Analysis

  • max time kernel
    45s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29-03-2024 15:59

General

  • Target

    Casino.Hack/Casino.Hack.exe

  • Size

    811KB

  • MD5

    b8ca231e45d6e98e05e23d1a2908ad77

  • SHA1

    14c1d99966e2099eeb69eb48108af9a84a24c940

  • SHA256

    b9e62d1062b81c9e45f7c9c089c09a0293c382c6073d23add20e4cb76b17a582

  • SHA512

    c238bb6498b4b65c507f2d6f3660b72c71dbe37e1957250d7cc2463d0e0b8d18370448900c14fb1cddca2115d935ada7f50147249e0e4533ec2611c34f78688b

  • SSDEEP

    12288:pTEYAsROAsrt/uxduo1jB0Y96qGp5ADrrmUJs0ZfZF/hzp4fEvtXXX6CclDn1hQ3:pwT7rC6qGp5AHKU7f7ncE1XanD12Im

Score
10/10

Malware Config

Signatures

  • Detects Eternity stealer 1 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Casino.Hack\Casino.Hack.exe
    "C:\Users\Admin\AppData\Local\Temp\Casino.Hack\Casino.Hack.exe"
    1⤵
    • Drops startup file
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\dcd.exe
      "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
      2⤵
      • Executes dropped EXE
      PID:1764
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2968 -s 1556
      2⤵
        PID:3064
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2036

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\dcd.exe

        Filesize

        227KB

        MD5

        b5ac46e446cead89892628f30a253a06

        SHA1

        f4ad1044a7f77a1b02155c3a355a1bb4177076ca

        SHA256

        def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

        SHA512

        bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

      • memory/2968-0-0x0000000000860000-0x0000000000932000-memory.dmp

        Filesize

        840KB

      • memory/2968-1-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2968-2-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/2968-3-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/2968-4-0x000000001AF30000-0x000000001AFB0000-memory.dmp

        Filesize

        512KB

      • memory/2968-5-0x0000000000260000-0x000000000029E000-memory.dmp

        Filesize

        248KB

      • memory/2968-27-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2968-28-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/2968-29-0x000000001AF30000-0x000000001AFB0000-memory.dmp

        Filesize

        512KB