Analysis

  • max time kernel
    151s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    01-03-2020 23:51

General

  • Target

    INV1.exe

  • Size

    2.4MB

  • MD5

    0d4d52901a4cb69ba79e116f0db9de72

  • SHA1

    47c90b1490f7b3523490794951f3fa79a4114c91

  • SHA256

    dec757dc1c2b7722acf90fb43dac3e8e7052fa4c4a3c7c53126d93af5013ab2c

  • SHA512

    9947dcd78c31ef1bfa0cdcf821179426b461d0706b967a50a43bb19e13cd73ccaccb7f6a041a9ce00585a9371984ed7ed0409dfae0041f5d875698210a930f76

Malware Config

Signatures

  • Suspicious use of SetThreadContext 3 IoCs
  • Deletes itself 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Reads browser user data or profiles (possible credential harvesting) 2 TTPs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • HawkEye Reborn

    HawkEye Reborn is an enchanced version of the HawkEye malware kit.

  • Uses the VBS compiler for execution 1 TTPs
  • Drops startup file 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\INV1.exe
    "C:\Users\Admin\AppData\Local\Temp\INV1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: MapViewOfSection
    • Drops startup file
    PID:1844
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\RegAsm.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp2F68.tmp"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1280
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp2175.tmp"
        3⤵
          PID:1036
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c TimeOut 1 & Del /F "C:\Users\Admin\AppData\Local\Temp\INV1.exe"
        2⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1896
        • C:\Windows\SysWOW64\timeout.exe
          TimeOut 1
          3⤵
          • Delays execution with timeout.exe
          PID:1920

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp2F68.tmp

    • memory/1036-7-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1036-8-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1280-4-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/1280-5-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/1864-0-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1864-1-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1864-2-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB