Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
309s -
max time network
318s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
20/09/2022, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe
Resource
win10-20220812-en
General
-
Target
e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe
-
Size
5.9MB
-
MD5
77bf70f8c1da395f912d51fff3e6b18a
-
SHA1
b43ba34649de3f6a1371d50cfe54f81e1fbf23f4
-
SHA256
e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729
-
SHA512
07b53ffe3ead2b151c17c97c1af025bf81313cd26e92f73508680ca7c273c1494de0f36ca7038ae9c39c74395cf1c36daa5fa2ba051058b17f08cac85bb7550d
-
SSDEEP
98304:MyPKcjUaampDA4HZpEkEno6DxWd9NadL+++zMap5Eiyao6UTzm9gFJFjH:zicdampfHZ6fo6DxLu/p5EiC6U2qfF
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2664 set thread context of 4272 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 InstallUtil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier InstallUtil.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1276 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 4272 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe Token: SeDebugPrivilege 4272 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2664 wrote to memory of 4272 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 2664 wrote to memory of 4272 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 2664 wrote to memory of 4272 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 2664 wrote to memory of 4272 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 2664 wrote to memory of 4272 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 2664 wrote to memory of 4272 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 2664 wrote to memory of 4272 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 2664 wrote to memory of 4272 2664 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 4272 wrote to memory of 4268 4272 InstallUtil.exe 69 PID 4272 wrote to memory of 4268 4272 InstallUtil.exe 69 PID 4272 wrote to memory of 4268 4272 InstallUtil.exe 69 PID 4268 wrote to memory of 3028 4268 cmd.exe 71 PID 4268 wrote to memory of 3028 4268 cmd.exe 71 PID 4268 wrote to memory of 3028 4268 cmd.exe 71 PID 4268 wrote to memory of 4512 4268 cmd.exe 73 PID 4268 wrote to memory of 4512 4268 cmd.exe 73 PID 4268 wrote to memory of 4512 4268 cmd.exe 73 PID 4268 wrote to memory of 4564 4268 cmd.exe 72 PID 4268 wrote to memory of 4564 4268 cmd.exe 72 PID 4268 wrote to memory of 4564 4268 cmd.exe 72 PID 4272 wrote to memory of 3828 4272 InstallUtil.exe 74 PID 4272 wrote to memory of 3828 4272 InstallUtil.exe 74 PID 4272 wrote to memory of 3828 4272 InstallUtil.exe 74 PID 3828 wrote to memory of 4620 3828 cmd.exe 76 PID 3828 wrote to memory of 4620 3828 cmd.exe 76 PID 3828 wrote to memory of 4620 3828 cmd.exe 76 PID 3828 wrote to memory of 4744 3828 cmd.exe 77 PID 3828 wrote to memory of 4744 3828 cmd.exe 77 PID 3828 wrote to memory of 4744 3828 cmd.exe 77 PID 3828 wrote to memory of 4756 3828 cmd.exe 78 PID 3828 wrote to memory of 4756 3828 cmd.exe 78 PID 3828 wrote to memory of 4756 3828 cmd.exe 78 PID 4272 wrote to memory of 3912 4272 InstallUtil.exe 79 PID 4272 wrote to memory of 3912 4272 InstallUtil.exe 79 PID 4272 wrote to memory of 3912 4272 InstallUtil.exe 79 PID 3912 wrote to memory of 772 3912 cmd.exe 81 PID 3912 wrote to memory of 772 3912 cmd.exe 81 PID 3912 wrote to memory of 772 3912 cmd.exe 81 PID 3912 wrote to memory of 1276 3912 cmd.exe 82 PID 3912 wrote to memory of 1276 3912 cmd.exe 82 PID 3912 wrote to memory of 1276 3912 cmd.exe 82 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe"C:\Users\Admin\AppData\Local\Temp\e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4272 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:3028
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵PID:4564
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵PID:4512
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key3⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:4620
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile name="65001" key=clear4⤵PID:4744
-
-
C:\Windows\SysWOW64\findstr.exefindstr Key4⤵PID:4756
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:772
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:1276
-
-
-