Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
184s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
10/09/2022, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe
Resource
win10-20220812-en
General
-
Target
a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe
-
Size
3.6MB
-
MD5
12583302bd6fc5d3f49bf40c9d176645
-
SHA1
3fce0fe8a822ac7d55423df2b2ce883c623c6ef3
-
SHA256
a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9
-
SHA512
72de6ca43b7d43478e0f793093231a9f6682deca562f7bf02271522a587d5f773c7c601fc66d14f2f7691119efa066f974fa3ca35a224237a7312638a037e0f4
-
SSDEEP
98304:Z7iwN/unOsJdeRtOzMMGJPV/6pUfsXQ7O6+R:DMOswtOEPV2bXQ7O6
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4324 set thread context of 4308 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 67 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 InstallUtil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier InstallUtil.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1672 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 4308 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe Token: SeDebugPrivilege 4308 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4324 wrote to memory of 4308 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 67 PID 4324 wrote to memory of 4308 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 67 PID 4324 wrote to memory of 4308 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 67 PID 4324 wrote to memory of 4308 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 67 PID 4324 wrote to memory of 4308 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 67 PID 4324 wrote to memory of 4308 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 67 PID 4324 wrote to memory of 4308 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 67 PID 4324 wrote to memory of 4308 4324 a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe 67 PID 4308 wrote to memory of 656 4308 InstallUtil.exe 69 PID 4308 wrote to memory of 656 4308 InstallUtil.exe 69 PID 4308 wrote to memory of 656 4308 InstallUtil.exe 69 PID 656 wrote to memory of 3948 656 cmd.exe 71 PID 656 wrote to memory of 3948 656 cmd.exe 71 PID 656 wrote to memory of 3948 656 cmd.exe 71 PID 656 wrote to memory of 860 656 cmd.exe 72 PID 656 wrote to memory of 860 656 cmd.exe 72 PID 656 wrote to memory of 860 656 cmd.exe 72 PID 656 wrote to memory of 4924 656 cmd.exe 73 PID 656 wrote to memory of 4924 656 cmd.exe 73 PID 656 wrote to memory of 4924 656 cmd.exe 73 PID 4308 wrote to memory of 1468 4308 InstallUtil.exe 74 PID 4308 wrote to memory of 1468 4308 InstallUtil.exe 74 PID 4308 wrote to memory of 1468 4308 InstallUtil.exe 74 PID 1468 wrote to memory of 3996 1468 cmd.exe 76 PID 1468 wrote to memory of 3996 1468 cmd.exe 76 PID 1468 wrote to memory of 3996 1468 cmd.exe 76 PID 1468 wrote to memory of 4832 1468 cmd.exe 77 PID 1468 wrote to memory of 4832 1468 cmd.exe 77 PID 1468 wrote to memory of 4832 1468 cmd.exe 77 PID 1468 wrote to memory of 8 1468 cmd.exe 78 PID 1468 wrote to memory of 8 1468 cmd.exe 78 PID 1468 wrote to memory of 8 1468 cmd.exe 78 PID 4308 wrote to memory of 360 4308 InstallUtil.exe 79 PID 4308 wrote to memory of 360 4308 InstallUtil.exe 79 PID 4308 wrote to memory of 360 4308 InstallUtil.exe 79 PID 360 wrote to memory of 2632 360 cmd.exe 81 PID 360 wrote to memory of 2632 360 cmd.exe 81 PID 360 wrote to memory of 2632 360 cmd.exe 81 PID 360 wrote to memory of 1672 360 cmd.exe 82 PID 360 wrote to memory of 1672 360 cmd.exe 82 PID 360 wrote to memory of 1672 360 cmd.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe"C:\Users\Admin\AppData\Local\Temp\a329745d4c6c9ac95b742d6e42829ac510887330084f7005d24e0ad6a09714f9.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4308 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:3948
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵PID:860
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵PID:4924
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key3⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:3996
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile name="65001" key=clear4⤵PID:4832
-
-
C:\Windows\SysWOW64\findstr.exefindstr Key4⤵PID:8
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:2632
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:1672
-
-
-