Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v191014
  • submitted
    11-02-2020 15:34

General

  • Target

    5e9f9c567f2286a5011027090b1462d5.exe

  • Size

    2.0MB

  • MD5

    5e9f9c567f2286a5011027090b1462d5

  • SHA1

    82ea25e7ed15171ebeaf604393a3c08097ca6ed4

  • SHA256

    aa01798101f8b75f82ecd6dbd29d0f0e7eac854a723d3cd2c5c571262b1930ac

  • SHA512

    35528136ca68b2059c459f0de596fad2d553b1a7011000a82a6b51409812dd72e357c5c8ec8ee6ffb6f64c87a5ee34ec8d4448eea260721f109390bc54636f65

Malware Config

Signatures

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 20006 IoCs
  • HawkEye Reborn

    HawkEye Reborn is an enchanced version of the HawkEye malware kit.

  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Drops startup file 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Reads browser user data or profiles (possible credential harvesting) 2 TTPs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e9f9c567f2286a5011027090b1462d5.exe
    "C:\Users\Admin\AppData\Local\Temp\5e9f9c567f2286a5011027090b1462d5.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    • Drops startup file
    • Suspicious behavior: MapViewOfSection
    PID:1304
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpE139.tmp"
        3⤵
          PID:1988
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpD336.tmp"
          3⤵
            PID:1928

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmpE139.tmp

      • memory/1928-6-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/1928-7-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/1988-3-0x0000000000400000-0x000000000045C000-memory.dmp

        Filesize

        368KB

      • memory/1988-4-0x0000000000400000-0x000000000045C000-memory.dmp

        Filesize

        368KB

      • memory/2036-0-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2036-1-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2036-2-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB