Analysis

  • max time kernel
    14s
  • max time network
    23s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-09-2024 12:30

General

  • Target

    Lucifier.exe

  • Size

    888KB

  • MD5

    73243a20d8f22b95d2635a67004c2583

  • SHA1

    14c2c4badbff0d40a1eb803eb79a2172d6615eda

  • SHA256

    7d32b3ffbe59d08f8aac2a79d67d28b62d740ba136904bb5335d5008664ac24f

  • SHA512

    6a1087704aba81e3b46732674fba9cd3e8ebcf8039711d56bc851bba5348b263b62a6028e1e1af96deb5391533cc2c8c8ee00b8917c2aa0c409abde6853ef834

  • SSDEEP

    12288:OTEYAsROAsrt/uxduo1jB0Y96qKGFYA5pNsD6sqYng6DZ4PCkZMp664+PPqNme:OwT7rC6qKGFn7NrZ1Pzk6rqPqNme

Score
10/10

Malware Config

Signatures

  • Detects Eternity stealer 1 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Lucifier.exe
    "C:\Users\Admin\AppData\Local\Temp\Lucifier.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4668

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4668-0-0x00007FFF5B653000-0x00007FFF5B655000-memory.dmp

    Filesize

    8KB

  • memory/4668-1-0x0000000000B00000-0x0000000000BE6000-memory.dmp

    Filesize

    920KB

  • memory/4668-2-0x000000001B730000-0x000000001B780000-memory.dmp

    Filesize

    320KB

  • memory/4668-3-0x0000000002DE0000-0x0000000002E1E000-memory.dmp

    Filesize

    248KB

  • memory/4668-4-0x00007FFF5B650000-0x00007FFF5C111000-memory.dmp

    Filesize

    10.8MB

  • memory/4668-5-0x00007FFF5B650000-0x00007FFF5C111000-memory.dmp

    Filesize

    10.8MB

  • memory/4668-6-0x00007FFF5B650000-0x00007FFF5C111000-memory.dmp

    Filesize

    10.8MB

  • memory/4668-7-0x00007FFF5B653000-0x00007FFF5B655000-memory.dmp

    Filesize

    8KB

  • memory/4668-8-0x00007FFF5B650000-0x00007FFF5C111000-memory.dmp

    Filesize

    10.8MB