Resubmissions

06-02-2024 17:36

240206-v6z6ssdhbn 10

06-02-2024 17:35

240206-v54sladggr 10

Analysis

  • max time kernel
    292s
  • max time network
    270s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2024 17:36

General

  • Target

    Loader (1).exe

  • Size

    887KB

  • MD5

    4921715c2581f736e92ea569def50a69

  • SHA1

    85d44e955199463ca786b2ef4ca95189704bb599

  • SHA256

    d25991745f08ec053c593fe639303859ec6b50a02fd04f86223526d5563062ba

  • SHA512

    4b18a2361f9e0be0be1d3fedcd82c0e900b90cb96fe084c7937e8a0e60711e8a39394891d91f06e62f57026a1f98116ffa1c2ee41e168e59e72303562d823127

  • SSDEEP

    12288:4TEYAsROAsrt/uxduo1jB0Y96qiD7xPD4OC7c3BpahgKj/NpYVi2ItaVo0n0NdY3:4wT7rC6qU5j3BoJ0VADLkl0

Score
10/10

Malware Config

Signatures

  • Detects Eternity stealer 3 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader (1).exe
    "C:\Users\Admin\AppData\Local\Temp\Loader (1).exe"
    1⤵
    • Drops startup file
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Users\Admin\AppData\Local\Temp\dcd.exe
      "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
      2⤵
      • Executes dropped EXE
      PID:3052
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 804 -s 1640
      2⤵
        PID:2940
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:612
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x578
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:880
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2448
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:2056
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 512 516 524 65536 520
          2⤵
          • Modifies data under HKEY_USERS
          PID:1524
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3470981204-343661084-3367201002-10002_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3470981204-343661084-3367201002-10002 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
          2⤵
          • Suspicious use of SetWindowsHookEx
          PID:1788
      • C:\Users\Admin\AppData\Local\Temp\Loader (1).exe
        "C:\Users\Admin\AppData\Local\Temp\Loader (1).exe"
        1⤵
        • Drops startup file
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1816
        • C:\Users\Admin\AppData\Local\Temp\dcd.exe
          "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
          2⤵
          • Executes dropped EXE
          PID:1036
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1816 -s 1548
          2⤵
            PID:1144
        • C:\Users\Admin\AppData\Local\Temp\Loader (1).exe
          "C:\Users\Admin\AppData\Local\Temp\Loader (1).exe"
          1⤵
          • Drops startup file
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1092
          • C:\Users\Admin\AppData\Local\Temp\dcd.exe
            "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
            2⤵
            • Executes dropped EXE
            PID:592
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1092 -s 1544
            2⤵
              PID:1576

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

            Filesize

            1024KB

            MD5

            e301292b79c0a03de647eea2350b68ce

            SHA1

            eefb064cf5e6a3b05b32fe308f681a5d504ebcaf

            SHA256

            d80b83dbe79107849a30c6140885c095592ecde7e48a4140d44fc20930ba489f

            SHA512

            a1b574c0f87c96aa1b13366fcbe049564b57569f7a090d632538f02235ade13923e048c0de14ee756d14093504f21145da5855e310b9ac7dafae06897b3e37db

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            65KB

            MD5

            ac05d27423a85adc1622c714f2cb6184

            SHA1

            b0fe2b1abddb97837ea0195be70ab2ff14d43198

            SHA256

            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

            SHA512

            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            1KB

            MD5

            a266bb7dcc38a562631361bbf61dd11b

            SHA1

            3b1efd3a66ea28b16697394703a72ca340a05bd5

            SHA256

            df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

            SHA512

            0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            242B

            MD5

            3897ef7d637284ca5d01f4c53e616612

            SHA1

            ceeeb2b3dd7a4f54899922121e1d64dfd9ac9ee7

            SHA256

            997731fa483be97e93e58d207576e7eaa91131fa6a16dfd3bcfcb4ac8d40c089

            SHA512

            2206f142d19bf90cdf6b60e89bbca51f21c45b71d2b0953eec003d593c22a23d230b17cdf91cc9a046ad37db90c3443b6f74a356e6bbe80f2942a910bb95498f

          • C:\Users\Admin\AppData\Local\Temp\Tar1ECC.tmp

            Filesize

            171KB

            MD5

            9c0c641c06238516f27941aa1166d427

            SHA1

            64cd549fb8cf014fcd9312aa7a5b023847b6c977

            SHA256

            4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

            SHA512

            936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

          • C:\Users\Admin\AppData\Local\Temp\dcd.exe

            Filesize

            227KB

            MD5

            b5ac46e446cead89892628f30a253a06

            SHA1

            f4ad1044a7f77a1b02155c3a355a1bb4177076ca

            SHA256

            def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

            SHA512

            bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Loader (1).exe

            Filesize

            887KB

            MD5

            4921715c2581f736e92ea569def50a69

            SHA1

            85d44e955199463ca786b2ef4ca95189704bb599

            SHA256

            d25991745f08ec053c593fe639303859ec6b50a02fd04f86223526d5563062ba

            SHA512

            4b18a2361f9e0be0be1d3fedcd82c0e900b90cb96fe084c7937e8a0e60711e8a39394891d91f06e62f57026a1f98116ffa1c2ee41e168e59e72303562d823127

          • memory/804-5-0x00000000004E0000-0x000000000051E000-memory.dmp

            Filesize

            248KB

          • memory/804-93-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

            Filesize

            9.9MB

          • memory/804-13-0x000000001B0F0000-0x000000001B170000-memory.dmp

            Filesize

            512KB

          • memory/804-7-0x000000001B0F0000-0x000000001B170000-memory.dmp

            Filesize

            512KB

          • memory/804-6-0x000000001B0F0000-0x000000001B170000-memory.dmp

            Filesize

            512KB

          • memory/804-2-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

            Filesize

            9.9MB

          • memory/804-4-0x000000001B0F0000-0x000000001B170000-memory.dmp

            Filesize

            512KB

          • memory/804-89-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

            Filesize

            9.9MB

          • memory/804-90-0x000000001B0F0000-0x000000001B170000-memory.dmp

            Filesize

            512KB

          • memory/804-91-0x000000001B0F0000-0x000000001B170000-memory.dmp

            Filesize

            512KB

          • memory/804-92-0x000000001B0F0000-0x000000001B170000-memory.dmp

            Filesize

            512KB

          • memory/804-1-0x000007FEF5D00000-0x000007FEF66EC000-memory.dmp

            Filesize

            9.9MB

          • memory/804-0-0x0000000000C40000-0x0000000000D26000-memory.dmp

            Filesize

            920KB

          • memory/804-3-0x00000000004D0000-0x00000000004D1000-memory.dmp

            Filesize

            4KB

          • memory/1092-215-0x000000001B000000-0x000000001B080000-memory.dmp

            Filesize

            512KB

          • memory/1092-214-0x000000001B000000-0x000000001B080000-memory.dmp

            Filesize

            512KB

          • memory/1092-198-0x000007FEF2D40000-0x000007FEF372C000-memory.dmp

            Filesize

            9.9MB

          • memory/1092-216-0x000000001B000000-0x000000001B080000-memory.dmp

            Filesize

            512KB

          • memory/1092-189-0x000000001B000000-0x000000001B080000-memory.dmp

            Filesize

            512KB

          • memory/1092-175-0x000007FEF2D40000-0x000007FEF372C000-memory.dmp

            Filesize

            9.9MB

          • memory/1092-178-0x000000001B000000-0x000000001B080000-memory.dmp

            Filesize

            512KB

          • memory/1092-177-0x000000001B000000-0x000000001B080000-memory.dmp

            Filesize

            512KB

          • memory/1092-176-0x000000001B000000-0x000000001B080000-memory.dmp

            Filesize

            512KB

          • memory/1524-192-0x000007FEDA5A0000-0x000007FEDA5AA000-memory.dmp

            Filesize

            40KB

          • memory/1524-218-0x000007FEDA5A0000-0x000007FEDA5AA000-memory.dmp

            Filesize

            40KB

          • memory/1524-191-0x000007FEEAF40000-0x000007FEEB083000-memory.dmp

            Filesize

            1.3MB

          • memory/1524-217-0x000007FEEAF40000-0x000007FEEB083000-memory.dmp

            Filesize

            1.3MB

          • memory/1816-163-0x0000000000D00000-0x0000000000DE6000-memory.dmp

            Filesize

            920KB

          • memory/1816-165-0x00000000003D0000-0x00000000003D1000-memory.dmp

            Filesize

            4KB

          • memory/1816-164-0x000007FEF2D40000-0x000007FEF372C000-memory.dmp

            Filesize

            9.9MB

          • memory/1816-197-0x000000001B2E0000-0x000000001B360000-memory.dmp

            Filesize

            512KB

          • memory/1816-174-0x000000001B2E0000-0x000000001B360000-memory.dmp

            Filesize

            512KB

          • memory/1816-168-0x000000001B2E0000-0x000000001B360000-memory.dmp

            Filesize

            512KB

          • memory/1816-211-0x000000001B2E0000-0x000000001B360000-memory.dmp

            Filesize

            512KB

          • memory/1816-190-0x000007FEF2D40000-0x000007FEF372C000-memory.dmp

            Filesize

            9.9MB

          • memory/1816-167-0x000000001B2E0000-0x000000001B360000-memory.dmp

            Filesize

            512KB

          • memory/1816-166-0x000000001B2E0000-0x000000001B360000-memory.dmp

            Filesize

            512KB

          • memory/1816-195-0x000000001B2E0000-0x000000001B360000-memory.dmp

            Filesize

            512KB

          • memory/1816-196-0x000000001B2E0000-0x000000001B360000-memory.dmp

            Filesize

            512KB

          • memory/2448-145-0x00000000013C0000-0x00000000013C8000-memory.dmp

            Filesize

            32KB

          • memory/2448-139-0x0000000002FF0000-0x0000000002FF1000-memory.dmp

            Filesize

            4KB

          • memory/2448-200-0x00000000038B0000-0x00000000038B1000-memory.dmp

            Filesize

            4KB

          • memory/2448-210-0x0000000003970000-0x0000000003978000-memory.dmp

            Filesize

            32KB

          • memory/2448-203-0x0000000003970000-0x0000000003971000-memory.dmp

            Filesize

            4KB

          • memory/2448-202-0x0000000003980000-0x0000000003988000-memory.dmp

            Filesize

            32KB

          • memory/2448-147-0x0000000001370000-0x0000000001371000-memory.dmp

            Filesize

            4KB

          • memory/2448-133-0x00000000013C0000-0x00000000013C8000-memory.dmp

            Filesize

            32KB

          • memory/2448-110-0x0000000001C70000-0x0000000001C80000-memory.dmp

            Filesize

            64KB

          • memory/2448-94-0x0000000001B70000-0x0000000001B80000-memory.dmp

            Filesize

            64KB

          • memory/2448-156-0x00000000014A0000-0x00000000014A8000-memory.dmp

            Filesize

            32KB

          • memory/2448-162-0x00000000035C0000-0x00000000035C8000-memory.dmp

            Filesize

            32KB