Analysis

  • max time kernel
    1556s
  • max time network
    1561s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-03-2024 04:21

General

  • Target

    Hugo Proxy/Hugo Proxy.exe

  • Size

    3.3MB

  • MD5

    8c3eade804e008553d55f87c8898e261

  • SHA1

    aa147d628faf0f37b72205c0e1dc46106bb01c5d

  • SHA256

    6c2a1d5c6c6022282e496e138ad6a372a0bf6c8b079799cb96d93a6be456964d

  • SHA512

    5d75d0a5d29c8b9f7422acc2b659b4ee839ff678db25cf0e11ec0cf646a15cff33175847fc432e070fc6fef3e08b3b8fa659a39cf625873ee0d0b07dd182a3e5

  • SSDEEP

    98304:ArphCyxSSTaVpyoF2gWl59NimUCMdyer:QhCyl4xMhp

Score
10/10

Malware Config

Signatures

  • Detects Eternity stealer 1 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Hugo Proxy\Hugo Proxy.exe
    "C:\Users\Admin\AppData\Local\Temp\Hugo Proxy\Hugo Proxy.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Users\Admin\AppData\Local\Temp\u0pzv3zp.drr\Hugo Proxy.exe
      "C:\Users\Admin\AppData\Local\Temp\u0pzv3zp.drr\Hugo Proxy.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c Color 0A
        3⤵
          PID:2756
      • C:\Users\Admin\AppData\Local\Temp\dcd.exe
        "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
        2⤵
        • Executes dropped EXE
        PID:1556
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1540 -s 1888
        2⤵
          PID:2620

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\dcd.exe

        Filesize

        227KB

        MD5

        b5ac46e446cead89892628f30a253a06

        SHA1

        f4ad1044a7f77a1b02155c3a355a1bb4177076ca

        SHA256

        def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

        SHA512

        bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

      • \Users\Admin\AppData\Local\Temp\u0pzv3zp.drr\Hugo Proxy.exe

        Filesize

        1.2MB

        MD5

        b110736e63d6f9078ed650298e903a63

        SHA1

        ec43355d545c0f027d35c7978e0229feda1d6e67

        SHA256

        853bfda7b9da26eff51479ffa267475f365de51a36720b79f19f32755389057c

        SHA512

        d08dd7515f5d2d40f1ec5e281e35020156bb9f7cf9a9d0dba0f99a9f74faa4e2323b3f22394caceb9882925975fb3632bfb74df8382ba915319348cd0b7ba970

      • memory/1540-3-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

        Filesize

        9.9MB

      • memory/1540-0-0x0000000000F10000-0x000000000125E000-memory.dmp

        Filesize

        3.3MB

      • memory/1540-4-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/1540-5-0x0000000000B10000-0x0000000000B90000-memory.dmp

        Filesize

        512KB

      • memory/1540-6-0x000000001B740000-0x000000001B8AE000-memory.dmp

        Filesize

        1.4MB

      • memory/1540-7-0x0000000000B10000-0x0000000000B90000-memory.dmp

        Filesize

        512KB

      • memory/1540-8-0x0000000000B10000-0x0000000000B90000-memory.dmp

        Filesize

        512KB

      • memory/1540-2-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

        Filesize

        9.9MB

      • memory/1540-1-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

        Filesize

        9.9MB

      • memory/1540-26-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

        Filesize

        9.9MB

      • memory/1540-27-0x0000000000B10000-0x0000000000B90000-memory.dmp

        Filesize

        512KB

      • memory/1540-28-0x0000000000B10000-0x0000000000B90000-memory.dmp

        Filesize

        512KB

      • memory/1540-29-0x0000000000B10000-0x0000000000B90000-memory.dmp

        Filesize

        512KB