946e53ae0a9e2417c8dfaf5786a0037422
SHA256182adf89e57f80a92db9a5e13105cd59544f37855ca35f98116a0182ddd3b2e6
SHA512d3547aadf665ce2552b3dfa350b80a5e813aa346870fb2b05a3b998096eebf563143bffe964e0f7243761b79420d1adf02f735779902901d1a41a1f35c557572
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
430B
MD5a5a443178bdaa30182c6e2b9b48df2ce
SHA173ec04586fd724f739f7f6fa2712b973415f9088
SHA256733309d8140475365b046dc173093bc2e9e08e2b73b5f478f4f32ca750ac3add
SHA512bdc06b923cd54cbd2444a29fca221587a8beb4218d1d408fef33b2468fdbfdbef63cb29382165b2cc20b6863c07bc83fb4c64b2307c31d965489c77b73f67524