Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 18:44
Behavioral task
behavioral1
Sample
4eb5c97d66e762fcc9358d4fa8c7b70a.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
4eb5c97d66e762fcc9358d4fa8c7b70a.exe
-
Size
1.1MB
-
MD5
4eb5c97d66e762fcc9358d4fa8c7b70a
-
SHA1
fa9d97be9304f1c19141d6e16ecf9bc42afe4dcb
-
SHA256
fe2d0e873f238e8c212e1a4bec1d4c666a4b5153016b9494b403652571e7dbf8
-
SHA512
b4488db4fd12e54a1b3caf5f32926b0f54e98ca8bb5790deb99e9012f094d0c07af77a57d4c9404aa37b395548ee578aa79339ae6835d47c04d7d5325a645b63
-
SSDEEP
12288:PTEYAsROAsrt/uxduo1jB0Y96qQUot5G+dovpSdfoMrb/9o56GkOdnbTtFh+kQpi:PwT7rC6qQxKvgoob9rGkMPQJ+
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral1/memory/2296-0-0x0000000001080000-0x000000000117E000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4eb5c97d66e762fcc9358d4fa8c7b70a.exe 4eb5c97d66e762fcc9358d4fa8c7b70a.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4eb5c97d66e762fcc9358d4fa8c7b70a.exe 4eb5c97d66e762fcc9358d4fa8c7b70a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2296 4eb5c97d66e762fcc9358d4fa8c7b70a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2692 2296 4eb5c97d66e762fcc9358d4fa8c7b70a.exe 19 PID 2296 wrote to memory of 2692 2296 4eb5c97d66e762fcc9358d4fa8c7b70a.exe 19 PID 2296 wrote to memory of 2692 2296 4eb5c97d66e762fcc9358d4fa8c7b70a.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\4eb5c97d66e762fcc9358d4fa8c7b70a.exe"C:\Users\Admin\AppData\Local\Temp\4eb5c97d66e762fcc9358d4fa8c7b70a.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2296 -s 7562⤵PID:2692
-