Analysis
-
max time kernel
202s -
max time network
291s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2023, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
FoxitPDFReader121_enu_Setup_Prom.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
FoxitPDFReader121_enu_Setup_Prom.exe
Resource
win10v2004-20220812-en
General
-
Target
FoxitPDFReader121_enu_Setup_Prom.exe
-
Size
1.5MB
-
MD5
0578fb34cae800e8e048a20417743bd7
-
SHA1
c6deed315110ef67b5e465fd01fe5f7496b86975
-
SHA256
254ed5fed795e8ca481785c3190f428fef25ee0326bb6bbbe461078bd2cdfd43
-
SHA512
fee7dfa9fceb152f00c24c53b518d4e6546fa43d531f9b67dd09e9351fa20e07a9960e83263623c1b11b829261ec400b94deba78626a120b81679f06b40e6801
-
SSDEEP
24576:gWmAFubS6dt9McpUGUT/oe4PWroZP8ZLfywzD/XKBCxnBmthc4w:826dRpEk3PWroFwyGD/XK4zB
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Executes dropped EXE 2 IoCs
pid Process 1520 Engine.exe 3020 Notebook.exe.pif -
resource yara_rule behavioral2/files/0x0006000000022f71-133.dat upx behavioral2/files/0x0006000000022f71-134.dat upx behavioral2/memory/1520-135-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral2/memory/1520-150-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral2/memory/1520-164-0x0000000000400000-0x0000000000558000-memory.dmp upx -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3020 set thread context of 2092 3020 Notebook.exe.pif 103 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 jsc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier jsc.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{3A7D5D78-3C33-43D4-8E64-F79C7EC2B5F8} svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{13BC2E6D-234B-49B5-AB39-15412488EE88} svchost.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3132 PING.EXE 4344 PING.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1064 powershell.exe 1064 powershell.exe 1064 powershell.exe 3084 powershell.exe 3084 powershell.exe 3084 powershell.exe 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif 2092 jsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1064 powershell.exe Token: SeDebugPrivilege 3084 powershell.exe Token: SeDebugPrivilege 2092 jsc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3020 Notebook.exe.pif 3020 Notebook.exe.pif 3020 Notebook.exe.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2056 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1520 1096 FoxitPDFReader121_enu_Setup_Prom.exe 79 PID 1096 wrote to memory of 1520 1096 FoxitPDFReader121_enu_Setup_Prom.exe 79 PID 1096 wrote to memory of 1520 1096 FoxitPDFReader121_enu_Setup_Prom.exe 79 PID 1520 wrote to memory of 4584 1520 Engine.exe 80 PID 1520 wrote to memory of 4584 1520 Engine.exe 80 PID 1520 wrote to memory of 4584 1520 Engine.exe 80 PID 4584 wrote to memory of 2320 4584 CmD.exe 82 PID 4584 wrote to memory of 2320 4584 CmD.exe 82 PID 4584 wrote to memory of 2320 4584 CmD.exe 82 PID 2320 wrote to memory of 1064 2320 cmd.exe 87 PID 2320 wrote to memory of 1064 2320 cmd.exe 87 PID 2320 wrote to memory of 1064 2320 cmd.exe 87 PID 2320 wrote to memory of 3084 2320 cmd.exe 89 PID 2320 wrote to memory of 3084 2320 cmd.exe 89 PID 2320 wrote to memory of 3084 2320 cmd.exe 89 PID 2320 wrote to memory of 4560 2320 cmd.exe 90 PID 2320 wrote to memory of 4560 2320 cmd.exe 90 PID 2320 wrote to memory of 4560 2320 cmd.exe 90 PID 2320 wrote to memory of 3628 2320 cmd.exe 91 PID 2320 wrote to memory of 3628 2320 cmd.exe 91 PID 2320 wrote to memory of 3628 2320 cmd.exe 91 PID 2320 wrote to memory of 3020 2320 cmd.exe 92 PID 2320 wrote to memory of 3020 2320 cmd.exe 92 PID 2320 wrote to memory of 3020 2320 cmd.exe 92 PID 2320 wrote to memory of 3132 2320 cmd.exe 93 PID 2320 wrote to memory of 3132 2320 cmd.exe 93 PID 2320 wrote to memory of 3132 2320 cmd.exe 93 PID 3020 wrote to memory of 2092 3020 Notebook.exe.pif 103 PID 3020 wrote to memory of 2092 3020 Notebook.exe.pif 103 PID 3020 wrote to memory of 2092 3020 Notebook.exe.pif 103 PID 3020 wrote to memory of 2092 3020 Notebook.exe.pif 103 PID 3020 wrote to memory of 2092 3020 Notebook.exe.pif 103 PID 2092 wrote to memory of 1940 2092 jsc.exe 104 PID 2092 wrote to memory of 1940 2092 jsc.exe 104 PID 2092 wrote to memory of 1940 2092 jsc.exe 104 PID 1940 wrote to memory of 4504 1940 cmd.exe 106 PID 1940 wrote to memory of 4504 1940 cmd.exe 106 PID 1940 wrote to memory of 4504 1940 cmd.exe 106 PID 1940 wrote to memory of 3172 1940 cmd.exe 107 PID 1940 wrote to memory of 3172 1940 cmd.exe 107 PID 1940 wrote to memory of 3172 1940 cmd.exe 107 PID 1940 wrote to memory of 4084 1940 cmd.exe 108 PID 1940 wrote to memory of 4084 1940 cmd.exe 108 PID 1940 wrote to memory of 4084 1940 cmd.exe 108 PID 2092 wrote to memory of 4752 2092 jsc.exe 109 PID 2092 wrote to memory of 4752 2092 jsc.exe 109 PID 2092 wrote to memory of 4752 2092 jsc.exe 109 PID 4752 wrote to memory of 2400 4752 cmd.exe 111 PID 4752 wrote to memory of 2400 4752 cmd.exe 111 PID 4752 wrote to memory of 2400 4752 cmd.exe 111 PID 4752 wrote to memory of 4452 4752 cmd.exe 112 PID 4752 wrote to memory of 4452 4752 cmd.exe 112 PID 4752 wrote to memory of 4452 4752 cmd.exe 112 PID 4752 wrote to memory of 1672 4752 cmd.exe 113 PID 4752 wrote to memory of 1672 4752 cmd.exe 113 PID 4752 wrote to memory of 1672 4752 cmd.exe 113 PID 2092 wrote to memory of 4808 2092 jsc.exe 114 PID 2092 wrote to memory of 4808 2092 jsc.exe 114 PID 2092 wrote to memory of 4808 2092 jsc.exe 114 PID 4808 wrote to memory of 2908 4808 cmd.exe 116 PID 4808 wrote to memory of 2908 4808 cmd.exe 116 PID 4808 wrote to memory of 2908 4808 cmd.exe 116 PID 4808 wrote to memory of 4344 4808 cmd.exe 117 PID 4808 wrote to memory of 4344 4808 cmd.exe 117 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FoxitPDFReader121_enu_Setup_Prom.exe"C:\Users\Admin\AppData\Local\Temp\FoxitPDFReader121_enu_Setup_Prom.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\SETUP_27515\Engine.exeC:\Users\Admin\AppData\Local\Temp\SETUP_27515\Engine.exe /TH_ID=_1752 /OriginExe="C:\Users\Admin\AppData\Local\Temp\FoxitPDFReader121_enu_Setup_Prom.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\CmD.exeC:\Windows\system32\CmD.exe /c cmd < 863⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avastui5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell get-process avgui5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Windows\SysWOW64\certutil.execertutil -decode 3 3UHKD5⤵PID:4560
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^GNdUATazHbwizfWqYotkNfVmSgnLgpRpQaFQcskZysGRJjaYZAURYJksSRwjxGynGRdqKyFGWtuvIrPGVmLOfZkuigYDdYEnjokRVsgTUhUUDPIOecsUUdo$" 3UHKD5⤵PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\rzcjlcr3.lzz\13439\Notebook.exe.pif13439\\Notebook.exe.pif 13439\\p5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe6⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2092 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All7⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵PID:4504
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile8⤵PID:3172
-
-
C:\Windows\SysWOW64\findstr.exefindstr All8⤵PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key7⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵PID:2400
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile name="65001" key=clear8⤵PID:4452
-
-
C:\Windows\SysWOW64\findstr.exefindstr Key8⤵PID:1672
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵PID:2908
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.18⤵
- Runs ping.exe
PID:4344
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 85⤵
- Runs ping.exe
PID:3132
-
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:3104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
Filesize
18KB
MD545f46053d94355bc0b7c5430573dfd14
SHA132792cb491ca18ac5e36e6881a647b01fe40cb3b
SHA2565b0048521bb1803a578b85c24c4c7d7b1aa539e4b66d45b7d39dc65f3c3bf0bc
SHA512994b5d7f463f445ce4d7021028a281c87e02ea62633c70ab859d8e1389a2a3d55245715c21e04878d35b877d494424f2f9518b3cc674a8e07e24a0c1d6acf86e
-
Filesize
1.2MB
MD5c3d7a7077ac61967c03d78f73d5925ad
SHA16ffb2b4f3d0e896e8a38eab9b6388266e95a0575
SHA256868f08fec86d4ee984bc9db15f5aaa2ded0d31449531541da4b63fcb760d91df
SHA51230a05cada0d23975b569e91d5a9af862fccd356c6ab5973ae2b0c5253aefdff22f04486ce2a52e1c4b26e5832562a859f97aaf2ae22057f41c994c3d539f442c
-
Filesize
949KB
MD577743554e71702b538da21005bc096b5
SHA1283040300491d93d44efb7d7b556316ce232efa7
SHA256199268e64b5aea15529e70074532412477fd658c7a77e9ba9da6df6c98f4ef63
SHA512344c2e3441322c5803d27379dfef649ae0b292f10f92b48ff401e3c266b9a8e17d95a9f29df090d45bb8fbbd4b587f229bbb1256ceba54b886355ccf4a8a3a8d
-
Filesize
14KB
MD52ca115bfaa3fdd9f4a4e3850902690fc
SHA158ecade34d9a8ec9e857503f4c482108b5702f07
SHA25614a9e8cf38e1f350fd4a344fb1436da14f4b65b203675a12cb1e11d2f7d26028
SHA512c7680240880b99264b76bd3498773581482642f23e7212b16a4943f5d08686e49d9c74cba0ba73def9b21ceba2d2f00ffefe4b11c0aa185a5ba46d06279a710e
-
Filesize
392KB
MD5a7a99a201774531d761f6aac2651a9df
SHA1b122ae368c4bf103e959a6ebb54ddb310117ab96
SHA256e6e73497e85e9ece4c92ac7d49e07b9d55e932ba2d9e5789b94b95a9841ee524
SHA512056504da2afeed547a4123ac8c38b35291b7dc0126fb638ae304eee802ac572715f9d608e9f1655788a030f488354741ee27c805434111c8e915cf841c0892f1
-
Filesize
392KB
MD5a7a99a201774531d761f6aac2651a9df
SHA1b122ae368c4bf103e959a6ebb54ddb310117ab96
SHA256e6e73497e85e9ece4c92ac7d49e07b9d55e932ba2d9e5789b94b95a9841ee524
SHA512056504da2afeed547a4123ac8c38b35291b7dc0126fb638ae304eee802ac572715f9d608e9f1655788a030f488354741ee27c805434111c8e915cf841c0892f1
-
Filesize
7KB
MD51dd88f67f029710d5c5858a6293a93f1
SHA13e5ef66613415fe9467b2a24ccc27d8f997e7df6
SHA256b5dad33ceb6eb1ac2a05fbda76e29a73038403939218a88367925c3a20c05532
SHA5127071fd64038e0058c8c586c63c62677c0ca403768100f90323cf9c0bc7b7fcb538391e6f3606bd7970b8769445606ada47adcdcfc1e991e25caf272a13e10c94
-
Filesize
2KB
MD5ab4b5559c91d2906c70123bd673d0f47
SHA1d24619a86ade578ad5b2c0a8364914c17dcd361b
SHA2562b86387418740406f9f6b8c087168f9078ac7776c068b88e14b28d767d68a654
SHA5127533db74ea6ae178ea458822c2eed6541c897119142d0fd0fd849cc1fd168214d1d6e183b39fc663574b413e5e83d283e98c5813e4f3619fc9ac935374d66b55
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD59385f4b884d2929a443713697831f51c
SHA195dece1b77613a4bcacc543bdfeb4abfb828838d
SHA256085489f6cef1d2342dbc1bb21a600a3b3a4891b6618a38475c4aea9a252e8a59
SHA512379d429fea7bb444eb881119757420cee6f7e42f52a1e325e788702b3359caa648d7f66d3b0f4e555d0bc261e5371a173f0fd478baab881df4a2da13060dc7a4