Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05-05-2024 01:06
Behavioral task
behavioral1
Sample
7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe
Resource
win10v2004-20240226-en
General
-
Target
7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe
-
Size
183KB
-
MD5
4e0c2b0be4b7176df83b2123f21618a0
-
SHA1
5b27e3ee25e574d5b53d6afadc57ef1441d86bed
-
SHA256
7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37
-
SHA512
c6ec7732e099958c4a504a15a0c94a63732a9a9a97729e70ae6837f951566ead8edb38fb7924c55b57be429ec39eb9ad3198a50b99cd9781bc8b0b39afd6eb34
-
SSDEEP
3072:MCduld6RDPgu7pIov+ZeONmgm0BIm6OzrV0NoVMF4seX8quHuzQU128jF:M/l8cCpIyFOIxzyruNWe4seXIH4t
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Executes dropped EXE 2 IoCs
pid Process 1748 NSudo_x64.exe 1340 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 2240 7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe 1340 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1360 2240 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1748 2240 7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe 28 PID 2240 wrote to memory of 1748 2240 7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe 28 PID 2240 wrote to memory of 1748 2240 7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe 28 PID 2240 wrote to memory of 1748 2240 7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe 28 PID 2240 wrote to memory of 1360 2240 7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe 29 PID 2240 wrote to memory of 1360 2240 7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe 29 PID 2240 wrote to memory of 1360 2240 7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe 29 PID 2240 wrote to memory of 1360 2240 7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe"C:\Users\Admin\AppData\Local\Temp\7cb637e7b9fd78267742aeddc3c40aa5d4b77b3210bf24cf71cb021046591a37.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\NSudo_x64.exe"C:\Users\Admin\AppData\Local\Temp\NSudo_x64.exe"2⤵
- Executes dropped EXE
PID:1748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 9242⤵
- Program crash
PID:1360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD57aacfd85b8dff0aa6867bede82cfd147
SHA1e783f6d4b754ea8424699203b8831bdc9cbdd4e6
SHA256871e4f28fe39bcad8d295ae46e148be458778c0195ed660b7db18eb595d00bd8
SHA51259cce358c125368dc5735a28960ddb7ee49835ca19f44255a7ae858ddd8a2db68c72c3f6818eca3678d989041043876e339f9fafe1d81d26001286494a8014f0