Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-01-2024 02:51

General

  • Target

    Eternity.exe

  • Size

    40.8MB

  • MD5

    40f0212fa97e2fe44ee0fbffae0c96b5

  • SHA1

    e11664504e7b3ab905de8069e6fb5b1159aec002

  • SHA256

    32d38e1eae86466254658d5a91a8bca983706b3aec35148012cb0a50f550a74f

  • SHA512

    2eeebc345f202033762cfa1e5ae4a2b2f477dad7e7019e5aff7b3aff98d0a9ee7c2223a94dfb6cc1a6fd66eb0290adee3baa1fda8d99658253c005ca11f425f5

  • SSDEEP

    786432:gHvsyBy7Mu30RSVRAaAeQc98NmhJQ8mZoJRWUmx2qmE:gUyCMrUVKa/bhJQ8mZorV+

Malware Config

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Growtopia

    Growtopa is an opensource modular stealer written in C#.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Eternity.exe
    "C:\Users\Admin\AppData\Local\Temp\Eternity.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:3768
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1096
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4952
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4128
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3068
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:3300
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:3304
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    1bfe591a4fe3d91b03cdf26eaacd8f89

    SHA1

    719c37c320f518ac168c86723724891950911cea

    SHA256

    9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

    SHA512

    02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\XBQB0SQ1\favicon[1].png

    Filesize

    7KB

    MD5

    9e3fe8db4c9f34d785a3064c7123a480

    SHA1

    0f77f9aa982c19665c642fa9b56b9b20c44983b6

    SHA256

    4d755ac02a070a1b4bb1b6f1c88ab493440109a8ac1e314aaced92f94cdc98e9

    SHA512

    20d8b416bd34f3d80a77305c6fcd597e9c2d92ab1db3f46ec5ac84f5cc6fb55dfcdccd03ffdc5d5de146d0add6d19064662ac3c83a852f3be8b8f650998828d1

  • C:\Users\Admin\AppData\Local\Temp\Eternity.ini

    Filesize

    84B

    MD5

    6a305098ba3f28a00107fb5a3cc1d1a6

    SHA1

    8b60f81d0bfea13069e2d4f08f65bff5677022f6

    SHA256

    a48b7aacd9ca7f0a7516e3df8e68ecb52425ddf79de1e5f3d3fc071dd12c041b

    SHA512

    72ac680c1483696b725390fa7bc60a680053511b9b24494d2f2be31f83e70784d7bf4d1600f683488214ab2ce86591008798fdf0d1195bb6584d740f954b1253

  • \Users\Admin\AppData\Local\Temp\enet_managed_resource\enet-win32-x86.dll

    Filesize

    39KB

    MD5

    e13ef136485a33c8a5b719d75b0312df

    SHA1

    fb692915b0a73e796c5904e05d37f963baef88dd

    SHA256

    9d2d83667ab5c391fbb60a1249078d0e2b031573a72dc07b67b610178ee94e78

    SHA512

    b3d58a11fc17925316f437e67d4b394bb9b5749e92064fe87eda3e12962f3970416e180cd40c61419651ec611eae0ee9f91a795199689cdd4743678bb6d3dca2

  • memory/1096-442-0x000001BB1E100000-0x000001BB1E101000-memory.dmp

    Filesize

    4KB

  • memory/1096-446-0x000001BB1DED0000-0x000001BB1DED1000-memory.dmp

    Filesize

    4KB

  • memory/1096-439-0x000001BB22CB0000-0x000001BB22CB2000-memory.dmp

    Filesize

    8KB

  • memory/1096-299-0x000001BB246F0000-0x000001BB246F1000-memory.dmp

    Filesize

    4KB

  • memory/1096-300-0x000001BB24E00000-0x000001BB24E01000-memory.dmp

    Filesize

    4KB

  • memory/1096-58-0x000001BB1CD30000-0x000001BB1CD32000-memory.dmp

    Filesize

    8KB

  • memory/1096-39-0x000001BB1E000000-0x000001BB1E010000-memory.dmp

    Filesize

    64KB

  • memory/3300-87-0x0000019E14A80000-0x0000019E14A82000-memory.dmp

    Filesize

    8KB

  • memory/3300-84-0x0000019E147F0000-0x0000019E14810000-memory.dmp

    Filesize

    128KB

  • memory/3300-102-0x0000019E159F0000-0x0000019E159F2000-memory.dmp

    Filesize

    8KB

  • memory/3300-104-0x0000019E15A10000-0x0000019E15A12000-memory.dmp

    Filesize

    8KB

  • memory/3300-99-0x0000019E15500000-0x0000019E15502000-memory.dmp

    Filesize

    8KB

  • memory/3300-93-0x0000019E15100000-0x0000019E15120000-memory.dmp

    Filesize

    128KB

  • memory/3300-91-0x0000019E14AC0000-0x0000019E14AC2000-memory.dmp

    Filesize

    8KB

  • memory/3300-89-0x0000019E14AA0000-0x0000019E14AA2000-memory.dmp

    Filesize

    8KB

  • memory/3768-9-0x000000000B9F0000-0x000000000BAC6000-memory.dmp

    Filesize

    856KB

  • memory/3768-308-0x000000000F500000-0x000000000F711000-memory.dmp

    Filesize

    2.1MB

  • memory/3768-15-0x000000000C2D0000-0x000000000C382000-memory.dmp

    Filesize

    712KB

  • memory/3768-10-0x000000000B830000-0x000000000B838000-memory.dmp

    Filesize

    32KB

  • memory/3768-20-0x000000006EFC0000-0x000000006EFD2000-memory.dmp

    Filesize

    72KB

  • memory/3768-0-0x0000000073500000-0x0000000073BEE000-memory.dmp

    Filesize

    6.9MB

  • memory/3768-21-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB

  • memory/3768-19-0x0000000073500000-0x0000000073BEE000-memory.dmp

    Filesize

    6.9MB

  • memory/3768-18-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB

  • memory/3768-17-0x000000000C4E0000-0x000000000C520000-memory.dmp

    Filesize

    256KB

  • memory/3768-16-0x000000000C490000-0x000000000C49A000-memory.dmp

    Filesize

    40KB

  • memory/3768-14-0x000000000B980000-0x000000000B99A000-memory.dmp

    Filesize

    104KB

  • memory/3768-8-0x000000000B870000-0x000000000B902000-memory.dmp

    Filesize

    584KB

  • memory/3768-7-0x000000000BCD0000-0x000000000C1CE000-memory.dmp

    Filesize

    5.0MB

  • memory/3768-6-0x000000000A430000-0x000000000B7D0000-memory.dmp

    Filesize

    19.6MB

  • memory/3768-22-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB

  • memory/3768-2-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB

  • memory/3768-5-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB

  • memory/3768-4-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB

  • memory/3768-450-0x0000000008310000-0x0000000008332000-memory.dmp

    Filesize

    136KB

  • memory/3768-451-0x0000000008340000-0x0000000008690000-memory.dmp

    Filesize

    3.3MB

  • memory/3768-3-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB

  • memory/3768-466-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB

  • memory/3768-1-0x0000000000E90000-0x0000000003720000-memory.dmp

    Filesize

    40.6MB

  • memory/3768-479-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB

  • memory/3768-480-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB

  • memory/3768-484-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB

  • memory/3768-489-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB

  • memory/3768-493-0x00000000081D0000-0x00000000081E0000-memory.dmp

    Filesize

    64KB