Analysis
-
max time kernel
69s -
max time network
74s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-06-2022 17:50
Static task
static1
Behavioral task
behavioral1
Sample
14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe
Resource
win10v2004-20220414-en
General
-
Target
14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe
-
Size
1.9MB
-
MD5
a50bcd48aa8e6f1c836c0bae7845267a
-
SHA1
d3cf85687785ff1db85266276ec14ba49e0c13e7
-
SHA256
14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d
-
SHA512
cf5829f8ca2850f3cd699fafcf64e54c26866d9aa51844fa2847cb98499a47c20627b6850d5adeee234b5cdd450288e8901bbe2be6ad029f193453a232fbafbf
Malware Config
Extracted
hawkeye_reborn
9.0.0.5
Protocol: ftp- Host:
ftp.msn-word.com - Port:
21 - Username:
[email protected] - Password:
!Kz*o+^SSb6!
15ea832f-ab23-4aa8-a59f-127593f086b5
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:2 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPort:0 _EmailSSL:false _ExecutionDelay:10 _FTPPassword:!Kz*o+^SSb6! _FTPPort:21 _FTPSFTP:true _FTPServer:ftp.msn-word.com _FTPUsername:[email protected] _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:60 _MeltFile:false _Mutex:15ea832f-ab23-4aa8-a59f-127593f086b5 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:true _Version:9.0.0.5 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye Keylogger - Reborn v9, Version=9.0.0.5, Culture=neutral, PublicKeyToken=null
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
Processes:
resource yara_rule behavioral1/memory/2000-61-0x0000000000C90000-0x0000000000D20000-memory.dmp m00nd3v_logger behavioral1/memory/2020-66-0x0000000000400000-0x0000000000490000-memory.dmp m00nd3v_logger behavioral1/memory/2020-67-0x0000000000400000-0x0000000000490000-memory.dmp m00nd3v_logger behavioral1/memory/2020-68-0x0000000000400000-0x0000000000490000-memory.dmp m00nd3v_logger behavioral1/memory/2020-69-0x000000000048B24E-mapping.dmp m00nd3v_logger behavioral1/memory/2020-71-0x0000000000400000-0x0000000000490000-memory.dmp m00nd3v_logger behavioral1/memory/2020-73-0x0000000000400000-0x0000000000490000-memory.dmp m00nd3v_logger -
Drops startup file 1 IoCs
Processes:
14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vbc.url 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exedescription pid process target process PID 2000 set thread context of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exedescription pid process Token: SeDebugPrivilege 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exedescription pid process target process PID 2000 wrote to memory of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe PID 2000 wrote to memory of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe PID 2000 wrote to memory of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe PID 2000 wrote to memory of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe PID 2000 wrote to memory of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe PID 2000 wrote to memory of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe PID 2000 wrote to memory of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe PID 2000 wrote to memory of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe PID 2000 wrote to memory of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe PID 2000 wrote to memory of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe PID 2000 wrote to memory of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe PID 2000 wrote to memory of 2020 2000 14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe"C:\Users\Admin\AppData\Local\Temp\14e2d7ef064341a2b6db7b610fb77bba15379f953d782c767dad0e1b7cd26e4d.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵PID:2020
-