Analysis

  • max time kernel
    21s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2024 22:56

General

  • Target

    Autofarm.exe

  • Size

    902KB

  • MD5

    c83093e96402aaf8c5afe4c12d1d162d

  • SHA1

    6b52e3cb21a3941c31da0dc3f559b7d45c99630c

  • SHA256

    4ef2f891081c62206d7277e2962377b3914da6f3d8912f56f415ec32474069a4

  • SHA512

    57aec652d34f0db9276908facc1faa3647a9464ba362055281fe6f04916d6f579e6f7f506903b4484d076e8d585e3c8cb6dade912e60543a6ddefd707aa3f9dd

  • SSDEEP

    12288:YTEYAsROAsrt/uxduo1jB0Y96qTqQaSMpyYCHopdCln3EWp5XdUHtY5:YwT7rC6q1aTpyYCHyIln3EWp5AY5

Malware Config

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detects Eternity stealer 1 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Autofarm.exe
    "C:\Users\Admin\AppData\Local\Temp\Autofarm.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security modification
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\AppData\Local\Temp\dcd.exe
      "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
      2⤵
      • Executes dropped EXE
      PID:2516
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2684
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2992 -s 1536
      2⤵
        PID:2512

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\dcd.exe

      Filesize

      227KB

      MD5

      b5ac46e446cead89892628f30a253a06

      SHA1

      f4ad1044a7f77a1b02155c3a355a1bb4177076ca

      SHA256

      def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

      SHA512

      bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

    • memory/2684-23-0x0000000001FA0000-0x0000000002020000-memory.dmp

      Filesize

      512KB

    • memory/2684-20-0x0000000001FA0000-0x0000000002020000-memory.dmp

      Filesize

      512KB

    • memory/2684-17-0x000000001B4D0000-0x000000001B7B2000-memory.dmp

      Filesize

      2.9MB

    • memory/2684-18-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

      Filesize

      32KB

    • memory/2684-24-0x000007FEEE290000-0x000007FEEEC2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2684-21-0x000007FEEE290000-0x000007FEEEC2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2684-22-0x0000000001FA0000-0x0000000002020000-memory.dmp

      Filesize

      512KB

    • memory/2684-19-0x000007FEEE290000-0x000007FEEEC2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2992-6-0x000000001AFF0000-0x000000001B070000-memory.dmp

      Filesize

      512KB

    • memory/2992-27-0x000000001AFF0000-0x000000001B070000-memory.dmp

      Filesize

      512KB

    • memory/2992-1-0x000007FEF5DD0000-0x000007FEF67BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2992-28-0x000000001AFF0000-0x000000001B070000-memory.dmp

      Filesize

      512KB

    • memory/2992-2-0x000007FEF5DD0000-0x000007FEF67BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2992-4-0x000000001AFF0000-0x000000001B070000-memory.dmp

      Filesize

      512KB

    • memory/2992-0-0x0000000000A50000-0x0000000000B3A000-memory.dmp

      Filesize

      936KB

    • memory/2992-7-0x000000001AFF0000-0x000000001B070000-memory.dmp

      Filesize

      512KB

    • memory/2992-25-0x000007FEF5DD0000-0x000007FEF67BC000-memory.dmp

      Filesize

      9.9MB

    • memory/2992-3-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/2992-26-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/2992-5-0x00000000003D0000-0x000000000040E000-memory.dmp

      Filesize

      248KB