Analysis
-
max time kernel
293s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08-08-2023 04:04
Static task
static1
Behavioral task
behavioral1
Sample
8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe
Resource
win10-20230703-en
General
-
Target
8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe
-
Size
1.4MB
-
MD5
88ad6b11165e045a4b03a6eec6546c31
-
SHA1
b16a4d87ad03557d72b162a26f66bfdc43c855c6
-
SHA256
8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c
-
SHA512
e4e34af5fe2cd0fd1a4d969c4b86ccb9763cc97931da1d73171c293eb888b6d2e45022667a1482e4a1625b117e8b579ac47d6398f362f9e4066f1841a57551aa
-
SSDEEP
24576:iyMtE3yw022MWRrGWOK+0QLTW/NdJrrGWU9G5EvsJ/1nWoBRFmpPvwuM8+re:U23ywWTr+k/NdJeaEvO/HBPmQuMBre
Malware Config
Extracted
eternity
-
payload_urls
http://162.244.93.4/~rubin/swo.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Executes dropped EXE 6 IoCs
pid Process 2596 vbc.exe 2812 vbc.exe 2468 vbc.exe 2748 vbc.exe 240 vbc.exe 2600 vbc.exe -
Loads dropped DLL 1 IoCs
pid Process 2160 cmd.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 2316 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe 28 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3032 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2016 PING.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe Token: 33 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe Token: SeIncBasePriorityPrivilege 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2316 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe 28 PID 1700 wrote to memory of 2316 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe 28 PID 1700 wrote to memory of 2316 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe 28 PID 1700 wrote to memory of 2316 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe 28 PID 1700 wrote to memory of 2316 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe 28 PID 1700 wrote to memory of 2316 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe 28 PID 1700 wrote to memory of 2316 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe 28 PID 1700 wrote to memory of 2316 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe 28 PID 1700 wrote to memory of 2316 1700 8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe 28 PID 2316 wrote to memory of 2160 2316 vbc.exe 29 PID 2316 wrote to memory of 2160 2316 vbc.exe 29 PID 2316 wrote to memory of 2160 2316 vbc.exe 29 PID 2316 wrote to memory of 2160 2316 vbc.exe 29 PID 2160 wrote to memory of 2492 2160 cmd.exe 31 PID 2160 wrote to memory of 2492 2160 cmd.exe 31 PID 2160 wrote to memory of 2492 2160 cmd.exe 31 PID 2160 wrote to memory of 2492 2160 cmd.exe 31 PID 2160 wrote to memory of 2016 2160 cmd.exe 32 PID 2160 wrote to memory of 2016 2160 cmd.exe 32 PID 2160 wrote to memory of 2016 2160 cmd.exe 32 PID 2160 wrote to memory of 2016 2160 cmd.exe 32 PID 2160 wrote to memory of 3032 2160 cmd.exe 33 PID 2160 wrote to memory of 3032 2160 cmd.exe 33 PID 2160 wrote to memory of 3032 2160 cmd.exe 33 PID 2160 wrote to memory of 3032 2160 cmd.exe 33 PID 2160 wrote to memory of 2596 2160 cmd.exe 34 PID 2160 wrote to memory of 2596 2160 cmd.exe 34 PID 2160 wrote to memory of 2596 2160 cmd.exe 34 PID 2160 wrote to memory of 2596 2160 cmd.exe 34 PID 2704 wrote to memory of 2812 2704 taskeng.exe 39 PID 2704 wrote to memory of 2812 2704 taskeng.exe 39 PID 2704 wrote to memory of 2812 2704 taskeng.exe 39 PID 2704 wrote to memory of 2812 2704 taskeng.exe 39 PID 2704 wrote to memory of 2468 2704 taskeng.exe 41 PID 2704 wrote to memory of 2468 2704 taskeng.exe 41 PID 2704 wrote to memory of 2468 2704 taskeng.exe 41 PID 2704 wrote to memory of 2468 2704 taskeng.exe 41 PID 2704 wrote to memory of 2748 2704 taskeng.exe 43 PID 2704 wrote to memory of 2748 2704 taskeng.exe 43 PID 2704 wrote to memory of 2748 2704 taskeng.exe 43 PID 2704 wrote to memory of 2748 2704 taskeng.exe 43 PID 2704 wrote to memory of 240 2704 taskeng.exe 45 PID 2704 wrote to memory of 240 2704 taskeng.exe 45 PID 2704 wrote to memory of 240 2704 taskeng.exe 45 PID 2704 wrote to memory of 240 2704 taskeng.exe 45 PID 2704 wrote to memory of 2600 2704 taskeng.exe 47 PID 2704 wrote to memory of 2600 2704 taskeng.exe 47 PID 2704 wrote to memory of 2600 2704 taskeng.exe 47 PID 2704 wrote to memory of 2600 2704 taskeng.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe"C:\Users\Admin\AppData\Local\Temp\8208c61fb8ae7da93969954ea176ed3730310c2c99d1199094a2cffa491cb23c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "vbc" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\vbc.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\vbc.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:2492
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:2016
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "vbc" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\vbc.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:3032
-
-
C:\Users\Admin\AppData\Local\ServiceHub\vbc.exe"C:\Users\Admin\AppData\Local\ServiceHub\vbc.exe"4⤵
- Executes dropped EXE
PID:2596
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D10275B2-4652-45B2-B00F-7F9B9B8B4384} S-1-5-21-4219371764-2579186923-3390623117-1000:NVACMPYA\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\ServiceHub\vbc.exeC:\Users\Admin\AppData\Local\ServiceHub\vbc.exe2⤵
- Executes dropped EXE
PID:2812
-
-
C:\Users\Admin\AppData\Local\ServiceHub\vbc.exeC:\Users\Admin\AppData\Local\ServiceHub\vbc.exe2⤵
- Executes dropped EXE
PID:2468
-
-
C:\Users\Admin\AppData\Local\ServiceHub\vbc.exeC:\Users\Admin\AppData\Local\ServiceHub\vbc.exe2⤵
- Executes dropped EXE
PID:2748
-
-
C:\Users\Admin\AppData\Local\ServiceHub\vbc.exeC:\Users\Admin\AppData\Local\ServiceHub\vbc.exe2⤵
- Executes dropped EXE
PID:240
-
-
C:\Users\Admin\AppData\Local\ServiceHub\vbc.exeC:\Users\Admin\AppData\Local\ServiceHub\vbc.exe2⤵
- Executes dropped EXE
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD51f7bccc57d21a4bfeddaafe514cfd74d
SHA14dab09179a12468cb1757cb7ca26e06d616b0a8d
SHA256d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061
SHA5129e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8
-
Filesize
2.6MB
MD51f7bccc57d21a4bfeddaafe514cfd74d
SHA14dab09179a12468cb1757cb7ca26e06d616b0a8d
SHA256d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061
SHA5129e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8
-
Filesize
2.6MB
MD51f7bccc57d21a4bfeddaafe514cfd74d
SHA14dab09179a12468cb1757cb7ca26e06d616b0a8d
SHA256d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061
SHA5129e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8
-
Filesize
2.6MB
MD51f7bccc57d21a4bfeddaafe514cfd74d
SHA14dab09179a12468cb1757cb7ca26e06d616b0a8d
SHA256d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061
SHA5129e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8
-
Filesize
2.6MB
MD51f7bccc57d21a4bfeddaafe514cfd74d
SHA14dab09179a12468cb1757cb7ca26e06d616b0a8d
SHA256d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061
SHA5129e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8
-
Filesize
2.6MB
MD51f7bccc57d21a4bfeddaafe514cfd74d
SHA14dab09179a12468cb1757cb7ca26e06d616b0a8d
SHA256d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061
SHA5129e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8
-
Filesize
2.6MB
MD51f7bccc57d21a4bfeddaafe514cfd74d
SHA14dab09179a12468cb1757cb7ca26e06d616b0a8d
SHA256d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061
SHA5129e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8
-
Filesize
2.6MB
MD51f7bccc57d21a4bfeddaafe514cfd74d
SHA14dab09179a12468cb1757cb7ca26e06d616b0a8d
SHA256d4cb7377e8275ed47e499ab0d7ee47167829a5931ba41aa5790593595a7e1061
SHA5129e639c777dc2d456f038c14efb7cbc871ceb1d7380a74d18fb722a28901357ccb1166c0d883562280e030f0252004ca13a1371ea480d0523c435cd0a6d9f43d8