Analysis
-
max time kernel
130s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
29-05-2022 17:06
Static task
static1
Behavioral task
behavioral1
Sample
0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe
Resource
win10v2004-20220414-en
General
-
Target
0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe
-
Size
1.1MB
-
MD5
e6ab0c06dd34718d2471d34f92bc4710
-
SHA1
96c687dccf0e761234701914b548f0c567d5396f
-
SHA256
0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f
-
SHA512
7da751a18d325c1f351a0445d824db3c7b873d09912cc0efbd0c3e1c8e480a9e74c4a0ad8110c7dfe59e29ca55d06a4f03aefc6c495eab0a51aa285e33524461
Malware Config
Extracted
hawkeye_reborn
9.0.1.6
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
*aM$m4sTh(J2$
c1f985bf-a670-47a2-82ed-7c0cc5b408ef
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:*aM$m4sTh(J2$ _EmailPort:587 _EmailSSL:true _EmailServer:mail.privateemail.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:c1f985bf-a670-47a2-82ed-7c0cc5b408ef _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:9.0.1.6 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye Keylogger - Reborn v9, Version=9.0.1.6, Culture=neutral, PublicKeyToken=null
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
resource yara_rule behavioral2/memory/4696-139-0x0000000000400000-0x0000000000490000-memory.dmp m00nd3v_logger -
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/4572-156-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral2/memory/4572-158-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral2/memory/4572-159-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 4 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/3008-146-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView behavioral2/memory/3008-148-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView behavioral2/memory/3008-152-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView behavioral2/memory/3008-153-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView -
Nirsoft 7 IoCs
resource yara_rule behavioral2/memory/3008-146-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/3008-148-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/3008-152-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/3008-153-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral2/memory/4572-156-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral2/memory/4572-158-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral2/memory/4572-159-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3148 set thread context of 4696 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 91 PID 4696 set thread context of 3008 4696 RegAsm.exe 92 PID 4696 set thread context of 4572 4696 RegAsm.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4144 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 3008 vbc.exe 3008 vbc.exe 3008 vbc.exe 3008 vbc.exe 3008 vbc.exe 3008 vbc.exe 3008 vbc.exe 3008 vbc.exe 3008 vbc.exe 3008 vbc.exe 3008 vbc.exe 3008 vbc.exe 4696 RegAsm.exe 4696 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe Token: SeDebugPrivilege 4696 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4696 RegAsm.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3148 wrote to memory of 4144 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 89 PID 3148 wrote to memory of 4144 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 89 PID 3148 wrote to memory of 4144 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 89 PID 3148 wrote to memory of 4696 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 91 PID 3148 wrote to memory of 4696 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 91 PID 3148 wrote to memory of 4696 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 91 PID 3148 wrote to memory of 4696 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 91 PID 3148 wrote to memory of 4696 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 91 PID 3148 wrote to memory of 4696 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 91 PID 3148 wrote to memory of 4696 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 91 PID 3148 wrote to memory of 4696 3148 0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe 91 PID 4696 wrote to memory of 3008 4696 RegAsm.exe 92 PID 4696 wrote to memory of 3008 4696 RegAsm.exe 92 PID 4696 wrote to memory of 3008 4696 RegAsm.exe 92 PID 4696 wrote to memory of 3008 4696 RegAsm.exe 92 PID 4696 wrote to memory of 3008 4696 RegAsm.exe 92 PID 4696 wrote to memory of 3008 4696 RegAsm.exe 92 PID 4696 wrote to memory of 3008 4696 RegAsm.exe 92 PID 4696 wrote to memory of 3008 4696 RegAsm.exe 92 PID 4696 wrote to memory of 3008 4696 RegAsm.exe 92 PID 4696 wrote to memory of 4572 4696 RegAsm.exe 93 PID 4696 wrote to memory of 4572 4696 RegAsm.exe 93 PID 4696 wrote to memory of 4572 4696 RegAsm.exe 93 PID 4696 wrote to memory of 4572 4696 RegAsm.exe 93 PID 4696 wrote to memory of 4572 4696 RegAsm.exe 93 PID 4696 wrote to memory of 4572 4696 RegAsm.exe 93 PID 4696 wrote to memory of 4572 4696 RegAsm.exe 93 PID 4696 wrote to memory of 4572 4696 RegAsm.exe 93 PID 4696 wrote to memory of 4572 4696 RegAsm.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe"C:\Users\Admin\AppData\Local\Temp\0d86e57fef572f267f5987db2d97f29ec09f9735d68b0844b671fe30378c9f7f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vhncOLJtirFGz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9F1E.tmp"2⤵
- Creates scheduled task(s)
PID:4144
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpCBCC.tmp"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpD7E2.tmp"3⤵
- Accesses Microsoft Outlook accounts
PID:4572
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD576e72bc0df57b1a897c9096447807137
SHA1c6d25809fff289659dbb14c641bc58877c75eaaf
SHA2566141782551ed080949592f9a25949fa75ccc856470ab9644051047c7a9695e51
SHA51240349fdaa0f181edc9df8beb7a58b6f4802c9a5da9731177f6bc930e359fd2e4dc20f4a2572f59479de54c9a9a0cff546d1c0a0cfec382af54a08a31dba95d54
-
Filesize
4KB
MD5bdf65f70610625cc771c5cc7ce168c7d
SHA1a8829b1c071ed0521d11925a98468c12a53a03b8
SHA256b66236dd86f140ca02db0c296e45032b272de2895c4f047a562e73bc8395dba5
SHA512add2db50b0440b07ecc48a5fde7f0b72e84b76f11ea060944afa28ddd03791e6adb3bfca704254131fb3f591f484b37f7276fab96b0c4776a27cb526bcf5f3a4