Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 11:06
Behavioral task
behavioral1
Sample
721213c1dc804876b85af2be746bdb6c.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
721213c1dc804876b85af2be746bdb6c.exe
-
Size
890KB
-
MD5
721213c1dc804876b85af2be746bdb6c
-
SHA1
8fe5b6b7d7ec021ff581a4dcecbe76db6557a9b7
-
SHA256
843e84bc446dbe19daa72d91489ea1cb10bf87ae47ab0b7310801cc90081d9e5
-
SHA512
2472488c650bdcf6db8f09847682c51cd51dd1364b0dafe067049519725ecb43f5c3cd4d91f24a331ba980ba26425ac1fe866a5b3fcdd054effbfd094ff6bf9f
-
SSDEEP
12288:cTEYAsROAsrt/uxduo1jB0Y96qpoWmBCh0jlxa66akUs+52xaO3EnfctmsLY:cwT7rC6q9oieYa52eEhY
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral2/memory/2816-0-0x0000000000B20000-0x0000000000C04000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\721213c1dc804876b85af2be746bdb6c.exe 721213c1dc804876b85af2be746bdb6c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\721213c1dc804876b85af2be746bdb6c.exe 721213c1dc804876b85af2be746bdb6c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2816 721213c1dc804876b85af2be746bdb6c.exe