Analysis

  • max time kernel
    101s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    08-02-2022 01:07

General

  • Target

    PRICE LISTS.exe

  • Size

    637KB

  • MD5

    038f1f701b7bbb405ac3e52d2971bbf0

  • SHA1

    3a35d2857fac0dce3177499f054744002d93280f

  • SHA256

    f1a813f7b246ad7238099fa5bbe800919eecf052965c7e44684c55de8ab5d97b

  • SHA512

    c39723e9ae615f8d6004fc54b026d74c536d1fb8cab0a65a1fb7ead67126293b75f608a8ce911916d20be76a000f92ead8dd1f652abdb64a6ef3369a2bd08d5a

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PRICE LISTS.exe
    "C:\Users\Admin\AppData\Local\Temp\PRICE LISTS.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
      "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\PRICE LISTS.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe'
      2⤵
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4788
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1536
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
    • Modifies data under HKEY_USERS
    PID:544
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
      PID:1900
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
      1⤵
        PID:3816

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/544-157-0x0000023BAAEE0000-0x0000023BAAEF0000-memory.dmp
        Filesize

        64KB

      • memory/544-156-0x0000023BAAE80000-0x0000023BAAE90000-memory.dmp
        Filesize

        64KB

      • memory/1536-152-0x0000000005700000-0x0000000005756000-memory.dmp
        Filesize

        344KB

      • memory/1536-233-0x0000000005470000-0x0000000005A14000-memory.dmp
        Filesize

        5.6MB

      • memory/1536-150-0x0000000005470000-0x0000000005A14000-memory.dmp
        Filesize

        5.6MB

      • memory/1536-151-0x0000000005500000-0x000000000550A000-memory.dmp
        Filesize

        40KB

      • memory/1536-149-0x00000000752B0000-0x0000000075A60000-memory.dmp
        Filesize

        7.7MB

      • memory/1536-144-0x0000000000400000-0x0000000000488000-memory.dmp
        Filesize

        544KB

      • memory/1900-380-0x000001DC40B10000-0x000001DC40B14000-memory.dmp
        Filesize

        16KB

      • memory/4560-135-0x0000000005B30000-0x00000000060D4000-memory.dmp
        Filesize

        5.6MB

      • memory/4560-134-0x0000000000B10000-0x0000000000BB6000-memory.dmp
        Filesize

        664KB

      • memory/4560-372-0x00000000054C0000-0x0000000005552000-memory.dmp
        Filesize

        584KB

      • memory/4560-136-0x0000000005580000-0x0000000005612000-memory.dmp
        Filesize

        584KB

      • memory/4560-138-0x0000000005760000-0x00000000057FC000-memory.dmp
        Filesize

        624KB

      • memory/4560-133-0x00000000752B0000-0x0000000075A60000-memory.dmp
        Filesize

        7.7MB

      • memory/4560-137-0x00000000054C0000-0x0000000005552000-memory.dmp
        Filesize

        584KB

      • memory/4788-147-0x0000000004E50000-0x0000000004EB6000-memory.dmp
        Filesize

        408KB

      • memory/4788-148-0x0000000005B80000-0x0000000005B9E000-memory.dmp
        Filesize

        120KB

      • memory/4788-146-0x0000000004D70000-0x0000000004DD6000-memory.dmp
        Filesize

        408KB

      • memory/4788-145-0x0000000004AD0000-0x0000000004AF2000-memory.dmp
        Filesize

        136KB

      • memory/4788-153-0x0000000006B50000-0x0000000006BE6000-memory.dmp
        Filesize

        600KB

      • memory/4788-154-0x0000000006050000-0x000000000606A000-memory.dmp
        Filesize

        104KB

      • memory/4788-155-0x00000000060D0000-0x00000000060F2000-memory.dmp
        Filesize

        136KB

      • memory/4788-143-0x0000000005050000-0x0000000005678000-memory.dmp
        Filesize

        6.2MB

      • memory/4788-142-0x0000000004A12000-0x0000000004A13000-memory.dmp
        Filesize

        4KB

      • memory/4788-141-0x0000000004A10000-0x0000000004A11000-memory.dmp
        Filesize

        4KB

      • memory/4788-140-0x0000000002250000-0x0000000002286000-memory.dmp
        Filesize

        216KB

      • memory/4788-139-0x00000000752B0000-0x0000000075A60000-memory.dmp
        Filesize

        7.7MB