Analysis

  • max time kernel
    143s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/02/2024, 05:27

General

  • Target

    Eclipse_HDR_PRO.exe

  • Size

    2.6MB

  • MD5

    35ac2534ff7d8ce64ce9517c971c1766

  • SHA1

    8d53a8629d75fd34317c85341519e4c6d7ec458b

  • SHA256

    0d17811ce8e064364a13b1932db6ff4db7f9342976f96a45001e8c2f0a27c530

  • SHA512

    9d96bac29fb6c056ccd394832d0c29505ecc032410a6d6f94c3baab9560f192ea897e802abb87ea10427dbeb8a76146229da5a68041431c946e583bbbc0c9b74

  • SSDEEP

    24576:0VFOjzdOUcdMR0rAhoFJc7gE44yx6OSgNWBGVcJQeCuYbm:NRb41hWB3J1Cut

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Eclipse_HDR_PRO.exe
    "C:\Users\Admin\AppData\Local\Temp\Eclipse_HDR_PRO.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:4400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4400-0-0x00007FF9CC240000-0x00007FF9CCBE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4400-1-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/4400-2-0x00007FF9CC240000-0x00007FF9CCBE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4400-17-0x000000001C710000-0x000000001C7AC000-memory.dmp

    Filesize

    624KB

  • memory/4400-16-0x000000001C5C0000-0x000000001C666000-memory.dmp

    Filesize

    664KB

  • memory/4400-18-0x000000001CC80000-0x000000001D14E000-memory.dmp

    Filesize

    4.8MB

  • memory/4400-19-0x000000001D150000-0x000000001D162000-memory.dmp

    Filesize

    72KB

  • memory/4400-20-0x000000001DDF0000-0x000000001DE52000-memory.dmp

    Filesize

    392KB

  • memory/4400-21-0x000000001DF60000-0x000000001E032000-memory.dmp

    Filesize

    840KB

  • memory/4400-24-0x0000000001540000-0x0000000001548000-memory.dmp

    Filesize

    32KB

  • memory/4400-25-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/4400-26-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/4400-27-0x00000000207E0000-0x000000002082C000-memory.dmp

    Filesize

    304KB

  • memory/4400-28-0x0000000020960000-0x00000000209B0000-memory.dmp

    Filesize

    320KB

  • memory/4400-29-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/4400-32-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/4400-33-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/4400-48-0x00007FF9CC240000-0x00007FF9CCBE1000-memory.dmp

    Filesize

    9.6MB

  • memory/4400-49-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/4400-50-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/4400-51-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/4400-52-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/4400-53-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/4400-54-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB