Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-03-2024 15:59
Behavioral task
behavioral1
Sample
Casino.Hack/Casino.Hack.exe
Resource
win7-20231129-en
General
-
Target
Casino.Hack/Casino.Hack.exe
-
Size
811KB
-
MD5
b8ca231e45d6e98e05e23d1a2908ad77
-
SHA1
14c1d99966e2099eeb69eb48108af9a84a24c940
-
SHA256
b9e62d1062b81c9e45f7c9c089c09a0293c382c6073d23add20e4cb76b17a582
-
SHA512
c238bb6498b4b65c507f2d6f3660b72c71dbe37e1957250d7cc2463d0e0b8d18370448900c14fb1cddca2115d935ada7f50147249e0e4533ec2611c34f78688b
-
SSDEEP
12288:pTEYAsROAsrt/uxduo1jB0Y96qGp5ADrrmUJs0ZfZF/hzp4fEvtXXX6CclDn1hQ3:pwT7rC6qGp5AHKU7f7ncE1XanD12Im
Malware Config
Signatures
-
Detects Eternity stealer 1 IoCs
resource yara_rule behavioral2/memory/2936-0-0x0000000000CA0000-0x0000000000D72000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Casino.Hack.exe Casino.Hack.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Casino.Hack.exe Casino.Hack.exe -
Executes dropped EXE 1 IoCs
pid Process 856 dcd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2936 Casino.Hack.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2936 wrote to memory of 856 2936 Casino.Hack.exe 84 PID 2936 wrote to memory of 856 2936 Casino.Hack.exe 84 PID 2936 wrote to memory of 856 2936 Casino.Hack.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Casino.Hack\Casino.Hack.exe"C:\Users\Admin\AppData\Local\Temp\Casino.Hack\Casino.Hack.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵
- Executes dropped EXE
PID:856
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1652
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87