Analysis

  • max time kernel
    107s
  • max time network
    230s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    30-06-2023 05:04

General

  • Target

    a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe

  • Size

    1.4MB

  • MD5

    51b7efe7f38177392eb8a521959f8cf1

  • SHA1

    290eb873259da1e5026b60bd93d9dc69139637df

  • SHA256

    a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3

  • SHA512

    2a01f1d450ecd30c062e873da49b132e8e1eae9f9891a8711a4073369c6498f7cbd794c45d3c4c9665bc64a16e31074c9c71ca6eb0b4b65318f395498cf91b57

  • SSDEEP

    24576:GGkH+O5MMsj/8oJ0HOgwzMIdEyaXC772Q9NXw2/wPOjdGxYNy8:GjHZ5MMpoJOp+MIVai7Tq24GjdGSo8

Score
10/10

Malware Config

Extracted

Family

eternity

Attributes
  • payload_urls

    http://162.244.93.4/~rubin/swo.exe

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe
    "C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe
      "C:\Users\Admin\AppData\Local\Temp\a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=a1e67d3495c39dd403f65217cb7368a468c66e5ccc790752dacc7e581b5d26b3.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1244
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9beb07fd77ef50d422e638a413af0871

    SHA1

    11d0b09da48eaf1a8354388b69c8353c348818bc

    SHA256

    bf1d619f11c7ae2fb8f1e9c8b13f38a87cfdaa537cfcd5525d253529f0757638

    SHA512

    3a0cad439c919049a2e06fa96d1e9f0a4a30b287e760646345102b05eb5b41c2d47817af85a321e0c04254163f3552de259f1fea06200b136ac1ac9c0e94a78f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    342549c6c43490422c5e8781a5c1d7a6

    SHA1

    7cbc5bd9eefdf7ad04b0ec4138e090371ce48ab0

    SHA256

    229a14b1cc62cefcc082ef1259ff897fcb7a28685d850fdd676a9e817707c73d

    SHA512

    a42f0f8ea83b57c234d80cf68b0ab44c6ce4d3dd917445a947a2082009d16758a22a394fc58b096da4466c83430109efcb5187c9c7d3a70c742c6f30bff49d71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2424072adf6c12b9837fe5567a57720e

    SHA1

    014853cec340c22ad4ad44885e393ee7807346fc

    SHA256

    6da0ad5f219578f772acc311e956b7ae4e6f008e610115f33d477a9a3b8372c2

    SHA512

    8fe9fe99d61ece35665a69422e94788646df539626a9c071eb9d2e4cf90518e90d1e4763c76df07eefbaab60c3cf2520c40206c37eb405ada3fc4f53d8860ba5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    12fa3d4211a9cb1770648f83ea496118

    SHA1

    a7b36087aa8d802be6ae83d2a2c199bc495921c7

    SHA256

    18fa1900b5e6432998cf7078cd3e48ccc90cecfffdd4eed8cc1bff4fb3502e8d

    SHA512

    16bfcdf1d4f24cf33b4ef0effa88c8c3acc842b51b283bcc18775dd71b2068ec704b43498ffdcf028a05e4452bea40f6cac6221dcbcdc681cee5dbcb1de18aa1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    663e4639c1ee8226eb75ceee4a69d168

    SHA1

    d9a0ec357da2e766d9928523eb64ea8c64fc6ca6

    SHA256

    8934b6cc24e3e2d024c76ae861752705a9dbe44f7b8972a374a7470e811b961b

    SHA512

    7b9a9523b7cb37cd9660af6b29b0b01c6eceb98c89f006673d0911b8f5653310fff7568168b23c8561172787ae1154b648519b94a8831ff02ea23347cf40b117

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b9387095b8ad21472cfaf0c825f1d2cc

    SHA1

    cab8fe11b5ee1a38df3e6e0eb2b19b92ad507ce2

    SHA256

    b58dca55360825e8ce6b7bb1c8f03ec69eb3aace0d445e625ccb37eccdb88998

    SHA512

    b96a9b3bd86c1e200105f7df5b01c82028630300c8686b66d004d064132f6f3eecd970f8216b209b92865c3cb4aa615edf365fdce82c5c88858d67fb856316dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    406c35828c05234a03661a0f65656dbf

    SHA1

    104aaeb4a30d3ab3254eeb7992c2b95fa975a917

    SHA256

    1fc1860d7af8c7f20a831690ef7f7075a9a47e8235374d5d4f9cbf18a1bf08c2

    SHA512

    ca1a5c1b00f334c03bcc4042436cbc061777fa8c2b3581e344973e87ab2360f8479dde9ae42273e99dd5ccbd3ad14e4eadf5c9ed9dacb915cf85efb774710c44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cd7579b93fb09f704f4a7c6b03ac3d8c

    SHA1

    29e87165327b2906df5232ee9555bec6ed4c26b7

    SHA256

    8b05f4b3a79b20028706c7084d5f995ed02eff1c0c4d2dd890e7bf97dd300798

    SHA512

    81bee01d2075ba8fd7dadc68552e9aa67a36f9f31aeda8fd82d04573747204c07502c3cee16a302cd475815a01721b8ca80c45796e79f47aa73e0d3da5e98eba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b23efd9bd074512345bc943c2c679a76

    SHA1

    08cf417d6dd02421acbca7654d8253512771348f

    SHA256

    d4e917d8fd8cf3b6006b52bc869a5e0680a5626b6c83c52be48aebb43ce065f5

    SHA512

    6b7c97e7da538a0da58ab4ac713513e7db9a41e20f3a4101f8c03fb0b88151de6bfbaaf2e235a335b091a00bd4230e30f2823ffcd17b5fac9395c1dd72ca53ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f6b637b24364aa37114a3d235304faef

    SHA1

    eb8d56fa84141815cf1e2fecbced0979296ab7d5

    SHA256

    8faab13cdd8f97a6897515d01bf1ffc9d043542b21a11b770e2a3a9478673eef

    SHA512

    1131d945e31b8c10b7dff2b668ae120b9fae2b2bbeffda1bd5c78dcf4453d678baf8af74d397be8e3d72474d41ddafa190000e9da175b0c321ff087a2ee429f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c1de72731471b4675787aae6734f40a2

    SHA1

    67b37cbc41a73ae8c83633dda0c582b099937dd2

    SHA256

    ac09d4ce239b7eec709962f1598275da55b5c1c6887a77a78442ee44d92f966d

    SHA512

    158f81ab44294ca5fd00b161d14af965065c996ef136510325f8640ef3950e9ecd427d97aefe9e09b87137f4af61a9958fc93cfa126f9a99f8707be3224dd340

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3dea79f741405444c72ac13c56f48f71

    SHA1

    1cee5de3f1714a3b0bc3e63e6756e7264ba4a8d7

    SHA256

    c9fa2353259fea8adb07e51380df1a33cfdff29091d70ccb58190addc36e002f

    SHA512

    9ad23191e674d105184bc05d2d41f2b402ee1a55b3421d5163309ea45030bd7f153a76ed9f8f41e025c1294051b9c791e0819c269b819e2852e272d2b4347737

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RPQI3YTS\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\Cab8097.tmp

    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\Tar8147.tmp

    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SBTB7QL5.txt

    Filesize

    601B

    MD5

    3c64dbf38ea32a2d967df7da85a94d53

    SHA1

    4bf61e278d5ccfbee7e6dd66f8012e1561266907

    SHA256

    3b9bb049a007801a146249020c3822da4ec5dd2a0a52d3171fc589e6b456559b

    SHA512

    7dbd4bc677ce547e2d62db412cf06247055088d9aff358b5ecf9dbff4fc226e6c2e5c7e63f2c795e63492161cdd3169341e29a70db87436441b6427562bb4ba4

  • memory/1740-57-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB

  • memory/1740-55-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB

  • memory/1740-54-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB

  • memory/1740-56-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB

  • memory/1740-58-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1740-59-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB

  • memory/1740-61-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB

  • memory/1740-63-0x0000000000400000-0x0000000000552000-memory.dmp

    Filesize

    1.3MB