Analysis
-
max time kernel
150s -
max time network
106s -
platform
windows7_x64 -
resource
win7v200410 -
submitted
28-04-2020 13:16
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7v200410
Behavioral task
behavioral2
Sample
PO.exe
Resource
win10v200410
General
-
Target
PO.exe
-
Size
799KB
-
MD5
ef043796a61db70e27b06e3cfe7209f1
-
SHA1
c78610ce51f61ebcc647a057def65409de76590a
-
SHA256
e842dbdc4b41d7516d87ccc21fa365b93c4c94ce5a75dc6f06321f90efa19e29
-
SHA512
72aab86bf1f1e2c75edfb56ec3fb0bb26766cb762f2408e5ba4e8791194a0b87118187a0f5c72a15285f3e16150a8704f675764750b6feb648b044bcaec31e09
Malware Config
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
PO.exeRegSvcs.exedescription pid process target process PID 2032 set thread context of 1280 2032 PO.exe RegSvcs.exe PID 1280 set thread context of 536 1280 RegSvcs.exe vbc.exe PID 1280 set thread context of 1708 1280 RegSvcs.exe vbc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PO.exedescription pid process Token: SeDebugPrivilege 2032 PO.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
PO.exeRegSvcs.exedescription pid process target process PID 2032 wrote to memory of 1044 2032 PO.exe schtasks.exe PID 2032 wrote to memory of 1044 2032 PO.exe schtasks.exe PID 2032 wrote to memory of 1044 2032 PO.exe schtasks.exe PID 2032 wrote to memory of 1044 2032 PO.exe schtasks.exe PID 2032 wrote to memory of 1276 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1276 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1276 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1276 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1276 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1276 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1276 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1280 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1280 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1280 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1280 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1280 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1280 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1280 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1280 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1280 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1280 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1280 2032 PO.exe RegSvcs.exe PID 2032 wrote to memory of 1280 2032 PO.exe RegSvcs.exe PID 1280 wrote to memory of 536 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 536 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 536 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 536 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 536 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 536 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 536 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 536 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 536 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 536 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 1708 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 1708 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 1708 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 1708 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 1708 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 1708 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 1708 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 1708 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 1708 1280 RegSvcs.exe vbc.exe PID 1280 wrote to memory of 1708 1280 RegSvcs.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
PO.exevbc.exepid process 2032 PO.exe 536 vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vpQgdie" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8C85.tmp"2⤵
- Creates scheduled task(s)
PID:1044 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵PID:1276
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpC023.tmp"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:536 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpB210.tmp"3⤵PID:1708