Overview
overview
10Static
static
10Bunifu.dll
windows7-x64
1Bunifu.dll
windows10-2004-x64
1DiscordRPC.dll
windows7-x64
1DiscordRPC.dll
windows10-2004-x64
1ENet.Managed.dll
windows7-x64
1ENet.Managed.dll
windows10-2004-x64
1Eternity.exe
windows7-x64
10Eternity.exe
windows10-2004-x64
10Newtonsoft.Json.dll
windows7-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1System.Buffers.dll
windows7-x64
1System.Buffers.dll
windows10-2004-x64
1System.Memory.dll
windows7-x64
1System.Memory.dll
windows10-2004-x64
1System.Num...rs.dll
windows7-x64
1System.Num...rs.dll
windows10-2004-x64
1System.Run...fe.dll
windows7-x64
1System.Run...fe.dll
windows10-2004-x64
1Analysis
-
max time kernel
90s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2024 22:56
Behavioral task
behavioral1
Sample
Bunifu.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Bunifu.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
DiscordRPC.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
DiscordRPC.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ENet.Managed.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
ENet.Managed.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Eternity.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Eternity.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Newtonsoft.Json.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
System.Buffers.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
System.Buffers.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
System.Memory.dll
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
System.Memory.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
System.Numeric.Vectors.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
System.Numeric.Vectors.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
System.Runtime.ComplierServices.Unsafe.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
System.Runtime.ComplierServices.Unsafe.dll
Resource
win10v2004-20231215-en
General
-
Target
Eternity.exe
-
Size
1.3MB
-
MD5
ef451fd641c05a1a83e2be29a405b4dd
-
SHA1
f4572606224ac0e8d1e6bf3daabbc6b794d81be9
-
SHA256
6b02571572867398bea14e8c7bb83a4a1ba79b42d9cfac884957786ebd06fba4
-
SHA512
0e15e95f17616a19ceed8e4da5c5da738ca8971009782fc39644710621ce41e8c6503a74cd8c6351250dc2e6ee8052d381f21482ce15954f5bfd47792e5335e1
-
SSDEEP
12288:iTEYAsROAsrt/uxduo1jB0Y96qGCirtbb+ZlKm9fn7sKVoFYhakR37hwHPPKv5N0:iwT7rC6qDIESmlFw6eMrI
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral8/memory/2568-0-0x0000000000FD0000-0x00000000010E8000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Eternity.exe Eternity.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Eternity.exe Eternity.exe -
Executes dropped EXE 1 IoCs
pid Process 3428 dcd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2568 Eternity.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2568 wrote to memory of 3428 2568 Eternity.exe 85 PID 2568 wrote to memory of 3428 2568 Eternity.exe 85 PID 2568 wrote to memory of 3428 2568 Eternity.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Eternity.exe"C:\Users\Admin\AppData\Local\Temp\Eternity.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵
- Executes dropped EXE
PID:3428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD51d79588a66399d0c3faad6cfbbb680c4
SHA1cdef89f4141874b1a8d91cc9d250ac567aa1cde5
SHA256597cf787ff0b4d69ea80b5a548f1a4c259862794408d749907b3dad835eb6fe9
SHA512a872f468083eb604162195598728054505bb2f1a47c0c94a2a387d19f39a049d3305515f0cbf19f17dab90ebb855af53e3d2e77e882b6f5e4f2bbeb58adcbb22
-
Filesize
32KB
MD54217a80ae6ac42db157f33e9a3d53142
SHA16c12e07826bf469336d6838b07a0fddf1a6f4596
SHA25631d7aa6c7c57d2836f9c1c67b94390e3e8332705e0a9b79466e668c95a687d85
SHA5126ba3373011c3ab57204ec9ef2f73c9e27edb93f78e092af409dac17386593295b5b1514e6e4d897dd76225256e9c24dff86f23cc64b2648c48fdc29056610c60