Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 14:29
Behavioral task
behavioral1
Sample
Ransomware.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Ransomware.exe
Resource
win10v2004-20230220-en
General
-
Target
Ransomware.exe
-
Size
112KB
-
MD5
5505bbddc971765df496f907b222c2fb
-
SHA1
de3c8668481fa3dacf2052951d45a9c3a388575d
-
SHA256
a5498ad33354516c8a2affe2de3e3cf515aafb252d5647d0f8c6efe4b46806a4
-
SHA512
7bec3c8dfa0f63db2ae182805dff0602f55b6e419f30b279992d891542f128c121542a05c214d9436f6baeae895cf09027c5d308731682df41d84e6283fd08eb
-
SSDEEP
1536:IsCK9eaNw9AFBPGMPYnQZZZZZZZZZonTZ6PhCOybwXuzIBnwbp3r+hX1dZji:xCSbwmFBPGtTZWhybwX7Bo36TZji
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Ransomware.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Ransomware.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Ransomware.exe -
Executes dropped EXE 2 IoCs
pid Process 3492 Ransomware.exe 1772 Ransomware.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wallpaper.bmp" Ransomware.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wallpaper.bmp" Ransomware.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1728 schtasks.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop\WallpaperStyle = "10" Ransomware.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop\TileWallpaper = "0" Ransomware.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop\WallpaperStyle = "10" Ransomware.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\Desktop\TileWallpaper = "0" Ransomware.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\.ecrp Ransomware.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\.ecrp\shell\open\command Ransomware.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\.ecrp\shell Ransomware.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\.ecrp\shell\open Ransomware.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\.ecrp\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\ServiceHub\\Ransomware.exe %1" Ransomware.exe Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\.ecrp\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\ServiceHub\\Ransomware.exe %1" Ransomware.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2672 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeBackupPrivilege 3224 vssvc.exe Token: SeRestorePrivilege 3224 vssvc.exe Token: SeAuditPrivilege 3224 vssvc.exe Token: SeDebugPrivilege 3492 Ransomware.exe Token: SeDebugPrivilege 1772 Ransomware.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1096 5008 Ransomware.exe 83 PID 5008 wrote to memory of 1096 5008 Ransomware.exe 83 PID 5008 wrote to memory of 1096 5008 Ransomware.exe 83 PID 1096 wrote to memory of 4728 1096 cmd.exe 85 PID 1096 wrote to memory of 4728 1096 cmd.exe 85 PID 1096 wrote to memory of 4728 1096 cmd.exe 85 PID 1096 wrote to memory of 2672 1096 cmd.exe 86 PID 1096 wrote to memory of 2672 1096 cmd.exe 86 PID 1096 wrote to memory of 2672 1096 cmd.exe 86 PID 1096 wrote to memory of 1728 1096 cmd.exe 87 PID 1096 wrote to memory of 1728 1096 cmd.exe 87 PID 1096 wrote to memory of 1728 1096 cmd.exe 87 PID 1096 wrote to memory of 3492 1096 cmd.exe 88 PID 1096 wrote to memory of 3492 1096 cmd.exe 88 PID 1096 wrote to memory of 3492 1096 cmd.exe 88 PID 3492 wrote to memory of 1160 3492 Ransomware.exe 92 PID 3492 wrote to memory of 1160 3492 Ransomware.exe 92 PID 3492 wrote to memory of 1160 3492 Ransomware.exe 92 PID 1160 wrote to memory of 2388 1160 cmd.exe 94 PID 1160 wrote to memory of 2388 1160 cmd.exe 94 PID 1160 wrote to memory of 2388 1160 cmd.exe 94 PID 1772 wrote to memory of 4532 1772 Ransomware.exe 99 PID 1772 wrote to memory of 4532 1772 Ransomware.exe 99 PID 1772 wrote to memory of 4532 1772 Ransomware.exe 99 PID 4532 wrote to memory of 660 4532 cmd.exe 101 PID 4532 wrote to memory of 660 4532 cmd.exe 101 PID 4532 wrote to memory of 660 4532 cmd.exe 101 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ransomware.exe"C:\Users\Admin\AppData\Local\Temp\Ransomware.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "Ransomware" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\Ransomware.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:4728
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2672
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Ransomware" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1728
-
-
C:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exe"C:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && vssadmin delete shadows /all /quiet4⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:2388
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
C:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exeC:\Users\Admin\AppData\Local\ServiceHub\Ransomware.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && vssadmin delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:660
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701B
MD51cfcc2ffa3019d3784f5852dd5547f84
SHA13fe48e46b1f9df2e3b4a5d8ddd6b1792d3ce7513
SHA256464a15de513b3da8a8d28732020c88a5b3d9e1b08c0d1d0b7248821999dae23a
SHA51276117b61890d2b4abd85a8aad98b8a2f65aeb885efee74206c0b83aa7f305f7b1b62c6ded58fa3042d06298310074f27849f54f52aabb805eb68e5a75eff55de
-
Filesize
112KB
MD55505bbddc971765df496f907b222c2fb
SHA1de3c8668481fa3dacf2052951d45a9c3a388575d
SHA256a5498ad33354516c8a2affe2de3e3cf515aafb252d5647d0f8c6efe4b46806a4
SHA5127bec3c8dfa0f63db2ae182805dff0602f55b6e419f30b279992d891542f128c121542a05c214d9436f6baeae895cf09027c5d308731682df41d84e6283fd08eb
-
Filesize
112KB
MD55505bbddc971765df496f907b222c2fb
SHA1de3c8668481fa3dacf2052951d45a9c3a388575d
SHA256a5498ad33354516c8a2affe2de3e3cf515aafb252d5647d0f8c6efe4b46806a4
SHA5127bec3c8dfa0f63db2ae182805dff0602f55b6e419f30b279992d891542f128c121542a05c214d9436f6baeae895cf09027c5d308731682df41d84e6283fd08eb
-
Filesize
112KB
MD55505bbddc971765df496f907b222c2fb
SHA1de3c8668481fa3dacf2052951d45a9c3a388575d
SHA256a5498ad33354516c8a2affe2de3e3cf515aafb252d5647d0f8c6efe4b46806a4
SHA5127bec3c8dfa0f63db2ae182805dff0602f55b6e419f30b279992d891542f128c121542a05c214d9436f6baeae895cf09027c5d308731682df41d84e6283fd08eb
-
Filesize
675KB
MD51acd21a0da96ef393408413154d4cd03
SHA1c523a930023c41d0c92fd33a074599071c54787f
SHA2560298095c6b93672ecbe9ef57dc271f0d401febccc884c6957b006880b8e39d28
SHA51265f506f141597dbf1b23d47aef9d880a0e9eb7d3a49e8c98383ae0904037c6e13e9d7a515cd4a1dca07556dc91432cffda89b496e361ebb157a7a5a1845701b1