Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 07:37
General
-
Target
cheaprobux.exe
-
Size
887KB
-
MD5
812a0980ac13573c86530fc8274b8df6
-
SHA1
f5dbbff56c7e3d5e97351685213b7f1b1e43f688
-
SHA256
2dee597fc447c80b3874b5f3c0c64cfb113e212212379546270b23826b107a32
-
SHA512
efa08f18d6f076fd4db740f1c14df5e7822e61f886271ed6663033069242783f414b303c3edc89178ddb8e552d7226908c8ca135740f50b6270bd88ec7f6d18f
-
SSDEEP
12288:mTEYAsROAsrt/uxduo1jB0Y96qfuoBaPo73z/n/uMM4wvN9tzKEJrz4mEVW69VyK:mwT7rC6qfufw73rnhM4wF35AQk
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral1/memory/1680-133-0x0000000000A10000-0x0000000000AF6000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cheaprobux.exe cheaprobux.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cheaprobux.exe cheaprobux.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 dcd.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2428 1680 WerFault.exe 83 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3336 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3336 vlc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1680 cheaprobux.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe 3336 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3336 vlc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2140 1680 cheaprobux.exe 84 PID 1680 wrote to memory of 2140 1680 cheaprobux.exe 84 PID 1680 wrote to memory of 2140 1680 cheaprobux.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\cheaprobux.exe"C:\Users\Admin\AppData\Local\Temp\cheaprobux.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵
- Executes dropped EXE
PID:2140
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1680 -s 19842⤵
- Program crash
PID:2428
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 1680 -ip 16801⤵PID:3784
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2536
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\StopReset.mpg"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3336
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87