Analysis
-
max time kernel
83s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 20:21
Static task
static1
Behavioral task
behavioral1
Sample
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe
Resource
win10v2004-20220414-en
General
-
Target
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe
-
Size
964KB
-
MD5
a25d035c838157e70afadd3b1b140f5f
-
SHA1
e9844f448f692a19978fb62aed10f121a2ec4314
-
SHA256
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07
-
SHA512
f5c05e07939bd4bbc53a235db15813d98e77c402c9ec1e40f9a16977a777556b94b78f5f125d40129203cab1786d551acc3a4f50f2f449fdb28c6c9b8254966b
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\newesthkraw.exe m00nd3v_logger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\newesthkraw.exe m00nd3v_logger C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\newesthkraw.exe m00nd3v_logger -
Executes dropped EXE 1 IoCs
Processes:
newesthkraw.exepid process 1032 newesthkraw.exe -
Loads dropped DLL 1 IoCs
Processes:
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exepid process 644 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gemstar-TV Guide International Inc = "C:\\Users\\Admin\\AppData\\Roaming\\Gemstar-TV Guide International Inc\\Gemstar-TV Guide International Inc.exe" 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 checkip.dyndns.org 7 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exedescription pid process target process PID 1472 set thread context of 644 1472 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exepid process 644 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 644 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exedescription pid process Token: SeDebugPrivilege 644 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exepid process 644 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exedescription pid process target process PID 1472 wrote to memory of 644 1472 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe PID 1472 wrote to memory of 644 1472 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe PID 1472 wrote to memory of 644 1472 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe PID 1472 wrote to memory of 644 1472 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe PID 1472 wrote to memory of 644 1472 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe PID 1472 wrote to memory of 644 1472 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe PID 1472 wrote to memory of 644 1472 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe PID 1472 wrote to memory of 644 1472 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe PID 1472 wrote to memory of 644 1472 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe PID 644 wrote to memory of 1032 644 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe newesthkraw.exe PID 644 wrote to memory of 1032 644 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe newesthkraw.exe PID 644 wrote to memory of 1032 644 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe newesthkraw.exe PID 644 wrote to memory of 1032 644 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe newesthkraw.exe -
outlook_office_path 1 IoCs
Processes:
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
outlook_win_path 1 IoCs
Processes:
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe"C:\Users\Admin\AppData\Local\Temp\44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe"C:\Users\Admin\AppData\Local\Temp\44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe"2⤵
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:644 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\newesthkraw.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\newesthkraw.exe"3⤵
- Executes dropped EXE
PID:1032
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD5c22961455558772a3eb94b470560b9d5
SHA19ab4977126485322978f549a30a6c76e9ea2596b
SHA2563b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c
SHA512d0426a2f5bb4ca1461fab19a5b003e27e955b1f9824824cd581d1671ed525147bc262e45812aba827d5955c50b9c631e97bd88ecf669866dc34a529c9c9918e2
-
Filesize
552KB
MD5c22961455558772a3eb94b470560b9d5
SHA19ab4977126485322978f549a30a6c76e9ea2596b
SHA2563b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c
SHA512d0426a2f5bb4ca1461fab19a5b003e27e955b1f9824824cd581d1671ed525147bc262e45812aba827d5955c50b9c631e97bd88ecf669866dc34a529c9c9918e2
-
Filesize
552KB
MD5c22961455558772a3eb94b470560b9d5
SHA19ab4977126485322978f549a30a6c76e9ea2596b
SHA2563b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c
SHA512d0426a2f5bb4ca1461fab19a5b003e27e955b1f9824824cd581d1671ed525147bc262e45812aba827d5955c50b9c631e97bd88ecf669866dc34a529c9c9918e2