Analysis

  • max time kernel
    151s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    22-06-2022 08:44

General

  • Target

    2e6b3018540b49803e4620aad0605775a5ffc765829418a12c6ffa7214d9d578.exe

  • Size

    1.0MB

  • MD5

    19e9776e8c45eab003baa27408b46c0c

  • SHA1

    1b785eb0188d4be4ad90d9ddcd7fc309f9d841da

  • SHA256

    2e6b3018540b49803e4620aad0605775a5ffc765829418a12c6ffa7214d9d578

  • SHA512

    b9c002b77d3e9d8d1cef4efb69d3594bf8089a315602a626f482aa7512ffbb35301004e43d2777fc6b631c53158fc4fa9c17126e5300a17c64a8845f70b96667

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 5 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 5 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 10 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e6b3018540b49803e4620aad0605775a5ffc765829418a12c6ffa7214d9d578.exe
    "C:\Users\Admin\AppData\Local\Temp\2e6b3018540b49803e4620aad0605775a5ffc765829418a12c6ffa7214d9d578.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe" /f
        3⤵
          PID:1256
      • C:\Users\Admin\AppData\Local\Temp\2e6b3018540b49803e4620aad0605775a5ffc765829418a12c6ffa7214d9d578.exe
        "C:\Users\Admin\AppData\Local\Temp\2e6b3018540b49803e4620aad0605775a5ffc765829418a12c6ffa7214d9d578.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\Mail.txt"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:1996
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\BFile_1.pdf"
          3⤵
          • Suspicious use of SetWindowsHookEx
          PID:1524
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\Web.txt"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1564
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:320
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 300
          3⤵
          • Delays execution with timeout.exe
          PID:1000

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.bat
      Filesize

      204B

      MD5

      bfcbf382f036462e63f307ca4ae280c7

      SHA1

      ffe98d15fa5ea205220d6bc105e317253a6ea003

      SHA256

      2c3dd84c3ce3e529117e611d8caf4fc7f5a902840350f4ca524c251a2152c727

      SHA512

      1b912652cc989541b396df5fd6bf207a4cf4ed891dc6e3223b8d0497c19a2589cb644c4c96ca01d882a7643f240c566966d84e46d77e9ad33e05214f8f553d16

    • C:\Users\Admin\AppData\Local\Temp\Web.txt
      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/320-70-0x0000000000000000-mapping.dmp
    • memory/848-57-0x0000000000000000-mapping.dmp
    • memory/1000-74-0x0000000000000000-mapping.dmp
    • memory/1256-58-0x0000000000000000-mapping.dmp
    • memory/1524-78-0x0000000000000000-mapping.dmp
    • memory/1564-109-0x0000000000400000-0x000000000045A000-memory.dmp
      Filesize

      360KB

    • memory/1564-112-0x0000000000400000-0x000000000045A000-memory.dmp
      Filesize

      360KB

    • memory/1564-97-0x0000000000400000-0x000000000045A000-memory.dmp
      Filesize

      360KB

    • memory/1564-99-0x0000000000400000-0x000000000045A000-memory.dmp
      Filesize

      360KB

    • memory/1564-101-0x0000000000400000-0x000000000045A000-memory.dmp
      Filesize

      360KB

    • memory/1564-103-0x0000000000400000-0x000000000045A000-memory.dmp
      Filesize

      360KB

    • memory/1564-106-0x00000000004439CC-mapping.dmp
    • memory/1564-105-0x0000000000400000-0x000000000045A000-memory.dmp
      Filesize

      360KB

    • memory/1564-96-0x0000000000400000-0x000000000045A000-memory.dmp
      Filesize

      360KB

    • memory/1564-110-0x0000000000400000-0x000000000045A000-memory.dmp
      Filesize

      360KB

    • memory/1580-68-0x0000000000400000-0x000000000047C000-memory.dmp
      Filesize

      496KB

    • memory/1580-77-0x0000000075010000-0x00000000755BB000-memory.dmp
      Filesize

      5.7MB

    • memory/1580-113-0x00000000002B5000-0x00000000002C6000-memory.dmp
      Filesize

      68KB

    • memory/1580-75-0x0000000075010000-0x00000000755BB000-memory.dmp
      Filesize

      5.7MB

    • memory/1580-59-0x0000000000400000-0x000000000047C000-memory.dmp
      Filesize

      496KB

    • memory/1580-60-0x0000000000400000-0x000000000047C000-memory.dmp
      Filesize

      496KB

    • memory/1580-64-0x0000000000400000-0x000000000047C000-memory.dmp
      Filesize

      496KB

    • memory/1580-62-0x0000000000400000-0x000000000047C000-memory.dmp
      Filesize

      496KB

    • memory/1580-71-0x0000000000400000-0x000000000047C000-memory.dmp
      Filesize

      496KB

    • memory/1580-65-0x0000000000400000-0x000000000047C000-memory.dmp
      Filesize

      496KB

    • memory/1580-66-0x000000000047517E-mapping.dmp
    • memory/1580-93-0x00000000002B5000-0x00000000002C6000-memory.dmp
      Filesize

      68KB

    • memory/1996-80-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1996-95-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1996-94-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1996-92-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1996-81-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1996-83-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1996-85-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1996-86-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1996-88-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/1996-89-0x0000000000411790-mapping.dmp
    • memory/2036-54-0x0000000076461000-0x0000000076463000-memory.dmp
      Filesize

      8KB

    • memory/2036-76-0x0000000075010000-0x00000000755BB000-memory.dmp
      Filesize

      5.7MB

    • memory/2036-56-0x0000000075010000-0x00000000755BB000-memory.dmp
      Filesize

      5.7MB

    • memory/2036-55-0x0000000075010000-0x00000000755BB000-memory.dmp
      Filesize

      5.7MB