Analysis
-
max time kernel
157s -
max time network
229s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30-06-2023 03:33
Behavioral task
behavioral1
Sample
a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe
Resource
win10-20230621-en
General
-
Target
a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe
-
Size
1.4MB
-
MD5
51b7efe7f38177392eb8a521959f8cf1
-
SHA1
290eb873259da1e5026b60bd93d9dc69139637df
-
SHA256
a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3
-
SHA512
2a01f1d450ecd30c062e873da49b132e8e1eae9f9891a8711a4073369c6498f7cbd794c45d3c4c9665bc64a16e31074c9c71ca6eb0b4b65318f395498cf91b57
-
SSDEEP
24576:GGkH+O5MMsj/8oJ0HOgwzMIdEyaXC772Q9NXw2/wPOjdGxYNy8:GjHZ5MMpoJOp+MIVai7Tq24GjdGSo8
Malware Config
Extracted
eternity
-
payload_urls
http://162.244.93.4/~rubin/swo.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1196 set thread context of 2012 1196 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2043e5c803abd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000076f5b9ef6ffa2e449989fba7f2481cbc00000000020000000000106600000001000020000000649d2a3cc05eeaffd7904da0feaaa42da2b2f29b86f009cb4d174b2f9981ef6a000000000e800000000200002000000050d2dc942f1ed19ca39fa4e0b89e239e459d3be3d046d10ccc4f7dfb55faa656200000000b5d13ec5a23650cc295defff897fd7afbfe9d7b5fc6982feda9d6c8107ab067400000009c7e87e4a4c24e1171dac8d7e1141a6e9cee48a074c1e895caae0b9776c7be77bfe77e985632e15eea5e5ecfe74a362178ce478909dbe614e3397443724aaef7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "394861006" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE8639E1-16F6-11EE-96DE-6E38A193C231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1437583205-2177757337-340526699-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000076f5b9ef6ffa2e449989fba7f2481cbc000000000200000000001066000000010000200000004fc4859ffe6fb0ea6d8c6be6fd280a19dc48706171a6e678318e083aa1a1a027000000000e8000000002000020000000269a9eb768d979b3fc7bed7b5e80c32bdc9040b1c2a51aadf11f499c2d0b702b90000000a0049095f527da137e6ff77a9bf4c2bed1eb4a6b195903c2ba69fdae07b9fb8976e951d91413addbc97701d4c0e419de9fcd5e8e221efe2beff25816ef1368d3dab1cfb79ac4a446d35495bd47db4c8c7f39fab2fbac6e7e01464622394fd4ea4459b6c7c9bb3e323cf56df893b2ab361fa83013f2e707c29ef56e6236d2de9dea4edc41d1aecfa48c26849ebe8f935e400000008c1a965194e6a382eb19ed053e5557f47c64d8a380dc210f45235d33bec9f550d4ad089dd2d91734b1ac30c4e737bcbf2dfb217564b32f7bec3bd038bb326d26 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1504 iexplore.exe 1504 iexplore.exe 268 IEXPLORE.EXE 268 IEXPLORE.EXE 268 IEXPLORE.EXE 268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2012 1196 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 1196 wrote to memory of 2012 1196 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 1196 wrote to memory of 2012 1196 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 1196 wrote to memory of 2012 1196 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 1196 wrote to memory of 2012 1196 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 1196 wrote to memory of 2012 1196 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 1196 wrote to memory of 2012 1196 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 1196 wrote to memory of 2012 1196 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 1196 wrote to memory of 2012 1196 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 2012 wrote to memory of 1504 2012 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 29 PID 2012 wrote to memory of 1504 2012 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 29 PID 2012 wrote to memory of 1504 2012 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 29 PID 2012 wrote to memory of 1504 2012 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 29 PID 1504 wrote to memory of 268 1504 iexplore.exe 31 PID 1504 wrote to memory of 268 1504 iexplore.exe 31 PID 1504 wrote to memory of 268 1504 iexplore.exe 31 PID 1504 wrote to memory of 268 1504 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:268
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da3136a8b7641d3429fce225962966e0
SHA15a2a0f4b5dfc24e97c59b5bdd58afb7ff83aaf72
SHA256cf65ac74b1eadf51b48b5dcbfc2fbbd0524baa1b124a0bb973ef9bfd7b30fa80
SHA512387b11b878a950b5acad3d8407dfbdb546c74604aa052f4d13a3cae646753fc3bbf37168205832fac652a55f619c356faee88b99265bc59489d42efa1dd32d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e912857689b49bd637239b3eb2758f87
SHA13bb3e78198f79de48aeef58f96d7099601f1c3c8
SHA25692743e8a1b6a2e15961a839da3a0c3cf66715b83e43b2a07c17c8acd34ac69d7
SHA512f2af80f2bd20c67df8573c2d653b0ccbd9c606012310edb44e5a6636c792c1d5ed95b42ba5e4341041f637796b6398e6ef2a70a693bf44918ab31819a16b719c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566d3d30fe790761391a1549f5057caa5
SHA171ceb21537ff98edd47807d44fa9489134ffc735
SHA256bda31be2aea2788f49e55b44b23e9f22797292a1d56547b0770425c487bf2b29
SHA512ae7dd85f3f3e796c739f14f26f8506f189e557136e9b48cb91260779e7e50db346eeac5122f1c9aea30672858af9b841676394741ab77a5de3f958dfc0bee434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551124b48922b2092eefcc43a7b8db53b
SHA13bcaf2f0e9019d9639947439959c7f444602fb32
SHA2569b68baaf5ecb5f708bb22ccc830154a4f4803e74fa04072a847adf8c54b9e2d3
SHA512baaf4073647a43493fa64be5c45aaa640fefab6cb2569f7e645daf994a83d9fe541660541c70cec127654672e68f16d245b3ee58b7305b756692e7e3e4fc960e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50173288d9e3ccb6593c8da93a9d583c0
SHA13745dcf1b44ab657dc6c44249fcfb8e69e54f0c0
SHA25656b7f6a9974da2ee94e87130e477ee67c5c682352165533380ca80afa03996cc
SHA5122baccdca582ee7805627f7f65b01b0a6773fad567a8b5f626b0bf4fee43d1e4dbf798cb843e049af25e1ed1bcc8f30a7db81c15c302ef232cdacef3b18887f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f4cda8397a1a5d50cb8647d7f48c8b0
SHA1ed87282c9c16e202b5a8a6261cdb1a74757e077b
SHA256be5cd71860a21c3619c8e1281feabc1df8746636da99a7246b561bb94fa6ff6a
SHA512973ce032ba7f9ec9efb64a963c479d3f25fe2cb4dd6a2aeab5d6c0f49708a55e55c8ff43da2f4dafcf6c959d4623df5a3defc50f81c30ce0c46ffaf31d82a785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD507942beef4919229cbfd660cc581284f
SHA11af56401010bf250b6defc98202508ad37e2faa6
SHA2562e75e0ae30c3d4ab205980fb8a1b2c4666c87bbc5dac207c2d204e8acbf072c7
SHA5124b40df2369b1eb8383c8aad21772faea1cdacc85e220257290ec61116e968a9cb6fe777df9fd3076482005faff003f31df1befd723b6b1263ea035f85c7d00bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b922cc6fc730ed2cfc68ba3afc93a4b2
SHA1edc3d4e44f1408f9a82e8cd4a0ac88a08572357b
SHA256d4ec9ccd08d18bb45f5d0f033b756d7e8a5d353fb8fb66d1ba868029a1d78845
SHA5127be2ca23e2f63b6fd9f1175de0090b2b9330beaff4c50006457b615be21044b4c236cbf9dadfe4270fb93456356ced5e2645a40ebb40aa9b6cdd27e12366193f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576511692bc266984097ea2d7f2f5c575
SHA119ef9557debbcdfe521525a2b6d65982927d2554
SHA256287dccd3be76af98edc266010bcd229bdd461b3ef85e8e2b9f648ee64b7444a1
SHA5127c9fff8c4c3ba38fb158d2a611fd1194952e00abbfa43272159a272587fb9bd5e83eff96391975991be41a1d4ac6bdfdd48209150ee97e0f4d3ecce7a8df0f1f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M90WC9I6\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
606B
MD58db985cd0f09c5dead0eb4ba739ff383
SHA1939b6c0b1bb1060ead6478a2a2d3ba5d33a31088
SHA2562d8e3d7e2e6ff8293c63ced066c734a40e618676928580073dec874baef6a5f8
SHA512caeee7faf9dcebcea1631b06e78e5e7309104dfcca4c5dd43646b73916004b7dc7722e3efad989fb11b8f8069f8e10b526c74fdddd9c09d1f54900bcde5aa0a1