Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 01:49
Behavioral task
behavioral1
Sample
8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7.exe
Resource
win10v2004-20240419-en
General
-
Target
8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7.exe
-
Size
78KB
-
MD5
4c44d05d5a5c2bddf8abedf86a434cec
-
SHA1
e6ee1bde5ad8790daca0d0dbd312e89510c488e1
-
SHA256
8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7
-
SHA512
b551b68e17deadd562c35d007797b1e4516c6c85ef9940ef530c8627b75e41bcde52996368efdf5e0d989d9f8635787c685159eba2ee0d336e9f0919f054857b
-
SSDEEP
768:3dNl4J8XyXuMmP/3JLlMCRXOdfgvhQnaFOnTR:NNiJ84mP/R6IXOza8TR
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2280 2104 WerFault.exe 27 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 DllHost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2280 2104 8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7.exe 29 PID 2104 wrote to memory of 2280 2104 8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7.exe 29 PID 2104 wrote to memory of 2280 2104 8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7.exe 29 PID 2104 wrote to memory of 2280 2104 8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7.exe"C:\Users\Admin\AppData\Local\Temp\8e0fb7d5270d146876c7fec1a3b74c21eb9a16673ca0e5d54010ba5d5448a3f7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 9962⤵
- Program crash
PID:2280
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52b478239f1e085b8ad0c9ff866a40de6
SHA15238652ab4f7bcb1d544ab8a5a6883494abbbb28
SHA2561a173680f101e8875d4a1fafed432c2b5740583ebdf4757da8592d54742be8fe
SHA5124d1cdcaab3011a46f78f22a0af540391bd4d65f38784b3214c02390085ebe2c3c8c2c8654ae1f88244e4f6d0c69dd43ead66a76ccd4431ab1b1cb768704d1ebc