Overview
overview
10Static
static
3GrowtopiaI...2).exe
windows7-x64
6GrowtopiaI...2).exe
windows10-2004-x64
$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Growtopia.exe
windows7-x64
1Growtopia.exe
windows10-2004-x64
1MicrosoftE...up.exe
windows7-x64
6MicrosoftE...up.exe
windows10-2004-x64
6SecureEngineSDK64.dll
windows7-x64
1SecureEngineSDK64.dll
windows10-2004-x64
1anzu.dll
windows7-x64
1anzu.dll
windows10-2004-x64
1sdkencrypt...64.dll
windows7-x64
1sdkencrypt...64.dll
windows10-2004-x64
1steam_api64.dll
windows7-x64
1steam_api64.dll
windows10-2004-x64
1ubiservices.dll
windows7-x64
1ubiservices.dll
windows10-2004-x64
1vc_redist.x64.exe
windows7-x64
7vc_redist.x64.exe
windows10-2004-x64
7vc_redist.x86.exe
windows7-x64
7vc_redist.x86.exe
windows10-2004-x64
7zlibwapi.dll
windows7-x64
1zlibwapi.dll
windows10-2004-x64
1General
-
Target
GrowtopiaInstaller (2).exe
-
Size
230.6MB
-
Sample
240804-v6kq4s1bnj
-
MD5
3a3fc09ccd9742f23dfcd213ea0cc4fa
-
SHA1
e20b17bd6a625259b4f9b2c9f8439d761bc126e3
-
SHA256
9ccb0bc19f24b694a4129cc387279457e57671f8109937550258ffc40173423b
-
SHA512
cfc533d6c845692a94868d4df276b47276504cce838bfffea3ff41a33c6d384d70583bb9413fb6048ecea0cf1311ce38c3311fda2e712c2aef3625bb45016971
-
SSDEEP
6291456:2TkXdHjFqVWTv3QXZ0ZDhip7rOCXqCS6N:2WmWtb6rOCaC/
Static task
static1
Behavioral task
behavioral1
Sample
GrowtopiaInstaller (2).exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
GrowtopiaInstaller (2).exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Growtopia.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Growtopia.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
MicrosoftEdgeWebview2Setup.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
MicrosoftEdgeWebview2Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
SecureEngineSDK64.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
SecureEngineSDK64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
anzu.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
anzu.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
sdkencryptedappticket64.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
sdkencryptedappticket64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
steam_api64.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
steam_api64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
ubiservices.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
ubiservices.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
vc_redist.x64.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
vc_redist.x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
vc_redist.x86.exe
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
vc_redist.x86.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
zlibwapi.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
zlibwapi.dll
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
GrowtopiaInstaller (2).exe
-
Size
230.6MB
-
MD5
3a3fc09ccd9742f23dfcd213ea0cc4fa
-
SHA1
e20b17bd6a625259b4f9b2c9f8439d761bc126e3
-
SHA256
9ccb0bc19f24b694a4129cc387279457e57671f8109937550258ffc40173423b
-
SHA512
cfc533d6c845692a94868d4df276b47276504cce838bfffea3ff41a33c6d384d70583bb9413fb6048ecea0cf1311ce38c3311fda2e712c2aef3625bb45016971
-
SSDEEP
6291456:2TkXdHjFqVWTv3QXZ0ZDhip7rOCXqCS6N:2WmWtb6rOCaC/
-
Detects Eternity stealer
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Disables Task Manager via registry modification
-
Drops desktop.ini file(s)
-
Event Triggered Execution: Image File Execution Options Injection
-
Legitimate hosting services abused for malware hosting/C2
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/InstallOptions.dll
-
Size
14KB
-
MD5
3e277798b9d8f48806fbb5ebfd4990db
-
SHA1
d1ab343c5792bc99599ec7acba506e8ba7e05969
-
SHA256
fe19353288a08a5d2640a9c022424a1d20e4909a351f2114423e087313a40d7c
-
SHA512
84c9d4e2e6872277bffb0e10b292c8c384d475ad163fd0a47ca924a3c79077dfde880f535a171660f73265792554129161d079a10057d44e28e2d57ebc477e92
-
SSDEEP
192:d4n3T5aK+dHCMR1aQR9RuZl3WWmU7WYZsw1JpVGnrjsK72dwF7dBOne:Wn3T5KdHCMRD/R1cOnrjs+BO
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
3f176d1ee13b0d7d6bd92e1c7a0b9bae
-
SHA1
fe582246792774c2c9dd15639ffa0aca90d6fd0b
-
SHA256
fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
-
SHA512
0a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6
-
SSDEEP
192:OPtkumJX7zB22kGwfy0mtVgkCPOsX1un:/702k5qpdsXQn
Score3/10 -
-
-
Target
Growtopia.exe
-
Size
39.8MB
-
MD5
eaca97167873094e5561a7a8c270edb0
-
SHA1
039be5d64c9fed35ba20e3bc049ff7a80d8bd69b
-
SHA256
ef525f5c3ae61a24e99fa290043e6a41b4bbe73fbec799addf7545538814044d
-
SHA512
912ea2fbf9e85f4828424d86535f3f86275b86865cd861ce7709321cd29cfd7828f32478e00b5cd938e3131f6f0fc2c7981d7c7fa7e2d90255f289dc91f0e6bb
-
SSDEEP
786432:yWsP/oCA4HUE6DZOKsBA8S3ldS7sfLGTJr+PBlK905c8Hm9:JsPQe0Ps28cdS7WkJrC+h8G9
Score1/10 -
-
-
Target
MicrosoftEdgeWebview2Setup.exe
-
Size
1.6MB
-
MD5
8b9812ba27e12c79319d859e97955ca4
-
SHA1
3cb35ac811c27e7b21b381dccab55517609190c3
-
SHA256
a63d59b2af0c7b2be6984280386042a230dab928e3b426d51a0afb2eff5f98e9
-
SHA512
8312081fcca20f1d8d393ea2588c2fd19830eb9b36700ec8bc541cd25c4c2046008f3eec07883056956adae5c56083d43ded74d3122d21555d1e43a9d1ab5618
-
SSDEEP
24576:o9ye32wIdWoAH+miAQoCZoWf4fh29ht/5iqSxulBbxAl/f1scgIDnzMwdF9fZ4T+:Qye32wIuAAQZKwEqbBe1scgID7fZcZJ
Score6/10-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
-
-
Target
SecureEngineSDK64.dll
-
Size
28KB
-
MD5
023ca3f56ce9d9aff9e4839301e82c82
-
SHA1
fec3bca7c4f43c9c44ffcfca1f41b5a480cba78b
-
SHA256
9387fedbd201f2886a28f32d1ec155a69ac86ea78e331381f6db521f8b4b5a11
-
SHA512
18bea9d3fde048dbd7ed0f039d44c36ccb112334b4188632772c35de06042e6d4077e1dc68ce6ac4f3a8fc4d1134940d24216a9451c79a813cd0ac33c56d354b
-
SSDEEP
192:6i08s5GvuxBdKKCeotPpWZlNCryWlHqX5xS5haBWUcSAfMVIBizxUv:6dZxBnCeqPpWZglsfSgA0V
Score1/10 -
-
-
Target
anzu.dll
-
Size
3.6MB
-
MD5
259a32af5b652b64addf145b389f6b60
-
SHA1
fe51dbf8bc1e4d8dbc3dc6dfcc48b54775b8e924
-
SHA256
d869244c77decc4b15dc20ba3207d9286cd67fd4599e8219a3df80edf66f7279
-
SHA512
f90dc7f0ef44fcbe14f08ee9addbc5c405f0b8dc8527aed7822d33f82a969a0d89fde8f6aa73bf9e5666658e682081aafd563758817c3358921a400c69829e09
-
SSDEEP
49152:Zic2gyhqmJ0SlAQwrkt187Sv0oFfcAlf080nUqMoa+48i1a9MhTdXrAj:ZMpmCukLOSl3pdk9MjXg
Score1/10 -
-
-
Target
sdkencryptedappticket64.dll
-
Size
1010KB
-
MD5
89491f37434a1848e016fa89bdc436e9
-
SHA1
4964f032ae077f8a2ba2848c57d95e1ceefdeeb4
-
SHA256
151b53f46c0d163ac2b47531508df942a92295fe75cbaa99e481339cb4ae82f3
-
SHA512
ba4004255edeb80eb385aafeee9a2b5da0968c026c7b002fc87539a449c60ecbbd78c2ea112f43b1c82e28863e22d2b8989814145c6924c666b2c82a4825893c
-
SSDEEP
24576:2BPcoPGk/xmJagU6ZivRa684r6dubOU9/Vxi7Cm9jw1o:OPcIGk/xmJagU6ZivRa684rzbOU92CmP
Score1/10 -
-
-
Target
steam_api64.dll
-
Size
291KB
-
MD5
f3db5801dc9b75da671b39041e2e8bcf
-
SHA1
40d0ae44e090db49b2309fb152fbd3e11124a376
-
SHA256
a44e5537939ae4eebc69000589aa9b2437a667813a1657cc779198bae9b815a9
-
SHA512
9abeb8542ce48f3d263e9924a82cafa80b42b730636f1df6e594679482b6638997563b5d752d5505f25596a5d0e2f56f1255e4a94bb9523d47c180bc131e22f9
-
SSDEEP
3072:B8Y+BDOgGIWcXSEJeRhqTMdU55UuT7+7JtN3RUOj65lhTbCMTiGu2ZvJpKCZyq+g:BYPNrQheMW5vTKxRo8CgCZyqO2CM4OYS
Score1/10 -
-
-
Target
ubiservices.dll
-
Size
14.8MB
-
MD5
d06ec93e5877f3f2623ccaa89a349a75
-
SHA1
a071d570f3af7fd283e99feb95938026eadc3f1a
-
SHA256
068bc38fa95a55d74470e9df9da71b8106668aaa647619d83a036808f14e6e5b
-
SHA512
7a3b57a82375835fb14ac735f882c883731ba486025cc1e86b2bb36743e2ad367ffa417f73be7a24585375cbc89ddca876acd9b208e5eebacae78f71aec2d854
-
SSDEEP
49152:++QTjHVpj56LNzw2Vo/PYfGctqzyf6nPsAAYQDIsPXzqGNXGMi4oY8/wFe5IOXdh:+D+VA/MsjPGRSip1zjFuoe6e
Score1/10 -
-
-
Target
vc_redist.x64.exe
-
Size
13.9MB
-
MD5
27b141aacc2777a82bb3fa9f6e5e5c1c
-
SHA1
3155cb0f146b927fcc30647c1a904cd162548c8c
-
SHA256
5eea714e1f22f1875c1cb7b1738b0c0b1f02aec5ecb95f0fdb1c5171c6cd93a3
-
SHA512
7789eabb6dd4a159bb899d2e6d6df70addb3df239bda6f9ead8c1d2a2ac2062fce3a495814b48a3c2bec12f13800ad0703e2c61c35158b0912011b914f098011
-
SSDEEP
393216:xTPq5dCsKSR65cX7Eyd/qnejOX3L8T8KYfU3j:VP5iw56oyleejcL8T8fc3
Score7/10-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
vc_redist.x86.exe
-
Size
13.1MB
-
MD5
1a15e6606bac9647e7ad3caa543377cf
-
SHA1
bfb74e498c44d3a103ca3aa2831763fb417134d1
-
SHA256
fdd1e1f0dcae2d0aa0720895eff33b927d13076e64464bb7c7e5843b7667cd14
-
SHA512
e8cb67fc8e0312da3cc98364b96dfa1a63150ab9de60069c4af60c1cf77d440b7dffe630b4784ba07ea9bf146bdbf6ad5282a900ffd6ab7d86433456a752b2fd
-
SSDEEP
393216:S1RPq5dCsKSR65cX7Eyd/qnejOFxP7OEnl4L/Vvc:yP5iw56oyleej2OEnlwc
Score7/10-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
zlibwapi.dll
-
Size
87KB
-
MD5
dd91e4c7d445c31682ebdd22e732d93d
-
SHA1
2ed9d1a085fa9179d199e0372d81462816fd7504
-
SHA256
1f047faec08d9a35c304fb4a7cf13853589359a8f7cbfdd48c5d5807712dcf05
-
SHA512
0e610c0b97a970ed6077e27f8071f32cceef6410133b9ee8934849443b8ebfb022f1d88f9b7bff77f3b5a243c73b5a4e05fae843bdbc849ba09168ecb61d5f87
-
SSDEEP
1536:3d34luTY6/aYPBqxRjt3JRSVoIOFIORnToIfHyRXCWdd:3hIuBZKjtZMuP5TBfqX/d
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Defense Evasion
Indicator Removal
1Clear Persistence
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1