Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:21
Behavioral task
behavioral1
Sample
29cf8f8e0cbfb9d2efcc4eb33746d2bc.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
29cf8f8e0cbfb9d2efcc4eb33746d2bc.exe
-
Size
881KB
-
MD5
29cf8f8e0cbfb9d2efcc4eb33746d2bc
-
SHA1
eff4f7b2e9a8e330c56f7c997f06c35fa5534da8
-
SHA256
223214577757ae30b9fd24cb9f8f2e750ecfc309d77e52bfd56b520f77632093
-
SHA512
6c05ddaa9d881068cc9a8f5255c901d2d7b47a48307a01ec2743f3dc8b6b2d618984355da4595f31325361ab33659e3b20b09e116e859a9791b2b6c6552ddf9e
-
SSDEEP
12288:UTEYAsROAsrt/uxduo1jB0Y96qZunGv+fkajssuESw7JqzQCabepSLuIa9:UwT7rC6qZuGv+usuESwVqcmpG6
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral2/memory/1056-0-0x00000000008A0000-0x0000000000984000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\29cf8f8e0cbfb9d2efcc4eb33746d2bc.exe 29cf8f8e0cbfb9d2efcc4eb33746d2bc.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\29cf8f8e0cbfb9d2efcc4eb33746d2bc.exe 29cf8f8e0cbfb9d2efcc4eb33746d2bc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1056 29cf8f8e0cbfb9d2efcc4eb33746d2bc.exe