Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 11:46
Behavioral task
behavioral1
Sample
Eternity.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Eternity.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
Eternity.exe
-
Size
40.8MB
-
MD5
40f0212fa97e2fe44ee0fbffae0c96b5
-
SHA1
e11664504e7b3ab905de8069e6fb5b1159aec002
-
SHA256
32d38e1eae86466254658d5a91a8bca983706b3aec35148012cb0a50f550a74f
-
SHA512
2eeebc345f202033762cfa1e5ae4a2b2f477dad7e7019e5aff7b3aff98d0a9ee7c2223a94dfb6cc1a6fd66eb0290adee3baa1fda8d99658253c005ca11f425f5
-
SSDEEP
786432:gHvsyBy7Mu30RSVRAaAeQc98NmhJQ8mZoJRWUmx2qmE:gUyCMrUVKa/bhJQ8mZorV+
Malware Config
Signatures
-
Growtopia family
-
Program crash 1 IoCs
pid pid_target Process procid_target 1468 3408 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eternity.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3408 Eternity.exe Token: SeDebugPrivilege 3388 taskmgr.exe Token: SeSystemProfilePrivilege 3388 taskmgr.exe Token: SeCreateGlobalPrivilege 3388 taskmgr.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe 3388 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Eternity.exe"C:\Users\Admin\AppData\Local\Temp\Eternity.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 13442⤵
- Program crash
PID:1468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3408 -ip 34081⤵PID:4832
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3388