Analysis
-
max time kernel
167s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-06-2022 07:43
Static task
static1
Behavioral task
behavioral1
Sample
3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe
Resource
win10v2004-20220414-en
General
-
Target
3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe
-
Size
772KB
-
MD5
ca9c2913e35c74a38b7f8ece1cb17785
-
SHA1
15e2e333efb22376e11e7983aa85b70a1875eb19
-
SHA256
3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174
-
SHA512
dd675a29e4436e294824aba0384985c874269e93a25ee0836edc5e17d294d48a47b81e9a0627a93d863f556aa627c2aa2672e7aeba6db5683c0df361005f224f
Malware Config
Extracted
hawkeye_reborn
9.0.0.5
Protocol: smtp- Host:
mail.123tracein.com - Port:
587 - Username:
[email protected] - Password:
Vvt.5rffGwtH
50d9bce9-6693-4df8-986d-11678ab9d9c5
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:Vvt.5rffGwtH _EmailPort:587 _EmailSSL:true _EmailServer:mail.123tracein.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:30 _MeltFile:false _Mutex:50d9bce9-6693-4df8-986d-11678ab9d9c5 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:true _Version:9.0.0.5 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye Keylogger - Reborn v9, Version=9.0.0.5, Culture=neutral, PublicKeyToken=null
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
Processes:
resource yara_rule behavioral2/memory/3984-140-0x0000000000400000-0x0000000000490000-memory.dmp m00nd3v_logger -
Executes dropped EXE 2 IoCs
Processes:
app.exeapp.exepid process 4844 app.exe 3984 app.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe -
Drops startup file 1 IoCs
Processes:
app.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.lnk app.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 41 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
app.exedescription pid process target process PID 4844 set thread context of 3984 4844 app.exe app.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exeapp.exeapp.exedescription pid process Token: SeDebugPrivilege 4328 3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe Token: 33 4328 3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe Token: SeIncBasePriorityPrivilege 4328 3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe Token: SeDebugPrivilege 4844 app.exe Token: 33 4844 app.exe Token: SeIncBasePriorityPrivilege 4844 app.exe Token: SeDebugPrivilege 3984 app.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.execmd.exeapp.exedescription pid process target process PID 4328 wrote to memory of 4600 4328 3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe cmd.exe PID 4328 wrote to memory of 4600 4328 3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe cmd.exe PID 4328 wrote to memory of 4600 4328 3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe cmd.exe PID 4328 wrote to memory of 176 4328 3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe cmd.exe PID 4328 wrote to memory of 176 4328 3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe cmd.exe PID 4328 wrote to memory of 176 4328 3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe cmd.exe PID 176 wrote to memory of 4844 176 cmd.exe app.exe PID 176 wrote to memory of 4844 176 cmd.exe app.exe PID 176 wrote to memory of 4844 176 cmd.exe app.exe PID 4844 wrote to memory of 3984 4844 app.exe app.exe PID 4844 wrote to memory of 3984 4844 app.exe app.exe PID 4844 wrote to memory of 3984 4844 app.exe app.exe PID 4844 wrote to memory of 3984 4844 app.exe app.exe PID 4844 wrote to memory of 3984 4844 app.exe app.exe PID 4844 wrote to memory of 3984 4844 app.exe app.exe PID 4844 wrote to memory of 3984 4844 app.exe app.exe PID 4844 wrote to memory of 3984 4844 app.exe app.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe"C:\Users\Admin\AppData\Local\Temp\3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\3237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\app.exe"2⤵PID:4600
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\app.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:176 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\app.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\app.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\app.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\app.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706B
MD50110f3d722cddd9753644c78a308ff57
SHA1c461bb3812ae8a3c77d0ec99850b3a88eda2ccc7
SHA25603c3a90b4c2615ddd7bc4b663ba3cce4969223c0a21c53624c6f792ffde91de4
SHA5128a581416a1a9e355e6cda1d4f2a93df807421ec2706c717c5d5d2acd004af2c14ee77d94c48e6643320dd2cd2e1072b9cfd8ecf37c0e8fb38df7d9f0c40cdf63
-
Filesize
772KB
MD5ca9c2913e35c74a38b7f8ece1cb17785
SHA115e2e333efb22376e11e7983aa85b70a1875eb19
SHA2563237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174
SHA512dd675a29e4436e294824aba0384985c874269e93a25ee0836edc5e17d294d48a47b81e9a0627a93d863f556aa627c2aa2672e7aeba6db5683c0df361005f224f
-
Filesize
772KB
MD5ca9c2913e35c74a38b7f8ece1cb17785
SHA115e2e333efb22376e11e7983aa85b70a1875eb19
SHA2563237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174
SHA512dd675a29e4436e294824aba0384985c874269e93a25ee0836edc5e17d294d48a47b81e9a0627a93d863f556aa627c2aa2672e7aeba6db5683c0df361005f224f
-
Filesize
772KB
MD5ca9c2913e35c74a38b7f8ece1cb17785
SHA115e2e333efb22376e11e7983aa85b70a1875eb19
SHA2563237150c0e5eafa032604dc03b7517e5ebb333287bfd1c4e9c507edaad37f174
SHA512dd675a29e4436e294824aba0384985c874269e93a25ee0836edc5e17d294d48a47b81e9a0627a93d863f556aa627c2aa2672e7aeba6db5683c0df361005f224f