Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-05-2022 18:55

General

  • Target

    invoice120319.msi

  • Size

    748KB

  • MD5

    30002087ca6943bbc6911c18048a9f9a

  • SHA1

    a10aa9733ccbb91bf63f798b8b956e2c9c87e13c

  • SHA256

    25ede42391888006bc97d0fb95490ccdeee2c746255cdb2b7ca9686bea4ad765

  • SHA512

    e33c97235aa90be4b9905ee5598d85bc17e96a8a1cdd15de587aa62c35656dc6e951c6c9f9eb073ec5bb3fdf2c20dee61a2797a18bd70d0d1841b0283c1c061a

Malware Config

Extracted

Family

hawkeye_reborn

Version

9.0.1.6

Credentials

  • Protocol:
    smtp
  • Host:
    mail.patrogabon.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    asVhX7(BT8t=
Mutex

f3ba5d73-3b3c-43e2-af34-d775d5622e62

Attributes
  • fields

    map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:asVhX7(BT8t= _EmailPort:587 _EmailSSL:true _EmailServer:mail.patrogabon.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:f3ba5d73-3b3c-43e2-af34-d775d5622e62 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:9.0.1.6 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]

  • name

    HawkEye Keylogger - Reborn v9, Version=9.0.1.6, Culture=neutral, PublicKeyToken=null

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger Payload 8 IoCs

    Detects M00nD3v Logger payload in memory.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 9 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\invoice120319.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1116
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Windows\Installer\MSIB38A.tmp
      "C:\Windows\Installer\MSIB38A.tmp"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        3⤵
          PID:1812
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
          3⤵
            PID:1484
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
            3⤵
              PID:1192
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
              3⤵
                PID:1620
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
                3⤵
                  PID:1096
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1456
            • C:\Windows\system32\DrvInst.exe
              DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000060" "000000000000005C"
              1⤵
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:764

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\Installer\MSIB38A.tmp

              Filesize

              720KB

              MD5

              95ad2331d017dee810a49322ce84409d

              SHA1

              76e0e06c638566bc2b01e0245e5f44a09a568d1d

              SHA256

              4fe6a5c8a091880cddc8977b53bd815c592315f8e010948c7aa1930daef533a5

              SHA512

              e9f79c6895452598086b3797ed038fe9d322a0a07b8cbfaf2759e93b79edc1af269a0fb03b1d67544af5a0ee7943b5ddc4ae4408e6815c8c1f08b7c6e7dc435c

            • C:\Windows\Installer\MSIB38A.tmp

              Filesize

              720KB

              MD5

              95ad2331d017dee810a49322ce84409d

              SHA1

              76e0e06c638566bc2b01e0245e5f44a09a568d1d

              SHA256

              4fe6a5c8a091880cddc8977b53bd815c592315f8e010948c7aa1930daef533a5

              SHA512

              e9f79c6895452598086b3797ed038fe9d322a0a07b8cbfaf2759e93b79edc1af269a0fb03b1d67544af5a0ee7943b5ddc4ae4408e6815c8c1f08b7c6e7dc435c

            • memory/1116-54-0x000007FEFBCB1000-0x000007FEFBCB3000-memory.dmp

              Filesize

              8KB

            • memory/1192-107-0x0000000071340000-0x00000000714C8000-memory.dmp

              Filesize

              1.5MB

            • memory/1192-111-0x0000000070970000-0x0000000070F1B000-memory.dmp

              Filesize

              5.7MB

            • memory/1192-98-0x000000000048B2FE-mapping.dmp

            • memory/1192-104-0x0000000070970000-0x0000000070F1B000-memory.dmp

              Filesize

              5.7MB

            • memory/1192-105-0x000000006FE70000-0x0000000070968000-memory.dmp

              Filesize

              11.0MB

            • memory/1192-106-0x000000006F6D0000-0x000000006FE6C000-memory.dmp

              Filesize

              7.6MB

            • memory/1192-108-0x000000006EAF0000-0x000000006F6CE000-memory.dmp

              Filesize

              11.9MB

            • memory/1192-109-0x00000000711A0000-0x000000007133B000-memory.dmp

              Filesize

              1.6MB

            • memory/1192-110-0x0000000071090000-0x0000000071194000-memory.dmp

              Filesize

              1.0MB

            • memory/1192-113-0x0000000071090000-0x0000000071194000-memory.dmp

              Filesize

              1.0MB

            • memory/1192-112-0x000000006FE70000-0x0000000070968000-memory.dmp

              Filesize

              11.0MB

            • memory/1488-64-0x00000000726C0000-0x0000000073A4F000-memory.dmp

              Filesize

              19.6MB

            • memory/1488-56-0x0000000000000000-mapping.dmp

            • memory/1488-65-0x0000000004F90000-0x0000000005020000-memory.dmp

              Filesize

              576KB

            • memory/1488-59-0x0000000000B50000-0x0000000000C0A000-memory.dmp

              Filesize

              744KB

            • memory/1488-90-0x0000000071CB0000-0x00000000726C0000-memory.dmp

              Filesize

              10.1MB

            • memory/1488-78-0x0000000071CB0000-0x00000000726C0000-memory.dmp

              Filesize

              10.1MB

            • memory/1488-79-0x00000000714D0000-0x0000000071CB0000-memory.dmp

              Filesize

              7.9MB

            • memory/1488-63-0x0000000000480000-0x00000000004A8000-memory.dmp

              Filesize

              160KB

            • memory/1488-62-0x0000000004CA0000-0x0000000004D56000-memory.dmp

              Filesize

              728KB

            • memory/1488-61-0x0000000004AC0000-0x0000000004C9E000-memory.dmp

              Filesize

              1.9MB

            • memory/1488-60-0x00000000755C1000-0x00000000755C3000-memory.dmp

              Filesize

              8KB

            • memory/1488-84-0x0000000074290000-0x0000000074461000-memory.dmp

              Filesize

              1.8MB

            • memory/1488-91-0x00000000726C0000-0x0000000073A4F000-memory.dmp

              Filesize

              19.6MB

            • memory/1812-67-0x0000000000400000-0x0000000000490000-memory.dmp

              Filesize

              576KB

            • memory/1812-87-0x0000000070F20000-0x00000000714CB000-memory.dmp

              Filesize

              5.7MB

            • memory/1812-88-0x0000000070420000-0x0000000070F18000-memory.dmp

              Filesize

              11.0MB

            • memory/1812-89-0x000000006EC60000-0x000000006ED64000-memory.dmp

              Filesize

              1.0MB

            • memory/1812-86-0x000000006FC80000-0x000000007041C000-memory.dmp

              Filesize

              7.6MB

            • memory/1812-85-0x0000000070F20000-0x00000000714CB000-memory.dmp

              Filesize

              5.7MB

            • memory/1812-83-0x000000006ED70000-0x000000006EF0B000-memory.dmp

              Filesize

              1.6MB

            • memory/1812-82-0x000000006EF10000-0x000000006FAEE000-memory.dmp

              Filesize

              11.9MB

            • memory/1812-81-0x000000006FAF0000-0x000000006FC78000-memory.dmp

              Filesize

              1.5MB

            • memory/1812-80-0x0000000070420000-0x0000000070F18000-memory.dmp

              Filesize

              11.0MB

            • memory/1812-74-0x0000000000400000-0x0000000000490000-memory.dmp

              Filesize

              576KB

            • memory/1812-76-0x0000000000400000-0x0000000000490000-memory.dmp

              Filesize

              576KB

            • memory/1812-70-0x0000000000400000-0x0000000000490000-memory.dmp

              Filesize

              576KB

            • memory/1812-72-0x000000000048B2FE-mapping.dmp

            • memory/1812-71-0x0000000000400000-0x0000000000490000-memory.dmp

              Filesize

              576KB

            • memory/1812-69-0x0000000000400000-0x0000000000490000-memory.dmp

              Filesize

              576KB

            • memory/1812-66-0x0000000000400000-0x0000000000490000-memory.dmp

              Filesize

              576KB