Analysis
-
max time kernel
133s -
max time network
112s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
04-05-2020 16:31
Static task
static1
Behavioral task
behavioral1
Sample
18AE44C925C3F0D7C7E7B40753B28500.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
18AE44C925C3F0D7C7E7B40753B28500.exe
Resource
win10v200430
General
-
Target
18AE44C925C3F0D7C7E7B40753B28500.exe
-
Size
142KB
-
MD5
18ae44c925c3f0d7c7e7b40753b28500
-
SHA1
06ef444a9a4264f83a0295cdad85e4bc14c5b5df
-
SHA256
aa3d0cb018929053fff3626d59456dac005d8f5416090cc27bb5c493ec5c3340
-
SHA512
78c44ab5e64f7c3477373612c1680ca689cc63f641185c362fb12a8ea0f461041c6e1abfe0c90956a1a07f0ddbaa8f61d17befe5ff76d12aaaf3334bd6996912
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
18AE44C925C3F0D7C7E7B40753B28500.exepid process 1312 18AE44C925C3F0D7C7E7B40753B28500.exe 1312 18AE44C925C3F0D7C7E7B40753B28500.exe -
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 bot.whatismyipaddress.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
18AE44C925C3F0D7C7E7B40753B28500.exedescription pid process Token: SeDebugPrivilege 1312 18AE44C925C3F0D7C7E7B40753B28500.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
18AE44C925C3F0D7C7E7B40753B28500.exepid process 1312 18AE44C925C3F0D7C7E7B40753B28500.exe