Analysis
-
max time kernel
126s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 16:39
Static task
static1
Behavioral task
behavioral1
Sample
3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe
Resource
win10v2004-20220414-en
General
-
Target
3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe
-
Size
692KB
-
MD5
0d975d18b48be7a18ac10f29a57cede7
-
SHA1
8c7106805127f6d7135dd5f80975578a82f46d55
-
SHA256
3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de
-
SHA512
485554946de310bac6a8c02d1e17eca404217048b9a11d6c34097e9e929d926c125ca2b1f9102ddd774a45fa284ed00978ea8b223152247f43626c8c6ddcbbc0
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
resource yara_rule behavioral2/memory/4744-132-0x0000000000400000-0x0000000000490000-memory.dmp m00nd3v_logger -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4876 set thread context of 4744 4876 3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe 83 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp dw20.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4876 3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe Token: SeRestorePrivilege 4632 dw20.exe Token: SeBackupPrivilege 4632 dw20.exe Token: SeBackupPrivilege 4632 dw20.exe Token: SeBackupPrivilege 4632 dw20.exe Token: SeBackupPrivilege 4632 dw20.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4876 wrote to memory of 4744 4876 3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe 83 PID 4876 wrote to memory of 4744 4876 3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe 83 PID 4876 wrote to memory of 4744 4876 3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe 83 PID 4876 wrote to memory of 4744 4876 3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe 83 PID 4876 wrote to memory of 4744 4876 3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe 83 PID 4876 wrote to memory of 4744 4876 3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe 83 PID 4876 wrote to memory of 4744 4876 3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe 83 PID 4876 wrote to memory of 4744 4876 3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe 83 PID 4744 wrote to memory of 4632 4744 regasm.exe 84 PID 4744 wrote to memory of 4632 4744 regasm.exe 84 PID 4744 wrote to memory of 4632 4744 regasm.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe"C:\Users\Admin\AppData\Local\Temp\3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\Microsoft.net\Framework\v2.0.50727\regasm.exe"C:\Users\Admin\AppData\Local\Temp\3b5f733e9294d06f99fa7bd3992ca3662a174f78b476b8469443b1962cc1f1de.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8883⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-