Analysis

  • max time kernel
    167s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-05-2022 18:55

General

  • Target

    25ede42391888006bc97d0fb95490ccdeee2c746255cdb2b7ca9686bea4ad765.msi

  • Size

    748KB

  • MD5

    30002087ca6943bbc6911c18048a9f9a

  • SHA1

    a10aa9733ccbb91bf63f798b8b956e2c9c87e13c

  • SHA256

    25ede42391888006bc97d0fb95490ccdeee2c746255cdb2b7ca9686bea4ad765

  • SHA512

    e33c97235aa90be4b9905ee5598d85bc17e96a8a1cdd15de587aa62c35656dc6e951c6c9f9eb073ec5bb3fdf2c20dee61a2797a18bd70d0d1841b0283c1c061a

Malware Config

Extracted

Family

hawkeye_reborn

Version

9.0.1.6

Credentials

  • Protocol:
    smtp
  • Host:
    mail.patrogabon.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    asVhX7(BT8t=
Mutex

f3ba5d73-3b3c-43e2-af34-d775d5622e62

Attributes
  • fields

    map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:asVhX7(BT8t= _EmailPort:587 _EmailSSL:true _EmailServer:mail.patrogabon.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:f3ba5d73-3b3c-43e2-af34-d775d5622e62 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:9.0.1.6 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]

  • name

    HawkEye Keylogger - Reborn v9, Version=9.0.1.6, Culture=neutral, PublicKeyToken=null

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger Payload 10 IoCs

    Detects M00nD3v Logger payload in memory.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 9 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\25ede42391888006bc97d0fb95490ccdeee2c746255cdb2b7ca9686bea4ad765.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1348
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\Installer\MSIB177.tmp
      "C:\Windows\Installer\MSIB177.tmp"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1820
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        3⤵
          PID:2004
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
          3⤵
            PID:1632
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
            3⤵
              PID:1804
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
              3⤵
                PID:268
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
                3⤵
                  PID:1400
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
                  3⤵
                    PID:1184
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
                    3⤵
                      PID:1600
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
                      3⤵
                        PID:848
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
                        3⤵
                          PID:1168
                    • C:\Windows\system32\vssvc.exe
                      C:\Windows\system32\vssvc.exe
                      1⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1680
                    • C:\Windows\system32\DrvInst.exe
                      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000004A0" "00000000000004AC"
                      1⤵
                      • Drops file in Windows directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1692

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Windows\Installer\MSIB177.tmp

                      Filesize

                      720KB

                      MD5

                      95ad2331d017dee810a49322ce84409d

                      SHA1

                      76e0e06c638566bc2b01e0245e5f44a09a568d1d

                      SHA256

                      4fe6a5c8a091880cddc8977b53bd815c592315f8e010948c7aa1930daef533a5

                      SHA512

                      e9f79c6895452598086b3797ed038fe9d322a0a07b8cbfaf2759e93b79edc1af269a0fb03b1d67544af5a0ee7943b5ddc4ae4408e6815c8c1f08b7c6e7dc435c

                    • C:\Windows\Installer\MSIB177.tmp

                      Filesize

                      720KB

                      MD5

                      95ad2331d017dee810a49322ce84409d

                      SHA1

                      76e0e06c638566bc2b01e0245e5f44a09a568d1d

                      SHA256

                      4fe6a5c8a091880cddc8977b53bd815c592315f8e010948c7aa1930daef533a5

                      SHA512

                      e9f79c6895452598086b3797ed038fe9d322a0a07b8cbfaf2759e93b79edc1af269a0fb03b1d67544af5a0ee7943b5ddc4ae4408e6815c8c1f08b7c6e7dc435c

                    • memory/1168-151-0x0000000071470000-0x000000007160B000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1168-140-0x000000000048B2FE-mapping.dmp

                    • memory/1168-146-0x0000000070C40000-0x00000000711EB000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1168-147-0x0000000070140000-0x0000000070C38000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/1168-149-0x0000000071610000-0x0000000071798000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/1168-148-0x000000006F9A0000-0x000000007013C000-memory.dmp

                      Filesize

                      7.6MB

                    • memory/1168-150-0x000000006EDC0000-0x000000006F99E000-memory.dmp

                      Filesize

                      11.9MB

                    • memory/1348-54-0x000007FEFBFB1000-0x000007FEFBFB3000-memory.dmp

                      Filesize

                      8KB

                    • memory/1400-108-0x000000006EDC0000-0x000000006F99E000-memory.dmp

                      Filesize

                      11.9MB

                    • memory/1400-105-0x0000000070140000-0x0000000070C38000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/1400-106-0x000000006F9A0000-0x000000007013C000-memory.dmp

                      Filesize

                      7.6MB

                    • memory/1400-107-0x0000000071610000-0x0000000071798000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/1400-98-0x000000000048B2FE-mapping.dmp

                    • memory/1400-109-0x0000000071470000-0x000000007160B000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1400-110-0x0000000070C40000-0x00000000711EB000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1400-111-0x0000000070140000-0x0000000070C38000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/1400-112-0x0000000071360000-0x0000000071464000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/1400-104-0x0000000070C40000-0x00000000711EB000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1600-119-0x000000000048B2FE-mapping.dmp

                    • memory/1600-133-0x000000006EED0000-0x000000006EFD4000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/1600-132-0x00000000706F0000-0x00000000711E8000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/1600-131-0x00000000711F0000-0x000000007179B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1600-130-0x000000006EFE0000-0x000000006F17B000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/1600-125-0x00000000711F0000-0x000000007179B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1600-129-0x000000006F180000-0x000000006FD5E000-memory.dmp

                      Filesize

                      11.9MB

                    • memory/1600-128-0x000000006FD60000-0x000000006FEE8000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/1600-127-0x000000006FEF0000-0x000000007068C000-memory.dmp

                      Filesize

                      7.6MB

                    • memory/1600-126-0x00000000706F0000-0x00000000711E8000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/1820-65-0x0000000004FC0000-0x0000000005050000-memory.dmp

                      Filesize

                      576KB

                    • memory/1820-90-0x0000000071F80000-0x0000000072990000-memory.dmp

                      Filesize

                      10.1MB

                    • memory/1820-91-0x0000000072990000-0x0000000073D1F000-memory.dmp

                      Filesize

                      19.6MB

                    • memory/1820-84-0x0000000074560000-0x0000000074731000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/1820-79-0x00000000717A0000-0x0000000071F80000-memory.dmp

                      Filesize

                      7.9MB

                    • memory/1820-78-0x0000000071F80000-0x0000000072990000-memory.dmp

                      Filesize

                      10.1MB

                    • memory/1820-64-0x0000000072990000-0x0000000073D1F000-memory.dmp

                      Filesize

                      19.6MB

                    • memory/1820-63-0x00000000004A0000-0x00000000004C8000-memory.dmp

                      Filesize

                      160KB

                    • memory/1820-62-0x0000000004AE0000-0x0000000004B96000-memory.dmp

                      Filesize

                      728KB

                    • memory/1820-61-0x0000000004BF0000-0x0000000004DCE000-memory.dmp

                      Filesize

                      1.9MB

                    • memory/1820-60-0x0000000076531000-0x0000000076533000-memory.dmp

                      Filesize

                      8KB

                    • memory/1820-59-0x0000000000050000-0x000000000010A000-memory.dmp

                      Filesize

                      744KB

                    • memory/1820-56-0x0000000000000000-mapping.dmp

                    • memory/2004-70-0x0000000000400000-0x0000000000490000-memory.dmp

                      Filesize

                      576KB

                    • memory/2004-89-0x000000006EF30000-0x000000006F034000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/2004-87-0x00000000711F0000-0x000000007179B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2004-88-0x00000000706F0000-0x00000000711E8000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/2004-86-0x000000006FF50000-0x00000000706EC000-memory.dmp

                      Filesize

                      7.6MB

                    • memory/2004-85-0x00000000711F0000-0x000000007179B000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/2004-83-0x000000006F040000-0x000000006F1DB000-memory.dmp

                      Filesize

                      1.6MB

                    • memory/2004-82-0x000000006F1E0000-0x000000006FDBE000-memory.dmp

                      Filesize

                      11.9MB

                    • memory/2004-81-0x000000006FDC0000-0x000000006FF48000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/2004-80-0x00000000706F0000-0x00000000711E8000-memory.dmp

                      Filesize

                      11.0MB

                    • memory/2004-76-0x0000000000400000-0x0000000000490000-memory.dmp

                      Filesize

                      576KB

                    • memory/2004-74-0x0000000000400000-0x0000000000490000-memory.dmp

                      Filesize

                      576KB

                    • memory/2004-69-0x0000000000400000-0x0000000000490000-memory.dmp

                      Filesize

                      576KB

                    • memory/2004-72-0x000000000048B2FE-mapping.dmp

                    • memory/2004-71-0x0000000000400000-0x0000000000490000-memory.dmp

                      Filesize

                      576KB

                    • memory/2004-67-0x0000000000400000-0x0000000000490000-memory.dmp

                      Filesize

                      576KB

                    • memory/2004-66-0x0000000000400000-0x0000000000490000-memory.dmp

                      Filesize

                      576KB