Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2024 01:49

General

  • Target

    8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7.exe

  • Size

    78KB

  • MD5

    4c44d05d5a5c2bddf8abedf86a434cec

  • SHA1

    e6ee1bde5ad8790daca0d0dbd312e89510c488e1

  • SHA256

    8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7

  • SHA512

    b551b68e17deadd562c35d007797b1e4516c6c85ef9940ef530c8627b75e41bcde52996368efdf5e0d989d9f8635787c685159eba2ee0d336e9f0919f054857b

  • SSDEEP

    768:3dNl4J8XyXuMmP/3JLlMCRXOdfgvhQnaFOnTR:NNiJ84mP/R6IXOza8TR

Score
10/10

Malware Config

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7.exe
    "C:\Users\Admin\AppData\Local\Temp\8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 996
      2⤵
      • Program crash
      PID:2280
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\150x150Logo.scale-180_contrast-white.png

    Filesize

    1KB

    MD5

    2b478239f1e085b8ad0c9ff866a40de6

    SHA1

    5238652ab4f7bcb1d544ab8a5a6883494abbbb28

    SHA256

    1a173680f101e8875d4a1fafed432c2b5740583ebdf4757da8592d54742be8fe

    SHA512

    4d1cdcaab3011a46f78f22a0af540391bd4d65f38784b3214c02390085ebe2c3c8c2c8654ae1f88244e4f6d0c69dd43ead66a76ccd4431ab1b1cb768704d1ebc

  • memory/2104-0-0x0000000074BAE000-0x0000000074BAF000-memory.dmp

    Filesize

    4KB

  • memory/2104-1-0x00000000001C0000-0x00000000001DA000-memory.dmp

    Filesize

    104KB

  • memory/2104-3-0x0000000074BA0000-0x000000007528E000-memory.dmp

    Filesize

    6.9MB

  • memory/2104-4-0x0000000000560000-0x0000000000562000-memory.dmp

    Filesize

    8KB

  • memory/2104-11-0x0000000074BA0000-0x000000007528E000-memory.dmp

    Filesize

    6.9MB

  • memory/3068-5-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB

  • memory/3068-7-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB

  • memory/3068-12-0x00000000002D0000-0x00000000002D1000-memory.dmp

    Filesize

    4KB