Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2024 09:45

General

  • Target

    869395ac2a88f6de036daf942d0b86d9.exe

  • Size

    913KB

  • MD5

    869395ac2a88f6de036daf942d0b86d9

  • SHA1

    42fbe6f668153bcb850c13677efe924e835c229f

  • SHA256

    cd72f8f3af6f9d098b3da55db5f7869ab75ec679e0c302f790faffc0fa6c47b5

  • SHA512

    e2e8492442edcfec16553def0cae3361f744bc8f095b4863dbc745ac3e72c75e1be83bbb0bb69da4f74fcaaba2b35123222706508c0d1f0e05e22cbcb75390d9

  • SSDEEP

    24576:rMYtHtnX4mHxjdibimBr4aOCZv4NPjgcwmIlSklG9:dtHtnX4mHObiMr4HCZvRzlJl

Malware Config

Signatures

  • Contains code to disable Windows Defender 2 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detects Eternity stealer 2 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\869395ac2a88f6de036daf942d0b86d9.exe
    "C:\Users\Admin\AppData\Local\Temp\869395ac2a88f6de036daf942d0b86d9.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\tmp3DCB.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp3DCB.tmp.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2676
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2440 -s 788
        3⤵
          PID:1656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp3DCB.tmp.exe

      Filesize

      904KB

      MD5

      5bc9eac8653703bf899d63f49466773e

      SHA1

      49fc8ed3bf850f9f4f59dba04dd7a2ae453334b1

      SHA256

      02c72fe8fc25c0069b619cbfe9bd223af3b791db1ceff2b37dbb0b5697c2306d

      SHA512

      0709490737c0b3fc46f107a74e2a9f62705006c596280af31b23fe6ec20a0e411af294af569f0204ea20111152c47de2f13fab4f0f724f36c90ebd78ba05d352

    • memory/2440-16-0x0000000000A70000-0x0000000000AF0000-memory.dmp

      Filesize

      512KB

    • memory/2440-34-0x0000000000A70000-0x0000000000AF0000-memory.dmp

      Filesize

      512KB

    • memory/2440-13-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/2440-15-0x00000000003D0000-0x000000000040E000-memory.dmp

      Filesize

      248KB

    • memory/2440-9-0x0000000000D10000-0x0000000000DFA000-memory.dmp

      Filesize

      936KB

    • memory/2440-10-0x000007FEF37C0000-0x000007FEF41AC000-memory.dmp

      Filesize

      9.9MB

    • memory/2440-11-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/2440-12-0x000007FEF37C0000-0x000007FEF41AC000-memory.dmp

      Filesize

      9.9MB

    • memory/2440-31-0x000007FEF37C0000-0x000007FEF41AC000-memory.dmp

      Filesize

      9.9MB

    • memory/2440-14-0x0000000000A70000-0x0000000000AF0000-memory.dmp

      Filesize

      512KB

    • memory/2440-32-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/2440-33-0x0000000000A70000-0x0000000000AF0000-memory.dmp

      Filesize

      512KB

    • memory/2440-35-0x0000000000A70000-0x0000000000AF0000-memory.dmp

      Filesize

      512KB

    • memory/2512-7-0x000007FEF5E60000-0x000007FEF67FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2512-2-0x000007FEF5E60000-0x000007FEF67FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2512-28-0x000007FEF5E60000-0x000007FEF67FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2512-8-0x000007FEF5E60000-0x000007FEF67FD000-memory.dmp

      Filesize

      9.6MB

    • memory/2512-3-0x0000000000BA0000-0x0000000000C20000-memory.dmp

      Filesize

      512KB

    • memory/2676-23-0x0000000002A20000-0x0000000002AA0000-memory.dmp

      Filesize

      512KB

    • memory/2676-27-0x0000000002A20000-0x0000000002AA0000-memory.dmp

      Filesize

      512KB

    • memory/2676-29-0x0000000002A20000-0x0000000002AA0000-memory.dmp

      Filesize

      512KB

    • memory/2676-30-0x000007FEEE170000-0x000007FEEEB0D000-memory.dmp

      Filesize

      9.6MB

    • memory/2676-26-0x0000000002A20000-0x0000000002AA0000-memory.dmp

      Filesize

      512KB

    • memory/2676-25-0x000007FEEE170000-0x000007FEEEB0D000-memory.dmp

      Filesize

      9.6MB

    • memory/2676-21-0x000000001B4F0000-0x000000001B7D2000-memory.dmp

      Filesize

      2.9MB

    • memory/2676-24-0x0000000002290000-0x0000000002298000-memory.dmp

      Filesize

      32KB

    • memory/2676-22-0x000007FEEE170000-0x000007FEEEB0D000-memory.dmp

      Filesize

      9.6MB