Resubmissions

12-02-2025 15:52

250212-ta9vpaykat 10

11-02-2025 14:21

250211-rpddxswndx 10

Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2025 14:21

General

  • Target

    Как заработать миллион.docm

  • Size

    466KB

  • MD5

    3c151ed6a605746afb9d5bab9041ab8f

  • SHA1

    0f016fecf45c95d084a163e4f9fc00438fb5f32c

  • SHA256

    65fe796ff29aa6f7fd2ec6e7fee276259371a2f0b76e62b180dabd162a161397

  • SHA512

    62f5006ee122ce913959f63bf880f800a54e6d2ab73aeae5b8546b0a54366c200c131500521b7f97fc3a893b6a43f966b6e757db880563b0ea018bdff02d6a0d

  • SSDEEP

    12288:ENwGmmFE0ToU190Wf57vqd6RCP6n4mBEhB/F7fBf5U:I7mOrTo03Lqd6ybmwB/FlBU

Malware Config

Extracted

Family

eternity

C2

http://izrukvro5khcol3z7cvvdq3akeunlod2gshgn7ppo3a4jvse3z5hpiyd.onion

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Eternity family
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Deobfuscate/Decode Files or Information 1 TTPs 1 IoCs

    Payload decoded via CertUtil.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Office loads VBA resources, possible macro or embedded object present
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Как заработать миллион.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\SysWOW64\certutil.exe
      "C:\Windows\System32\certutil.exe" -decode C:\Users\Admin\AppData\Local\Temp\Q19c152890436667fb228d84cd21489 C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe
      2⤵
      • Process spawned unexpected child process
      • Deobfuscate/Decode Files or Information
      • System Location Discovery: System Language Discovery
      PID:2860
    • C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe
      "C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:1752
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • System Network Configuration Discovery: Wi-Fi Discovery
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:2792
          • C:\Windows\system32\netsh.exe
            netsh wlan show profile
            4⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Network Configuration Discovery: Wi-Fi Discovery
            PID:2736
          • C:\Windows\system32\findstr.exe
            findstr All
            4⤵
              PID:2740
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe"
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Suspicious use of WriteProcessMemory
            PID:2880
            • C:\Windows\system32\chcp.com
              chcp 65001
              4⤵
                PID:2388
              • C:\Windows\system32\PING.EXE
                ping 127.0.0.1
                4⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:1936
          • C:\Windows\splwow64.exe
            C:\Windows\splwow64.exe 12288
            2⤵
              PID:1248

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Cab1B12.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\Q19c152890436667fb228d84cd21489

            Filesize

            448KB

            MD5

            7a02f6a1b5994b6f125d0d4e59e2476b

            SHA1

            5b4893957fbba79b9d167137b9864cb2073ad68c

            SHA256

            e337223a29d9e895111353bbd62bf5e253699160f3894400dc228b88a09bab78

            SHA512

            7797b96824eeccf46c1c8b767bac711022ad3ec3cc53b43b3b78c9ec4ad55da2b2b30edfc5af3fcb2897ca35c2b83a49ee8fb4ef4cc65a32521fc39c6bf2805a

          • C:\Users\Admin\AppData\Local\Temp\Tar1B25.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe

            Filesize

            336KB

            MD5

            47615cb40373de40aaf86d99d8b4970f

            SHA1

            b6ebf2ec54cee7c6e907f0fa4a69f59651d0f26b

            SHA256

            d7bada568e0619861960b365bda34d4fddfcbd96e3be8b2a6580f51bed2f682d

            SHA512

            eabdf336417076ab77db792d17a4b5670174c0dcd549d5ef86de3a86b6d2468a2f97fafcbe2c7e27854e99f6b053d6618d3fe6149f92fdcd8a96108c610531ef

          • memory/1752-13-0x0000000000310000-0x000000000036A000-memory.dmp

            Filesize

            360KB

          • memory/2364-4-0x0000000000490000-0x0000000000590000-memory.dmp

            Filesize

            1024KB

          • memory/2364-6-0x0000000000490000-0x0000000000590000-memory.dmp

            Filesize

            1024KB

          • memory/2364-5-0x0000000000490000-0x0000000000590000-memory.dmp

            Filesize

            1024KB

          • memory/2364-0-0x000000002F681000-0x000000002F682000-memory.dmp

            Filesize

            4KB

          • memory/2364-14-0x000000007140D000-0x0000000071418000-memory.dmp

            Filesize

            44KB

          • memory/2364-15-0x0000000000490000-0x0000000000590000-memory.dmp

            Filesize

            1024KB

          • memory/2364-2-0x000000007140D000-0x0000000071418000-memory.dmp

            Filesize

            44KB

          • memory/2364-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB