Resubmissions

01-05-2020 12:06

200501-p6rz3bm7hs 10

02-03-2020 12:22

200302-886h98214s 10

Analysis

  • max time kernel
    152s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7v200217
  • submitted
    02-03-2020 12:22

General

  • Target

    malware.exe

  • Size

    743KB

  • MD5

    d0b3518e06e76afbf847b77eb0394aee

  • SHA1

    56d0931f5ca3dfb0f3848a512297adbf7d758a87

  • SHA256

    a95ad9e61847bec0e9faac52ac95e069cf6cf9583733cc10cf547060e096eb24

  • SHA512

    0654014c576f29947c6773be6b0c359a1487d6ad7a9eab0cea3cc9df49d1fda1715d143d937347839aec815220783206af175ee1385c9838046798241f1c8bfd

Malware Config

Signatures

  • Suspicious use of SetThreadContext 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Loads dropped DLL 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • HawkEye Reborn

    HawkEye Reborn is an enchanced version of the HawkEye malware kit.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Reads browser user data or profiles (possible credential harvesting) 2 TTPs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\malware.exe
    "C:\Users\Admin\AppData\Local\Temp\malware.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Roaming\Awwovi\Uopcep.exe
      "C:\Users\Admin\AppData\Roaming\Awwovi\Uopcep.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Adds Run entry to start application
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:316
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1576
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
        3⤵
          PID:1632
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:1052
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpB579.tmp"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2004
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpA7A4.tmp"
            4⤵
              PID:1596

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmpB579.tmp

      • C:\Users\Admin\AppData\Roaming\Awwovi\Uopcep.exe

      • C:\Users\Admin\AppData\Roaming\Awwovi\Uopcep.exe

      • C:\Users\Admin\AppData\Roaming\Awwovi\kherg.url

      • \Users\Admin\AppData\Roaming\Awwovi\Uopcep.exe

      • memory/316-15-0x000000007476F02E-0x0000000074B7DF66-disk.dmp

        Filesize

        4.1MB

      • memory/1052-25-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1052-23-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1052-24-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/1576-20-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/1576-21-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/1576-19-0x0000000000400000-0x0000000000414000-memory.dmp

        Filesize

        80KB

      • memory/1596-31-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/1596-32-0x0000000000400000-0x000000000041C000-memory.dmp

        Filesize

        112KB

      • memory/1868-2-0x0000000000000106-0x0000000000000106-disk.dmp

      • memory/1868-5-0x000000007476F02E-0x000000007492E2A6-disk.dmp

        Filesize

        1.7MB

      • memory/2004-28-0x0000000000400000-0x000000000045C000-memory.dmp

        Filesize

        368KB

      • memory/2004-29-0x0000000000400000-0x000000000045C000-memory.dmp

        Filesize

        368KB