Analysis
-
max time kernel
145s -
max time network
91s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
06-05-2020 14:40
Static task
static1
Behavioral task
behavioral1
Sample
07675566556 PURCHASE ORDERpdf.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
07675566556 PURCHASE ORDERpdf.exe
Resource
win10v200430
General
-
Target
07675566556 PURCHASE ORDERpdf.exe
-
Size
876KB
-
MD5
b274988968c4256575dd4c4403838324
-
SHA1
a62d5ceb57ddec5dcffe768c6f48ff1dae66db67
-
SHA256
bbf613ce1f6850b2b62c6f55082ab7b9bcc7f92db0a8ec8f0b495e29cb4988ae
-
SHA512
abc5906d8e1e69ff1b33c61db06c4802e370efc8c15db8742092148fbb57aa8df3bd70e6b54fcf6b9a232642318510a4b352ce9810fbd7a1904b6f806d379978
Malware Config
Extracted
Protocol: ftp- Host:
ftp.gracexmhk.info - Port:
21 - Username:
[email protected] - Password:
Success2020
Extracted
hawkeye_reborn
10.0.0.1
Protocol: ftp- Host:
ftp.gracexmhk.info - Port:
21 - Username:
[email protected] - Password:
Success2020
860e38e2-ebad-459f-9a9b-df55993f73fe
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:false _Delivery:2 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPort:0 _EmailSSL:false _ExecutionDelay:10 _FTPPassword:Success2020 _FTPPort:21 _FTPSFTP:true _FTPServer:ftp.gracexmhk.info _FTPUsername:[email protected] _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:false _LogInterval:10 _MeltFile:false _Mutex:860e38e2-ebad-459f-9a9b-df55993f73fe _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:10.0.0.1 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye RebornX, Version=10.0.0.1, Culture=neutral, PublicKeyToken=null
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
07675566556 PURCHASE ORDERpdf.exe07675566556 PURCHASE ORDERpdf.exedescription pid process target process PID 3544 wrote to memory of 508 3544 07675566556 PURCHASE ORDERpdf.exe schtasks.exe PID 3544 wrote to memory of 508 3544 07675566556 PURCHASE ORDERpdf.exe schtasks.exe PID 3544 wrote to memory of 508 3544 07675566556 PURCHASE ORDERpdf.exe schtasks.exe PID 3544 wrote to memory of 864 3544 07675566556 PURCHASE ORDERpdf.exe 07675566556 PURCHASE ORDERpdf.exe PID 3544 wrote to memory of 864 3544 07675566556 PURCHASE ORDERpdf.exe 07675566556 PURCHASE ORDERpdf.exe PID 3544 wrote to memory of 864 3544 07675566556 PURCHASE ORDERpdf.exe 07675566556 PURCHASE ORDERpdf.exe PID 3544 wrote to memory of 864 3544 07675566556 PURCHASE ORDERpdf.exe 07675566556 PURCHASE ORDERpdf.exe PID 3544 wrote to memory of 864 3544 07675566556 PURCHASE ORDERpdf.exe 07675566556 PURCHASE ORDERpdf.exe PID 3544 wrote to memory of 864 3544 07675566556 PURCHASE ORDERpdf.exe 07675566556 PURCHASE ORDERpdf.exe PID 3544 wrote to memory of 864 3544 07675566556 PURCHASE ORDERpdf.exe 07675566556 PURCHASE ORDERpdf.exe PID 3544 wrote to memory of 864 3544 07675566556 PURCHASE ORDERpdf.exe 07675566556 PURCHASE ORDERpdf.exe PID 864 wrote to memory of 1432 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 1432 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 1432 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 1432 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 1432 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 1432 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 1432 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 1432 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 1432 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 2704 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 2704 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 2704 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 2704 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 2704 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 2704 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 2704 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 2704 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 wrote to memory of 2704 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
07675566556 PURCHASE ORDERpdf.exe07675566556 PURCHASE ORDERpdf.exedescription pid process target process PID 3544 set thread context of 864 3544 07675566556 PURCHASE ORDERpdf.exe 07675566556 PURCHASE ORDERpdf.exe PID 864 set thread context of 1432 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe PID 864 set thread context of 2704 864 07675566556 PURCHASE ORDERpdf.exe vbc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
vbc.exepid process 1432 vbc.exe 1432 vbc.exe 1432 vbc.exe 1432 vbc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 bot.whatismyipaddress.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\07675566556 PURCHASE ORDERpdf.exe"C:\Users\Admin\AppData\Local\Temp\07675566556 PURCHASE ORDERpdf.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:3544 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eLajqaT" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA042.tmp"2⤵
- Creates scheduled task(s)
PID:508
-
-
C:\Users\Admin\AppData\Local\Temp\07675566556 PURCHASE ORDERpdf.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:864 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpD31A.tmp"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpDF40.tmp"3⤵PID:2704
-
-