Analysis

  • max time kernel
    150s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    19-06-2022 21:56

General

  • Target

    344cd873d0a5831c2c999f3d578f392167b6cae6e5c589c19692fa9118074cf8.exe

  • Size

    1.8MB

  • MD5

    3c71365a309815edb3e4f68e31d9ad65

  • SHA1

    0dcedc057971c7d298bf14e7eec3bfb52009ed7c

  • SHA256

    344cd873d0a5831c2c999f3d578f392167b6cae6e5c589c19692fa9118074cf8

  • SHA512

    02c17b67facc4ab314c0d43072bdc178f747ba7b4441f8bebe802162f545935504bd3ff8dec7bf57e7f76ffdb8178278c5a43ac6304501331c81a2ea695b4591

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger Payload 7 IoCs

    Detects M00nD3v Logger payload in memory.

  • NirSoft WebBrowserPassView 5 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 5 IoCs
  • Drops startup file 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\344cd873d0a5831c2c999f3d578f392167b6cae6e5c589c19692fa9118074cf8.exe
    "C:\Users\Admin\AppData\Local\Temp\344cd873d0a5831c2c999f3d578f392167b6cae6e5c589c19692fa9118074cf8.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
        PID:1896
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1268
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpF613.tmp"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:672

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Defense Evasion

    Scripting

    1
    T1064

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpF613.tmp
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/672-73-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB

    • memory/672-88-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB

    • memory/672-87-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB

    • memory/672-86-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB

    • memory/672-83-0x000000000044472E-mapping.dmp
    • memory/672-82-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB

    • memory/672-80-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB

    • memory/672-78-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB

    • memory/672-76-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB

    • memory/672-74-0x0000000000400000-0x000000000045B000-memory.dmp
      Filesize

      364KB

    • memory/1268-60-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/1268-65-0x000000000048B1CE-mapping.dmp
    • memory/1268-71-0x0000000074500000-0x0000000074AAB000-memory.dmp
      Filesize

      5.7MB

    • memory/1268-72-0x0000000074500000-0x0000000074AAB000-memory.dmp
      Filesize

      5.7MB

    • memory/1268-67-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/1268-64-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/1268-63-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/1268-69-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/1268-62-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/1268-59-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/2036-54-0x0000000000350000-0x000000000050C000-memory.dmp
      Filesize

      1.7MB

    • memory/2036-58-0x0000000004780000-0x0000000004810000-memory.dmp
      Filesize

      576KB

    • memory/2036-57-0x0000000075C01000-0x0000000075C03000-memory.dmp
      Filesize

      8KB

    • memory/2036-56-0x0000000000290000-0x000000000029C000-memory.dmp
      Filesize

      48KB

    • memory/2036-55-0x0000000000910000-0x00000000009AA000-memory.dmp
      Filesize

      616KB