Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-02-2025 14:21
Static task
static1
Behavioral task
behavioral1
Sample
Как заработать миллион.docm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Как заработать миллион.docm
Resource
win10v2004-20250129-en
General
-
Target
Как заработать миллион.docm
-
Size
466KB
-
MD5
3c151ed6a605746afb9d5bab9041ab8f
-
SHA1
0f016fecf45c95d084a163e4f9fc00438fb5f32c
-
SHA256
65fe796ff29aa6f7fd2ec6e7fee276259371a2f0b76e62b180dabd162a161397
-
SHA512
62f5006ee122ce913959f63bf880f800a54e6d2ab73aeae5b8546b0a54366c200c131500521b7f97fc3a893b6a43f966b6e757db880563b0ea018bdff02d6a0d
-
SSDEEP
12288:ENwGmmFE0ToU190Wf57vqd6RCP6n4mBEhB/F7fBf5U:I7mOrTo03Lqd6ybmwB/FlBU
Malware Config
Extracted
eternity
http://izrukvro5khcol3z7cvvdq3akeunlod2gshgn7ppo3a4jvse3z5hpiyd.onion
Signatures
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Eternity family
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE is not expected to spawn this process 2860 2364 certutil.exe 29 -
Executes dropped EXE 1 IoCs
pid Process 1752 oe39e861fc2efb967c73b4c7b.exe -
Loads dropped DLL 1 IoCs
pid Process 2364 WINWORD.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 oe39e861fc2efb967c73b4c7b.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 oe39e861fc2efb967c73b4c7b.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 oe39e861fc2efb967c73b4c7b.exe -
pid Process 2860 certutil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certutil.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2880 cmd.exe 1936 PING.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2908 cmd.exe 2736 netsh.exe -
Office loads VBA resources, possible macro or embedded object present
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier oe39e861fc2efb967c73b4c7b.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 oe39e861fc2efb967c73b4c7b.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1936 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2364 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1752 oe39e861fc2efb967c73b4c7b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1752 oe39e861fc2efb967c73b4c7b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2364 WINWORD.EXE 2364 WINWORD.EXE -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2860 2364 WINWORD.EXE 30 PID 2364 wrote to memory of 2860 2364 WINWORD.EXE 30 PID 2364 wrote to memory of 2860 2364 WINWORD.EXE 30 PID 2364 wrote to memory of 2860 2364 WINWORD.EXE 30 PID 2364 wrote to memory of 1752 2364 WINWORD.EXE 32 PID 2364 wrote to memory of 1752 2364 WINWORD.EXE 32 PID 2364 wrote to memory of 1752 2364 WINWORD.EXE 32 PID 2364 wrote to memory of 1752 2364 WINWORD.EXE 32 PID 1752 wrote to memory of 2908 1752 oe39e861fc2efb967c73b4c7b.exe 35 PID 1752 wrote to memory of 2908 1752 oe39e861fc2efb967c73b4c7b.exe 35 PID 1752 wrote to memory of 2908 1752 oe39e861fc2efb967c73b4c7b.exe 35 PID 2908 wrote to memory of 2792 2908 cmd.exe 37 PID 2908 wrote to memory of 2792 2908 cmd.exe 37 PID 2908 wrote to memory of 2792 2908 cmd.exe 37 PID 2908 wrote to memory of 2736 2908 cmd.exe 38 PID 2908 wrote to memory of 2736 2908 cmd.exe 38 PID 2908 wrote to memory of 2736 2908 cmd.exe 38 PID 2908 wrote to memory of 2740 2908 cmd.exe 39 PID 2908 wrote to memory of 2740 2908 cmd.exe 39 PID 2908 wrote to memory of 2740 2908 cmd.exe 39 PID 1752 wrote to memory of 2880 1752 oe39e861fc2efb967c73b4c7b.exe 40 PID 1752 wrote to memory of 2880 1752 oe39e861fc2efb967c73b4c7b.exe 40 PID 1752 wrote to memory of 2880 1752 oe39e861fc2efb967c73b4c7b.exe 40 PID 2880 wrote to memory of 2388 2880 cmd.exe 42 PID 2880 wrote to memory of 2388 2880 cmd.exe 42 PID 2880 wrote to memory of 2388 2880 cmd.exe 42 PID 2880 wrote to memory of 1936 2880 cmd.exe 43 PID 2880 wrote to memory of 1936 2880 cmd.exe 43 PID 2880 wrote to memory of 1936 2880 cmd.exe 43 PID 2364 wrote to memory of 1248 2364 WINWORD.EXE 45 PID 2364 wrote to memory of 1248 2364 WINWORD.EXE 45 PID 2364 wrote to memory of 1248 2364 WINWORD.EXE 45 PID 2364 wrote to memory of 1248 2364 WINWORD.EXE 45 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 oe39e861fc2efb967c73b4c7b.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 oe39e861fc2efb967c73b4c7b.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Как заработать миллион.docm"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\certutil.exe"C:\Windows\System32\certutil.exe" -decode C:\Users\Admin\AppData\Local\Temp\Q19c152890436667fb228d84cd21489 C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe2⤵
- Process spawned unexpected child process
- Deobfuscate/Decode Files or Information
- System Location Discovery: System Language Discovery
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe"C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:1752 -
C:\Windows\system32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:2792
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2736
-
-
C:\Windows\system32\findstr.exefindstr All4⤵PID:2740
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:2388
-
-
C:\Windows\system32\PING.EXEping 127.0.0.14⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1936
-
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1248
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
448KB
MD57a02f6a1b5994b6f125d0d4e59e2476b
SHA15b4893957fbba79b9d167137b9864cb2073ad68c
SHA256e337223a29d9e895111353bbd62bf5e253699160f3894400dc228b88a09bab78
SHA5127797b96824eeccf46c1c8b767bac711022ad3ec3cc53b43b3b78c9ec4ad55da2b2b30edfc5af3fcb2897ca35c2b83a49ee8fb4ef4cc65a32521fc39c6bf2805a
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
336KB
MD547615cb40373de40aaf86d99d8b4970f
SHA1b6ebf2ec54cee7c6e907f0fa4a69f59651d0f26b
SHA256d7bada568e0619861960b365bda34d4fddfcbd96e3be8b2a6580f51bed2f682d
SHA512eabdf336417076ab77db792d17a4b5670174c0dcd549d5ef86de3a86b6d2468a2f97fafcbe2c7e27854e99f6b053d6618d3fe6149f92fdcd8a96108c610531ef