Analysis

  • max time kernel
    150s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 02:31

General

  • Target

    249044da311886a46b7e93c1586c2c7a.exe

  • Size

    880KB

  • MD5

    249044da311886a46b7e93c1586c2c7a

  • SHA1

    4a70832767f7e9a89e7a22ae75c68b7004d01818

  • SHA256

    2e9eb411b41ca953845b0d29c208b1f01ad9b1aaca8e4013b65709d0c53a6034

  • SHA512

    23dfcfaab4037da3589b96000211f82b831cfc1b9b8122e8edfd2a1cd7de0a2151768d3c851359791701adf4c9fcad2f07f142675adf9b750087622626ce4a83

  • SSDEEP

    12288:hTEYAsROAsrt/uxduo1jB0Y96qPjVCA+QzDPBgVtom53YI1AF4RztwqpQtB36nwn:hwT7rC6qPjVCA+Qzyr53DO4RdpQRn

Score
10/10

Malware Config

Signatures

  • Detects Eternity stealer 1 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Drops startup file 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\249044da311886a46b7e93c1586c2c7a.exe
    "C:\Users\Admin\AppData\Local\Temp\249044da311886a46b7e93c1586c2c7a.exe"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    PID:220

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/220-0-0x0000000000070000-0x0000000000154000-memory.dmp

    Filesize

    912KB

  • memory/220-1-0x00007FFE0D090000-0x00007FFE0DB51000-memory.dmp

    Filesize

    10.8MB

  • memory/220-2-0x000000001AC20000-0x000000001AC70000-memory.dmp

    Filesize

    320KB

  • memory/220-3-0x0000000000A00000-0x0000000000A01000-memory.dmp

    Filesize

    4KB

  • memory/220-4-0x00007FFE0D090000-0x00007FFE0DB51000-memory.dmp

    Filesize

    10.8MB

  • memory/220-5-0x0000000000A00000-0x0000000000A01000-memory.dmp

    Filesize

    4KB

  • memory/220-6-0x000000001AD90000-0x000000001ADA0000-memory.dmp

    Filesize

    64KB

  • memory/220-7-0x000000001AFC0000-0x000000001AFFE000-memory.dmp

    Filesize

    248KB

  • memory/220-8-0x000000001AD90000-0x000000001ADA0000-memory.dmp

    Filesize

    64KB

  • memory/220-9-0x000000001AD90000-0x000000001ADA0000-memory.dmp

    Filesize

    64KB

  • memory/220-12-0x0000000000A00000-0x0000000000A01000-memory.dmp

    Filesize

    4KB

  • memory/220-13-0x000000001AD90000-0x000000001ADA0000-memory.dmp

    Filesize

    64KB

  • memory/220-14-0x000000001AD90000-0x000000001ADA0000-memory.dmp

    Filesize

    64KB

  • memory/220-15-0x000000001AD90000-0x000000001ADA0000-memory.dmp

    Filesize

    64KB

  • memory/220-16-0x00007FFE0D090000-0x00007FFE0DB51000-memory.dmp

    Filesize

    10.8MB