Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    184s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25/06/2022, 02:29 UTC

General

  • Target

    4d020195285828592414a4f32ee5d1967ecb7432e4a66e3baad19b3eec907190.exe

  • Size

    678KB

  • MD5

    80b608f8dc479742af88700cdf15e5f2

  • SHA1

    492c965587df9dbb10476507830be72d89971707

  • SHA256

    4d020195285828592414a4f32ee5d1967ecb7432e4a66e3baad19b3eec907190

  • SHA512

    8c6d0511b7b6e1ac186c49712733d7218d477c73315cd2c12bf7fefa6aebe6be62fadb56ae311542484203c129a75c58dc1ecc59e3e7750189a8e821a7e1bb76

Malware Config

Extracted

Family

hawkeye_reborn

Version

10.0.0.0

Credentials

  • Protocol:
    smtp
  • Host:
    mail.floordecor.in
  • Port:
    25
  • Username:
    sales2@floordecor.in
  • Password:
    Fantabulous0!
Mutex

db9aeb2f-51cd-4c51-810c-a0d53ca41f68

Attributes
  • fields

    map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:Fantabulous0! _EmailPort:25 _EmailSSL:false _EmailServer:mail.floordecor.in _EmailUsername:sales2@floordecor.in _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:5 _MeltFile:false _Mutex:db9aeb2f-51cd-4c51-810c-a0d53ca41f68 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:true _SystemInfo:false _Version:10.0.0.0 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]

  • name

    HawkEye RebornX, Version=10.0.0.0, Culture=neutral, PublicKeyToken=null

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 6 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d020195285828592414a4f32ee5d1967ecb7432e4a66e3baad19b3eec907190.exe
    "C:\Users\Admin\AppData\Local\Temp\4d020195285828592414a4f32ee5d1967ecb7432e4a66e3baad19b3eec907190.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:312
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp52FD.tmp"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4604
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp5715.tmp"
        3⤵
        • Accesses Microsoft Outlook accounts
        PID:4348

Network

  • flag-us
    DNS
    bot.whatismyipaddress.com
    RegSvcs.exe
    Remote address:
    8.8.8.8:53
    Request
    bot.whatismyipaddress.com
    IN A
    Response
  • 104.110.191.140:80
    46 B
    40 B
    1
    1
  • 104.110.191.140:80
    46 B
    40 B
    1
    1
  • 8.248.21.254:80
    322 B
    7
  • 8.248.21.254:80
    322 B
    7
  • 104.110.191.133:80
    46 B
    40 B
    1
    1
  • 13.69.239.72:443
    322 B
    7
  • 2.22.22.136:443
    tls
    92 B
    104 B
    2
    2
  • 8.248.21.254:80
    322 B
    7
  • 8.248.21.254:80
    322 B
    7
  • 8.248.21.254:80
    322 B
    7
  • 8.248.21.254:80
    260 B
    5
  • 8.253.146.248:80
    260 B
    5
  • 8.253.209.120:80
    260 B
    5
  • 8.8.8.8:53
    bot.whatismyipaddress.com
    dns
    RegSvcs.exe
    71 B
    130 B
    1
    1

    DNS Request

    bot.whatismyipaddress.com

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp52FD.tmp

    Filesize

    4KB

    MD5

    92b3d04dbcf7aa8eabb0096c55624068

    SHA1

    04a3b14a8f16bdd8a67f1b5d6be8c3db79c766c7

    SHA256

    84e388e2bbff6a229d99df8d7e0558e46e793106c2f3bb290c6acc06fe31fe9c

    SHA512

    fbd6a298b66e2117f68028cdf9fa1b3e441f87fa8a052ce1be628ae65116d5b2953cdc8117dce57e86475a75412b1a85f431eb0da6dd788ec5312d34ff71f9d1

  • memory/312-133-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/312-135-0x0000000074E00000-0x00000000753B1000-memory.dmp

    Filesize

    5.7MB

  • memory/312-136-0x0000000074E00000-0x00000000753B1000-memory.dmp

    Filesize

    5.7MB

  • memory/2356-131-0x0000000074E00000-0x00000000753B1000-memory.dmp

    Filesize

    5.7MB

  • memory/2356-134-0x0000000074E00000-0x00000000753B1000-memory.dmp

    Filesize

    5.7MB

  • memory/2356-130-0x0000000074E00000-0x00000000753B1000-memory.dmp

    Filesize

    5.7MB

  • memory/4348-144-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4348-146-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4348-147-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4604-140-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4604-141-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4604-138-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.