Overview
overview
10Static
static
10Bunifu.dll
windows7-x64
1Bunifu.dll
windows10-2004-x64
1DiscordRPC.dll
windows7-x64
1DiscordRPC.dll
windows10-2004-x64
1ENet.Managed.dll
windows7-x64
1ENet.Managed.dll
windows10-2004-x64
1Eternity.exe
windows7-x64
10Eternity.exe
windows10-2004-x64
10Newtonsoft.Json.dll
windows7-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1System.Buffers.dll
windows7-x64
1System.Buffers.dll
windows10-2004-x64
1System.Memory.dll
windows7-x64
1System.Memory.dll
windows10-2004-x64
1System.Num...rs.dll
windows7-x64
1System.Num...rs.dll
windows10-2004-x64
1System.Run...fe.dll
windows7-x64
1System.Run...fe.dll
windows10-2004-x64
1Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 11:46
Behavioral task
behavioral1
Sample
Bunifu.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Bunifu.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
DiscordRPC.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
DiscordRPC.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ENet.Managed.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
ENet.Managed.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Eternity.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Eternity.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
Newtonsoft.Json.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
System.Buffers.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
System.Buffers.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
System.Memory.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
System.Memory.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
System.Numeric.Vectors.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
System.Numeric.Vectors.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
System.Runtime.ComplierServices.Unsafe.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
System.Runtime.ComplierServices.Unsafe.dll
Resource
win10v2004-20231215-en
General
-
Target
Eternity.exe
-
Size
1.3MB
-
MD5
ef451fd641c05a1a83e2be29a405b4dd
-
SHA1
f4572606224ac0e8d1e6bf3daabbc6b794d81be9
-
SHA256
6b02571572867398bea14e8c7bb83a4a1ba79b42d9cfac884957786ebd06fba4
-
SHA512
0e15e95f17616a19ceed8e4da5c5da738ca8971009782fc39644710621ce41e8c6503a74cd8c6351250dc2e6ee8052d381f21482ce15954f5bfd47792e5335e1
-
SSDEEP
12288:iTEYAsROAsrt/uxduo1jB0Y96qGCirtbb+ZlKm9fn7sKVoFYhakR37hwHPPKv5N0:iwT7rC6qDIESmlFw6eMrI
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral8/memory/3188-0-0x0000000000840000-0x0000000000958000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Eternity.exe Eternity.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Eternity.exe Eternity.exe -
Executes dropped EXE 1 IoCs
pid Process 3420 dcd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3188 Eternity.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3188 wrote to memory of 3420 3188 Eternity.exe 19 PID 3188 wrote to memory of 3420 3188 Eternity.exe 19 PID 3188 wrote to memory of 3420 3188 Eternity.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\Eternity.exe"C:\Users\Admin\AppData\Local\Temp\Eternity.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵
- Executes dropped EXE
PID:3420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD501cdf14747f021a45837328f176add30
SHA1b6279771b106c501527d1015a16e99fff068487b
SHA2565fc4c95e3b7f45ba02751bbc6688ad82affb3b7c453b96e54fa1d776a04e828a
SHA512ad1fa7961ddc9108fc113e8707e768389a77f53f4acb9218b1d2bc293bfdae3c4986babe1f27924ace147cbcc55f68d222984459fc1b10cf426fabed2bfab149
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87