Analysis
-
max time kernel
92s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2023 09:45
Static task
static1
Behavioral task
behavioral1
Sample
rust-dotnet-crypter.exe
Resource
win10v2004-20231020-en
General
-
Target
rust-dotnet-crypter.exe
-
Size
626KB
-
MD5
33440e9a461e26fcf61e75fec0d709c1
-
SHA1
49bde2fdd0e63d9b79cabaee9a00fed7105d252d
-
SHA256
c7b87ae037b647f8c111d673b6421cdd9a2a0c6014a2d84978a325399c229cc3
-
SHA512
407104943a652f1fd8c4f4e699178a4b72048b2a6be762e25de1f044eb671accfa464e66164020aac2561b7790e9362ee9831f4f2f4507dd620b69b68eaf8446
-
SSDEEP
12288:Bfj5Y8jZPz4b56VOEDCIM6opl2ATqzAawF+ypMb0Q:Bfji+dUFgM7pvTqj3ypi
Malware Config
Extracted
eternity
http://izrukvro5khcol3z7cvvdq3akeunlod2gshgn7ppo3a4jvse3z5hpiyd.onion
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rust-dotnet-crypter.exe Key opened \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rust-dotnet-crypter.exe Key opened \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rust-dotnet-crypter.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 ip-api.com -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 rust-dotnet-crypter.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rust-dotnet-crypter.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4040 rust-dotnet-crypter.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4040 rust-dotnet-crypter.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4040 wrote to memory of 752 4040 rust-dotnet-crypter.exe 96 PID 4040 wrote to memory of 752 4040 rust-dotnet-crypter.exe 96 PID 752 wrote to memory of 2472 752 cmd.exe 98 PID 752 wrote to memory of 2472 752 cmd.exe 98 PID 752 wrote to memory of 4944 752 cmd.exe 99 PID 752 wrote to memory of 4944 752 cmd.exe 99 PID 752 wrote to memory of 4876 752 cmd.exe 100 PID 752 wrote to memory of 4876 752 cmd.exe 100 PID 4040 wrote to memory of 4652 4040 rust-dotnet-crypter.exe 101 PID 4040 wrote to memory of 4652 4040 rust-dotnet-crypter.exe 101 PID 4652 wrote to memory of 1600 4652 cmd.exe 103 PID 4652 wrote to memory of 1600 4652 cmd.exe 103 PID 4652 wrote to memory of 4120 4652 cmd.exe 104 PID 4652 wrote to memory of 4120 4652 cmd.exe 104 PID 4652 wrote to memory of 1452 4652 cmd.exe 105 PID 4652 wrote to memory of 1452 4652 cmd.exe 105 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rust-dotnet-crypter.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rust-dotnet-crypter.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rust-dotnet-crypter.exe"C:\Users\Admin\AppData\Local\Temp\rust-dotnet-crypter.exe"1⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4040 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2472
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵PID:4944
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:4876
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key2⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1600
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile name="65001" key=clear3⤵PID:4120
-
-
C:\Windows\system32\findstr.exefindstr Key3⤵PID:1452
-
-