Analysis
-
max time kernel
112s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/04/2023, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
a68ccf819e65e63c220113ba45c1a13b.exe
Resource
win7-20230220-en
General
-
Target
a68ccf819e65e63c220113ba45c1a13b.exe
-
Size
2.4MB
-
MD5
a68ccf819e65e63c220113ba45c1a13b
-
SHA1
8a410c54db44221acbb341815d49109594b50300
-
SHA256
23f09d9012c25fbba5f04b0648379e4c8a42ce2a2c30beffe4532b712907e1ef
-
SHA512
1262e12b48f0a471e8da2b470facc387813a1dd92c99e5f2e8fa550c16a1ba3f8c835ff6678bf7f5c4f9986b37e722b78835230d90f63bae6d8ea7f4f3f4f6fe
-
SSDEEP
24576:HfUxAfB9iuK++moKnfNIGQaK83uHU/uYfo11qis3s4b+6GIAANEN2tXL6Y3TEhi2:DLiuD+moCQZhHUWYfo11q33dRGyRt7
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
http://167.88.170.23/swo/sw.exe
http://167.88.170.23/swo/swo.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Executes dropped EXE 2 IoCs
pid Process 1972 InstallUtil.exe 1336 InstallUtil.exe -
Loads dropped DLL 1 IoCs
pid Process 1520 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 1760 2032 WerFault.exe 27 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1004 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 632 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe 2032 a68ccf819e65e63c220113ba45c1a13b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2032 a68ccf819e65e63c220113ba45c1a13b.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2032 wrote to memory of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 PID 2032 wrote to memory of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 PID 2032 wrote to memory of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 PID 2032 wrote to memory of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 PID 2032 wrote to memory of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 PID 2032 wrote to memory of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 PID 2032 wrote to memory of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 PID 2032 wrote to memory of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 PID 2032 wrote to memory of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 PID 2032 wrote to memory of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 PID 2032 wrote to memory of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 PID 2032 wrote to memory of 980 2032 a68ccf819e65e63c220113ba45c1a13b.exe 28 PID 2032 wrote to memory of 1760 2032 a68ccf819e65e63c220113ba45c1a13b.exe 29 PID 2032 wrote to memory of 1760 2032 a68ccf819e65e63c220113ba45c1a13b.exe 29 PID 2032 wrote to memory of 1760 2032 a68ccf819e65e63c220113ba45c1a13b.exe 29 PID 2032 wrote to memory of 1760 2032 a68ccf819e65e63c220113ba45c1a13b.exe 29 PID 980 wrote to memory of 1520 980 InstallUtil.exe 31 PID 980 wrote to memory of 1520 980 InstallUtil.exe 31 PID 980 wrote to memory of 1520 980 InstallUtil.exe 31 PID 980 wrote to memory of 1520 980 InstallUtil.exe 31 PID 1520 wrote to memory of 1624 1520 cmd.exe 33 PID 1520 wrote to memory of 1624 1520 cmd.exe 33 PID 1520 wrote to memory of 1624 1520 cmd.exe 33 PID 1520 wrote to memory of 1624 1520 cmd.exe 33 PID 1520 wrote to memory of 632 1520 cmd.exe 34 PID 1520 wrote to memory of 632 1520 cmd.exe 34 PID 1520 wrote to memory of 632 1520 cmd.exe 34 PID 1520 wrote to memory of 632 1520 cmd.exe 34 PID 1520 wrote to memory of 1004 1520 cmd.exe 35 PID 1520 wrote to memory of 1004 1520 cmd.exe 35 PID 1520 wrote to memory of 1004 1520 cmd.exe 35 PID 1520 wrote to memory of 1004 1520 cmd.exe 35 PID 1520 wrote to memory of 1972 1520 cmd.exe 36 PID 1520 wrote to memory of 1972 1520 cmd.exe 36 PID 1520 wrote to memory of 1972 1520 cmd.exe 36 PID 1520 wrote to memory of 1972 1520 cmd.exe 36 PID 1520 wrote to memory of 1972 1520 cmd.exe 36 PID 1520 wrote to memory of 1972 1520 cmd.exe 36 PID 1520 wrote to memory of 1972 1520 cmd.exe 36 PID 1364 wrote to memory of 1336 1364 taskeng.exe 39 PID 1364 wrote to memory of 1336 1364 taskeng.exe 39 PID 1364 wrote to memory of 1336 1364 taskeng.exe 39 PID 1364 wrote to memory of 1336 1364 taskeng.exe 39 PID 1364 wrote to memory of 1336 1364 taskeng.exe 39 PID 1364 wrote to memory of 1336 1364 taskeng.exe 39 PID 1364 wrote to memory of 1336 1364 taskeng.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\a68ccf819e65e63c220113ba45c1a13b.exe"C:\Users\Admin\AppData\Local\Temp\a68ccf819e65e63c220113ba45c1a13b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "InstallUtil" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1624
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:632
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "InstallUtil" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1004
-
-
C:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exe"C:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exe"4⤵
- Executes dropped EXE
PID:1972
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 9762⤵
- Program crash
PID:1760
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0DB2D5B8-677B-4DC0-AEAA-D1197974BF6B} S-1-5-21-2647223082-2067913677-935928954-1000:BPOQNXYB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exeC:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exe2⤵
- Executes dropped EXE
PID:1336
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e