Analysis
-
max time kernel
157s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 22:06
Static task
static1
Behavioral task
behavioral1
Sample
document.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
document.exe
Resource
win10v2004-20220414-en
General
-
Target
document.exe
-
Size
663KB
-
MD5
0e43f07d161f5d0f3739e5588e1bb3e5
-
SHA1
1c67ae07cc9f304cb40731f6ed64ec1684198aad
-
SHA256
32a1d99c12d4bbbf6b20ee43a25cf4dccf34ba30d8d40dc68d9c59d4c7ba25d5
-
SHA512
44a7e55bee5db8a48d90ebada34134bb168d1d9e28aac1864607e2462134113766fdf8e88bc685e4c46576d5c96e2096eb1cd37d1b9f40b85b1005f60f3bcd6d
Malware Config
Extracted
hawkeye_reborn
10.0.0.1
Protocol: smtp- Host:
mail.eagleeyeapparels.com - Port:
587 - Username:
[email protected] - Password:
eagle*qaz
f98d37f4-ca90-4ed7-9f6f-6121c4014605
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:eagle*qaz _EmailPort:587 _EmailSSL:true _EmailServer:mail.eagleeyeapparels.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:f98d37f4-ca90-4ed7-9f6f-6121c4014605 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:true _SystemInfo:true _Version:10.0.0.1 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye RebornX, Version=10.0.0.1, Culture=neutral, PublicKeyToken=null
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 9 IoCs
Processes:
document.exedocument.exedocument.exedocument.exedocument.exedocument.exedocument.exedocument.exedocument.exedescription pid process target process PID 1948 set thread context of 1936 1948 document.exe document.exe PID 1196 set thread context of 1268 1196 document.exe document.exe PID 428 set thread context of 1152 428 document.exe document.exe PID 1164 set thread context of 1960 1164 document.exe document.exe PID 1708 set thread context of 576 1708 document.exe document.exe PID 268 set thread context of 1212 268 document.exe document.exe PID 1484 set thread context of 552 1484 document.exe document.exe PID 1544 set thread context of 1952 1544 document.exe document.exe PID 924 set thread context of 2028 924 document.exe document.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
document.exedocument.exedocument.exedocument.exedocument.exedocument.exepid process 1948 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1464 document.exe 1196 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 1520 document.exe 428 document.exe 1548 document.exe 1548 document.exe 1548 document.exe 1548 document.exe 1548 document.exe 1548 document.exe 1548 document.exe 1548 document.exe 1548 document.exe 1548 document.exe 1548 document.exe 1548 document.exe 1548 document.exe -
Suspicious behavior: MapViewOfSection 9 IoCs
Processes:
document.exedocument.exedocument.exedocument.exedocument.exedocument.exedocument.exedocument.exedocument.exepid process 1948 document.exe 1196 document.exe 428 document.exe 1164 document.exe 1708 document.exe 268 document.exe 1484 document.exe 1544 document.exe 924 document.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
document.exedocument.exedocument.exedocument.exedocument.exedocument.exedocument.exedocument.exedocument.exedocument.exedocument.exedescription pid process target process PID 1948 wrote to memory of 1936 1948 document.exe document.exe PID 1948 wrote to memory of 1936 1948 document.exe document.exe PID 1948 wrote to memory of 1936 1948 document.exe document.exe PID 1948 wrote to memory of 1936 1948 document.exe document.exe PID 1948 wrote to memory of 1464 1948 document.exe document.exe PID 1948 wrote to memory of 1464 1948 document.exe document.exe PID 1948 wrote to memory of 1464 1948 document.exe document.exe PID 1948 wrote to memory of 1464 1948 document.exe document.exe PID 1464 wrote to memory of 1196 1464 document.exe document.exe PID 1464 wrote to memory of 1196 1464 document.exe document.exe PID 1464 wrote to memory of 1196 1464 document.exe document.exe PID 1464 wrote to memory of 1196 1464 document.exe document.exe PID 1196 wrote to memory of 1268 1196 document.exe document.exe PID 1196 wrote to memory of 1268 1196 document.exe document.exe PID 1196 wrote to memory of 1268 1196 document.exe document.exe PID 1196 wrote to memory of 1268 1196 document.exe document.exe PID 1196 wrote to memory of 1520 1196 document.exe document.exe PID 1196 wrote to memory of 1520 1196 document.exe document.exe PID 1196 wrote to memory of 1520 1196 document.exe document.exe PID 1196 wrote to memory of 1520 1196 document.exe document.exe PID 1520 wrote to memory of 428 1520 document.exe document.exe PID 1520 wrote to memory of 428 1520 document.exe document.exe PID 1520 wrote to memory of 428 1520 document.exe document.exe PID 1520 wrote to memory of 428 1520 document.exe document.exe PID 428 wrote to memory of 1152 428 document.exe document.exe PID 428 wrote to memory of 1152 428 document.exe document.exe PID 428 wrote to memory of 1152 428 document.exe document.exe PID 428 wrote to memory of 1152 428 document.exe document.exe PID 428 wrote to memory of 1548 428 document.exe document.exe PID 428 wrote to memory of 1548 428 document.exe document.exe PID 428 wrote to memory of 1548 428 document.exe document.exe PID 428 wrote to memory of 1548 428 document.exe document.exe PID 1548 wrote to memory of 1164 1548 document.exe document.exe PID 1548 wrote to memory of 1164 1548 document.exe document.exe PID 1548 wrote to memory of 1164 1548 document.exe document.exe PID 1548 wrote to memory of 1164 1548 document.exe document.exe PID 1164 wrote to memory of 1960 1164 document.exe document.exe PID 1164 wrote to memory of 1960 1164 document.exe document.exe PID 1164 wrote to memory of 1960 1164 document.exe document.exe PID 1164 wrote to memory of 1960 1164 document.exe document.exe PID 1164 wrote to memory of 1972 1164 document.exe document.exe PID 1164 wrote to memory of 1972 1164 document.exe document.exe PID 1164 wrote to memory of 1972 1164 document.exe document.exe PID 1164 wrote to memory of 1972 1164 document.exe document.exe PID 1972 wrote to memory of 1708 1972 document.exe document.exe PID 1972 wrote to memory of 1708 1972 document.exe document.exe PID 1972 wrote to memory of 1708 1972 document.exe document.exe PID 1972 wrote to memory of 1708 1972 document.exe document.exe PID 1708 wrote to memory of 576 1708 document.exe document.exe PID 1708 wrote to memory of 576 1708 document.exe document.exe PID 1708 wrote to memory of 576 1708 document.exe document.exe PID 1708 wrote to memory of 576 1708 document.exe document.exe PID 1708 wrote to memory of 340 1708 document.exe document.exe PID 1708 wrote to memory of 340 1708 document.exe document.exe PID 1708 wrote to memory of 340 1708 document.exe document.exe PID 1708 wrote to memory of 340 1708 document.exe document.exe PID 340 wrote to memory of 268 340 document.exe document.exe PID 340 wrote to memory of 268 340 document.exe document.exe PID 340 wrote to memory of 268 340 document.exe document.exe PID 340 wrote to memory of 268 340 document.exe document.exe PID 268 wrote to memory of 1212 268 document.exe document.exe PID 268 wrote to memory of 1212 268 document.exe document.exe PID 268 wrote to memory of 1212 268 document.exe document.exe PID 268 wrote to memory of 1212 268 document.exe document.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"2⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe" 2 1936 70818052⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1196
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe" 2 1268 71021951⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe" 2 1152 71208523⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"5⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe" 2 1960 71393545⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe" 2 576 71578567⤵
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"8⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"9⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe" 2 1212 71764359⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"10⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"11⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe" 2 552 719506211⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"12⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"13⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe" 2 1952 721370413⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"14⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:924 -
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"15⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe" 2 2028 723223715⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"7⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"3⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\document.exe"C:\Users\Admin\AppData\Local\Temp\document.exe"1⤵PID:1268