Analysis

  • max time kernel
    271s
  • max time network
    275s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20/03/2023, 01:07

General

  • Target

    b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c.exe

  • Size

    537KB

  • MD5

    f0a2d9e0876b2de2d5f5b7936a299e9f

  • SHA1

    1b55b7a5c97e180d29dd884650ce7b54db1f2ab7

  • SHA256

    b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c

  • SHA512

    2a654178b30c5976dce0ee0272f289a526fb30cd2a2d6276ec0acfcc20c61771618ae4058914dce81863bfae0b0e87a1a310ec95c0d64aa6960dfad39a55c522

  • SSDEEP

    12288:e8WG7Smm7vPfLEzGljR+prwvpOXOJUzs+Qr:FwfozGlUmxO+JlD

Malware Config

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c.exe
    "C:\Users\Admin\AppData\Local\Temp\b58bb6c824428bcd5c0aa524de71455f92fb2d063eb94a86b74b99c39e151a0c.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:1316
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4392
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
          PID:4016
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          3⤵
            PID:2692
          • C:\Windows\SysWOW64\findstr.exe
            findstr All
            3⤵
              PID:3808
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1236
            • C:\Windows\SysWOW64\chcp.com
              chcp 65001
              3⤵
                PID:3540
              • C:\Windows\SysWOW64\netsh.exe
                netsh wlan show profile name="65001" key=clear
                3⤵
                  PID:2848
                • C:\Windows\SysWOW64\findstr.exe
                  findstr Key
                  3⤵
                    PID:4632

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1316-122-0x0000000004890000-0x00000000048F0000-memory.dmp

                Filesize

                384KB

              • memory/1316-123-0x0000000004F00000-0x0000000004F7C000-memory.dmp

                Filesize

                496KB

              • memory/1316-124-0x0000000007450000-0x000000000794E000-memory.dmp

                Filesize

                5.0MB

              • memory/1316-125-0x0000000007950000-0x00000000079CA000-memory.dmp

                Filesize

                488KB

              • memory/1316-126-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-127-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-129-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-133-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-131-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-135-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-139-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-141-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-137-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-143-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-145-0x0000000007440000-0x0000000007450000-memory.dmp

                Filesize

                64KB

              • memory/1316-154-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-152-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-160-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-158-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-156-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-150-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-149-0x0000000007440000-0x0000000007450000-memory.dmp

                Filesize

                64KB

              • memory/1316-147-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-146-0x0000000007440000-0x0000000007450000-memory.dmp

                Filesize

                64KB

              • memory/1316-162-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-164-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-166-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-174-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-172-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-176-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-170-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-178-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-168-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-182-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-186-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-188-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-184-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-190-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-192-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-180-0x0000000007950000-0x00000000079C5000-memory.dmp

                Filesize

                468KB

              • memory/1316-2450-0x0000000007440000-0x0000000007450000-memory.dmp

                Filesize

                64KB

              • memory/1316-2452-0x0000000007440000-0x0000000007450000-memory.dmp

                Filesize

                64KB

              • memory/1316-2454-0x0000000007440000-0x0000000007450000-memory.dmp

                Filesize

                64KB

              • memory/1316-4878-0x00000000079D0000-0x0000000007A36000-memory.dmp

                Filesize

                408KB

              • memory/1316-4879-0x0000000007440000-0x0000000007450000-memory.dmp

                Filesize

                64KB

              • memory/1316-4880-0x0000000008040000-0x00000000080D2000-memory.dmp

                Filesize

                584KB

              • memory/1316-4881-0x0000000008D20000-0x0000000008D70000-memory.dmp

                Filesize

                320KB

              • memory/1316-4882-0x0000000008B20000-0x0000000008BBC000-memory.dmp

                Filesize

                624KB

              • memory/1316-4884-0x0000000007440000-0x0000000007450000-memory.dmp

                Filesize

                64KB