Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2023, 10:52
Behavioral task
behavioral1
Sample
32d883d45ff52cbfde2ed8868c3a50c7.exe
Resource
win7-20230220-en
General
-
Target
32d883d45ff52cbfde2ed8868c3a50c7.exe
-
Size
2.1MB
-
MD5
32d883d45ff52cbfde2ed8868c3a50c7
-
SHA1
5aa654b6a616ea75370ac559df4421bf67eef265
-
SHA256
e72ba123ab2230b92c80767c89f37989b3e342b6afb61d638c4ae92192cb744f
-
SHA512
6df5e54ccfb4e7010add8db922fa5a65ddfe08142d93659830b9e5ea766dce70332834ba940b859921bdc074e2aa9697a50b16bf475ad7716c7c4a460de78d5e
-
SSDEEP
24576:gsK5rYRnE8sdMmJD9RQSyeRH9xrofiiymJWIg7MQnrhSqnfFQypfV+Dg1DzeHPTQ:hK5rYRnraMmDkMXr6JGhgef6HjP4Ng0
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
http://167.88.170.23/swo/sw.exe
http://167.88.170.23/swo/swo.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation 32d883d45ff52cbfde2ed8868c3a50c7.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation Email and Password List.exe -
Executes dropped EXE 9 IoCs
pid Process 736 Email and Password List.exe 3504 Email and Password List.exe 1712 Email and Password List.exe 2928 Email and Password List.exe 756 Email and Password List.exe 3312 Email and Password List.exe 4808 Email and Password List.exe 2804 Email and Password List.exe 1740 Email and Password List.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 736 set thread context of 2928 736 Email and Password List.exe 100 PID 756 set thread context of 3312 756 Email and Password List.exe 111 PID 4808 set thread context of 1740 4808 Email and Password List.exe 115 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 320 schtasks.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings 32d883d45ff52cbfde2ed8868c3a50c7.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4996 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 736 Email and Password List.exe 736 Email and Password List.exe 736 Email and Password List.exe 736 Email and Password List.exe 4808 Email and Password List.exe 4808 Email and Password List.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 736 Email and Password List.exe Token: SeDebugPrivilege 3312 Email and Password List.exe Token: SeDebugPrivilege 4808 Email and Password List.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2564 wrote to memory of 3136 2564 32d883d45ff52cbfde2ed8868c3a50c7.exe 87 PID 2564 wrote to memory of 3136 2564 32d883d45ff52cbfde2ed8868c3a50c7.exe 87 PID 2564 wrote to memory of 3136 2564 32d883d45ff52cbfde2ed8868c3a50c7.exe 87 PID 2564 wrote to memory of 736 2564 32d883d45ff52cbfde2ed8868c3a50c7.exe 88 PID 2564 wrote to memory of 736 2564 32d883d45ff52cbfde2ed8868c3a50c7.exe 88 PID 2564 wrote to memory of 736 2564 32d883d45ff52cbfde2ed8868c3a50c7.exe 88 PID 736 wrote to memory of 3504 736 Email and Password List.exe 98 PID 736 wrote to memory of 3504 736 Email and Password List.exe 98 PID 736 wrote to memory of 3504 736 Email and Password List.exe 98 PID 736 wrote to memory of 1712 736 Email and Password List.exe 99 PID 736 wrote to memory of 1712 736 Email and Password List.exe 99 PID 736 wrote to memory of 1712 736 Email and Password List.exe 99 PID 736 wrote to memory of 2928 736 Email and Password List.exe 100 PID 736 wrote to memory of 2928 736 Email and Password List.exe 100 PID 736 wrote to memory of 2928 736 Email and Password List.exe 100 PID 736 wrote to memory of 2928 736 Email and Password List.exe 100 PID 736 wrote to memory of 2928 736 Email and Password List.exe 100 PID 736 wrote to memory of 2928 736 Email and Password List.exe 100 PID 736 wrote to memory of 2928 736 Email and Password List.exe 100 PID 736 wrote to memory of 2928 736 Email and Password List.exe 100 PID 2928 wrote to memory of 4348 2928 Email and Password List.exe 102 PID 2928 wrote to memory of 4348 2928 Email and Password List.exe 102 PID 2928 wrote to memory of 4348 2928 Email and Password List.exe 102 PID 4348 wrote to memory of 3776 4348 cmd.exe 104 PID 4348 wrote to memory of 3776 4348 cmd.exe 104 PID 4348 wrote to memory of 3776 4348 cmd.exe 104 PID 4348 wrote to memory of 4996 4348 cmd.exe 105 PID 4348 wrote to memory of 4996 4348 cmd.exe 105 PID 4348 wrote to memory of 4996 4348 cmd.exe 105 PID 4348 wrote to memory of 320 4348 cmd.exe 107 PID 4348 wrote to memory of 320 4348 cmd.exe 107 PID 4348 wrote to memory of 320 4348 cmd.exe 107 PID 4348 wrote to memory of 756 4348 cmd.exe 108 PID 4348 wrote to memory of 756 4348 cmd.exe 108 PID 4348 wrote to memory of 756 4348 cmd.exe 108 PID 756 wrote to memory of 3312 756 Email and Password List.exe 111 PID 756 wrote to memory of 3312 756 Email and Password List.exe 111 PID 756 wrote to memory of 3312 756 Email and Password List.exe 111 PID 756 wrote to memory of 3312 756 Email and Password List.exe 111 PID 756 wrote to memory of 3312 756 Email and Password List.exe 111 PID 756 wrote to memory of 3312 756 Email and Password List.exe 111 PID 756 wrote to memory of 3312 756 Email and Password List.exe 111 PID 756 wrote to memory of 3312 756 Email and Password List.exe 111 PID 4808 wrote to memory of 2804 4808 Email and Password List.exe 114 PID 4808 wrote to memory of 2804 4808 Email and Password List.exe 114 PID 4808 wrote to memory of 2804 4808 Email and Password List.exe 114 PID 4808 wrote to memory of 1740 4808 Email and Password List.exe 115 PID 4808 wrote to memory of 1740 4808 Email and Password List.exe 115 PID 4808 wrote to memory of 1740 4808 Email and Password List.exe 115 PID 4808 wrote to memory of 1740 4808 Email and Password List.exe 115 PID 4808 wrote to memory of 1740 4808 Email and Password List.exe 115 PID 4808 wrote to memory of 1740 4808 Email and Password List.exe 115 PID 4808 wrote to memory of 1740 4808 Email and Password List.exe 115 PID 4808 wrote to memory of 1740 4808 Email and Password List.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\32d883d45ff52cbfde2ed8868c3a50c7.exe"C:\Users\Admin\AppData\Local\Temp\32d883d45ff52cbfde2ed8868c3a50c7.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Email and Password List.txt2⤵PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe"C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe"{path}"3⤵
- Executes dropped EXE
PID:3504
-
-
C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe"{path}"3⤵
- Executes dropped EXE
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe"{path}"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "Email and Password List" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\Email and Password List.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:3776
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
PID:4996
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Email and Password List" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:320
-
-
C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"{path}"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"{path}"2⤵
- Executes dropped EXE
PID:2804
-
-
C:\Users\Admin\AppData\Local\ServiceHub\Email and Password List.exe"{path}"2⤵
- Executes dropped EXE
PID:1740
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bb3d30439ec1e6435c3eac4df8c1d2e3
SHA1c901d5946e53ae0a9e2417c8dfaf5786a0037422
SHA256182adf89e57f80a92db9a5e13105cd59544f37855ca35f98116a0182ddd3b2e6
SHA512d3547aadf665ce2552b3dfa350b80a5e813aa346870fb2b05a3b998096eebf563143bffe964e0f7243761b79420d1adf02f735779902901d1a41a1f35c557572
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
2.1MB
MD5633b0303b31c70c07ee65e0fcc895259
SHA1c00053332bc05a57604147419660908d8ac0da1d
SHA25611536d2bcc70ddd7cb41038ab3db2b38ebbe5ce0c7eb2927f93772d63447c3ce
SHA512a5673ba02847215d96f67b1b148bebcc0567e48a981efe1b1fed93c074614776c52a9588dee6a6a3e2b55bbd1c3aab6c918e5dd7529d9d358e3a50cecd65767b
-
Filesize
430B
MD5a5a443178bdaa30182c6e2b9b48df2ce
SHA173ec04586fd724f739f7f6fa2712b973415f9088
SHA256733309d8140475365b046dc173093bc2e9e08e2b73b5f478f4f32ca750ac3add
SHA512bdc06b923cd54cbd2444a29fca221587a8beb4218d1d408fef33b2468fdbfdbef63cb29382165b2cc20b6863c07bc83fb4c64b2307c31d965489c77b73f67524