Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 16:55
Behavioral task
behavioral1
Sample
Growtopia Hack.exe
Resource
win7-20240221-en
General
-
Target
Growtopia Hack.exe
-
Size
1.2MB
-
MD5
3f532a4355da80fc22ce565440f9d73d
-
SHA1
ad55468ee3271ddf921fc68252ff633a56449d77
-
SHA256
e14364e74981e5512d4b55360af8dc794d2e00dc758c1952484171e729018536
-
SHA512
7545619ccc2920b1cefb4cc8f476886b2fcd08124059d0f72570878d9086280251ee9f0206f8fa9e69c249cad4bdab0e299b5ed0fbb7ad6d8223ac76489ed540
-
SSDEEP
12288:HTEYAsROAsrt/uxduo1jB0Y96qNef7PV64xnAsspqZEeLh0I4oDgJzzq1MlEjFNh:HwT7rC6qmPdhsqBL61oDGCuyw
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral2/memory/4196-0-0x0000000000AF0000-0x0000000000BFA000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Growtopia Hack.exe Growtopia Hack.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Growtopia Hack.exe Growtopia Hack.exe -
Executes dropped EXE 1 IoCs
pid Process 1952 dcd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 444 taskmgr.exe 444 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4196 Growtopia Hack.exe Token: SeDebugPrivilege 444 taskmgr.exe Token: SeSystemProfilePrivilege 444 taskmgr.exe Token: SeCreateGlobalPrivilege 444 taskmgr.exe Token: 33 444 taskmgr.exe Token: SeIncBasePriorityPrivilege 444 taskmgr.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe 444 taskmgr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4196 wrote to memory of 1952 4196 Growtopia Hack.exe 97 PID 4196 wrote to memory of 1952 4196 Growtopia Hack.exe 97 PID 4196 wrote to memory of 1952 4196 Growtopia Hack.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Growtopia Hack.exe"C:\Users\Admin\AppData\Local\Temp\Growtopia Hack.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵
- Executes dropped EXE
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3844 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:1868
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87