Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    03-05-2022 20:37

General

  • Target

    415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe

  • Size

    1.1MB

  • MD5

    bd5bc2f6b95e140c02325034f6a5c068

  • SHA1

    7034fd90e9e47b8bbc195d8b07222e68aaed91cc

  • SHA256

    415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d

  • SHA512

    cf6875becdab1381e32c36ba6489bc318e6a35b8f96219b45b7a7c2300b81c9450f4e850fbde43de918a5c9bbff747adeaa8b9da013d836cffb136b1eacc1d2b

Malware Config

Extracted

Family

hawkeye_reborn

Version

10.0.0.1

Credentials

  • Protocol:
    smtp
  • Host:
    mail.eagleeyeapparels.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    eagle*qaz
Mutex

f98d37f4-ca90-4ed7-9f6f-6121c4014605

Attributes
  • fields

    map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:eagle*qaz _EmailPort:587 _EmailSSL:true _EmailServer:mail.eagleeyeapparels.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:f98d37f4-ca90-4ed7-9f6f-6121c4014605 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:true _SystemInfo:true _Version:10.0.0.1 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]

  • name

    HawkEye RebornX, Version=10.0.0.1, Culture=neutral, PublicKeyToken=null

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • Looks up external IP address via web service 8 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
    "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
      "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
      2⤵
        PID:2400
      • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
        "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe" 2 2400 240541531
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4160
        • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
          "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:4492
          • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
            "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
            4⤵
              PID:1856
            • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
              "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe" 2 1856 240606531
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:740
              • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                5⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:2328
                • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                  "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                  6⤵
                    PID:3180
                  • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                    "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe" 2 3180 240617968
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4076
                    • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                      "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                      7⤵
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of WriteProcessMemory
                      PID:1960
                      • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                        "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                        8⤵
                          PID:2440
                        • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                          "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe" 2 2440 240628859
                          8⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4504
                          • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                            "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                            9⤵
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            PID:1680
                            • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                              "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                              10⤵
                                PID:3172
                              • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe" 2 3172 240639843
                                10⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2844
                                • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                  "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                                  11⤵
                                  • Suspicious use of SetThreadContext
                                  • Suspicious behavior: MapViewOfSection
                                  • Suspicious use of WriteProcessMemory
                                  PID:3880
                                  • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                    "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                                    12⤵
                                      PID:3116
                                    • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                      "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe" 2 3116 240650828
                                      12⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:1144
                                      • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                        "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                                        13⤵
                                        • Suspicious use of SetThreadContext
                                        • Suspicious behavior: MapViewOfSection
                                        • Suspicious use of WriteProcessMemory
                                        PID:3360
                                        • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                          "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                                          14⤵
                                            PID:2256
                                          • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                            "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe" 2 2256 240661765
                                            14⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:3504
                                            • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                              "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                                              15⤵
                                              • Suspicious use of SetThreadContext
                                              • Suspicious behavior: MapViewOfSection
                                              • Suspicious use of WriteProcessMemory
                                              PID:4276
                                              • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                                "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                                                16⤵
                                                  PID:32
                                                • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe" 2 32 240672734
                                                  16⤵
                                                    PID:4480
                                                    • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                                                      17⤵
                                                      • Suspicious use of SetThreadContext
                                                      • Suspicious behavior: MapViewOfSection
                                                      PID:2584
                                                      • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe"
                                                        18⤵
                                                          PID:4616
                                                        • C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe" 2 4616 240683750
                                                          18⤵
                                                            PID:4612

                        Network

                        MITRE ATT&CK Matrix

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\415dfa4ea6d8b002aa3f6b96dd95dbc149514f283caa4f3043d465d26bd54e5d.exe.log

                          Filesize

                          680B

                          MD5

                          8faf48455ffc017246b08e89f6ba1956

                          SHA1

                          2f6c39d9828b3f95dc050f52a38cd7d3f543baf8

                          SHA256

                          9a643ce75fdfe840ea158010f28f8520bea2a60220494b44a25039a2a318fc35

                          SHA512

                          dafd4f1bf894ef1c61ff65dbcb8d5a151b33d8e39f3e354e6e433c8c7c0e8c2105615bffde8d796e361b77ccbe917a70ca4d03cc8cb6396f0495ff9e5b7010a9

                        • memory/32-207-0x0000000074910000-0x0000000074EC1000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/32-206-0x0000000000A70000-0x0000000000B00000-memory.dmp

                          Filesize

                          576KB

                        • memory/32-203-0x0000000000000000-mapping.dmp

                        • memory/740-143-0x0000000000000000-mapping.dmp

                        • memory/1144-184-0x0000000000000000-mapping.dmp

                        • memory/1680-170-0x0000000000000000-mapping.dmp

                        • memory/1856-149-0x0000000074910000-0x0000000074EC1000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/1856-142-0x0000000000000000-mapping.dmp

                        • memory/1856-144-0x0000000000960000-0x00000000009F0000-memory.dmp

                          Filesize

                          576KB

                        • memory/1856-145-0x0000000000960000-0x00000000009F0000-memory.dmp

                          Filesize

                          576KB

                        • memory/1960-160-0x0000000000000000-mapping.dmp

                        • memory/2256-196-0x0000000000A00000-0x0000000000A90000-memory.dmp

                          Filesize

                          576KB

                        • memory/2256-199-0x0000000074910000-0x0000000074EC1000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2256-193-0x0000000000000000-mapping.dmp

                        • memory/2328-150-0x0000000000000000-mapping.dmp

                        • memory/2400-132-0x0000000000000000-mapping.dmp

                        • memory/2400-134-0x0000000000AF0000-0x0000000000B80000-memory.dmp

                          Filesize

                          576KB

                        • memory/2400-135-0x0000000000AF0000-0x0000000000B80000-memory.dmp

                          Filesize

                          576KB

                        • memory/2400-138-0x0000000074870000-0x0000000074E21000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2440-166-0x0000000000A50000-0x0000000000AE0000-memory.dmp

                          Filesize

                          576KB

                        • memory/2440-169-0x0000000074910000-0x0000000074EC1000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/2440-163-0x0000000000000000-mapping.dmp

                        • memory/2584-210-0x0000000000000000-mapping.dmp

                        • memory/2844-174-0x0000000000000000-mapping.dmp

                        • memory/3116-189-0x0000000074910000-0x0000000074EC1000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/3116-186-0x0000000000AE0000-0x0000000000B70000-memory.dmp

                          Filesize

                          576KB

                        • memory/3116-183-0x0000000000000000-mapping.dmp

                        • memory/3172-179-0x0000000074910000-0x0000000074EC1000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/3172-176-0x0000000000A40000-0x0000000000AD0000-memory.dmp

                          Filesize

                          576KB

                        • memory/3172-173-0x0000000000000000-mapping.dmp

                        • memory/3180-159-0x0000000074910000-0x0000000074EC1000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/3180-153-0x0000000000000000-mapping.dmp

                        • memory/3180-156-0x0000000000A20000-0x0000000000AB0000-memory.dmp

                          Filesize

                          576KB

                        • memory/3360-190-0x0000000000000000-mapping.dmp

                        • memory/3504-194-0x0000000000000000-mapping.dmp

                        • memory/3880-180-0x0000000000000000-mapping.dmp

                        • memory/4036-131-0x0000000000BA0000-0x0000000000BB1000-memory.dmp

                          Filesize

                          68KB

                        • memory/4076-154-0x0000000000000000-mapping.dmp

                        • memory/4160-133-0x0000000000000000-mapping.dmp

                        • memory/4276-200-0x0000000000000000-mapping.dmp

                        • memory/4480-204-0x0000000000000000-mapping.dmp

                        • memory/4492-139-0x0000000000000000-mapping.dmp

                        • memory/4504-164-0x0000000000000000-mapping.dmp

                        • memory/4612-214-0x0000000000000000-mapping.dmp

                        • memory/4616-213-0x0000000000000000-mapping.dmp

                        • memory/4616-216-0x0000000000AA0000-0x0000000000B30000-memory.dmp

                          Filesize

                          576KB

                        • memory/4616-229-0x0000000074910000-0x0000000074EC1000-memory.dmp

                          Filesize

                          5.7MB