Analysis
-
max time kernel
136s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2023 01:09
Static task
static1
Behavioral task
behavioral1
Sample
4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe
Resource
win10v2004-20230220-en
General
-
Target
4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe
-
Size
2.4MB
-
MD5
0fcabff10f0b3659aecdcb536e685377
-
SHA1
fd1f72d74a65ea4f71fbe98acf5a6a84398632b8
-
SHA256
4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e
-
SHA512
eef91dd06cdb75e84b22d0757af20aeae0a700809d0d217cbb2437566acee101397d93a5617ccbea83896f5c4df79b80306a967de467a320b763b6219c82642a
-
SSDEEP
24576:FCXYEopBLD+2pIRPAo+V0z68WEZYcsl12gwpU7ng4QLCKnv8hfiF+IoHOWZ2wvxI:SFnPAo+S28BZY3lgg97ngB+KIIoHOWD
Malware Config
Extracted
eternity
-
payload_urls
http://167.88.170.23/swo/sw.exe
http://167.88.170.23/swo/swo.exe,http://167.88.170.23/1300.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Executes dropped EXE 2 IoCs
pid Process 360 InstallUtil.exe 948 InstallUtil.exe -
Loads dropped DLL 1 IoCs
pid Process 844 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1456 set thread context of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 -
Program crash 1 IoCs
pid pid_target Process procid_target 304 1456 WerFault.exe 27 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 560 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 672 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 1456 wrote to memory of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 PID 1456 wrote to memory of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 PID 1456 wrote to memory of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 PID 1456 wrote to memory of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 PID 1456 wrote to memory of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 PID 1456 wrote to memory of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 PID 1456 wrote to memory of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 PID 1456 wrote to memory of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 PID 1456 wrote to memory of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 PID 1456 wrote to memory of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 PID 1456 wrote to memory of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 PID 1456 wrote to memory of 684 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 28 PID 1456 wrote to memory of 304 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 29 PID 1456 wrote to memory of 304 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 29 PID 1456 wrote to memory of 304 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 29 PID 1456 wrote to memory of 304 1456 4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe 29 PID 684 wrote to memory of 844 684 InstallUtil.exe 30 PID 684 wrote to memory of 844 684 InstallUtil.exe 30 PID 684 wrote to memory of 844 684 InstallUtil.exe 30 PID 684 wrote to memory of 844 684 InstallUtil.exe 30 PID 844 wrote to memory of 1528 844 cmd.exe 32 PID 844 wrote to memory of 1528 844 cmd.exe 32 PID 844 wrote to memory of 1528 844 cmd.exe 32 PID 844 wrote to memory of 1528 844 cmd.exe 32 PID 844 wrote to memory of 672 844 cmd.exe 33 PID 844 wrote to memory of 672 844 cmd.exe 33 PID 844 wrote to memory of 672 844 cmd.exe 33 PID 844 wrote to memory of 672 844 cmd.exe 33 PID 844 wrote to memory of 560 844 cmd.exe 34 PID 844 wrote to memory of 560 844 cmd.exe 34 PID 844 wrote to memory of 560 844 cmd.exe 34 PID 844 wrote to memory of 560 844 cmd.exe 34 PID 844 wrote to memory of 360 844 cmd.exe 35 PID 844 wrote to memory of 360 844 cmd.exe 35 PID 844 wrote to memory of 360 844 cmd.exe 35 PID 844 wrote to memory of 360 844 cmd.exe 35 PID 844 wrote to memory of 360 844 cmd.exe 35 PID 844 wrote to memory of 360 844 cmd.exe 35 PID 844 wrote to memory of 360 844 cmd.exe 35 PID 1428 wrote to memory of 948 1428 taskeng.exe 38 PID 1428 wrote to memory of 948 1428 taskeng.exe 38 PID 1428 wrote to memory of 948 1428 taskeng.exe 38 PID 1428 wrote to memory of 948 1428 taskeng.exe 38 PID 1428 wrote to memory of 948 1428 taskeng.exe 38 PID 1428 wrote to memory of 948 1428 taskeng.exe 38 PID 1428 wrote to memory of 948 1428 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe"C:\Users\Admin\AppData\Local\Temp\4c0f274e3694fbabe53bf4160108b37353cbe110eab6effadfad8dc1f868d49e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "InstallUtil" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1528
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:672
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "InstallUtil" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:560
-
-
C:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exe"C:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exe"4⤵
- Executes dropped EXE
PID:360
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 8042⤵
- Program crash
PID:304
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {4F89C134-5B92-4EA3-9134-38CE02D59E3E} S-1-5-21-2961826002-3968192592-354541192-1000:HVMHZIYD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exeC:\Users\Admin\AppData\Local\ServiceHub\InstallUtil.exe2⤵
- Executes dropped EXE
PID:948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e