Analysis
-
max time kernel
123s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2023, 16:50
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Detects Eternity stealer 2 IoCs
resource yara_rule behavioral1/memory/1116-151-0x0000000000EE0000-0x00000000013D2000-memory.dmp eternity_stealer behavioral1/files/0x0006000000023144-194.dat eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GABB.exe GABB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GABB.exe GABB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GABB.exe GABB.exe -
Executes dropped EXE 4 IoCs
pid Process 5012 dcd.exe 1636 GABB.exe 3168 dcd.exe 4688 GABB.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3320 1116 WerFault.exe 87 4552 972 WerFault.exe 95 -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 2c9ba0669e45d901 iexplore.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "384285200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{BE47FE63-F111-49D9-A70C-A98AAFDB3E85}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{36799B0F-B6C7-11ED-ABF7-6A8031F758F8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "191751896" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31017684" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31017684" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "191751896" iexplore.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1116 GABB.exe Token: SeDebugPrivilege 972 GABB.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1500 iexplore.exe 1500 iexplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1500 iexplore.exe 1500 iexplore.exe 3184 IEXPLORE.EXE 3184 IEXPLORE.EXE 4752 OpenWith.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1500 wrote to memory of 3184 1500 iexplore.exe 84 PID 1500 wrote to memory of 3184 1500 iexplore.exe 84 PID 1500 wrote to memory of 3184 1500 iexplore.exe 84 PID 1116 wrote to memory of 5012 1116 GABB.exe 89 PID 1116 wrote to memory of 5012 1116 GABB.exe 89 PID 1116 wrote to memory of 5012 1116 GABB.exe 89 PID 1116 wrote to memory of 1636 1116 GABB.exe 90 PID 1116 wrote to memory of 1636 1116 GABB.exe 90 PID 1116 wrote to memory of 1636 1116 GABB.exe 90 PID 972 wrote to memory of 3168 972 GABB.exe 96 PID 972 wrote to memory of 3168 972 GABB.exe 96 PID 972 wrote to memory of 3168 972 GABB.exe 96 PID 972 wrote to memory of 4688 972 GABB.exe 97 PID 972 wrote to memory of 4688 972 GABB.exe 97 PID 972 wrote to memory of 4688 972 GABB.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/MitroxGT/GABB-Growtopia/releases/download/gabb-main/GABB-Secured.zip1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3184
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\Temp1_GABB-Secured.zip\GABB-Secured\GABB.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_GABB-Secured.zip\GABB-Secured\GABB.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵
- Executes dropped EXE
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\0aged4x4.41s\GABB.exe"C:\Users\Admin\AppData\Local\Temp\0aged4x4.41s\GABB.exe"2⤵
- Executes dropped EXE
PID:1636
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1116 -s 23642⤵
- Program crash
PID:3320
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 428 -p 1116 -ip 11161⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\Temp1_GABB-Secured.zip\GABB-Secured\GABB.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_GABB-Secured.zip\GABB-Secured\GABB.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵
- Executes dropped EXE
PID:3168
-
-
C:\Users\Admin\AppData\Local\Temp\5jgmezyl.nnz\GABB.exe"C:\Users\Admin\AppData\Local\Temp\5jgmezyl.nnz\GABB.exe"2⤵
- Executes dropped EXE
PID:4688
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 972 -s 23962⤵
- Program crash
PID:4552
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4752
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 516 -p 972 -ip 9721⤵PID:848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD567077886f7da41b4b4e575a8c811b5e9
SHA1e282ce26c7a9178ea70f2d150d5bc3a021bca5f5
SHA25636a613f379123e2006f6711f57b341f6138e041130b89b5adbd2aaed7f67a594
SHA5125cfce904edf85c4f840a6cb404c4f538fe242cfebf97a4f1c83c9ff19fa7d44886ad3c327009f4cc0ce075a58c6dda47d86cd95b5920ede30004569e9f7cca95
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\5AN3FZ97\GABB-Secured.zip.k2sqrnw.partial
Filesize2.6MB
MD567077886f7da41b4b4e575a8c811b5e9
SHA1e282ce26c7a9178ea70f2d150d5bc3a021bca5f5
SHA25636a613f379123e2006f6711f57b341f6138e041130b89b5adbd2aaed7f67a594
SHA5125cfce904edf85c4f840a6cb404c4f538fe242cfebf97a4f1c83c9ff19fa7d44886ad3c327009f4cc0ce075a58c6dda47d86cd95b5920ede30004569e9f7cca95
-
Filesize
1.8MB
MD523b71563af5ff450418a5bacfe63d4e3
SHA1e0710c35bdd94aee3952a720fff1ec16eb40761b
SHA2560518340706e89adb60325d1ea1106c0ea8f69da2ecbd2ef85385edd923eb0b88
SHA512e55402adc03ff4b4c90256c4b4bb7d3a7f8b7a1bb87b73d1c6bcfe5a0ab17758e53805c00f78a4d3992ef7541ea46adabe2dbc84a8af768ea9c04eb2e23b86f3
-
Filesize
1.8MB
MD523b71563af5ff450418a5bacfe63d4e3
SHA1e0710c35bdd94aee3952a720fff1ec16eb40761b
SHA2560518340706e89adb60325d1ea1106c0ea8f69da2ecbd2ef85385edd923eb0b88
SHA512e55402adc03ff4b4c90256c4b4bb7d3a7f8b7a1bb87b73d1c6bcfe5a0ab17758e53805c00f78a4d3992ef7541ea46adabe2dbc84a8af768ea9c04eb2e23b86f3
-
Filesize
1.8MB
MD523b71563af5ff450418a5bacfe63d4e3
SHA1e0710c35bdd94aee3952a720fff1ec16eb40761b
SHA2560518340706e89adb60325d1ea1106c0ea8f69da2ecbd2ef85385edd923eb0b88
SHA512e55402adc03ff4b4c90256c4b4bb7d3a7f8b7a1bb87b73d1c6bcfe5a0ab17758e53805c00f78a4d3992ef7541ea46adabe2dbc84a8af768ea9c04eb2e23b86f3
-
Filesize
1.8MB
MD523b71563af5ff450418a5bacfe63d4e3
SHA1e0710c35bdd94aee3952a720fff1ec16eb40761b
SHA2560518340706e89adb60325d1ea1106c0ea8f69da2ecbd2ef85385edd923eb0b88
SHA512e55402adc03ff4b4c90256c4b4bb7d3a7f8b7a1bb87b73d1c6bcfe5a0ab17758e53805c00f78a4d3992ef7541ea46adabe2dbc84a8af768ea9c04eb2e23b86f3
-
Filesize
1.8MB
MD523b71563af5ff450418a5bacfe63d4e3
SHA1e0710c35bdd94aee3952a720fff1ec16eb40761b
SHA2560518340706e89adb60325d1ea1106c0ea8f69da2ecbd2ef85385edd923eb0b88
SHA512e55402adc03ff4b4c90256c4b4bb7d3a7f8b7a1bb87b73d1c6bcfe5a0ab17758e53805c00f78a4d3992ef7541ea46adabe2dbc84a8af768ea9c04eb2e23b86f3
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87
-
Filesize
5.3MB
MD588abcf7fbb8bbeeaecd486a500ef1d97
SHA14320358bf410bb94caca4bbb5349f33fbc015249
SHA25698e4fe2f4a4eb843e0409157cee11a62da9ff550ad1d2b8d73c88a016bf7d148
SHA5122c017d62f082d52d2a32c78327f3d08431958cd47df636e6efdc4c6bb1d32f76d0e1f4a59b400e1ece1e31da0a91120a2ac6cd1d0b9ff677c3376d70b4647db0