Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 11:11 UTC
Behavioral task
behavioral1
Sample
AJProxy_3.0/AJProxy3.0.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
AJProxy_3.0/AJProxy3.0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AJProxy_3.0/Growpai.dll
Resource
win7-20241010-en
General
-
Target
AJProxy_3.0/AJProxy3.0.exe
-
Size
887KB
-
MD5
948298bd9dec41df13cbc007cacc3e70
-
SHA1
822ba513d2263161590f9db62fa83d417b5dbb54
-
SHA256
1324fff98ceaf46786fa86c449c0829804b668718f2a73f1daa6343d7eecd426
-
SHA512
76fd8d2190d7e9cc2582123c579af214bba467001b1faf2c4ed96d60f6b7fb695301ebfa141052a4c4847a38a54c64bd117f5b052ced1f4cfc5de4667630b906
-
SSDEEP
24576:DwT7rC6qJfn+1RChT+BHubaRo6Mh/2aUUdt4:KrC6q5Go6Ma0W
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral2/memory/4432-1-0x0000000000570000-0x0000000000656000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Eternity family
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AJProxy3.0.exe AJProxy3.0.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AJProxy3.0.exe AJProxy3.0.exe -
Executes dropped EXE 1 IoCs
pid Process 4216 dcd.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4432 AJProxy3.0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4216 4432 AJProxy3.0.exe 83 PID 4432 wrote to memory of 4216 4432 AJProxy3.0.exe 83 PID 4432 wrote to memory of 4216 4432 AJProxy3.0.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\AJProxy_3.0\AJProxy3.0.exe"C:\Users\Admin\AppData\Local\Temp\AJProxy_3.0\AJProxy3.0.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4216
-
Network
-
Remote address:8.8.8.8:53Requestgoogle.comIN AResponsegoogle.comIN A216.58.214.174
-
Remote address:216.58.214.174:80RequestGET /generate_204 HTTP/1.1
Host: google.com
Connection: Keep-Alive
ResponseHTTP/1.1 204 No Content
Cross-Origin-Resource-Policy: cross-origin
Date: Mon, 30 Dec 2024 11:11:42 GMT
-
Remote address:8.8.8.8:53Requesteterprx.netIN AResponseeterprx.netIN A104.21.20.223eterprx.netIN A172.67.194.181
-
Remote address:104.21.20.223:443RequestPOST /api/accounts HTTP/1.1
Accept: application/json
Content-Type: application/x-www-form-urlencoded
Host: eterprx.net
Content-Length: 209
Connection: Keep-Alive
ResponseHTTP/1.1 400 Bad Request
Content-Type: application/json
Transfer-Encoding: chunked
Connection: keep-alive
x-powered-by: PHP/7.2.34
cache-control: no-cache, private
x-ratelimit-limit: 30
x-ratelimit-remaining: 28
vary: Accept-Encoding,User-Agent
x-turbo-charged-by: LiteSpeed
cf-cache-status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lxhby7ULXmDAkxAJ%2FZpUk6CqrmlWJYXXeEDAEtChmF8S0kVytPkaJPZkkk6MUZrg7ju8MOfrCcTi0B7tLj9ZifN7kTXx7qv51sEbFUG5FeApNyp3PMI60AnQKNTjng%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8fa1973229b463db-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=30023&min_rtt=29144&rtt_var=7553&sent=7&recv=7&lost=0&retrans=0&sent_bytes=2984&recv_bytes=703&delivery_rate=130034&cwnd=252&unsent_bytes=0&cid=29a00719112c4176&ts=293&x=0"
-
Remote address:8.8.8.8:53Requesteternitypr.netIN AResponseeternitypr.netIN A172.67.199.29eternitypr.netIN A104.21.21.142
-
Remote address:172.67.199.29:443RequestPOST /api/accounts HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: eternitypr.net
Content-Length: 209
Connection: Keep-Alive
ResponseHTTP/1.1 400 Bad Request
Content-Type: application/json
Transfer-Encoding: chunked
Connection: keep-alive
x-powered-by: PHP/7.2.34
cache-control: no-cache, private
x-ratelimit-limit: 30
x-ratelimit-remaining: 28
vary: Accept-Encoding,User-Agent
x-turbo-charged-by: LiteSpeed
cf-cache-status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N5Gyp1EbCvLVsbvAmPTK5rclFq958ti%2F6KIfr8T%2FXRwcqj6P7362bv3nnDCmHatnj3I8uqidtBZCRhoZNec%2FSQ0InR6OJQuBABHoEYFB61qShZ0VQdT%2FOl5osJWdn2yknA%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8fa19734fa8ee906-LHR
alt-svc: h3=":443"; ma=86400
server-timing: cfL4;desc="?proto=TCP&rtt=33722&min_rtt=29329&rtt_var=9155&sent=7&recv=7&lost=0&retrans=0&sent_bytes=2996&recv_bytes=683&delivery_rate=111994&cwnd=253&unsent_bytes=0&cid=0f2d6e4cc848389e&ts=328&x=0"
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request174.214.58.216.in-addr.arpaIN PTRResponse174.214.58.216.in-addr.arpaIN PTRmad01s26-in-f141e100net174.214.58.216.in-addr.arpaIN PTRmad01s26-in-f174�I174.214.58.216.in-addr.arpaIN PTRpar10s42-in-f14�I
-
Remote address:8.8.8.8:53Request88.210.23.2.in-addr.arpaIN PTRResponse88.210.23.2.in-addr.arpaIN PTRa2-23-210-88deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request223.20.21.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.199.67.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request72.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request28.118.140.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.163.202.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.42.69.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request83.210.23.2.in-addr.arpaIN PTRResponse83.210.23.2.in-addr.arpaIN PTRa2-23-210-83deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request48.229.111.52.in-addr.arpaIN PTRResponse
-
302 B 259 B 5 3
HTTP Request
GET http://google.com/generate_204HTTP Response
204 -
1.1kB 4.5kB 9 10
HTTP Request
POST https://eterprx.net/api/accountsHTTP Response
400 -
1.1kB 4.5kB 9 10
HTTP Request
POST https://eternitypr.net/api/accountsHTTP Response
400
-
56 B 72 B 1 1
DNS Request
google.com
DNS Response
216.58.214.174
-
57 B 89 B 1 1
DNS Request
eterprx.net
DNS Response
104.21.20.223172.67.194.181
-
60 B 92 B 1 1
DNS Request
eternitypr.net
DNS Response
172.67.199.29104.21.21.142
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
73 B 173 B 1 1
DNS Request
174.214.58.216.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
88.210.23.2.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
223.20.21.104.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
29.199.67.172.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
72.32.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
28.118.140.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
74 B 160 B 1 1
DNS Request
200.163.202.172.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
241.42.69.40.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
83.210.23.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
48.229.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87