Analysis
-
max time kernel
107s -
max time network
230s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30-06-2023 05:04
Behavioral task
behavioral1
Sample
a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe
Resource
win7-20230621-en
General
-
Target
a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe
-
Size
1.4MB
-
MD5
51b7efe7f38177392eb8a521959f8cf1
-
SHA1
290eb873259da1e5026b60bd93d9dc69139637df
-
SHA256
a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3
-
SHA512
2a01f1d450ecd30c062e873da49b132e8e1eae9f9891a8711a4073369c6498f7cbd794c45d3c4c9665bc64a16e31074c9c71ca6eb0b4b65318f395498cf91b57
-
SSDEEP
24576:GGkH+O5MMsj/8oJ0HOgwzMIdEyaXC772Q9NXw2/wPOjdGxYNy8:GjHZ5MMpoJOp+MIVai7Tq24GjdGSo8
Malware Config
Extracted
eternity
-
payload_urls
http://162.244.93.4/~rubin/swo.exe
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 316 set thread context of 1740 316 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5032916910abd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "394866428" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002ddbc2eb40027547a7b75ae262b677ea00000000020000000000106600000001000020000000f8ede2734bec42dc0a6dd4950b4b2798effc7fc4085bd20773e6d3f37ef6ce64000000000e80000000020000200000004ad433ffc9b20bf1eb65492b20998a062a57894096846f151f2977c1353fc5ff20000000755e8798614d1330969046ba3761e2bcf8b708eae0e4c4efb812aba4e2c3167240000000e943ca1a781eae27a9fca84d92d7e8a7fd0cf98762f76a03413464ba7ca5938d6d195a0f141c82a6bcb81a40dfb893400b1683d67dbc98d031416cf6cfd1c678 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E4680F1-1703-11EE-9F0B-469C97065D71} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3465915139-4244146034-2076118314-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1244 iexplore.exe 1244 iexplore.exe 672 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 316 wrote to memory of 1740 316 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 316 wrote to memory of 1740 316 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 316 wrote to memory of 1740 316 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 316 wrote to memory of 1740 316 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 316 wrote to memory of 1740 316 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 316 wrote to memory of 1740 316 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 316 wrote to memory of 1740 316 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 316 wrote to memory of 1740 316 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 316 wrote to memory of 1740 316 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 28 PID 1740 wrote to memory of 1244 1740 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 29 PID 1740 wrote to memory of 1244 1740 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 29 PID 1740 wrote to memory of 1244 1740 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 29 PID 1740 wrote to memory of 1244 1740 a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe 29 PID 1244 wrote to memory of 672 1244 iexplore.exe 31 PID 1244 wrote to memory of 672 1244 iexplore.exe 31 PID 1244 wrote to memory of 672 1244 iexplore.exe 31 PID 1244 wrote to memory of 672 1244 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:672
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59beb07fd77ef50d422e638a413af0871
SHA111d0b09da48eaf1a8354388b69c8353c348818bc
SHA256bf1d619f11c7ae2fb8f1e9c8b13f38a87cfdaa537cfcd5525d253529f0757638
SHA5123a0cad439c919049a2e06fa96d1e9f0a4a30b287e760646345102b05eb5b41c2d47817af85a321e0c04254163f3552de259f1fea06200b136ac1ac9c0e94a78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5342549c6c43490422c5e8781a5c1d7a6
SHA17cbc5bd9eefdf7ad04b0ec4138e090371ce48ab0
SHA256229a14b1cc62cefcc082ef1259ff897fcb7a28685d850fdd676a9e817707c73d
SHA512a42f0f8ea83b57c234d80cf68b0ab44c6ce4d3dd917445a947a2082009d16758a22a394fc58b096da4466c83430109efcb5187c9c7d3a70c742c6f30bff49d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52424072adf6c12b9837fe5567a57720e
SHA1014853cec340c22ad4ad44885e393ee7807346fc
SHA2566da0ad5f219578f772acc311e956b7ae4e6f008e610115f33d477a9a3b8372c2
SHA5128fe9fe99d61ece35665a69422e94788646df539626a9c071eb9d2e4cf90518e90d1e4763c76df07eefbaab60c3cf2520c40206c37eb405ada3fc4f53d8860ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD512fa3d4211a9cb1770648f83ea496118
SHA1a7b36087aa8d802be6ae83d2a2c199bc495921c7
SHA25618fa1900b5e6432998cf7078cd3e48ccc90cecfffdd4eed8cc1bff4fb3502e8d
SHA51216bfcdf1d4f24cf33b4ef0effa88c8c3acc842b51b283bcc18775dd71b2068ec704b43498ffdcf028a05e4452bea40f6cac6221dcbcdc681cee5dbcb1de18aa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5663e4639c1ee8226eb75ceee4a69d168
SHA1d9a0ec357da2e766d9928523eb64ea8c64fc6ca6
SHA2568934b6cc24e3e2d024c76ae861752705a9dbe44f7b8972a374a7470e811b961b
SHA5127b9a9523b7cb37cd9660af6b29b0b01c6eceb98c89f006673d0911b8f5653310fff7568168b23c8561172787ae1154b648519b94a8831ff02ea23347cf40b117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9387095b8ad21472cfaf0c825f1d2cc
SHA1cab8fe11b5ee1a38df3e6e0eb2b19b92ad507ce2
SHA256b58dca55360825e8ce6b7bb1c8f03ec69eb3aace0d445e625ccb37eccdb88998
SHA512b96a9b3bd86c1e200105f7df5b01c82028630300c8686b66d004d064132f6f3eecd970f8216b209b92865c3cb4aa615edf365fdce82c5c88858d67fb856316dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5406c35828c05234a03661a0f65656dbf
SHA1104aaeb4a30d3ab3254eeb7992c2b95fa975a917
SHA2561fc1860d7af8c7f20a831690ef7f7075a9a47e8235374d5d4f9cbf18a1bf08c2
SHA512ca1a5c1b00f334c03bcc4042436cbc061777fa8c2b3581e344973e87ab2360f8479dde9ae42273e99dd5ccbd3ad14e4eadf5c9ed9dacb915cf85efb774710c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd7579b93fb09f704f4a7c6b03ac3d8c
SHA129e87165327b2906df5232ee9555bec6ed4c26b7
SHA2568b05f4b3a79b20028706c7084d5f995ed02eff1c0c4d2dd890e7bf97dd300798
SHA51281bee01d2075ba8fd7dadc68552e9aa67a36f9f31aeda8fd82d04573747204c07502c3cee16a302cd475815a01721b8ca80c45796e79f47aa73e0d3da5e98eba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b23efd9bd074512345bc943c2c679a76
SHA108cf417d6dd02421acbca7654d8253512771348f
SHA256d4e917d8fd8cf3b6006b52bc869a5e0680a5626b6c83c52be48aebb43ce065f5
SHA5126b7c97e7da538a0da58ab4ac713513e7db9a41e20f3a4101f8c03fb0b88151de6bfbaaf2e235a335b091a00bd4230e30f2823ffcd17b5fac9395c1dd72ca53ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6b637b24364aa37114a3d235304faef
SHA1eb8d56fa84141815cf1e2fecbced0979296ab7d5
SHA2568faab13cdd8f97a6897515d01bf1ffc9d043542b21a11b770e2a3a9478673eef
SHA5121131d945e31b8c10b7dff2b668ae120b9fae2b2bbeffda1bd5c78dcf4453d678baf8af74d397be8e3d72474d41ddafa190000e9da175b0c321ff087a2ee429f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1de72731471b4675787aae6734f40a2
SHA167b37cbc41a73ae8c83633dda0c582b099937dd2
SHA256ac09d4ce239b7eec709962f1598275da55b5c1c6887a77a78442ee44d92f966d
SHA512158f81ab44294ca5fd00b161d14af965065c996ef136510325f8640ef3950e9ecd427d97aefe9e09b87137f4af61a9958fc93cfa126f9a99f8707be3224dd340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dea79f741405444c72ac13c56f48f71
SHA11cee5de3f1714a3b0bc3e63e6756e7264ba4a8d7
SHA256c9fa2353259fea8adb07e51380df1a33cfdff29091d70ccb58190addc36e002f
SHA5129ad23191e674d105184bc05d2d41f2b402ee1a55b3421d5163309ea45030bd7f153a76ed9f8f41e025c1294051b9c791e0819c269b819e2852e272d2b4347737
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RPQI3YTS\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
601B
MD53c64dbf38ea32a2d967df7da85a94d53
SHA14bf61e278d5ccfbee7e6dd66f8012e1561266907
SHA2563b9bb049a007801a146249020c3822da4ec5dd2a0a52d3171fc589e6b456559b
SHA5127dbd4bc677ce547e2d62db412cf06247055088d9aff358b5ecf9dbff4fc226e6c2e5c7e63f2c795e63492161cdd3169341e29a70db87436441b6427562bb4ba4