Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v191014
  • submitted
    11-02-2020 15:34

General

  • Target

    5e9f9c567f2286a5011027090b1462d5.exe

  • Size

    2.0MB

  • MD5

    5e9f9c567f2286a5011027090b1462d5

  • SHA1

    82ea25e7ed15171ebeaf604393a3c08097ca6ed4

  • SHA256

    aa01798101f8b75f82ecd6dbd29d0f0e7eac854a723d3cd2c5c571262b1930ac

  • SHA512

    35528136ca68b2059c459f0de596fad2d553b1a7011000a82a6b51409812dd72e357c5c8ec8ee6ffb6f64c87a5ee34ec8d4448eea260721f109390bc54636f65

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 22 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Reads browser user data or profiles (possible credential harvesting) 2 TTPs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 14004 IoCs
  • Drops startup file 1 IoCs
  • HawkEye Reborn

    HawkEye Reborn is an enchanced version of the HawkEye malware kit.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e9f9c567f2286a5011027090b1462d5.exe
    "C:\Users\Admin\AppData\Local\Temp\5e9f9c567f2286a5011027090b1462d5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetThreadContext
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious behavior: EnumeratesProcesses
    • Drops startup file
    PID:4928
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetThreadContext
      PID:4504
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpBE2.tmp"
        3⤵
          PID:4312
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpFE61.tmp"
          3⤵
            PID:820

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmpBE2.tmp

      • memory/820-35740-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/820-35741-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/4312-11533-0x0000000000400000-0x000000000045C000-memory.dmp

        Filesize

        368KB

      • memory/4312-11535-0x0000000000400000-0x000000000045C000-memory.dmp

        Filesize

        368KB

      • memory/4504-4-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB