Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2023 16:40

General

  • Target

    0x0003000000000731-1007.exe

  • Size

    14KB

  • MD5

    a922561dc3eb681a439a93b07257f606

  • SHA1

    ed45d4bfcdcfcc226bd6e66ce772f3c20b7e8241

  • SHA256

    a9744c5c29b2455061dabc72c660a9737bac2600ea2895d9d24c5099ff7d421b

  • SHA512

    25d74be339bdd2fab4af1e52304a9c131271068baefde87a33d8a3df9160a0ea9f90358e4228faf79d8e97d2a7ffd9503122b18f238b3f470a956509608433d9

  • SSDEEP

    384:frnPpyQr13n3KBIPVIJv9zo5+mbVjyN6Tw/j0asEkx:1qv9M/bM7Yaq

Score
10/10

Malware Config

Extracted

Family

eternity

Wallets

47vk9PbPuHnEnazCn4tLpwPCWRLSMhpX9PD8WqpjchhTXisimD6j8EvRFDbPQHKUmHVq3vAM3DLytXLg8CqcdRXRFdPe92Q

Attributes
  • payload_urls

    https://raw.githubusercontent.com/VolVeRFM/SilentMiner-VolVeR/main/VolVeRBuilder/Resources/xmrig.exe

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x0003000000000731-1007.exe
    "C:\Users\Admin\AppData\Local\Temp\0x0003000000000731-1007.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "0x0003000000000731-1007" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\0x0003000000000731-1007.exe" &&START "" "C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe"
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
          PID:2764
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:2800
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /tn "0x0003000000000731-1007" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe" /rl HIGHEST /f
          3⤵
          • Creates scheduled task(s)
          PID:2552
        • C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe
          "C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2096
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 1188
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:2588
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {2C51A934-86EA-4F2B-ADFB-8EE6145D9182} S-1-5-21-2084844033-2744876406-2053742436-1000:GGPVHMXR\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe
        C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe
        2⤵
        • Executes dropped EXE
        PID:2368
      • C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe
        C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe
        2⤵
        • Executes dropped EXE
        PID:808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe

      Filesize

      14KB

      MD5

      a922561dc3eb681a439a93b07257f606

      SHA1

      ed45d4bfcdcfcc226bd6e66ce772f3c20b7e8241

      SHA256

      a9744c5c29b2455061dabc72c660a9737bac2600ea2895d9d24c5099ff7d421b

      SHA512

      25d74be339bdd2fab4af1e52304a9c131271068baefde87a33d8a3df9160a0ea9f90358e4228faf79d8e97d2a7ffd9503122b18f238b3f470a956509608433d9

    • C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe

      Filesize

      14KB

      MD5

      a922561dc3eb681a439a93b07257f606

      SHA1

      ed45d4bfcdcfcc226bd6e66ce772f3c20b7e8241

      SHA256

      a9744c5c29b2455061dabc72c660a9737bac2600ea2895d9d24c5099ff7d421b

      SHA512

      25d74be339bdd2fab4af1e52304a9c131271068baefde87a33d8a3df9160a0ea9f90358e4228faf79d8e97d2a7ffd9503122b18f238b3f470a956509608433d9

    • C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe

      Filesize

      14KB

      MD5

      a922561dc3eb681a439a93b07257f606

      SHA1

      ed45d4bfcdcfcc226bd6e66ce772f3c20b7e8241

      SHA256

      a9744c5c29b2455061dabc72c660a9737bac2600ea2895d9d24c5099ff7d421b

      SHA512

      25d74be339bdd2fab4af1e52304a9c131271068baefde87a33d8a3df9160a0ea9f90358e4228faf79d8e97d2a7ffd9503122b18f238b3f470a956509608433d9

    • C:\Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe

      Filesize

      14KB

      MD5

      a922561dc3eb681a439a93b07257f606

      SHA1

      ed45d4bfcdcfcc226bd6e66ce772f3c20b7e8241

      SHA256

      a9744c5c29b2455061dabc72c660a9737bac2600ea2895d9d24c5099ff7d421b

      SHA512

      25d74be339bdd2fab4af1e52304a9c131271068baefde87a33d8a3df9160a0ea9f90358e4228faf79d8e97d2a7ffd9503122b18f238b3f470a956509608433d9

    • \Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe

      Filesize

      14KB

      MD5

      a922561dc3eb681a439a93b07257f606

      SHA1

      ed45d4bfcdcfcc226bd6e66ce772f3c20b7e8241

      SHA256

      a9744c5c29b2455061dabc72c660a9737bac2600ea2895d9d24c5099ff7d421b

      SHA512

      25d74be339bdd2fab4af1e52304a9c131271068baefde87a33d8a3df9160a0ea9f90358e4228faf79d8e97d2a7ffd9503122b18f238b3f470a956509608433d9

    • \Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe

      Filesize

      14KB

      MD5

      a922561dc3eb681a439a93b07257f606

      SHA1

      ed45d4bfcdcfcc226bd6e66ce772f3c20b7e8241

      SHA256

      a9744c5c29b2455061dabc72c660a9737bac2600ea2895d9d24c5099ff7d421b

      SHA512

      25d74be339bdd2fab4af1e52304a9c131271068baefde87a33d8a3df9160a0ea9f90358e4228faf79d8e97d2a7ffd9503122b18f238b3f470a956509608433d9

    • \Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe

      Filesize

      14KB

      MD5

      a922561dc3eb681a439a93b07257f606

      SHA1

      ed45d4bfcdcfcc226bd6e66ce772f3c20b7e8241

      SHA256

      a9744c5c29b2455061dabc72c660a9737bac2600ea2895d9d24c5099ff7d421b

      SHA512

      25d74be339bdd2fab4af1e52304a9c131271068baefde87a33d8a3df9160a0ea9f90358e4228faf79d8e97d2a7ffd9503122b18f238b3f470a956509608433d9

    • \Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe

      Filesize

      14KB

      MD5

      a922561dc3eb681a439a93b07257f606

      SHA1

      ed45d4bfcdcfcc226bd6e66ce772f3c20b7e8241

      SHA256

      a9744c5c29b2455061dabc72c660a9737bac2600ea2895d9d24c5099ff7d421b

      SHA512

      25d74be339bdd2fab4af1e52304a9c131271068baefde87a33d8a3df9160a0ea9f90358e4228faf79d8e97d2a7ffd9503122b18f238b3f470a956509608433d9

    • \Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe

      Filesize

      14KB

      MD5

      a922561dc3eb681a439a93b07257f606

      SHA1

      ed45d4bfcdcfcc226bd6e66ce772f3c20b7e8241

      SHA256

      a9744c5c29b2455061dabc72c660a9737bac2600ea2895d9d24c5099ff7d421b

      SHA512

      25d74be339bdd2fab4af1e52304a9c131271068baefde87a33d8a3df9160a0ea9f90358e4228faf79d8e97d2a7ffd9503122b18f238b3f470a956509608433d9

    • \Users\Admin\AppData\Local\ServiceHub\0x0003000000000731-1007.exe

      Filesize

      14KB

      MD5

      a922561dc3eb681a439a93b07257f606

      SHA1

      ed45d4bfcdcfcc226bd6e66ce772f3c20b7e8241

      SHA256

      a9744c5c29b2455061dabc72c660a9737bac2600ea2895d9d24c5099ff7d421b

      SHA512

      25d74be339bdd2fab4af1e52304a9c131271068baefde87a33d8a3df9160a0ea9f90358e4228faf79d8e97d2a7ffd9503122b18f238b3f470a956509608433d9

    • memory/536-0-0x0000000000D60000-0x0000000000D6A000-memory.dmp

      Filesize

      40KB

    • memory/536-4-0x0000000074450000-0x0000000074B3E000-memory.dmp

      Filesize

      6.9MB

    • memory/536-1-0x0000000074450000-0x0000000074B3E000-memory.dmp

      Filesize

      6.9MB

    • memory/808-22-0x0000000073D60000-0x000000007444E000-memory.dmp

      Filesize

      6.9MB

    • memory/2096-9-0x0000000073D60000-0x000000007444E000-memory.dmp

      Filesize

      6.9MB

    • memory/2096-8-0x00000000009A0000-0x00000000009AA000-memory.dmp

      Filesize

      40KB

    • memory/2096-10-0x0000000004260000-0x00000000042A0000-memory.dmp

      Filesize

      256KB

    • memory/2096-16-0x0000000073D60000-0x000000007444E000-memory.dmp

      Filesize

      6.9MB

    • memory/2096-17-0x0000000004260000-0x00000000042A0000-memory.dmp

      Filesize

      256KB

    • memory/2368-19-0x0000000073D60000-0x000000007444E000-memory.dmp

      Filesize

      6.9MB

    • memory/2368-20-0x0000000073D60000-0x000000007444E000-memory.dmp

      Filesize

      6.9MB