Analysis

  • max time kernel
    112s
  • max time network
    118s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    17/07/2020, 15:40

General

  • Target

    01_extracted.exe

  • Size

    1.1MB

  • MD5

    bea9ed2395cb83c1680ee33fd231fef9

  • SHA1

    2620700b8c76d4236321f2a15b6392184df943e5

  • SHA256

    680e65e6219bd366e58a94117c26b39487a3bb274d1fa15537cdc9efc1e655ba

  • SHA512

    d0275ef36e13674de2505ef5997c594405f59a6327a2cfbd22cd5e185da673fd98c6ee2e4f7566083aeb7b86b955b24d6288b3d27b455d8c876155d788a6e177

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    payments00

Signatures

  • Suspicious use of WriteProcessMemory 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of SetThreadContext 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\01_extracted.exe
    "C:\Users\Admin\AppData\Local\Temp\01_extracted.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetThreadContext
    PID:3100
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UXzxSWYbhi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF9AD.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:640
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
      "{path}"
      2⤵
        PID:396
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        "{path}"
        2⤵
        • Suspicious use of WriteProcessMemory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetThreadContext
        PID:912
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          3⤵
            PID:2160
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2232
      • C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
        C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
        1⤵
          PID:3936

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/912-2-0x0000000000400000-0x0000000000488000-memory.dmp

                Filesize

                544KB

              • memory/2160-4-0x0000000000400000-0x000000000041B000-memory.dmp

                Filesize

                108KB

              • memory/2160-6-0x0000000000400000-0x000000000041B000-memory.dmp

                Filesize

                108KB

              • memory/2232-7-0x0000000000400000-0x0000000000458000-memory.dmp

                Filesize

                352KB

              • memory/2232-9-0x0000000000400000-0x0000000000458000-memory.dmp

                Filesize

                352KB