Analysis

  • max time kernel
    19s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2024 09:56

General

  • Target

    Inzector.exe

  • Size

    885KB

  • MD5

    e68b50c1d7267fd40af08c08947ade75

  • SHA1

    b05ab128dd35924a6f7026f3a7d4c786e1296513

  • SHA256

    9c9823dd87bc225f2c9a47fa1fecfc9e8719be7852cf0ff8f60a2515e6e18b0b

  • SHA512

    adb77f8fda6e0f721835d9f30cc0eba5e65cc7e91f9192f3f097ae27afd8371728c8c3c60fd139950999eb77a879dac1137192666d6aa3c638cea4ed718c2b8e

  • SSDEEP

    12288:OTEYAsROAsrt/uxduo1jB0Y96qDhsFKR4LHzZRScClGrQ9qQloHQ94:OwT7rC6qdsFKRMHzrElG09qQf94

Malware Config

Signatures

  • Detects Eternity stealer 1 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Inzector.exe
    "C:\Users\Admin\AppData\Local\Temp\Inzector.exe"
    1⤵
    • Drops startup file
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\dcd.exe
      "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
      2⤵
      • Executes dropped EXE
      PID:848
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2240 -s 1636
      2⤵
        PID:1768

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      b5b32b9352c8434192fc4086a4d83484

      SHA1

      12f1377d9bbb60a66c3f7791e9a88d8290ea792f

      SHA256

      b4d6e9b31d4563cb9e9fc14dbf689478b37a2d4b5bfb7c353862939955b19d9b

      SHA512

      cf551c6b611f262b15535436d7f11fbbff49defd2037e00a171f8fe913d323c0455d7715beb0cffc136e03983433ad6fa334b836f121d205cd8b69ec7c3ca085

    • C:\Users\Admin\AppData\Local\Temp\Tar28BB.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\dcd.exe

      Filesize

      187KB

      MD5

      1302a0a084d50398879f382ca1610e0c

      SHA1

      4211867d45ec6ae0dff0a92c045179e89c14218a

      SHA256

      bc6feb977abe79ef06bc79fc980b5f9a9180ccd0c8d640cab64cfe68b97922ac

      SHA512

      1e11dc523b15aaf961166d7991c1b878175397d6dfa200044dcd997e11f7994251641bc032a15462925e2a94355930529566b78d54bbfdc4a2cb4a2fdeb0da59

    • memory/2240-4-0x000000001B100000-0x000000001B180000-memory.dmp

      Filesize

      512KB

    • memory/2240-3-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2240-2-0x000007FEF5250000-0x000007FEF5C3C000-memory.dmp

      Filesize

      9.9MB

    • memory/2240-0-0x0000000000E60000-0x0000000000F46000-memory.dmp

      Filesize

      920KB

    • memory/2240-13-0x000000001B100000-0x000000001B180000-memory.dmp

      Filesize

      512KB

    • memory/2240-6-0x000000001B100000-0x000000001B180000-memory.dmp

      Filesize

      512KB

    • memory/2240-7-0x000000001B100000-0x000000001B180000-memory.dmp

      Filesize

      512KB

    • memory/2240-5-0x0000000000260000-0x000000000029E000-memory.dmp

      Filesize

      248KB

    • memory/2240-1-0x000007FEF5250000-0x000007FEF5C3C000-memory.dmp

      Filesize

      9.9MB

    • memory/2240-89-0x000007FEF5250000-0x000007FEF5C3C000-memory.dmp

      Filesize

      9.9MB

    • memory/2240-90-0x000000001B100000-0x000000001B180000-memory.dmp

      Filesize

      512KB

    • memory/2240-91-0x000000001B100000-0x000000001B180000-memory.dmp

      Filesize

      512KB