Analysis
-
max time kernel
126s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 13:37
Static task
static1
Behavioral task
behavioral1
Sample
DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe
-
Size
1.9MB
-
MD5
161b5b19041f9bdbd9a39399b56a89d2
-
SHA1
9f00d56b968638ba354d4e73831574e325e99a0f
-
SHA256
1202e3f6949e818eade931f5a9f26e5eeab4fcbb0b7d4259fef0ace107d7218c
-
SHA512
3ad79a67f95bea6e545e61fa4a2f27fd3978280890c8af7cb99fbe42b6560b9f82008c5c86efa7f56914498c94573486719a23e89938b4cdd4e7331c6c087dd6
Malware Config
Extracted
hawkeye_reborn
9.0.1.6
Protocol: ftp- Host:
ftp.kassohome.com.tr - Port:
21 - Username:
[email protected] - Password:
J%jCb2L=!5~E
a1754d62-0730-4ad6-8fcc-8e3f7c68284b
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:false _Delivery:2 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPort:0 _EmailSSL:false _ExecutionDelay:10 _FTPPassword:J%jCb2L=!5~E _FTPPort:21 _FTPSFTP:true _FTPServer:ftp.kassohome.com.tr _FTPUsername:[email protected] _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:false _LogInterval:219000 _MeltFile:false _Mutex:a1754d62-0730-4ad6-8fcc-8e3f7c68284b _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:9.0.1.6 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye Keylogger - Reborn v9, Version=9.0.1.6, Culture=neutral, PublicKeyToken=null
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
resource yara_rule behavioral2/memory/4484-131-0x0000000000400000-0x0000000000490000-memory.dmp m00nd3v_logger -
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4648-146-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral2/memory/4648-148-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral2/memory/4648-149-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 3 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/4728-140-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView behavioral2/memory/4728-142-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView behavioral2/memory/4728-143-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView -
Nirsoft 6 IoCs
resource yara_rule behavioral2/memory/4728-140-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/4728-142-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/4728-143-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/4648-146-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral2/memory/4648-148-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral2/memory/4648-149-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3420 set thread context of 4484 3420 DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe 77 PID 4484 set thread context of 4728 4484 MSBuild.exe 78 PID 4484 set thread context of 4648 4484 MSBuild.exe 79 -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4728 vbc.exe 4728 vbc.exe 4728 vbc.exe 4728 vbc.exe 4728 vbc.exe 4728 vbc.exe 4728 vbc.exe 4728 vbc.exe 4728 vbc.exe 4728 vbc.exe 4728 vbc.exe 4728 vbc.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3420 DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe 3420 DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe 3420 DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3420 DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe 3420 DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe 3420 DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3420 wrote to memory of 4484 3420 DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe 77 PID 3420 wrote to memory of 4484 3420 DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe 77 PID 3420 wrote to memory of 4484 3420 DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe 77 PID 3420 wrote to memory of 4484 3420 DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe 77 PID 3420 wrote to memory of 4484 3420 DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe 77 PID 4484 wrote to memory of 4728 4484 MSBuild.exe 78 PID 4484 wrote to memory of 4728 4484 MSBuild.exe 78 PID 4484 wrote to memory of 4728 4484 MSBuild.exe 78 PID 4484 wrote to memory of 4728 4484 MSBuild.exe 78 PID 4484 wrote to memory of 4728 4484 MSBuild.exe 78 PID 4484 wrote to memory of 4728 4484 MSBuild.exe 78 PID 4484 wrote to memory of 4728 4484 MSBuild.exe 78 PID 4484 wrote to memory of 4728 4484 MSBuild.exe 78 PID 4484 wrote to memory of 4728 4484 MSBuild.exe 78 PID 4484 wrote to memory of 4648 4484 MSBuild.exe 79 PID 4484 wrote to memory of 4648 4484 MSBuild.exe 79 PID 4484 wrote to memory of 4648 4484 MSBuild.exe 79 PID 4484 wrote to memory of 4648 4484 MSBuild.exe 79 PID 4484 wrote to memory of 4648 4484 MSBuild.exe 79 PID 4484 wrote to memory of 4648 4484 MSBuild.exe 79 PID 4484 wrote to memory of 4648 4484 MSBuild.exe 79 PID 4484 wrote to memory of 4648 4484 MSBuild.exe 79 PID 4484 wrote to memory of 4648 4484 MSBuild.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe"C:\Users\Admin\AppData\Local\Temp\DETALLES DE SEGUIMIENTO DE FedEx-pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\MSBuild.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpE4A8.tmp"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpE8C0.tmp"3⤵
- Accesses Microsoft Outlook accounts
PID:4648
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD592b3d04dbcf7aa8eabb0096c55624068
SHA104a3b14a8f16bdd8a67f1b5d6be8c3db79c766c7
SHA25684e388e2bbff6a229d99df8d7e0558e46e793106c2f3bb290c6acc06fe31fe9c
SHA512fbd6a298b66e2117f68028cdf9fa1b3e441f87fa8a052ce1be628ae65116d5b2953cdc8117dce57e86475a75412b1a85f431eb0da6dd788ec5312d34ff71f9d1