Analysis
-
max time kernel
144s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
24-09-2022 22:24
Static task
static1
Behavioral task
behavioral1
Sample
e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe
Resource
win10-20220901-en
General
-
Target
e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe
-
Size
5.9MB
-
MD5
77bf70f8c1da395f912d51fff3e6b18a
-
SHA1
b43ba34649de3f6a1371d50cfe54f81e1fbf23f4
-
SHA256
e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729
-
SHA512
07b53ffe3ead2b151c17c97c1af025bf81313cd26e92f73508680ca7c273c1494de0f36ca7038ae9c39c74395cf1c36daa5fa2ba051058b17f08cac85bb7550d
-
SSDEEP
98304:MyPKcjUaampDA4HZpEkEno6DxWd9NadL+++zMap5Eiyao6UTzm9gFJFjH:zicdampfHZ6fo6DxLu/p5EiC6U2qfF
Malware Config
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4264 set thread context of 4804 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 68 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 InstallUtil.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier InstallUtil.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 688 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 4804 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe Token: SeDebugPrivilege 4804 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 4264 wrote to memory of 3696 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 4264 wrote to memory of 3696 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 4264 wrote to memory of 3696 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 4264 wrote to memory of 3696 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 4264 wrote to memory of 3696 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 4264 wrote to memory of 3696 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 4264 wrote to memory of 3696 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 4264 wrote to memory of 3696 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 67 PID 4264 wrote to memory of 4804 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 68 PID 4264 wrote to memory of 4804 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 68 PID 4264 wrote to memory of 4804 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 68 PID 4264 wrote to memory of 4804 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 68 PID 4264 wrote to memory of 4804 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 68 PID 4264 wrote to memory of 4804 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 68 PID 4264 wrote to memory of 4804 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 68 PID 4264 wrote to memory of 4804 4264 e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe 68 PID 4804 wrote to memory of 5104 4804 InstallUtil.exe 70 PID 4804 wrote to memory of 5104 4804 InstallUtil.exe 70 PID 4804 wrote to memory of 5104 4804 InstallUtil.exe 70 PID 5104 wrote to memory of 3684 5104 cmd.exe 72 PID 5104 wrote to memory of 3684 5104 cmd.exe 72 PID 5104 wrote to memory of 3684 5104 cmd.exe 72 PID 5104 wrote to memory of 4180 5104 cmd.exe 73 PID 5104 wrote to memory of 4180 5104 cmd.exe 73 PID 5104 wrote to memory of 4180 5104 cmd.exe 73 PID 5104 wrote to memory of 4208 5104 cmd.exe 74 PID 5104 wrote to memory of 4208 5104 cmd.exe 74 PID 5104 wrote to memory of 4208 5104 cmd.exe 74 PID 4804 wrote to memory of 3812 4804 InstallUtil.exe 75 PID 4804 wrote to memory of 3812 4804 InstallUtil.exe 75 PID 4804 wrote to memory of 3812 4804 InstallUtil.exe 75 PID 3812 wrote to memory of 3400 3812 cmd.exe 77 PID 3812 wrote to memory of 3400 3812 cmd.exe 77 PID 3812 wrote to memory of 3400 3812 cmd.exe 77 PID 3812 wrote to memory of 3112 3812 cmd.exe 78 PID 3812 wrote to memory of 3112 3812 cmd.exe 78 PID 3812 wrote to memory of 3112 3812 cmd.exe 78 PID 3812 wrote to memory of 4700 3812 cmd.exe 79 PID 3812 wrote to memory of 4700 3812 cmd.exe 79 PID 3812 wrote to memory of 4700 3812 cmd.exe 79 PID 4804 wrote to memory of 1688 4804 InstallUtil.exe 80 PID 4804 wrote to memory of 1688 4804 InstallUtil.exe 80 PID 4804 wrote to memory of 1688 4804 InstallUtil.exe 80 PID 1688 wrote to memory of 3308 1688 cmd.exe 82 PID 1688 wrote to memory of 3308 1688 cmd.exe 82 PID 1688 wrote to memory of 3308 1688 cmd.exe 82 PID 1688 wrote to memory of 688 1688 cmd.exe 83 PID 1688 wrote to memory of 688 1688 cmd.exe 83 PID 1688 wrote to memory of 688 1688 cmd.exe 83 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe"C:\Users\Admin\AppData\Local\Temp\e228aeaa8bc4541b749f1e2a6f0ce6692f0822b93243e00778dd940c903be729.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:3696
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4804 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:3684
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵PID:4180
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵PID:4208
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key3⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:3400
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile name="65001" key=clear4⤵PID:3112
-
-
C:\Windows\SysWOW64\findstr.exefindstr Key4⤵PID:4700
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:3308
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- Runs ping.exe
PID:688
-
-
-