Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
89s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/09/2022, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe
Resource
win10-20220812-en
General
-
Target
e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe
-
Size
5.9MB
-
MD5
77bf70f8c1da395f912d51fff3e6b18a
-
SHA1
b43ba34649de3f6a1371d50cfe54f81e1fbf23f4
-
SHA256
e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729
-
SHA512
07b53ffe3ead2b151c17c97c1af025bf81313cd26e92f73508680ca7c273c1494de0f36ca7038ae9c39c74395cf1c36daa5fa2ba051058b17f08cac85bb7550d
-
SSDEEP
98304:MyPKcjUaampDA4HZpEkEno6DxWd9NadL+++zMap5Eiyao6UTzm9gFJFjH:zicdampfHZ6fo6DxLu/p5EiC6U2qfF
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1552 set thread context of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 InstallUtil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier InstallUtil.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1652 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 1764 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe Token: SeDebugPrivilege 1764 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 PID 1552 wrote to memory of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 PID 1552 wrote to memory of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 PID 1552 wrote to memory of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 PID 1552 wrote to memory of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 PID 1552 wrote to memory of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 PID 1552 wrote to memory of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 PID 1552 wrote to memory of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 PID 1552 wrote to memory of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 PID 1552 wrote to memory of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 PID 1552 wrote to memory of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 PID 1552 wrote to memory of 1764 1552 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 28 PID 1764 wrote to memory of 1288 1764 InstallUtil.exe 30 PID 1764 wrote to memory of 1288 1764 InstallUtil.exe 30 PID 1764 wrote to memory of 1288 1764 InstallUtil.exe 30 PID 1764 wrote to memory of 1288 1764 InstallUtil.exe 30 PID 1288 wrote to memory of 2012 1288 cmd.exe 32 PID 1288 wrote to memory of 2012 1288 cmd.exe 32 PID 1288 wrote to memory of 2012 1288 cmd.exe 32 PID 1288 wrote to memory of 2012 1288 cmd.exe 32 PID 1288 wrote to memory of 1408 1288 cmd.exe 33 PID 1288 wrote to memory of 1408 1288 cmd.exe 33 PID 1288 wrote to memory of 1408 1288 cmd.exe 33 PID 1288 wrote to memory of 1408 1288 cmd.exe 33 PID 1288 wrote to memory of 1952 1288 cmd.exe 34 PID 1288 wrote to memory of 1952 1288 cmd.exe 34 PID 1288 wrote to memory of 1952 1288 cmd.exe 34 PID 1288 wrote to memory of 1952 1288 cmd.exe 34 PID 1764 wrote to memory of 1420 1764 InstallUtil.exe 35 PID 1764 wrote to memory of 1420 1764 InstallUtil.exe 35 PID 1764 wrote to memory of 1420 1764 InstallUtil.exe 35 PID 1764 wrote to memory of 1420 1764 InstallUtil.exe 35 PID 1420 wrote to memory of 1696 1420 cmd.exe 37 PID 1420 wrote to memory of 1696 1420 cmd.exe 37 PID 1420 wrote to memory of 1696 1420 cmd.exe 37 PID 1420 wrote to memory of 1696 1420 cmd.exe 37 PID 1420 wrote to memory of 1652 1420 cmd.exe 38 PID 1420 wrote to memory of 1652 1420 cmd.exe 38 PID 1420 wrote to memory of 1652 1420 cmd.exe 38 PID 1420 wrote to memory of 1652 1420 cmd.exe 38 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe"C:\Users\Admin\AppData\Local\Temp\e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1764 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:2012
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵PID:1408
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1696
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:1652
-
-
-