Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 02:35
Behavioral task
behavioral1
Sample
Ransomware.exe
Resource
win7-20240903-en
General
-
Target
Ransomware.exe
-
Size
113KB
-
MD5
9d6c2430dba01a6d51bcae957a6b73b2
-
SHA1
fb17425c5227ee3bcb975870a2320a3deab7df93
-
SHA256
f7aef424b5ac320e0833c9cc9be68a491a39eff100fd14f01ebd5ae68db76b46
-
SHA512
c81750ba6dee49d4612c39a57c9d89f7a494f21ec0a56daede51cfb0d58c5079fef6bdfb5722d432c6c73a2ba83edb4d369624ee235ed5ad9db0dbe4fc01e563
-
SSDEEP
3072:JdzpRExiXwVehVee336bkoeKyH/lFZji:J1pewqehVe+6bUT/lFZ
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Ransomware.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ransomware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.ecrp\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Ransomware.exe %1" Ransomware.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.ecrp Ransomware.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.ecrp\shell\open\command Ransomware.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.ecrp\shell Ransomware.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\.ecrp\shell\open Ransomware.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe 3156 Ransomware.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3156 Ransomware.exe Token: SeBackupPrivilege 5040 vssvc.exe Token: SeRestorePrivilege 5040 vssvc.exe Token: SeAuditPrivilege 5040 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3156 wrote to memory of 2864 3156 Ransomware.exe 90 PID 3156 wrote to memory of 2864 3156 Ransomware.exe 90 PID 3156 wrote to memory of 2864 3156 Ransomware.exe 90 PID 2864 wrote to memory of 4992 2864 cmd.exe 92 PID 2864 wrote to memory of 4992 2864 cmd.exe 92 PID 2864 wrote to memory of 4992 2864 cmd.exe 92 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ransomware.exe"C:\Users\Admin\AppData\Local\Temp\Ransomware.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && vssadmin delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:4992
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5040