File name:

Pathfinder_2.19.3.exe

Full analysis: https://app.any.run/tasks/7dc27873-4690-409a-8746-0285688e4591
Verdict: Malicious activity
Analysis date: November 30, 2023, 20:43:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
eternity
eternity stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

3938DAD69B5687B89FF8883B2A51A4DB

SHA1:

132B551A1E506AE3D496639A001FC0BF657484A7

SHA256:

60D3A19ED683BDFBB61985E1CD8EE97F112D8A1F6A14F308AABF8E5432EE9AC2

SSDEEP:

6144:ReXY4XP4ZQWFFFTdlkOffZ/t2yeS40b3svMU:ReXY4XP4ZQWFFFvkOnZF0SiM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • Pathfinder_2.19.3.exe (PID: 2876)
    • Actions looks like stealing of personal data

      • Pathfinder_2.19.3.exe (PID: 2876)
    • Starts CMD.EXE for self-deleting

      • Pathfinder_2.19.3.exe (PID: 2876)
    • ETERNITY has been detected (YARA)

      • Pathfinder_2.19.3.exe (PID: 2876)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Pathfinder_2.19.3.exe (PID: 2876)
    • Starts CMD.EXE for commands execution

      • Pathfinder_2.19.3.exe (PID: 2876)
    • Accesses Microsoft Outlook profiles

      • Pathfinder_2.19.3.exe (PID: 2876)
    • Starts application with an unusual extension

      • cmd.exe (PID: 1444)
      • cmd.exe (PID: 3160)
    • Uses NETSH.EXE to obtain data on the network

      • cmd.exe (PID: 1444)
    • Checks for external IP

      • Pathfinder_2.19.3.exe (PID: 2876)
    • Connects to unusual port

      • Pathfinder_2.19.3.exe (PID: 2876)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 1444)
    • Reads browser cookies

      • Pathfinder_2.19.3.exe (PID: 2876)
    • Reads settings of System Certificates

      • Pathfinder_2.19.3.exe (PID: 2876)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • Pathfinder_2.19.3.exe (PID: 2876)
  • INFO

    • Reads Environment values

      • Pathfinder_2.19.3.exe (PID: 2876)
    • Checks supported languages

      • Pathfinder_2.19.3.exe (PID: 2876)
      • chcp.com (PID: 1788)
      • wmpnscfg.exe (PID: 2432)
      • chcp.com (PID: 3812)
    • Reads the computer name

      • Pathfinder_2.19.3.exe (PID: 2876)
      • wmpnscfg.exe (PID: 2432)
    • Reads the machine GUID from the registry

      • Pathfinder_2.19.3.exe (PID: 2876)
      • wmpnscfg.exe (PID: 2432)
    • Reads CPU info

      • Pathfinder_2.19.3.exe (PID: 2876)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2432)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2038:11:06 16:43:12+01:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 343552
InitializedDataSize: 2560
UninitializedDataSize: -
EntryPoint: 0x55c8e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 234.234.4322.1234
ProductVersionNumber: 234.234.4322.1234
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: asdfsfw3er234
CompanyName: asdf234asdf
FileDescription: asdsdfw3423
FileVersion: 234.234.4322.1234
InternalName: Death13.exe
LegalCopyright: SFw345w5t 2222
LegalTrademarks: we2
OriginalFileName: Death13.exe
ProductName: fsad234sdaf3
ProductVersion: 234.234.4322.1234
AssemblyVersion: 1234.231.123.1234
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
9
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ETERNITY pathfinder_2.19.3.exe cmd.exe no specs chcp.com no specs netsh.exe no specs findstr.exe no specs wmpnscfg.exe no specs cmd.exe no specs chcp.com no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1444"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr AllC:\Windows\System32\cmd.exePathfinder_2.19.3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1788chcp 65001 C:\Windows\System32\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\chcp.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2432"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
2820netsh wlan show profile C:\Windows\System32\netsh.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2876"C:\Users\admin\AppData\Local\Temp\Pathfinder_2.19.3.exe" C:\Users\admin\AppData\Local\Temp\Pathfinder_2.19.3.exe
explorer.exe
User:
admin
Company:
asdf234asdf
Integrity Level:
MEDIUM
Description:
asdsdfw3423
Exit code:
0
Version:
234.234.4322.1234
Modules
Images
c:\users\admin\appdata\local\temp\pathfinder_2.19.3.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2948findstr AllC:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
3160"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\admin\AppData\Local\Temp\Pathfinder_2.19.3.exe"C:\Windows\System32\cmd.exePathfinder_2.19.3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3812chcp 65001 C:\Windows\System32\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\chcp.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3940ping 127.0.0.1 C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
Total events
3 917
Read events
3 850
Write events
64
Delete events
3

Modification events

(PID) Process:(2820) netsh.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2876) Pathfinder_2.19.3.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2432) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{36C40D6A-95F1-4B72-B2AC-359CAA10CAA7}\{A696716D-2822-44A3-91F1-178B59EE0F78}
Operation:delete keyName:(default)
Value:
(PID) Process:(2432) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{36C40D6A-95F1-4B72-B2AC-359CAA10CAA7}
Operation:delete keyName:(default)
Value:
(PID) Process:(2432) wmpnscfg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{403246BC-A81A-4C80-B051-2598BE045156}
Operation:delete keyName:(default)
Value:
(PID) Process:(2876) Pathfinder_2.19.3.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2876) Pathfinder_2.19.3.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2876) Pathfinder_2.19.3.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2876) Pathfinder_2.19.3.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
9
DNS requests
4
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2876
Pathfinder_2.19.3.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
binary
293 b
unknown
1080
svchost.exe
GET
200
184.24.77.173:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?5c94acfb5b892539
unknown
compressed
4.66 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2876
Pathfinder_2.19.3.exe
208.95.112.1:80
ip-api.com
TUT-AS
US
unknown
2876
Pathfinder_2.19.3.exe
149.154.167.99:443
t.me
Telegram Messenger Inc
GB
unknown
2876
Pathfinder_2.19.3.exe
104.20.68.143:443
pastebin.com
CLOUDFLARENET
unknown
2876
Pathfinder_2.19.3.exe
52.210.11.180:9040
AMAZON-02
IE
unknown
1080
svchost.exe
184.24.77.173:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
ip-api.com
  • 208.95.112.1
shared
t.me
  • 149.154.167.99
whitelisted
pastebin.com
  • 104.20.68.143
  • 104.20.67.143
  • 172.67.34.170
shared
ctldl.windowsupdate.com
  • 184.24.77.173
  • 184.24.77.186
  • 184.24.77.209
  • 184.24.77.194
whitelisted

Threats

PID
Process
Class
Message
2876
Pathfinder_2.19.3.exe
Potential Corporate Privacy Violation
AV POLICY Internal Host Retrieving External IP Address (ip-api. com)
2876
Pathfinder_2.19.3.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
2876
Pathfinder_2.19.3.exe
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
2876
Pathfinder_2.19.3.exe
Potential Corporate Privacy Violation
ET POLICY Socks5 Proxy to Onion (set)
2876
Pathfinder_2.19.3.exe
Potentially Bad Traffic
ET INFO Onion/TOR Proxy Client Request
2876
Pathfinder_2.19.3.exe
Potentially Bad Traffic
ET INFO Onion/TOR Successful Proxy Request Response (Inbound)
1 ETPRO signatures available at the full report
No debug info