Analysis

  • max time kernel
    172s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-05-2022 22:07

General

  • Target

    08601dfa46006125bee6f0d7b3c8f18e824756992e2638872c7e8050d59686dd.exe

  • Size

    772KB

  • MD5

    114f9255de59954ae627cc7bf2869cf9

  • SHA1

    6d4f439a590083f4dc4bdcf25b1aae93fdde99e0

  • SHA256

    08601dfa46006125bee6f0d7b3c8f18e824756992e2638872c7e8050d59686dd

  • SHA512

    3fedb776d22a0fc626f35c6b12653083be52298765b97ecbb234b7c960440de7e808e6c15d5d8aff15148b1319781fdaafc717274e601cce02df8c0f2d5aa04d

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger Payload 7 IoCs

    Detects M00nD3v Logger payload in memory.

  • NirSoft MailPassView 4 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 5 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 9 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08601dfa46006125bee6f0d7b3c8f18e824756992e2638872c7e8050d59686dd.exe
    "C:\Users\Admin\AppData\Local\Temp\08601dfa46006125bee6f0d7b3c8f18e824756992e2638872c7e8050d59686dd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\p0a3jnnn\p0a3jnnn.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE1F7.tmp" "c:\Users\Admin\AppData\Local\Temp\p0a3jnnn\CSC70B2BC0010FE44CFAF8C78C02A96B035.TMP"
        3⤵
          PID:2000
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp208C.tmp"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1824
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpC94A.tmp"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:1448

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESE1F7.tmp

      Filesize

      1KB

      MD5

      e6940ee768b90ec9bca99639b766aa5c

      SHA1

      8f64444642d53eedc54154fce173d61387556c7f

      SHA256

      3b45ce52d5bf5ab0358fc829d9965e754b5c204ad5a2a4f830fa1ef9c806843b

      SHA512

      d3bca34c4f62d383f2600d984c1f32941aa1fb26a8d8efa95589ac9cef3d04f4b0d2053a425e50f9ba4c86d1e5430f2eae5d18a67a15c0fa8070ec5c258c8d6e

    • C:\Users\Admin\AppData\Local\Temp\p0a3jnnn\p0a3jnnn.dll

      Filesize

      9KB

      MD5

      fee9b2bff1885808c41d4a5eb6039d7e

      SHA1

      9083256f8a9aab1bac62c43b0a5041afc18207e7

      SHA256

      655f596758e718fef5521315c4342658b7f99441174ee0b790edd84fe27cb5f8

      SHA512

      3d0ecb580fb4c4014524e0ae4acd4623091f6bca026efe73e7322f32b9c81e61cb61d19acfbf652cf94cd674ee1647a4b9490870507231abfbd0a7bc3dfc8e5d

    • C:\Users\Admin\AppData\Local\Temp\p0a3jnnn\p0a3jnnn.pdb

      Filesize

      27KB

      MD5

      848da43b7b73e26ed29e1477bd49a0a6

      SHA1

      a7a1d5c033deeb9a1d3736b72d1aa22e4bb568c9

      SHA256

      d4257336f3977ba0deac105472c81063ffff14310a5f28195679315000ef4f84

      SHA512

      6e12961f20a4d84abc2a2c81fd05e29faa0014cce288dc4cf8e0821b3c8d5de7b129823c7d54d8649f57b3896d6d13dbcf8d722ca8988c012c11f66e7df9ffd2

    • C:\Users\Admin\AppData\Local\Temp\tmp208C.tmp

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • \??\c:\Users\Admin\AppData\Local\Temp\p0a3jnnn\CSC70B2BC0010FE44CFAF8C78C02A96B035.TMP

      Filesize

      1KB

      MD5

      127bf6b3eb63e6570d6fd1bb2a166b48

      SHA1

      2dde5e8808a965894f747b5494b17cd478dfda41

      SHA256

      52e18c60967b7ade42c76f0a25c9ab8d95787fc507218fbfccfe9fc44e2ad9de

      SHA512

      bc8591bf58de113ea7522da627cd2ffe482a0e20fcd3e4d229a1490c9761604dc33102a42c19944503e846a06be45c8cd758b7944d40dbdb51fd0c2c2353011e

    • \??\c:\Users\Admin\AppData\Local\Temp\p0a3jnnn\p0a3jnnn.0.cs

      Filesize

      17KB

      MD5

      1eed8b456610b069b7fb3bc76ddbec96

      SHA1

      9b17e2f62631775b89cca34c1cdc9ea9fbd3d4ba

      SHA256

      2bba3ab6332f7a3196ee3b0ee29ffac3e1cf206803b96f7a7b39a261ddd741b1

      SHA512

      c950a13ae648284f0c0b4090a57f45c68a0393055085ab8d74ca7363d3bc7985be6962546510fa5655e85d2f7c1037a008591556a1c4e979443e5ea11364c801

    • \??\c:\Users\Admin\AppData\Local\Temp\p0a3jnnn\p0a3jnnn.cmdline

      Filesize

      312B

      MD5

      f0777b6474cc834c8ade6236040161c2

      SHA1

      1c1fb02accabeebd2e694fec9a1b15686148c8e4

      SHA256

      e60b0d855f609e4b349109b79947ccb24e22b86a10a5e8ea7ededc5c4a699509

      SHA512

      ef709ffc46011c69424593b715b870f28e8d2be9a2efcdb2364887ddabb827bde980409ed61b3a0dfbf5f9af3e67b94b3dae42595aa0ad0ae2fc53f5666962aa

    • memory/1448-123-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1448-121-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1448-119-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1448-118-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1448-127-0x000000000041211A-mapping.dmp

    • memory/1448-126-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1448-130-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1448-131-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1448-124-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1516-88-0x00000000738C0000-0x0000000073A91000-memory.dmp

      Filesize

      1.8MB

    • memory/1516-61-0x0000000073EC0000-0x0000000074054000-memory.dmp

      Filesize

      1.6MB

    • memory/1516-72-0x0000000004A50000-0x0000000004AE0000-memory.dmp

      Filesize

      576KB

    • memory/1516-55-0x0000000000630000-0x0000000000638000-memory.dmp

      Filesize

      32KB

    • memory/1516-56-0x00000000721E0000-0x000000007356F000-memory.dmp

      Filesize

      19.6MB

    • memory/1516-70-0x00000000007B0000-0x00000000007BC000-memory.dmp

      Filesize

      48KB

    • memory/1516-60-0x00000000717D0000-0x00000000721E0000-memory.dmp

      Filesize

      10.1MB

    • memory/1516-71-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

      Filesize

      8KB

    • memory/1516-63-0x0000000070FF0000-0x00000000717D0000-memory.dmp

      Filesize

      7.9MB

    • memory/1516-68-0x0000000000740000-0x0000000000748000-memory.dmp

      Filesize

      32KB

    • memory/1516-69-0x0000000005100000-0x000000000519A000-memory.dmp

      Filesize

      616KB

    • memory/1516-85-0x00000000721E0000-0x000000007356F000-memory.dmp

      Filesize

      19.6MB

    • memory/1516-86-0x00000000717D0000-0x00000000721E0000-memory.dmp

      Filesize

      10.1MB

    • memory/1516-87-0x0000000073EC0000-0x0000000074054000-memory.dmp

      Filesize

      1.6MB

    • memory/1516-54-0x00000000013C0000-0x0000000001486000-memory.dmp

      Filesize

      792KB

    • memory/1652-57-0x0000000000000000-mapping.dmp

    • memory/1656-114-0x0000000074450000-0x00000000745EB000-memory.dmp

      Filesize

      1.6MB

    • memory/1656-83-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1656-92-0x00000000716F0000-0x00000000722CE000-memory.dmp

      Filesize

      11.9MB

    • memory/1656-93-0x0000000074450000-0x00000000745EB000-memory.dmp

      Filesize

      1.6MB

    • memory/1656-94-0x00000000722D0000-0x0000000072A6C000-memory.dmp

      Filesize

      7.6MB

    • memory/1656-73-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1656-76-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1656-74-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1656-77-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1656-78-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1656-79-0x000000000048B1CE-mapping.dmp

    • memory/1656-81-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1656-91-0x00000000745F0000-0x0000000074778000-memory.dmp

      Filesize

      1.5MB

    • memory/1656-109-0x0000000073BA0000-0x0000000073CA4000-memory.dmp

      Filesize

      1.0MB

    • memory/1656-89-0x0000000073D80000-0x000000007432B000-memory.dmp

      Filesize

      5.7MB

    • memory/1656-111-0x0000000072A70000-0x0000000073568000-memory.dmp

      Filesize

      11.0MB

    • memory/1656-112-0x0000000073D80000-0x000000007432B000-memory.dmp

      Filesize

      5.7MB

    • memory/1656-113-0x00000000716F0000-0x00000000722CE000-memory.dmp

      Filesize

      11.9MB

    • memory/1656-90-0x0000000072A70000-0x0000000073568000-memory.dmp

      Filesize

      11.0MB

    • memory/1656-115-0x00000000722D0000-0x0000000072A6C000-memory.dmp

      Filesize

      7.6MB

    • memory/1824-116-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1824-110-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1824-108-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1824-105-0x000000000044472E-mapping.dmp

    • memory/1824-104-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1824-102-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1824-100-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1824-98-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1824-96-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1824-95-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/2000-62-0x0000000000000000-mapping.dmp