Analysis

  • max time kernel
    151s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    12-12-2020 16:29

General

  • Target

    Vape V4 Crack.bin.exe

  • Size

    1.7MB

  • MD5

    6a669de1d724cc4874c42ae535ca892d

  • SHA1

    de905655fd632fff874bc907726e9b9a16886ea9

  • SHA256

    5d45d76577ec4d7429bab8dbfa6f5ff52d947a5c7c6f9ff373456e0c3703e454

  • SHA512

    23ed610d8a5803934a2a35de40fbd3e55a91d89b436812e0bb8cc692e8d10ce5a9e10e63267084461b13d50a5eeac5ed45df67950e164654e6ba8de859921708

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    motionalt1@gmail.com
  • Password:
    you@regay

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Modifies security service 2 TTPs 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1859 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Vape V4 Crack.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Vape V4 Crack.bin.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Users\Admin\AppData\Roaming\Windows Update.exe
      "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\BFile_1.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1560
      • C:\Users\Admin\AppData\Local\Temp\EBFile_2.exe
        "C:\Users\Admin\AppData\Local\Temp\EBFile_2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:908
        • C:\Users\Admin\AppData\Local\Temp\Defender.exe
          "C:\Users\Admin\AppData\Local\Temp\Defender.exe" /D
          4⤵
          • Modifies security service
          • Executes dropped EXE
          • Windows security modification
          • Drops file in System32 directory
          • Suspicious use of AdjustPrivilegeToken
          PID:2032
          • C:\Users\Admin\AppData\Local\Temp\Defender.exe
            "C:\Users\Admin\AppData\Local\Temp\Defender.exe" /SYS 1
            5⤵
            • Modifies security service
            • Executes dropped EXE
            • Windows security modification
            PID:944
      • C:\Users\Admin\AppData\Local\Temp\EBFile_3.exe
        "C:\Users\Admin\AppData\Local\Temp\EBFile_3.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:852
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\finalres.vbs"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1652
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp.\finalres2.vbs"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2032
            • C:\Windows\System32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp.\finalres.bat" "
              6⤵
                PID:1624
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\EBFile_3.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1568
            • C:\Windows\system32\choice.exe
              choice /C Y /N /D Y /T 3
              5⤵
                PID:1508
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
            3⤵
              PID:1844
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
              C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
              3⤵
                PID:1372
          • C:\Windows\system32\gpscript.exe
            gpscript.exe /RefreshSystemParam
            1⤵
              PID:1052

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Execution

            Scripting

            1
            T1064

            Persistence

            Modify Existing Service

            1
            T1031

            Registry Run Keys / Startup Folder

            1
            T1060

            Defense Evasion

            Modify Registry

            4
            T1112

            Scripting

            1
            T1064

            Disabling Security Tools

            1
            T1089

            Install Root Certificate

            1
            T1130

            Credential Access

            Credentials in Files

            1
            T1081

            Collection

            Data from Local System

            1
            T1005

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\BFile_1.txt
              MD5

              1a315f228b55458f972213ed7d06a82d

              SHA1

              abd233b01b6532ff259e574f95f218a11c5b6caa

              SHA256

              f31a1549c0ded4a9de1cfc44a7fe54b95c233379dae6dc58c56609a2381cc7f5

              SHA512

              9427ec6918639f3e0f12f2cbcb6a4f2b379cdb5e7042993a53b74077139817f711e5ded15579a3a8e5ae9c47216c618dfee96847b340e58cf8e8475a5ac828cf

            • C:\Users\Admin\AppData\Local\Temp\Defender.exe
              MD5

              ac34ba84a5054cd701efad5dd14645c9

              SHA1

              dc74a9fd5560b7c7a0fc9d183de9d676e92b9e8b

              SHA256

              c576f7f55c4c0304b290b15e70a638b037df15c69577cd6263329c73416e490e

              SHA512

              df491306a3c8ddb580b7cca1dce9e22a87fd43ca3632f3630cdcbe114bef243e847b2ce774d688f6e142516f2e0fc49d30fad7c7168e627523da21e2fe06836a

            • C:\Users\Admin\AppData\Local\Temp\Defender.exe
              MD5

              ac34ba84a5054cd701efad5dd14645c9

              SHA1

              dc74a9fd5560b7c7a0fc9d183de9d676e92b9e8b

              SHA256

              c576f7f55c4c0304b290b15e70a638b037df15c69577cd6263329c73416e490e

              SHA512

              df491306a3c8ddb580b7cca1dce9e22a87fd43ca3632f3630cdcbe114bef243e847b2ce774d688f6e142516f2e0fc49d30fad7c7168e627523da21e2fe06836a

            • C:\Users\Admin\AppData\Local\Temp\Defender.exe
              MD5

              ac34ba84a5054cd701efad5dd14645c9

              SHA1

              dc74a9fd5560b7c7a0fc9d183de9d676e92b9e8b

              SHA256

              c576f7f55c4c0304b290b15e70a638b037df15c69577cd6263329c73416e490e

              SHA512

              df491306a3c8ddb580b7cca1dce9e22a87fd43ca3632f3630cdcbe114bef243e847b2ce774d688f6e142516f2e0fc49d30fad7c7168e627523da21e2fe06836a

            • C:\Users\Admin\AppData\Local\Temp\EBFile_2.exe
              MD5

              1d6a2397610b09dd6b49785182fd13d2

              SHA1

              4a4ccd35f98544d0dd5bd6a30f9101c7babb36d3

              SHA256

              e96c14e2853a64717b64d3972e436dcfb39daa539ed1b67c8a58caafdf22c923

              SHA512

              fe0c86e696e39386e58355ed887238ddb3ae5f1013cbcbae16fe61f968a537a831bae7c3deb4cd0342d898d5fa5b20d662831d83ad7ab22fb0ce9e7834d9cb82

            • C:\Users\Admin\AppData\Local\Temp\EBFile_2.exe
              MD5

              1d6a2397610b09dd6b49785182fd13d2

              SHA1

              4a4ccd35f98544d0dd5bd6a30f9101c7babb36d3

              SHA256

              e96c14e2853a64717b64d3972e436dcfb39daa539ed1b67c8a58caafdf22c923

              SHA512

              fe0c86e696e39386e58355ed887238ddb3ae5f1013cbcbae16fe61f968a537a831bae7c3deb4cd0342d898d5fa5b20d662831d83ad7ab22fb0ce9e7834d9cb82

            • C:\Users\Admin\AppData\Local\Temp\EBFile_3.exe
              MD5

              fde2f12ea09556a7d28e4d10a80c0e88

              SHA1

              9c44959deda54054be62d00fc1bd8254efcf4f69

              SHA256

              53509887881cb405ddb046fb70dcaa55c7e8f02b23799384dbfb7b97cc898968

              SHA512

              c7832129ec62fd788394a5622b95b4536e1e3cac3938572a85c9b5deb17da13ac86166f322aab83a4baed97a990e2323e84dca3f518931897970da039e343cee

            • C:\Users\Admin\AppData\Local\Temp\EBFile_3.exe
              MD5

              fde2f12ea09556a7d28e4d10a80c0e88

              SHA1

              9c44959deda54054be62d00fc1bd8254efcf4f69

              SHA256

              53509887881cb405ddb046fb70dcaa55c7e8f02b23799384dbfb7b97cc898968

              SHA512

              c7832129ec62fd788394a5622b95b4536e1e3cac3938572a85c9b5deb17da13ac86166f322aab83a4baed97a990e2323e84dca3f518931897970da039e343cee

            • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt
              MD5

              6d36037988c328ba2fe31d405e118572

              SHA1

              db5d7a91456262daa9c9807602730fc92f490f8b

              SHA256

              af1deef9bf3f5a67a2e594ffe2092d52520806c63df035d664de4dda83f697e5

              SHA512

              8fe19e4aee0e351230a21b5a8152f48e6f163af64fcd9918bca28178db38f12e5b953294941756d87871b25390e6d999e78e01c529ed87653e0044d181464fe1

            • C:\Users\Admin\AppData\Local\Temp\finalres.bat
              MD5

              2574c5b67cffffae5c7a056455d1d3ae

              SHA1

              2386d127b47e27b236eb0cb6d90ffa67376891d2

              SHA256

              b25df4870b5e471b57431771df6dbb10c68b0eb8f9d5fef9c72e4cf3844dc9fc

              SHA512

              be6930b803980d1ed71cb2c9907884d172a93ad3f34cffda2ceadf3afad9fe3e354d95bebc250bf2db1179fd9cbaa57da71925e45f2f2430d3ae72f587a9d610

            • C:\Users\Admin\AppData\Local\Temp\finalres.vbs
              MD5

              cbca85af83070314b060c23175f9f4df

              SHA1

              a881531b0a737c4cd2a910478836ad0d78a5d4c0

              SHA256

              97de4041a56e13945df8a7db417de01f4ea5f1ece5623fb557b5d8e36e4f2f91

              SHA512

              ea74acef42ca1558a0734b7adf5ee9192e244f0d9b30985ae7ad3dfb0d303205d51f863e10b0f4ad00165c0aa70edf48a4a9f002c8752e75c7e059b567b5c46d

            • C:\Users\Admin\AppData\Local\Temp\finalres2.vbs
              MD5

              50f631e85016c256f4f103d8a8f711b1

              SHA1

              2e39050ce0bc06e9426f3ac440fec9067777eba2

              SHA256

              8610901e51055bcbbef41f30194f46a13ecfaf1876a2019de0c9078d67d63bb4

              SHA512

              b5e643cbdaac4a07d31ea71c001e514ccf165a03e207f773a87c633f4d8728049eccb775d7f594ad6225dda2b73538e323861438957ab5453ca1140529a3f80b

            • C:\Users\Admin\AppData\Local\Temp\holderwb.txt
              MD5

              f3b25701fe362ec84616a93a45ce9998

              SHA1

              d62636d8caec13f04e28442a0a6fa1afeb024bbb

              SHA256

              b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

              SHA512

              98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

            • C:\Users\Admin\AppData\Roaming\Windows Update.exe
              MD5

              6a669de1d724cc4874c42ae535ca892d

              SHA1

              de905655fd632fff874bc907726e9b9a16886ea9

              SHA256

              5d45d76577ec4d7429bab8dbfa6f5ff52d947a5c7c6f9ff373456e0c3703e454

              SHA512

              23ed610d8a5803934a2a35de40fbd3e55a91d89b436812e0bb8cc692e8d10ce5a9e10e63267084461b13d50a5eeac5ed45df67950e164654e6ba8de859921708

            • C:\Users\Admin\AppData\Roaming\Windows Update.exe
              MD5

              6a669de1d724cc4874c42ae535ca892d

              SHA1

              de905655fd632fff874bc907726e9b9a16886ea9

              SHA256

              5d45d76577ec4d7429bab8dbfa6f5ff52d947a5c7c6f9ff373456e0c3703e454

              SHA512

              23ed610d8a5803934a2a35de40fbd3e55a91d89b436812e0bb8cc692e8d10ce5a9e10e63267084461b13d50a5eeac5ed45df67950e164654e6ba8de859921708

            • \Users\Admin\AppData\Local\Temp\Defender.exe
              MD5

              ac34ba84a5054cd701efad5dd14645c9

              SHA1

              dc74a9fd5560b7c7a0fc9d183de9d676e92b9e8b

              SHA256

              c576f7f55c4c0304b290b15e70a638b037df15c69577cd6263329c73416e490e

              SHA512

              df491306a3c8ddb580b7cca1dce9e22a87fd43ca3632f3630cdcbe114bef243e847b2ce774d688f6e142516f2e0fc49d30fad7c7168e627523da21e2fe06836a

            • \Users\Admin\AppData\Local\Temp\EBFile_2.exe
              MD5

              1d6a2397610b09dd6b49785182fd13d2

              SHA1

              4a4ccd35f98544d0dd5bd6a30f9101c7babb36d3

              SHA256

              e96c14e2853a64717b64d3972e436dcfb39daa539ed1b67c8a58caafdf22c923

              SHA512

              fe0c86e696e39386e58355ed887238ddb3ae5f1013cbcbae16fe61f968a537a831bae7c3deb4cd0342d898d5fa5b20d662831d83ad7ab22fb0ce9e7834d9cb82

            • \Users\Admin\AppData\Local\Temp\EBFile_3.exe
              MD5

              fde2f12ea09556a7d28e4d10a80c0e88

              SHA1

              9c44959deda54054be62d00fc1bd8254efcf4f69

              SHA256

              53509887881cb405ddb046fb70dcaa55c7e8f02b23799384dbfb7b97cc898968

              SHA512

              c7832129ec62fd788394a5622b95b4536e1e3cac3938572a85c9b5deb17da13ac86166f322aab83a4baed97a990e2323e84dca3f518931897970da039e343cee

            • \Users\Admin\AppData\Roaming\Windows Update.exe
              MD5

              6a669de1d724cc4874c42ae535ca892d

              SHA1

              de905655fd632fff874bc907726e9b9a16886ea9

              SHA256

              5d45d76577ec4d7429bab8dbfa6f5ff52d947a5c7c6f9ff373456e0c3703e454

              SHA512

              23ed610d8a5803934a2a35de40fbd3e55a91d89b436812e0bb8cc692e8d10ce5a9e10e63267084461b13d50a5eeac5ed45df67950e164654e6ba8de859921708

            • memory/748-35-0x000007FEF7800000-0x000007FEF7A7A000-memory.dmp
              Filesize

              2.5MB

            • memory/852-14-0x0000000000000000-mapping.dmp
            • memory/852-17-0x000007FEF54A0000-0x000007FEF5E8C000-memory.dmp
              Filesize

              9.9MB

            • memory/852-23-0x0000000000DE0000-0x0000000000DE1000-memory.dmp
              Filesize

              4KB

            • memory/908-25-0x0000000001010000-0x0000000001011000-memory.dmp
              Filesize

              4KB

            • memory/908-10-0x0000000000000000-mapping.dmp
            • memory/908-19-0x00000000708D0000-0x0000000070FBE000-memory.dmp
              Filesize

              6.9MB

            • memory/1372-33-0x0000000000442628-mapping.dmp
            • memory/1372-32-0x0000000000400000-0x0000000000458000-memory.dmp
              Filesize

              352KB

            • memory/1372-34-0x0000000000400000-0x0000000000458000-memory.dmp
              Filesize

              352KB

            • memory/1508-40-0x0000000000000000-mapping.dmp
            • memory/1560-7-0x0000000000000000-mapping.dmp
            • memory/1568-39-0x0000000000000000-mapping.dmp
            • memory/1580-3-0x0000000000000000-mapping.dmp
            • memory/1624-45-0x0000000000000000-mapping.dmp
            • memory/1652-43-0x0000000002580000-0x0000000002584000-memory.dmp
              Filesize

              16KB

            • memory/1652-37-0x0000000000000000-mapping.dmp
            • memory/1844-22-0x0000000000400000-0x000000000041B000-memory.dmp
              Filesize

              108KB

            • memory/1844-21-0x0000000000411654-mapping.dmp
            • memory/1844-20-0x0000000000400000-0x000000000041B000-memory.dmp
              Filesize

              108KB

            • memory/2032-42-0x0000000000000000-mapping.dmp
            • memory/2032-28-0x0000000000000000-mapping.dmp
            • memory/2032-46-0x0000000002640000-0x0000000002644000-memory.dmp
              Filesize

              16KB