File name:

Growpai.exe

Full analysis: https://app.any.run/tasks/fd152579-f2ea-4618-9af9-10e2a3e650ea
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: November 09, 2024, 07:07:29
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
eternity
stealer
qrcode
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 5 sections
MD5:

3694133BFD5047EE5E2A63C055690F94

SHA1:

F9E533F09C02F0E23E41EDC75CABF6D165A60E07

SHA256:

1C53799C7C3E713D6CE398A4A0F60BBD13FC2DD8BD60EA761E6E9E46C49886BF

SSDEEP:

49152:ldS48cPgnlbwnt7ah7YDnw7LO0WnO+AQPeQDjntyJMbu2b3Q8OQPbNlRbwnt7ah2:ldS48t2Wh7YDw7LO0WO+oQDjntju2BOb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ETERNITY has been detected (SURICATA)

      • svchost.exe (PID: 2172)
      • Growpai.exe (PID: 5400)
    • Connects to the CnC server

      • svchost.exe (PID: 2172)
    • Create files in the Startup directory

      • Growpai.exe (PID: 5400)
  • SUSPICIOUS

    • Contacting a server suspected of hosting an CnC

      • svchost.exe (PID: 2172)
      • Growpai.exe (PID: 5400)
    • Executable content was dropped or overwritten

      • Growpai.exe (PID: 5400)
    • Executes application which crashes

      • Growpai.exe (PID: 5400)
  • INFO

    • Reads the computer name

      • Growpai.exe (PID: 5400)
    • Disables trace logs

      • Growpai.exe (PID: 5400)
    • Checks supported languages

      • Growpai.exe (PID: 5400)
      • dcd.exe (PID: 6564)
    • Checks proxy server information

      • Growpai.exe (PID: 5400)
      • WerFault.exe (PID: 1440)
    • Reads the machine GUID from the registry

      • Growpai.exe (PID: 5400)
    • Reads Environment values

      • Growpai.exe (PID: 5400)
    • Create files in a temporary directory

      • Growpai.exe (PID: 5400)
    • Reads the software policy settings

      • Growpai.exe (PID: 5400)
      • WerFault.exe (PID: 1440)
    • Creates files or folders in the user directory

      • Growpai.exe (PID: 5400)
      • WerFault.exe (PID: 1440)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (41)
.exe | Win64 Executable (generic) (36.3)
.dll | Win32 Dynamic Link Library (generic) (8.6)
.exe | Win32 Executable (generic) (5.9)
.exe | Win16/32 Executable Delphi generic (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:06:10 14:13:21+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 272384
InitializedDataSize: 199680
UninitializedDataSize: -
EntryPoint: 0x446ee
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 0.0.0.0
InternalName: EternityStealer.exe
LegalCopyright:
OriginalFileName: EternityStealer.exe
ProductVersion: 0.0.0.0
AssemblyVersion: 0.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ETERNITY growpai.exe dcd.exe no specs #ETERNITY svchost.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
1440C:\WINDOWS\system32\WerFault.exe -u -p 5400 -s 2000C:\Windows\System32\WerFault.exe
Growpai.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5400"C:\Users\admin\AppData\Local\Temp\Growpai.exe" C:\Users\admin\AppData\Local\Temp\Growpai.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
3762504530
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\growpai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6564"C:\Users\admin\AppData\Local\Temp\dcd.exe" -path=""C:\Users\admin\AppData\Local\Temp\dcd.exeGrowpai.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\dcd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\iphlpapi.dll
Total events
6 293
Read events
6 279
Write events
14
Delete events
0

Modification events

(PID) Process:(5400) Growpai.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Growpai_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5400) Growpai.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Growpai_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5400) Growpai.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Growpai_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5400) Growpai.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Growpai_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5400) Growpai.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Growpai_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5400) Growpai.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Growpai_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5400) Growpai.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Growpai_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5400) Growpai.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Growpai_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5400) Growpai.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Growpai_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5400) Growpai.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Growpai_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
2
Suspicious files
5
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
1440WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Growpai.exe_f457f1e6cae45bdc23a98b4f0e9e824e5fef2_9c1ee9c8_79641a26-dc87-46ee-b092-857e00cd91fe\Report.wer
MD5:
SHA256:
1440WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Growpai.exe.5400.dmp
MD5:
SHA256:
5400Growpai.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Growpai.exeexecutable
MD5:3694133BFD5047EE5E2A63C055690F94
SHA256:1C53799C7C3E713D6CE398A4A0F60BBD13FC2DD8BD60EA761E6E9E46C49886BF
1440WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEder
MD5:F0CF5B1794ECA7CD73F9C020DAAB8EF2
SHA256:2AF00EDCE7EF3266897E52DC81E8DE3B7A079028C0F1F96EAFF9E38AD342F617
1440WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC221.tmp.WERInternalMetadata.xmlxml
MD5:A48610E7BA10FFD3CF607D578BF27FF2
SHA256:79B2AEDE5A28D431B5AD29764DE15D47371397F7521ED71ACEFA211C6464A32B
1440WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC260.tmp.xmlxml
MD5:E84DEB575919F1792CACDEDE2D22C54C
SHA256:BFD50FC76E8BF3308F908B6C3569790C34E7F533A4F3867597CE5150A38545A1
1440WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:D2E7FDF61D9E512215C0888E0D1AF78F
SHA256:AFCCE6E5E7F449395051D629F832A2C748087AA2C1C3D43F8C8FAF0A21B2D132
5400Growpai.exeC:\Users\admin\AppData\Local\Temp\dcd.exeexecutable
MD5:B5AC46E446CEAD89892628F30A253A06
SHA256:DEF7AFCB65126C4B04A7CBF08C693F357A707AA99858CAC09A8D5E65F3177669
1440WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERBD2E.tmp.dmpbinary
MD5:FF2154145DF6E1581C97784F9961063E
SHA256:A2C40DBA1A670AE741497BDF2DABFB3E5B5C85CB528C414068FF3264547D6BC2
1440WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:B7635BBF72A755CF237266AFDD5CB6AB
SHA256:1730A63B0BEF6541F66E9C0776B4E5AC80E28F60CE0DE435D26D345A2A4AFBA1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
47
DNS requests
25
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5400
Growpai.exe
GET
204
216.58.212.142:80
http://google.com/generate_204
unknown
whitelisted
1440
WerFault.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1440
WerFault.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4004
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6660
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6660
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3960
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5488
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1248
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4360
SearchApp.exe
104.126.37.160:443
www.bing.com
Akamai International B.V.
DE
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
5400
Growpai.exe
216.58.212.142:80
google.com
GOOGLE
US
whitelisted
4
System
192.168.100.255:138
whitelisted
5400
Growpai.exe
104.21.20.223:443
eterprx.net
CLOUDFLARENET
malicious
5400
Growpai.exe
172.67.199.29:443
eternitypr.net
CLOUDFLARENET
US
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
www.bing.com
  • 104.126.37.160
  • 104.126.37.137
  • 104.126.37.168
  • 104.126.37.171
  • 104.126.37.161
  • 104.126.37.153
  • 104.126.37.139
  • 104.126.37.170
  • 104.126.37.131
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 216.58.212.142
whitelisted
eterprx.net
  • 104.21.20.223
  • 172.67.194.181
malicious
eternitypr.net
  • 172.67.199.29
  • 104.21.21.142
malicious
watson.events.data.microsoft.com
  • 20.189.173.22
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
login.live.com
  • 20.190.160.20
  • 40.126.32.74
  • 40.126.32.140
  • 20.190.160.14
  • 40.126.32.138
  • 40.126.32.76
  • 40.126.32.134
  • 20.190.160.22
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Eternity Stealer CnC Domain in DNS Lookup (eternitypr .net)
2172
svchost.exe
Domain Observed Used for C2 Detected
ET MALWARE Win32/Eternity Stealer CnC Domain in DNS Lookup (eterprx .net)
5400
Growpai.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Eternity Stealer Domain (eternitypr .net in TLS SNI)
5400
Growpai.exe
Domain Observed Used for C2 Detected
ET MALWARE Observed Win32/Eternity Stealer Domain (eterprx .net in TLS SNI)
No debug info