Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2024 00:10
Behavioral task
behavioral1
Sample
68fca4f28d420001d12fe8a7f99bc1dd.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
68fca4f28d420001d12fe8a7f99bc1dd.exe
-
Size
911KB
-
MD5
68fca4f28d420001d12fe8a7f99bc1dd
-
SHA1
0d0432d5c739933ad334a5b9894b13d2d9f8dd2e
-
SHA256
d56d18b6c61e6b1ada83822cd74aadf86815c7c4320cd98b7c0687a2be388012
-
SHA512
e9b7081edb0409a6b239e2d51313c575c88a752a3be4cad77f1c2a4608c3aa8de6ca2fe1538d95f583ce9541cb1da29274d7496281d48674561410b9b46c5eb1
-
SSDEEP
12288:ETEYAsROAsrt/uxduo1jB0Y96q3HCPfh/VLgatG15Hyz+syHx5aUjounR:EwT7rC6qgfUMK5Sz+QUjR
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral2/memory/4148-0-0x0000000000510000-0x00000000005F8000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4148 68fca4f28d420001d12fe8a7f99bc1dd.exe Token: SeManageVolumePrivilege 2964 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68fca4f28d420001d12fe8a7f99bc1dd.exe"C:\Users\Admin\AppData\Local\Temp\68fca4f28d420001d12fe8a7f99bc1dd.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3568
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2964