Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 17:44
Behavioral task
behavioral1
Sample
0924f5981c48825e5ed86f85e6c0c523.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
0924f5981c48825e5ed86f85e6c0c523.exe
-
Size
880KB
-
MD5
0924f5981c48825e5ed86f85e6c0c523
-
SHA1
fcac9f2f58790421f37dea24f03b1ef7696cbe87
-
SHA256
abcd003b1760e5d14fe6e99491414fa2a0647745c00c4e19a40cf464c947b8fa
-
SHA512
98c2ff2a62a3c0e4182682007468cadc34282ded0b7b0a0ef3a2201b9f91ab02ce2625dbf84e8621b67e3a8676612953ca59f3c872e6c01ba9a7aa79ece4080e
-
SSDEEP
12288:zTEYAsROAsrt/uxduo1jB0Y96quL1ON0H9s1z0fw9tzvrHSKMQx8mhM5WaE4RfL4:zwT7rC6quL1Otzd9xuG8OyEGQ7
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral2/memory/4900-0-0x00000000001B0000-0x0000000000294000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0924f5981c48825e5ed86f85e6c0c523.exe 0924f5981c48825e5ed86f85e6c0c523.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0924f5981c48825e5ed86f85e6c0c523.exe 0924f5981c48825e5ed86f85e6c0c523.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4900 0924f5981c48825e5ed86f85e6c0c523.exe