Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 20:54
Behavioral task
behavioral1
Sample
17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe
Resource
win10v2004-20240419-en
General
-
Target
17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe
-
Size
70KB
-
MD5
d7d06a5643291ff48ed602b773264f25
-
SHA1
86a43422686cedc96fdcf739ade018f7c0d8a054
-
SHA256
17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202
-
SHA512
2a76a73774c5dc6486444506ca980b6ff4c4bf03fcd77023ac6c1e77e50cd5b1bd9fcf8318971d22cd5866d45c9719db35cf3c6e0322ba2cfcb4923ede3eb957
-
SSDEEP
384:mIvRBy67ui/aDK+8zfP4mCxFkEL68DDkJsl38dDnaxg679Poww4glQhgLU07kRI1:jvciiDK+8DyNTcJ+s9naW+9SLf
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2612 2848 WerFault.exe 27 -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2872 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2872 2848 17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe 28 PID 2848 wrote to memory of 2872 2848 17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe 28 PID 2848 wrote to memory of 2872 2848 17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe 28 PID 2848 wrote to memory of 2872 2848 17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe 28 PID 2848 wrote to memory of 2612 2848 17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe 29 PID 2848 wrote to memory of 2612 2848 17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe 29 PID 2848 wrote to memory of 2612 2848 17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe 29 PID 2848 wrote to memory of 2612 2848 17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe"C:\Users\Admin\AppData\Local\Temp\17f6063bb270cd10ece9002bedb90c84711b6efe6a1a66b52d254b4532264202.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Dialog.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 9202⤵
- Program crash
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51a9eeb355c464755c06d26042c545ca6
SHA19d0dda756fdc6fc64de06675529d976c12637723
SHA2566ea4dad6a2e4cdbcf2f2ee09aebe2b90d966725979e7c9d268a7ffe658381d5b
SHA51293cef6bfa3fe50e4b42b78ad40d751edbc90abdd41534696cfe01cb1cb068dcad6eba2ddb782d2eb6a7eb7e07aef4bb91e2feca4f44da28e892cca50e6739296