Overview

overview

10

Static

static

#Order#.exe

windows7_x64

7

#Order#.exe

windows10_x64

7

#QTN-20-97...7..exe

windows7_x64

6

#QTN-20-97...7..exe

windows10_x64

5

$70k MT 30JAN.exe

windows7_x64

6

$70k MT 30JAN.exe

windows10_x64

6

03-02-20.exe

windows7_x64

7

03-02-20.exe

windows10_x64

7

20191107145436608.exe

windows7_x64

6

20191107145436608.exe

windows10_x64

6

2019111211...fo.exe

windows7_x64

6

2019111211...fo.exe

windows10_x64

6

2020 ORDERS.exe

windows7_x64

5

2020 ORDERS.exe

windows10_x64

5

624880_ZOC...PT.exe

windows7_x64

6

624880_ZOC...PT.exe

windows10_x64

6

ADMIN DEPT...NT.exe

windows7_x64

8

ADMIN DEPT...NT.exe

windows10_x64

10

AWB_TR0089.exe

windows7_x64

1

AWB_TR0089.exe

windows10_x64

1

Avis de virement.exe

windows7_x64

7

Avis de virement.exe

windows10_x64

8

BL-INVOICE...CS.exe

windows7_x64

6

BL-INVOICE...CS.exe

windows10_x64

6

BMS PO 4820.exe

windows7_x64

6

BMS PO 4820.exe

windows10_x64

6

BSO_191120...df.exe

windows7_x64

6

BSO_191120...df.exe

windows10_x64

6

Bank Information.exe

windows7_x64

6

Bank Information.exe

windows10_x64

6

C.V - Expe...es.exe

windows7_x64

7

C.V - Expe...es.exe

windows10_x64

7

C956PO.exe

windows7_x64

6

C956PO.exe

windows10_x64

6

CIN - U140...32.exe

windows7_x64

6

CIN - U140...32.exe

windows10_x64

6

CV - Resum...ma.exe

windows7_x64

10

CV - Resum...ma.exe

windows10_x64

7

Calendar2Excel.exe

windows7_x64

1

Calendar2Excel.exe

windows10_x64

1

DOC302429042_SDOU.exe

windows7_x64

5

DOC302429042_SDOU.exe

windows10_x64

5

DOC37774732.exe

windows7_x64

6

DOC37774732.exe

windows10_x64

6

Doc _45654.exe

windows7_x64

6

Doc _45654.exe

windows10_x64

6

Docs.exe

windows7_x64

6

Docs.exe

windows10_x64

6

Document_Invoice.exe

windows7_x64

7

Document_Invoice.exe

windows10_x64

7

FOENER RFQ...DF.exe

windows7_x64

6

FOENER RFQ...DF.exe

windows10_x64

6

Following ...ts.exe

windows7_x64

7

Following ...ts.exe

windows10_x64

7

HTQ19-P040...AN.exe

windows7_x64

7

HTQ19-P040...AN.exe

windows10_x64

7

IMAGE221.exe

windows7_x64

8

IMAGE221.exe

windows10_x64

8

Invoice.exe

windows7_x64

6

Invoice.exe

windows10_x64

6

LPO-16155152112.exe

windows7_x64

7

LPO-16155152112.exe

windows10_x64

8

Lëscht vu...lt.exe

windows7_x64

6

Lëscht vu...lt.exe

windows10_x64

6

MT Swift copy.exe

windows7_x64

6

MT Swift copy.exe

windows10_x64

6

NEW P.O-8...FE.exe

windows7_x64

6

NEW P.O-8...FE.exe

windows10_x64

6

NEW P.O -J...20.exe

windows7_x64

6

NEW P.O -J...20.exe

windows10_x64

6

NNBL DRAFT...df.exe

windows7_x64

6

NNBL DRAFT...df.exe

windows10_x64

6

New Order ...05.exe

windows7_x64

6

New Order ...05.exe

windows10_x64

6

New Purcha...er.exe

windows7_x64

8

New Purcha...er.exe

windows10_x64

8

New Year Order.exe

windows7_x64

8

New Year Order.exe

windows10_x64

8

New order ...5).exe

windows7_x64

10

New order ...5).exe

windows10_x64

10

OCEAN BILL...NG.exe

windows7_x64

6

OCEAN BILL...NG.exe

windows10_x64

6

ORDER FILE.exe

windows7_x64

10

ORDER FILE.exe

windows10_x64

10

Order Feb 2020.exe

windows7_x64

6

Order Feb 2020.exe

windows10_x64

6

Order Speciations.exe

windows7_x64

1

Order Speciations.exe

windows10_x64

10

Order list.exe

windows7_x64

8

Order list.exe

windows10_x64

8

P.O.25890.exe

windows7_x64

6

P.O.25890.exe

windows10_x64

6

PAYMENT DE...DF.exe

windows7_x64

10

PAYMENT DE...DF.exe

windows10_x64

10

PDF324561.exe

windows7_x64

6

PDF324561.exe

windows10_x64

6

PO BMS 4820.exe

windows7_x64

6

PO BMS 4820.exe

windows10_x64

6

PO NO.SC-100887.exe

windows7_x64

6

PO NO.SC-100887.exe

windows10_x64

6

PO#32136578.exe

windows7_x64

6

PO#32136578.exe

windows10_x64

6

PO#P-13082...df.exe

windows7_x64

5

PO#P-13082...df.exe

windows10_x64

5

PO-0088PI69.exe

windows7_x64

6

PO-0088PI69.exe

windows10_x64

6

PO-05808T008.exe

windows7_x64

6

PO-05808T008.exe

windows10_x64

6

PO-ABA-098722.exe

windows7_x64

7

PO-ABA-098722.exe

windows10_x64

7

PO. 11092873.exe

windows7_x64

6

PO. 11092873.exe

windows10_x64

6

PO.exe

windows7_x64

6

PO.exe

windows10_x64

6

PO1782020.exe

windows7_x64

10

PO1782020.exe

windows10_x64

10

PO3245_Signed.exe

windows7_x64

10

PO3245_Signed.exe

windows10_x64

10

PRODUCT LIST.exe

windows7_x64

6

PRODUCT LIST.exe

windows10_x64

6

Payment De...ce.exe

windows7_x64

6

Payment De...ce.exe

windows10_x64

6

Payment Details.exe

windows7_x64

10

Payment Details.exe

windows10_x64

10

Photo-Samp...50.exe

windows7_x64

7

Photo-Samp...50.exe

windows10_x64

10

Presupuest...19.exe

windows7_x64

6

Presupuest...19.exe

windows10_x64

6

Proform In...ea.exe

windows7_x64

6

Proform In...ea.exe

windows10_x64

6

Proform Invoice.exe

windows7_x64

6

Proform Invoice.exe

windows10_x64

6

Proforma Invoice.exe

windows7_x64

6

Proforma Invoice.exe

windows10_x64

6

Purchase O...2).exe

windows7_x64

8

Purchase O...2).exe

windows10_x64

8

Purchase Order.exe

windows7_x64

7

Purchase Order.exe

windows10_x64

7

Purchase order.exe

windows7_x64

7

Purchase order.exe

windows10_x64

7

QUOTATION.Pdf.exe

windows7_x64

8

QUOTATION.Pdf.exe

windows10_x64

8

Quotation.exe

windows7_x64

7

Quotation.exe

windows10_x64

7

RFQ2901202...43.exe

windows7_x64

6

RFQ2901202...43.exe

windows10_x64

5

Revised_PO...01.exe

windows7_x64

10

Revised_PO...01.exe

windows10_x64

10

SEA LONGIT...ER.exe

windows7_x64

1

SEA LONGIT...ER.exe

windows10_x64

1

SHIPPING P...76.exe

windows7_x64

6

SHIPPING P...76.exe

windows10_x64

6

SKM_C33501...00.exe

windows7_x64

6

SKM_C33501...00.exe

windows10_x64

6

SOA DEC 2019.exe

windows7_x64

1

SOA DEC 2019.exe

windows10_x64

7

SOA JAN 2020.exe

windows7_x64

6

SOA JAN 2020.exe

windows10_x64

6

SOA.exe

windows7_x64

6

SOA.exe

windows10_x64

6

SP3-139-V1...ER.exe

windows7_x64

8

SP3-139-V1...ER.exe

windows10_x64

8

Scan 50%_s...89.exe

windows7_x64

6

Scan 50%_s...89.exe

windows10_x64

6

Shipment Details.exe

windows7_x64

10

Shipment Details.exe

windows10_x64

10

Shipping D...B).exe

windows7_x64

1

Shipping D...B).exe

windows10_x64

1

Shipping i...t..exe

windows7_x64

6

Shipping i...t..exe

windows10_x64

6

Swift copy.exe

windows7_x64

6

Swift copy.exe

windows10_x64

6

Swift.exe

windows7_x64

10

Swift.exe

windows10_x64

10

TT COPY.exe

windows7_x64

6

TT COPY.exe

windows10_x64

6

TT Statement.exe

windows7_x64

6

TT Statement.exe

windows10_x64

6

The Original Copy.exe

windows7_x64

10

The Original Copy.exe

windows10_x64

7

UPDATE SOA...41.exe

windows7_x64

1

UPDATE SOA...41.exe

windows10_x64

1

URGENT ENQUIRY.exe

windows7_x64

1

URGENT ENQUIRY.exe

windows10_x64

1

Untitled_2...-1.exe

windows7_x64

1

Untitled_2...-1.exe

windows10_x64

7

Unusual lo...ss.exe

windows7_x64

1

Unusual lo...ss.exe

windows10_x64

1

bin_2CE6.exe

windows7_x64

5

bin_2CE6.exe

windows10_x64

6

bin_4B66.exe

windows7_x64

8

bin_4B66.exe

windows10_x64

10

bin_C237.exe

windows7_x64

5

bin_C237.exe

windows10_x64

6

bin_protec...1F.exe

windows7_x64

5

bin_protec...1F.exe

windows10_x64

6

devis.exe

windows7_x64

5

devis.exe

windows10_x64

5

dhl_doc7348255141.exe

windows7_x64

6

dhl_doc7348255141.exe

windows10_x64

6

documento.exe

windows7_x64

7

documento.exe

windows10_x64

7

new order -85486.exe

windows7_x64

6

new order -85486.exe

windows10_x64

6

payment 000012223.exe

windows7_x64

6

payment 000012223.exe

windows10_x64

6

po 23232 signed.exe

windows7_x64

10

po 23232 signed.exe

windows10_x64

10

products inquiry.exe

windows7_x64

6

products inquiry.exe

windows10_x64

6

products_inquiry.exe

windows7_x64

6

products_inquiry.exe

windows10_x64

6

proforma invoice.exe

windows7_x64

6

proforma invoice.exe

windows10_x64

6

purchase o...7..exe

windows7_x64

7

purchase o...7..exe

windows10_x64

7

shipping doc.exe

windows7_x64

6

shipping doc.exe

windows10_x64

6

statement ...nt.exe

windows7_x64

6

statement ...nt.exe

windows10_x64

6

swift.exe

windows7_x64

10

swift.exe

windows10_x64

10

swiftcopy 433.exe

windows7_x64

10

swiftcopy 433.exe

windows10_x64

10

swiftcopy.exe

windows7_x64

10

swiftcopy.exe

windows10_x64

10

updated statement.exe

windows7_x64

6

updated statement.exe

windows10_x64

6

w3TM24p.exe

windows7_x64

1

w3TM24p.exe

windows10_x64

1

Analysis

  • max time kernel
    152s
  • max time network
    113s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    20-02-2020 07:05

General

  • Target

    Payment Details.exe

  • Size

    619KB

  • MD5

    7e339ae04105233c0b48396fde4feabf

  • SHA1

    cc966901f9cab5b6029a124669c4f226e544eba4

  • SHA256

    e4175079c591142ca40e3eed98f45db421546f698cf78f33b583973b0c42ca39

  • SHA512

    dbdc0f38ed8539398ff7fc16f078fb09258131d591065ad332f23d42b02646593cd76a2b07d85fda80afa168723ca18ebdbf74df8e0090366173548f51f8ab91

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 76 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Loads dropped DLL 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1681 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Reads browser user data or profiles (possible credential harvesting) 2 TTPs
  • Adds Run entry to start application 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Payment Details.exe
    "C:\Users\Admin\AppData\Local\Temp\Payment Details.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Loads dropped DLL
    • Adds Run entry to start application
    PID:1856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RvqrkcaUsJUxlrmRma5.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RvqrkcaUsJUxlrmRma5.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetThreadContext
      • Loads dropped DLL
      • Executes dropped EXE
      PID:1868
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rw1t5cyi\rw1t5cyi.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC4A5.tmp" "c:\Users\Admin\AppData\Local\Temp\rw1t5cyi\CSC2F28CA69793445489726B9AA4B1F134.TMP"
          4⤵
            PID:1956
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\unt5av2e\unt5av2e.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1976
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCCFE.tmp" "c:\Users\Admin\AppData\Local\Temp\unt5av2e\CSCFE6F2CBD3364D16B385D3DFC68080FE.TMP"
            4⤵
              PID:2008
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
              PID:2032
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:2044
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
                4⤵
                  PID:1608
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
                  4⤵
                    PID:1072

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Execution

            Scripting

            1
            T1064

            Persistence

            Registry Run Keys / Startup Folder

            1
            T1060

            Defense Evasion

            Scripting

            1
            T1064

            Modify Registry

            1
            T1112

            Credential Access

            Credentials in Files

            1
            T1081

            Collection

            Data from Local System

            1
            T1005

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RvqrkcaUsJUxlrmRm
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RvqrkcaUsJUxlrmRma5.exe
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RvqrkcaUsJUxlrmRma5.exe
            • C:\Users\Admin\AppData\Local\Temp\RESC4A5.tmp
            • C:\Users\Admin\AppData\Local\Temp\RESCCFE.tmp
            • C:\Users\Admin\AppData\Local\Temp\holderwb.txt
            • C:\Users\Admin\AppData\Local\Temp\rw1t5cyi\rw1t5cyi.dll
            • C:\Users\Admin\AppData\Local\Temp\unt5av2e\unt5av2e.dll
            • \??\c:\Users\Admin\AppData\Local\Temp\rw1t5cyi\CSC2F28CA69793445489726B9AA4B1F134.TMP
            • \??\c:\Users\Admin\AppData\Local\Temp\rw1t5cyi\rw1t5cyi.0.cs
            • \??\c:\Users\Admin\AppData\Local\Temp\rw1t5cyi\rw1t5cyi.cmdline
            • \??\c:\Users\Admin\AppData\Local\Temp\unt5av2e\CSCFE6F2CBD3364D16B385D3DFC68080FE.TMP
            • \??\c:\Users\Admin\AppData\Local\Temp\unt5av2e\unt5av2e.0.cs
            • \??\c:\Users\Admin\AppData\Local\Temp\unt5av2e\unt5av2e.cmdline
            • \Users\Admin\AppData\Local\Temp\IXP000.TMP\RvqrkcaUsJUxlrmRma5.exe
            • \Users\Admin\AppData\Local\Temp\IXP000.TMP\RvqrkcaUsJUxlrmRma5.exe
            • \Users\Admin\AppData\Local\Temp\IXP000.TMP\RvqrkcaUsJUxlrmRma5.exe
            • memory/1072-22-0x0000000000400000-0x0000000000458000-memory.dmp
              Filesize

              352KB

            • memory/1072-23-0x0000000000400000-0x0000000000458000-memory.dmp
              Filesize

              352KB

            • memory/1608-20-0x0000000000400000-0x000000000041B000-memory.dmp
              Filesize

              108KB

            • memory/1608-21-0x0000000000400000-0x000000000041B000-memory.dmp
              Filesize

              108KB

            • memory/1868-16-0x0000000000C80000-0x0000000000D08000-memory.dmp
              Filesize

              544KB

            • memory/2044-17-0x0000000000400000-0x0000000000488000-memory.dmp
              Filesize

              544KB

            • memory/2044-18-0x0000000000400000-0x0000000000488000-memory.dmp
              Filesize

              544KB

            • memory/2044-19-0x0000000000400000-0x0000000000488000-memory.dmp
              Filesize

              544KB