Resubmissions

12/02/2025, 15:52

250212-ta9vpaykat 10

11/02/2025, 14:21

250211-rpddxswndx 10

Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/02/2025, 14:21

General

  • Target

    Как заработать миллион.docm

  • Size

    466KB

  • MD5

    3c151ed6a605746afb9d5bab9041ab8f

  • SHA1

    0f016fecf45c95d084a163e4f9fc00438fb5f32c

  • SHA256

    65fe796ff29aa6f7fd2ec6e7fee276259371a2f0b76e62b180dabd162a161397

  • SHA512

    62f5006ee122ce913959f63bf880f800a54e6d2ab73aeae5b8546b0a54366c200c131500521b7f97fc3a893b6a43f966b6e757db880563b0ea018bdff02d6a0d

  • SSDEEP

    12288:ENwGmmFE0ToU190Wf57vqd6RCP6n4mBEhB/F7fBf5U:I7mOrTo03Lqd6ybmwB/FlBU

Malware Config

Extracted

Family

eternity

C2

http://izrukvro5khcol3z7cvvdq3akeunlod2gshgn7ppo3a4jvse3z5hpiyd.onion

Signatures

  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Eternity family
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Executes dropped EXE 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Deobfuscate/Decode Files or Information 1 TTPs 1 IoCs

    Payload decoded via CertUtil.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Как заработать миллион.docm" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3432
    • C:\Windows\System32\certutil.exe
      "C:\Windows\System32\certutil.exe" -decode C:\Users\Admin\AppData\Local\Temp\Q19c152890436667fb228d84cd21489 C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe
      2⤵
      • Process spawned unexpected child process
      • Deobfuscate/Decode Files or Information
      PID:3656
    • C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe
      "C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe"
      2⤵
      • Executes dropped EXE
      • Accesses Microsoft Outlook profiles
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4532
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • System Network Configuration Discovery: Wi-Fi Discovery
        • Suspicious use of WriteProcessMemory
        PID:3268
        • C:\Windows\system32\chcp.com
          chcp 65001
          4⤵
            PID:2384
          • C:\Windows\system32\netsh.exe
            netsh wlan show profile
            4⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Network Configuration Discovery: Wi-Fi Discovery
            PID:1900
          • C:\Windows\system32\findstr.exe
            findstr All
            4⤵
              PID:2036
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show profile name="65001" key=clear | findstr Key
            3⤵
            • System Network Configuration Discovery: Wi-Fi Discovery
            • Suspicious use of WriteProcessMemory
            PID:2704
            • C:\Windows\system32\chcp.com
              chcp 65001
              4⤵
                PID:3124
              • C:\Windows\system32\netsh.exe
                netsh wlan show profile name="65001" key=clear
                4⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Network Configuration Discovery: Wi-Fi Discovery
                PID:4668
              • C:\Windows\system32\findstr.exe
                findstr Key
                4⤵
                  PID:4604

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Q19c152890436667fb228d84cd21489

            Filesize

            448KB

            MD5

            7a02f6a1b5994b6f125d0d4e59e2476b

            SHA1

            5b4893957fbba79b9d167137b9864cb2073ad68c

            SHA256

            e337223a29d9e895111353bbd62bf5e253699160f3894400dc228b88a09bab78

            SHA512

            7797b96824eeccf46c1c8b767bac711022ad3ec3cc53b43b3b78c9ec4ad55da2b2b30edfc5af3fcb2897ca35c2b83a49ee8fb4ef4cc65a32521fc39c6bf2805a

          • C:\Users\Admin\AppData\Local\Temp\oe39e861fc2efb967c73b4c7b.exe

            Filesize

            336KB

            MD5

            47615cb40373de40aaf86d99d8b4970f

            SHA1

            b6ebf2ec54cee7c6e907f0fa4a69f59651d0f26b

            SHA256

            d7bada568e0619861960b365bda34d4fddfcbd96e3be8b2a6580f51bed2f682d

            SHA512

            eabdf336417076ab77db792d17a4b5670174c0dcd549d5ef86de3a86b6d2468a2f97fafcbe2c7e27854e99f6b053d6618d3fe6149f92fdcd8a96108c610531ef

          • memory/3432-16-0x00007FFCCB9B0000-0x00007FFCCB9C0000-memory.dmp

            Filesize

            64KB

          • memory/3432-41-0x00007FFD0DB8D000-0x00007FFD0DB8E000-memory.dmp

            Filesize

            4KB

          • memory/3432-3-0x00007FFCCDB70000-0x00007FFCCDB80000-memory.dmp

            Filesize

            64KB

          • memory/3432-5-0x00007FFCCDB70000-0x00007FFCCDB80000-memory.dmp

            Filesize

            64KB

          • memory/3432-6-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-8-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-9-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-11-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-13-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-12-0x00007FFCCB9B0000-0x00007FFCCB9C0000-memory.dmp

            Filesize

            64KB

          • memory/3432-14-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-15-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-4-0x00007FFCCDB70000-0x00007FFCCDB80000-memory.dmp

            Filesize

            64KB

          • memory/3432-1-0x00007FFD0DB8D000-0x00007FFD0DB8E000-memory.dmp

            Filesize

            4KB

          • memory/3432-0-0x00007FFCCDB70000-0x00007FFCCDB80000-memory.dmp

            Filesize

            64KB

          • memory/3432-25-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-26-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-2-0x00007FFCCDB70000-0x00007FFCCDB80000-memory.dmp

            Filesize

            64KB

          • memory/3432-7-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-49-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-43-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-40-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-10-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/3432-42-0x00007FFD0DAF0000-0x00007FFD0DCE5000-memory.dmp

            Filesize

            2.0MB

          • memory/4532-39-0x0000019B2C280000-0x0000019B2C2D0000-memory.dmp

            Filesize

            320KB

          • memory/4532-33-0x0000019B11B00000-0x0000019B11B5A000-memory.dmp

            Filesize

            360KB