Analysis
-
max time kernel
299s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
28-06-2023 00:18
Static task
static1
Behavioral task
behavioral1
Sample
95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe
Resource
win10v2004-20230621-en
General
-
Target
95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe
-
Size
2.2MB
-
MD5
18434574bc13a42141f4657759898410
-
SHA1
a02eefcba33a8d3e8bd3627d923381bf1dfd0920
-
SHA256
95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0
-
SHA512
434015561e0ffb381003b715ecd539e19bdccf02ac9edb9c6a3bdc2da84bbc4ce2eea471188b89f41393d6e72596d00ceec43e159dc2ccfff778372a4bcecc98
-
SSDEEP
49152:TIoiAdWAwUYIzJlDrobOuvZxyP6JeY+s4t+XuoPhSgfgGNmGhquX:XjdMcjnobOAy5Y+A3fzNbP
Malware Config
Extracted
eternity
-
payload_urls
http://162.244.93.4/~rubin/swo.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Deletes itself 1 IoCs
pid Process 1468 cmd.exe -
Executes dropped EXE 6 IoCs
pid Process 1784 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 1868 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 828 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 872 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 1332 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 372 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe -
Loads dropped DLL 1 IoCs
pid Process 1468 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1696 set thread context of 1428 1696 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 27 PID 1784 set thread context of 828 1784 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 36 PID 1868 set thread context of 872 1868 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 37 PID 1332 set thread context of 372 1332 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 39 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1708 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1796 PING.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1428 1696 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 27 PID 1696 wrote to memory of 1428 1696 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 27 PID 1696 wrote to memory of 1428 1696 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 27 PID 1696 wrote to memory of 1428 1696 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 27 PID 1696 wrote to memory of 1428 1696 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 27 PID 1696 wrote to memory of 1428 1696 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 27 PID 1696 wrote to memory of 1428 1696 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 27 PID 1696 wrote to memory of 1428 1696 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 27 PID 1696 wrote to memory of 1428 1696 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 27 PID 1428 wrote to memory of 1468 1428 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 28 PID 1428 wrote to memory of 1468 1428 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 28 PID 1428 wrote to memory of 1468 1428 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 28 PID 1428 wrote to memory of 1468 1428 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 28 PID 1468 wrote to memory of 1992 1468 cmd.exe 30 PID 1468 wrote to memory of 1992 1468 cmd.exe 30 PID 1468 wrote to memory of 1992 1468 cmd.exe 30 PID 1468 wrote to memory of 1992 1468 cmd.exe 30 PID 1468 wrote to memory of 1796 1468 cmd.exe 31 PID 1468 wrote to memory of 1796 1468 cmd.exe 31 PID 1468 wrote to memory of 1796 1468 cmd.exe 31 PID 1468 wrote to memory of 1796 1468 cmd.exe 31 PID 1468 wrote to memory of 1708 1468 cmd.exe 32 PID 1468 wrote to memory of 1708 1468 cmd.exe 32 PID 1468 wrote to memory of 1708 1468 cmd.exe 32 PID 1468 wrote to memory of 1708 1468 cmd.exe 32 PID 1468 wrote to memory of 1784 1468 cmd.exe 33 PID 1468 wrote to memory of 1784 1468 cmd.exe 33 PID 1468 wrote to memory of 1784 1468 cmd.exe 33 PID 1468 wrote to memory of 1784 1468 cmd.exe 33 PID 1716 wrote to memory of 1868 1716 taskeng.exe 35 PID 1716 wrote to memory of 1868 1716 taskeng.exe 35 PID 1716 wrote to memory of 1868 1716 taskeng.exe 35 PID 1716 wrote to memory of 1868 1716 taskeng.exe 35 PID 1784 wrote to memory of 828 1784 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 36 PID 1784 wrote to memory of 828 1784 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 36 PID 1784 wrote to memory of 828 1784 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 36 PID 1784 wrote to memory of 828 1784 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 36 PID 1784 wrote to memory of 828 1784 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 36 PID 1784 wrote to memory of 828 1784 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 36 PID 1784 wrote to memory of 828 1784 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 36 PID 1784 wrote to memory of 828 1784 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 36 PID 1784 wrote to memory of 828 1784 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 36 PID 1868 wrote to memory of 872 1868 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 37 PID 1868 wrote to memory of 872 1868 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 37 PID 1868 wrote to memory of 872 1868 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 37 PID 1868 wrote to memory of 872 1868 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 37 PID 1868 wrote to memory of 872 1868 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 37 PID 1868 wrote to memory of 872 1868 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 37 PID 1868 wrote to memory of 872 1868 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 37 PID 1868 wrote to memory of 872 1868 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 37 PID 1868 wrote to memory of 872 1868 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 37 PID 1716 wrote to memory of 1332 1716 taskeng.exe 38 PID 1716 wrote to memory of 1332 1716 taskeng.exe 38 PID 1716 wrote to memory of 1332 1716 taskeng.exe 38 PID 1716 wrote to memory of 1332 1716 taskeng.exe 38 PID 1332 wrote to memory of 372 1332 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 39 PID 1332 wrote to memory of 372 1332 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 39 PID 1332 wrote to memory of 372 1332 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 39 PID 1332 wrote to memory of 372 1332 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 39 PID 1332 wrote to memory of 372 1332 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 39 PID 1332 wrote to memory of 372 1332 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 39 PID 1332 wrote to memory of 372 1332 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 39 PID 1332 wrote to memory of 372 1332 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 39 PID 1332 wrote to memory of 372 1332 95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe"C:\Users\Admin\AppData\Local\Temp\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe"3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1992
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:1796
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1708
-
-
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe"C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe"{path}"5⤵
- Executes dropped EXE
PID:828
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {37100878-B32A-4848-BD56-40ABA9593383} S-1-5-21-3518257231-2980324860-1431329550-1000:VWMLZJGN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exeC:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe"{path}"3⤵
- Executes dropped EXE
PID:872
-
-
-
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exeC:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe"{path}"3⤵
- Executes dropped EXE
PID:372
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe
Filesize2.2MB
MD518434574bc13a42141f4657759898410
SHA1a02eefcba33a8d3e8bd3627d923381bf1dfd0920
SHA25695c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0
SHA512434015561e0ffb381003b715ecd539e19bdccf02ac9edb9c6a3bdc2da84bbc4ce2eea471188b89f41393d6e72596d00ceec43e159dc2ccfff778372a4bcecc98
-
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe
Filesize2.2MB
MD518434574bc13a42141f4657759898410
SHA1a02eefcba33a8d3e8bd3627d923381bf1dfd0920
SHA25695c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0
SHA512434015561e0ffb381003b715ecd539e19bdccf02ac9edb9c6a3bdc2da84bbc4ce2eea471188b89f41393d6e72596d00ceec43e159dc2ccfff778372a4bcecc98
-
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe
Filesize2.2MB
MD518434574bc13a42141f4657759898410
SHA1a02eefcba33a8d3e8bd3627d923381bf1dfd0920
SHA25695c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0
SHA512434015561e0ffb381003b715ecd539e19bdccf02ac9edb9c6a3bdc2da84bbc4ce2eea471188b89f41393d6e72596d00ceec43e159dc2ccfff778372a4bcecc98
-
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe
Filesize2.2MB
MD518434574bc13a42141f4657759898410
SHA1a02eefcba33a8d3e8bd3627d923381bf1dfd0920
SHA25695c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0
SHA512434015561e0ffb381003b715ecd539e19bdccf02ac9edb9c6a3bdc2da84bbc4ce2eea471188b89f41393d6e72596d00ceec43e159dc2ccfff778372a4bcecc98
-
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe
Filesize2.2MB
MD518434574bc13a42141f4657759898410
SHA1a02eefcba33a8d3e8bd3627d923381bf1dfd0920
SHA25695c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0
SHA512434015561e0ffb381003b715ecd539e19bdccf02ac9edb9c6a3bdc2da84bbc4ce2eea471188b89f41393d6e72596d00ceec43e159dc2ccfff778372a4bcecc98
-
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe
Filesize2.2MB
MD518434574bc13a42141f4657759898410
SHA1a02eefcba33a8d3e8bd3627d923381bf1dfd0920
SHA25695c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0
SHA512434015561e0ffb381003b715ecd539e19bdccf02ac9edb9c6a3bdc2da84bbc4ce2eea471188b89f41393d6e72596d00ceec43e159dc2ccfff778372a4bcecc98
-
C:\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe
Filesize2.2MB
MD518434574bc13a42141f4657759898410
SHA1a02eefcba33a8d3e8bd3627d923381bf1dfd0920
SHA25695c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0
SHA512434015561e0ffb381003b715ecd539e19bdccf02ac9edb9c6a3bdc2da84bbc4ce2eea471188b89f41393d6e72596d00ceec43e159dc2ccfff778372a4bcecc98
-
\Users\Admin\AppData\Local\ServiceHub\95c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0.exe
Filesize2.2MB
MD518434574bc13a42141f4657759898410
SHA1a02eefcba33a8d3e8bd3627d923381bf1dfd0920
SHA25695c8457d231c9d28ead95f7cd8032a0049663b5540582874bb4a1937cd0870d0
SHA512434015561e0ffb381003b715ecd539e19bdccf02ac9edb9c6a3bdc2da84bbc4ce2eea471188b89f41393d6e72596d00ceec43e159dc2ccfff778372a4bcecc98