Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2023 16:25

General

  • Target

    Amax Roulette Modifier.exe

  • Size

    888KB

  • MD5

    cd683cf6192f6be3da001586aa10bc24

  • SHA1

    1335efc2afc90c0abbe30a34e10189117d97eb1f

  • SHA256

    7c2f5886b66987195429fb85833555b44ebc2656e52cce787d4f6e239a09ed4d

  • SHA512

    048809ebf4769c591b3f779666b4dd26957a8b7a3e273afad4ecc8361eaa10325b7bef1d8f36a5287b7cc0d507cd2f72028453bb1905c5834d1405eae150ed43

  • SSDEEP

    12288:YTEYAsROAsrt/uxduo1jB0Y96qeD2qdvKb0WcCEQ1MQY3dmJxCGchwrjX8eG5d/N:YwT7rC6qeAgPCfMQM0xCGM9KkYV

Score
10/10

Malware Config

Signatures

  • Detects Eternity stealer 1 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Amax Roulette Modifier.exe
    "C:\Users\Admin\AppData\Local\Temp\Amax Roulette Modifier.exe"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\dcd.exe
      "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
      2⤵
      • Executes dropped EXE
      PID:1108

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dcd.exe

    Filesize

    227KB

    MD5

    b5ac46e446cead89892628f30a253a06

    SHA1

    f4ad1044a7f77a1b02155c3a355a1bb4177076ca

    SHA256

    def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

    SHA512

    bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

  • C:\Users\Admin\AppData\Local\Temp\dcd.exe

    Filesize

    227KB

    MD5

    b5ac46e446cead89892628f30a253a06

    SHA1

    f4ad1044a7f77a1b02155c3a355a1bb4177076ca

    SHA256

    def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

    SHA512

    bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

  • memory/2188-0-0x00000000008E0000-0x00000000009C6000-memory.dmp

    Filesize

    920KB

  • memory/2188-1-0x00007FFEFD020000-0x00007FFEFDAE1000-memory.dmp

    Filesize

    10.8MB

  • memory/2188-2-0x000000001B4A0000-0x000000001B4F0000-memory.dmp

    Filesize

    320KB

  • memory/2188-3-0x0000000001280000-0x0000000001281000-memory.dmp

    Filesize

    4KB

  • memory/2188-4-0x0000000001280000-0x0000000001281000-memory.dmp

    Filesize

    4KB

  • memory/2188-5-0x000000001B570000-0x000000001B580000-memory.dmp

    Filesize

    64KB

  • memory/2188-6-0x0000000002A80000-0x0000000002ABE000-memory.dmp

    Filesize

    248KB

  • memory/2188-7-0x000000001B570000-0x000000001B580000-memory.dmp

    Filesize

    64KB

  • memory/2188-8-0x000000001B570000-0x000000001B580000-memory.dmp

    Filesize

    64KB

  • memory/2188-14-0x00007FFEFD020000-0x00007FFEFDAE1000-memory.dmp

    Filesize

    10.8MB