Analysis
-
max time kernel
150s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:31
Behavioral task
behavioral1
Sample
249044da311886a46b7e93c1586c2c7a.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
249044da311886a46b7e93c1586c2c7a.exe
-
Size
880KB
-
MD5
249044da311886a46b7e93c1586c2c7a
-
SHA1
4a70832767f7e9a89e7a22ae75c68b7004d01818
-
SHA256
2e9eb411b41ca953845b0d29c208b1f01ad9b1aaca8e4013b65709d0c53a6034
-
SHA512
23dfcfaab4037da3589b96000211f82b831cfc1b9b8122e8edfd2a1cd7de0a2151768d3c851359791701adf4c9fcad2f07f142675adf9b750087622626ce4a83
-
SSDEEP
12288:hTEYAsROAsrt/uxduo1jB0Y96qPjVCA+QzDPBgVtom53YI1AF4RztwqpQtB36nwn:hwT7rC6qPjVCA+Qzyr53DO4RdpQRn
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral2/memory/220-0-0x0000000000070000-0x0000000000154000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\249044da311886a46b7e93c1586c2c7a.exe 249044da311886a46b7e93c1586c2c7a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\249044da311886a46b7e93c1586c2c7a.exe 249044da311886a46b7e93c1586c2c7a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 220 249044da311886a46b7e93c1586c2c7a.exe