Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13-06-2024 22:55

General

  • Target

    GABB/GABB.exe

  • Size

    5.2MB

  • MD5

    c90ce1a6c8c6185af5c85efa5a3d9eb2

  • SHA1

    b4b2bc553bd0ed22c56c5288cd533f2e9eab1597

  • SHA256

    4bcd41b460dc664cbeb181b9516d6ccc39eb78cfb9f7c106bf904634163a76ac

  • SHA512

    dde898df373f3cdaadee89e7bb387be170e6c7959ecabee92dc8bb6de4de8d8164f51d2ba8b674c2dee33fbcc2700d3aa27cc47c67cd46cb4885791b83423772

  • SSDEEP

    49152:MrC6q5wyKyKyKyKyOVoeWRd2Ru1j0IAibunmqJNAivkCnVHMDsXO1ak2zmByg2z3:MrGw////+F4rSO0Yhsp9v3eEj53f

Score
10/10

Malware Config

Signatures

  • Detects Eternity stealer 1 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GABB\GABB.exe
    "C:\Users\Admin\AppData\Local\Temp\GABB\GABB.exe"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\ppf0o3jd.fwh\GABB.exe
      "C:\Users\Admin\AppData\Local\Temp\ppf0o3jd.fwh\GABB.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1692
    • C:\Users\Admin\AppData\Local\Temp\dcd.exe
      "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
      2⤵
      • Executes dropped EXE
      PID:2640
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 3036 -s 896
      2⤵
        PID:2796

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Cab233C.tmp

      Filesize

      67KB

      MD5

      2d3dcf90f6c99f47e7593ea250c9e749

      SHA1

      51be82be4a272669983313565b4940d4b1385237

      SHA256

      8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

      SHA512

      9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

    • C:\Users\Admin\AppData\Local\Temp\Tar2584.tmp

      Filesize

      160KB

      MD5

      7186ad693b8ad9444401bd9bcd2217c2

      SHA1

      5c28ca10a650f6026b0df4737078fa4197f3bac1

      SHA256

      9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

      SHA512

      135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

    • C:\Users\Admin\AppData\Local\Temp\dcd.exe

      Filesize

      227KB

      MD5

      b5ac46e446cead89892628f30a253a06

      SHA1

      f4ad1044a7f77a1b02155c3a355a1bb4177076ca

      SHA256

      def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

      SHA512

      bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

    • C:\Users\Admin\AppData\Local\Temp\ppf0o3jd.fwh\GABB.exe

      Filesize

      1.8MB

      MD5

      23b71563af5ff450418a5bacfe63d4e3

      SHA1

      e0710c35bdd94aee3952a720fff1ec16eb40761b

      SHA256

      0518340706e89adb60325d1ea1106c0ea8f69da2ecbd2ef85385edd923eb0b88

      SHA512

      e55402adc03ff4b4c90256c4b4bb7d3a7f8b7a1bb87b73d1c6bcfe5a0ab17758e53805c00f78a4d3992ef7541ea46adabe2dbc84a8af768ea9c04eb2e23b86f3

    • memory/1692-72-0x0000000073D60000-0x000000007444E000-memory.dmp

      Filesize

      6.9MB

    • memory/1692-20-0x0000000073D60000-0x000000007444E000-memory.dmp

      Filesize

      6.9MB

    • memory/1692-19-0x0000000000B30000-0x0000000000D0C000-memory.dmp

      Filesize

      1.9MB

    • memory/1692-18-0x0000000073D6E000-0x0000000073D6F000-memory.dmp

      Filesize

      4KB

    • memory/3036-5-0x000007FEF50F0000-0x000007FEF5ADC000-memory.dmp

      Filesize

      9.9MB

    • memory/3036-6-0x000007FEF50F0000-0x000007FEF5ADC000-memory.dmp

      Filesize

      9.9MB

    • memory/3036-4-0x000000001BC70000-0x000000001BE88000-memory.dmp

      Filesize

      2.1MB

    • memory/3036-0-0x000007FEF50F3000-0x000007FEF50F4000-memory.dmp

      Filesize

      4KB

    • memory/3036-29-0x000007FEF50F0000-0x000007FEF5ADC000-memory.dmp

      Filesize

      9.9MB

    • memory/3036-3-0x000007FEF50F0000-0x000007FEF5ADC000-memory.dmp

      Filesize

      9.9MB

    • memory/3036-2-0x000007FEF50F0000-0x000007FEF5ADC000-memory.dmp

      Filesize

      9.9MB

    • memory/3036-1-0x00000000012A0000-0x0000000001780000-memory.dmp

      Filesize

      4.9MB