Resubmissions
05/03/2023, 16:18
230305-tr3spsgg64 10Analysis
-
max time kernel
97s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2023, 16:18
Behavioral task
behavioral1
Sample
Stealer.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Stealer.exe
Resource
win10v2004-20230220-en
General
-
Target
Stealer.exe
-
Size
334KB
-
MD5
f505c99287810f7b1a797515169f96db
-
SHA1
9866580b607e9419fb83f41194b2da0902e5ee21
-
SHA256
14a058b86f673e476ef336155cdb437d9891a9f146fe11c4837c092dfcd9d5c0
-
SHA512
37f1608da2348c6584a5e1ff5453be6f12d84d46462f0a9363f40a265c4d8fc9fff8553e01af259167cc95551542c9911befb7fa13acc8e4f22ed72b1d2c3a6a
-
SSDEEP
6144:G8em0Zl5+OUMUEzDodTVQzZWWjwXO83nI02x2bVm/FQNOp:G8em0JLixioWjN8X4J
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Stealer.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Stealer.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Stealer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Stealer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Stealer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1300 Stealer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1300 Stealer.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1300 wrote to memory of 236 1300 Stealer.exe 87 PID 1300 wrote to memory of 236 1300 Stealer.exe 87 PID 236 wrote to memory of 5064 236 cmd.exe 89 PID 236 wrote to memory of 5064 236 cmd.exe 89 PID 236 wrote to memory of 5080 236 cmd.exe 90 PID 236 wrote to memory of 5080 236 cmd.exe 90 PID 236 wrote to memory of 4996 236 cmd.exe 91 PID 236 wrote to memory of 4996 236 cmd.exe 91 PID 1300 wrote to memory of 4620 1300 Stealer.exe 92 PID 1300 wrote to memory of 4620 1300 Stealer.exe 92 PID 4620 wrote to memory of 1944 4620 cmd.exe 94 PID 4620 wrote to memory of 1944 4620 cmd.exe 94 PID 4620 wrote to memory of 2616 4620 cmd.exe 95 PID 4620 wrote to memory of 2616 4620 cmd.exe 95 PID 4620 wrote to memory of 384 4620 cmd.exe 96 PID 4620 wrote to memory of 384 4620 cmd.exe 96 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Stealer.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Stealer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stealer.exe"C:\Users\Admin\AppData\Local\Temp\Stealer.exe"1⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1300 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:5064
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵PID:5080
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:4996
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key2⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1944
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile name="65001" key=clear3⤵PID:2616
-
-
C:\Windows\system32\findstr.exefindstr Key3⤵PID:384
-
-