Analysis
-
max time kernel
114s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 13:35
Behavioral task
behavioral1
Sample
HWID Changer.exe
Resource
win7-20240220-en
General
-
Target
HWID Changer.exe
-
Size
1.1MB
-
MD5
5a3ddf0c0b07ce709c802ee3ee000438
-
SHA1
c5d128fab542ba17c92db8481215167f16b2a606
-
SHA256
88b9188a51717b40cd1921bd8d760dddccc43ab7c3b6015b3091faf1eaf783eb
-
SHA512
6e1b6e6fcee9aea6cd91cfded327ab284195a742a8fe39636d830de44c4d51b15b522ffb25e496a0fdca0ab1a13fb6f44cdb43fc71f935559250537fa28af996
-
SSDEEP
24576:DwT7rC6qoKmtTUhxD+iecTryJWlnjVcT:KrC6qoKDN3r1jV
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral2/memory/3324-0-0x00000000007A0000-0x00000000008A2000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HWID Changer.exe HWID Changer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HWID Changer.exe HWID Changer.exe -
Executes dropped EXE 1 IoCs
pid Process 4404 dcd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3324 HWID Changer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3324 wrote to memory of 4404 3324 HWID Changer.exe 96 PID 3324 wrote to memory of 4404 3324 HWID Changer.exe 96 PID 3324 wrote to memory of 4404 3324 HWID Changer.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\HWID Changer.exe"C:\Users\Admin\AppData\Local\Temp\HWID Changer.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵
- Executes dropped EXE
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3956 --field-trial-handle=2588,i,4353937220825226770,7138584070663735671,262144 --variations-seed-version /prefetch:81⤵PID:3460
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87