Analysis
-
max time kernel
124s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 19:44
Behavioral task
behavioral1
Sample
260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe
Resource
win10v2004-20240226-en
General
-
Target
260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe
-
Size
105KB
-
MD5
541094bc5f7e928f7268be6bc24bae48
-
SHA1
5b159e8afb0f53fcd655ea9b40c07f145a2c7e1d
-
SHA256
260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e
-
SHA512
5fa2aab3bb812a23ad49884679cd7f8da3fcb930e7237d6947384166084d41841eed863b26c910fb56c32c847b1d5ede73563a927506dcbeb4f933a0ca21bd61
-
SSDEEP
1536:1xVz5Vw8mvalcPRdnQZZZZZZZZZonqEKmv0A0bx02vrd4dZji:vVFi8mvgcJFqErvD0bx02jduZji
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1992 vssadmin.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.ecrp 260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.ecrp\shell\open\command 260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.ecrp\shell 260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.ecrp\shell\open 260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.ecrp\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe %1" 260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 1876 vssvc.exe Token: SeRestorePrivilege 1876 vssvc.exe Token: SeAuditPrivilege 1876 vssvc.exe Token: SeDebugPrivilege 2820 260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2820 wrote to memory of 1696 2820 260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe 32 PID 2820 wrote to memory of 1696 2820 260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe 32 PID 2820 wrote to memory of 1696 2820 260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe 32 PID 2820 wrote to memory of 1696 2820 260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe 32 PID 1696 wrote to memory of 2008 1696 cmd.exe 34 PID 1696 wrote to memory of 2008 1696 cmd.exe 34 PID 1696 wrote to memory of 2008 1696 cmd.exe 34 PID 1696 wrote to memory of 2008 1696 cmd.exe 34 PID 1696 wrote to memory of 1992 1696 cmd.exe 35 PID 1696 wrote to memory of 1992 1696 cmd.exe 35 PID 1696 wrote to memory of 1992 1696 cmd.exe 35 PID 1696 wrote to memory of 1992 1696 cmd.exe 35 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe"C:\Users\Admin\AppData\Local\Temp\260bf3d587c5bd04e5e382e6f6c76da3e2439171998d1ae30aa5dc366fd00d7e.exe"1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && vssadmin delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2008
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1992
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1876