Analysis

  • max time kernel
    59s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250207-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-02-2025 00:53

General

  • Target

    65fe796ff29aa6f7fd2ec6e7fee276259371a2f0b76e62b180dabd162a161397.docm

  • Size

    466KB

  • MD5

    3c151ed6a605746afb9d5bab9041ab8f

  • SHA1

    0f016fecf45c95d084a163e4f9fc00438fb5f32c

  • SHA256

    65fe796ff29aa6f7fd2ec6e7fee276259371a2f0b76e62b180dabd162a161397

  • SHA512

    62f5006ee122ce913959f63bf880f800a54e6d2ab73aeae5b8546b0a54366c200c131500521b7f97fc3a893b6a43f966b6e757db880563b0ea018bdff02d6a0d

  • SSDEEP

    12288:ENwGmmFE0ToU190Wf57vqd6RCP6n4mBEhB/F7fBf5U:I7mOrTo03Lqd6ybmwB/FlBU

Malware Config

Extracted

Family

eternity

C2

http://izrukvro5khcol3z7cvvdq3akeunlod2gshgn7ppo3a4jvse3z5hpiyd.onion

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Eternity family
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Deobfuscate/Decode Files or Information 1 TTPs 1 IoCs

    Payload decoded via CertUtil.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\65fe796ff29aa6f7fd2ec6e7fee276259371a2f0b76e62b180dabd162a161397.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Windows\System32\certutil.exe
      "C:\Windows\System32\certutil.exe" -decode C:\Users\Admin\AppData\Local\Temp\Q19c152890436667fb228d84cd21489 C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe
      2⤵
      • Process spawned unexpected child process
      • Deobfuscate/Decode Files or Information
      PID:2608
    • C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe
      "C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:3720
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • System Network Configuration Discovery: Wi-Fi Discovery
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:224
          • C:\Windows\system32\netsh.exe
            netsh wlan show profile
            4⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Network Configuration Discovery: Wi-Fi Discovery
            PID:1808
          • C:\Windows\system32\findstr.exe
            findstr All
            4⤵
              PID:4672
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key
            3⤵
            • System Network Configuration Discovery: Wi-Fi Discovery
            • Suspicious use of WriteProcessMemory
            PID:4012
            • C:\Windows\system32\chcp.com
              chcp 65001
              4⤵
                PID:1600
              • C:\Windows\system32\netsh.exe
                netsh wlan show profile name="65001" key=clear
                4⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Network Configuration Discovery: Wi-Fi Discovery
                PID:1660
              • C:\Windows\system32\findstr.exe
                findstr Key
                4⤵
                  PID:1156
          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTA2MzMzMzQ4Ii8-PC9hcHA-PC9yZXF1ZXN0Pg
            1⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            PID:2092

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Q19c152890436667fb228d84cd21489

            Filesize

            448KB

            MD5

            7a02f6a1b5994b6f125d0d4e59e2476b

            SHA1

            5b4893957fbba79b9d167137b9864cb2073ad68c

            SHA256

            e337223a29d9e895111353bbd62bf5e253699160f3894400dc228b88a09bab78

            SHA512

            7797b96824eeccf46c1c8b767bac711022ad3ec3cc53b43b3b78c9ec4ad55da2b2b30edfc5af3fcb2897ca35c2b83a49ee8fb4ef4cc65a32521fc39c6bf2805a

          • C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe

            Filesize

            336KB

            MD5

            47615cb40373de40aaf86d99d8b4970f

            SHA1

            b6ebf2ec54cee7c6e907f0fa4a69f59651d0f26b

            SHA256

            d7bada568e0619861960b365bda34d4fddfcbd96e3be8b2a6580f51bed2f682d

            SHA512

            eabdf336417076ab77db792d17a4b5670174c0dcd549d5ef86de3a86b6d2468a2f97fafcbe2c7e27854e99f6b053d6618d3fe6149f92fdcd8a96108c610531ef

          • memory/3720-38-0x000002306D3C0000-0x000002306D410000-memory.dmp

            Filesize

            320KB

          • memory/3720-37-0x000002306AC40000-0x000002306AC9A000-memory.dmp

            Filesize

            360KB

          • memory/4524-12-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-16-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-8-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-10-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-0-0x00007FFAD9D30000-0x00007FFAD9D40000-memory.dmp

            Filesize

            64KB

          • memory/4524-13-0x00007FFAD7BE0000-0x00007FFAD7BF0000-memory.dmp

            Filesize

            64KB

          • memory/4524-11-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-9-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-14-0x00007FFAD7BE0000-0x00007FFAD7BF0000-memory.dmp

            Filesize

            64KB

          • memory/4524-7-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-15-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-20-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-19-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-18-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-17-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-2-0x00007FFAD9D30000-0x00007FFAD9D40000-memory.dmp

            Filesize

            64KB

          • memory/4524-6-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-30-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-29-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-32-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-4-0x00007FFAD9D30000-0x00007FFAD9D40000-memory.dmp

            Filesize

            64KB

          • memory/4524-5-0x00007FFAD9D30000-0x00007FFAD9D40000-memory.dmp

            Filesize

            64KB

          • memory/4524-3-0x00007FFAD9D30000-0x00007FFAD9D40000-memory.dmp

            Filesize

            64KB

          • memory/4524-1-0x00007FFB19D4D000-0x00007FFB19D4E000-memory.dmp

            Filesize

            4KB

          • memory/4524-39-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-41-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-40-0x00007FFB19D4D000-0x00007FFB19D4E000-memory.dmp

            Filesize

            4KB

          • memory/4524-42-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-43-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-50-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB

          • memory/4524-51-0x00007FFB19CB0000-0x00007FFB19EA5000-memory.dmp

            Filesize

            2.0MB