Analysis
-
max time kernel
289s -
max time network
229s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30-06-2023 04:47
Behavioral task
behavioral1
Sample
a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe
Resource
win7-20230621-en
General
-
Target
a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe
-
Size
1.4MB
-
MD5
51b7efe7f38177392eb8a521959f8cf1
-
SHA1
290eb873259da1e5026b60bd93d9dc69139637df
-
SHA256
a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3
-
SHA512
2a01f1d450ecd30c062e873da49b132e8e1eae9f9891a8711a4073369c6498f7cbd794c45d3c4c9665bc64a16e31074c9c71ca6eb0b4b65318f395498cf91b57
-
SSDEEP
24576:GGkH+O5MMsj/8oJ0HOgwzMIdEyaXC772Q9NXw2/wPOjdGxYNy8:GjHZ5MMpoJOp+MIVai7Tq24GjdGSo8
Malware Config
Extracted
eternity
-
payload_urls
http://162.244.93.4/~rubin/swo.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 1028 2032 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005e2967218a20af4e980a9f47ecd196a400000000020000000000106600000001000020000000ec46b0d0a55026a6a7fbb05e456db0642794d0b9ba7797ff60cebdc7745967fe000000000e800000000200002000000014a5f0679b163a2c1d02c3f87befca4bd2b06b7d227179277c1267808d93a36420000000bd8a39173f154852dd14c304e11241ed0ec3b41bdc0625901b0723bd2705c6534000000053d7a79900c338b7c8c8ad3bae08104e3a671db61592496078a367ece7254b89554b69e50e232b1c96a38475163865128e61c3dab87c44d4309c4f206f930cba iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fa2c2b0eabd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5048B361-1701-11EE-BDA4-529E7E5E5956} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "394865466" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1306246566-3334493410-3785284834-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1092 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1092 iexplore.exe 1092 iexplore.exe 596 IEXPLORE.EXE 596 IEXPLORE.EXE 596 IEXPLORE.EXE 596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1028 2032 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 2032 wrote to memory of 1028 2032 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 2032 wrote to memory of 1028 2032 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 2032 wrote to memory of 1028 2032 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 2032 wrote to memory of 1028 2032 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 2032 wrote to memory of 1028 2032 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 2032 wrote to memory of 1028 2032 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 2032 wrote to memory of 1028 2032 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 2032 wrote to memory of 1028 2032 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 1028 wrote to memory of 1092 1028 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 29 PID 1028 wrote to memory of 1092 1028 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 29 PID 1028 wrote to memory of 1092 1028 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 29 PID 1028 wrote to memory of 1092 1028 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 29 PID 1092 wrote to memory of 596 1092 iexplore.exe 31 PID 1092 wrote to memory of 596 1092 iexplore.exe 31 PID 1092 wrote to memory of 596 1092 iexplore.exe 31 PID 1092 wrote to memory of 596 1092 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1092 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:596
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f340256ee6b74a15024d99238aab895
SHA1ba0adb0d30b15511de547c2f0f90ffaccb0123d7
SHA2569296a93670713b63211c947e6c7dea398b145ad9d3586f9ab26d575a7c0546cd
SHA5121d6731febe39e382d85cf884d4901ce7c0275419459e8f37e1150c257a2de712ee7f4e238335e688078ebe32e23df1097c37d70ddc7f1c34fb4499d5f7b6987b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d18ad5fe8aac6c3a0b9f9cb14c93567
SHA15a2d755ed7205a2138b6de6df2fd90fe2021ad32
SHA256b80b06e60428298f9d3b8b95d7a74fcf42437d12972007c651e4962ca18df93c
SHA5120f49d124353f5ca166aceb2f1f6d66a2cf89dcaa543c77f248662fa5b0568767b0872be9eeb4d561107fb0763a4345a218750f5796d304847f51f56b0bcb54dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558280b6d22e67ddd56a56edd4e8de40b
SHA1b05ae683feee8a1d592383f649740ba8dc15cb0c
SHA256f9deadf0b324daa6ed1ab1384269de4f63e8635c30d0ac77b0ce3f7c394434c9
SHA512e06c1231cf9936ace4ea994627cd1ec026c014452fb29daac29e7dda35061dbb17c740d3c8b8105d860e3181b1088793297051012e50bd7317ed02f499054d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572375f85d037dcdd178a32270dd801a1
SHA18ea74a4954150b08a3efedb489aed6df18f0c4ae
SHA256f65ab3b13f53866d088adf7cbebc6a0799db2fbb0f0430dec9c2acd7f9026061
SHA51211adf08692b4f10389a0c89cb1e4686a2634efd87f460976667613766b7fe95a956999526e7d068de1bbf313af0d800d87c5162dafde046604df51dc6ed58f49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf1dfbe585edc5c88e2feeb6ff004355
SHA12cd29a86e993b7ba59011fdf66cc4d4250279afa
SHA256a515079743e4c7ef00e215709193ef6de7b46c76b6b3a78ebd0715028124054b
SHA512e9ade7bd5dff1d88e68d9362db27895d433f4ebf6e801701aa676f5944e3fae7f7b97c67ee6f246c2f26a2204a2da1d4709304bea4158837b1cd67b46e1a4d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6b460ff72cb7d09bcaf56dbe2e49e6a
SHA152f45cc90cbc4f05dc442fccaf944a86b565d0c1
SHA2569dbe28b22f133c93e4ed9679f498ecff1d8359e9b7ce0caac634f355d1a6614d
SHA512c8732d23712165c8a1b0b327538f653a69795e9aa89d6eb8557e2afdab6409434bb063b98577ec14db6e92a415dd9eb114cde15d1796f8d1df6fdce565a2e688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f14c7d81e3691979d65051d04402536
SHA1adc455ab0ed3bd3e25b1f1c4d224a2a548fd0319
SHA25602ce66d8be594a7f079d2f73fab46cb6fafee4061d7fccda2f20f00e77f6da49
SHA512892095e905e9566af175ba60d1e0e2ac85da65e0f0da3fed1889e643443bc31a1b310888767a3e668d4145da43555a36130c33204a5ac593b426d3ee732cb526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5feb44e23ab6f1909101bfcff5a0f8268
SHA1d93cfa5355dbf5972c32439236611ef77406ef6f
SHA256c60e9a63858360739ade5e84e84910e11f71b4077c4bcea130fb2a059bc72761
SHA512e1c5544588514a1a76f6a6c7cf65cd69ce60dd0285ea39940442cbe5ed6f88be6665e3a0cb11ef2bdbe42820fc7f347ab1d44ba68cdd6225e9e575a3f9807db1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORT469H\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD52d982b7fe1a71a0d9ea8010cb0130831
SHA1d1d69269b83190679f58e77437f87dc2c95ed531
SHA2560b6f6d95cd8558450e4614a4d53fcbcb8ff8c55d3892c0a782dd2ef9198e5498
SHA512d99532a9d36e7fc03ab3f7d5644123f40f3b3c9e6bb6ca961f9f9c36462b4691d67afd95b67749972958a2de802234cc28a033e81bec5e5e11a4cdb08c60e9a6