Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 20:21
Static task
static1
Behavioral task
behavioral1
Sample
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe
Resource
win10v2004-20220414-en
General
-
Target
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe
-
Size
964KB
-
MD5
a25d035c838157e70afadd3b1b140f5f
-
SHA1
e9844f448f692a19978fb62aed10f121a2ec4314
-
SHA256
44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07
-
SHA512
f5c05e07939bd4bbc53a235db15813d98e77c402c9ec1e40f9a16977a777556b94b78f5f125d40129203cab1786d551acc3a4f50f2f449fdb28c6c9b8254966b
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
resource yara_rule behavioral2/files/0x00060000000231ea-138.dat m00nd3v_logger behavioral2/files/0x00060000000231ea-139.dat m00nd3v_logger -
Executes dropped EXE 1 IoCs
pid Process 4584 newesthkraw.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gemstar-TV Guide International Inc = "C:\\Users\\Admin\\AppData\\Roaming\\Gemstar-TV Guide International Inc\\Gemstar-TV Guide International Inc.exe" 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 checkip.dyndns.org 31 bot.whatismyipaddress.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2764 set thread context of 3804 2764 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3804 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 3804 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3804 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3804 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2764 wrote to memory of 3804 2764 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 81 PID 2764 wrote to memory of 3804 2764 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 81 PID 2764 wrote to memory of 3804 2764 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 81 PID 2764 wrote to memory of 3804 2764 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 81 PID 2764 wrote to memory of 3804 2764 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 81 PID 2764 wrote to memory of 3804 2764 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 81 PID 2764 wrote to memory of 3804 2764 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 81 PID 2764 wrote to memory of 3804 2764 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 81 PID 3804 wrote to memory of 4584 3804 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 83 PID 3804 wrote to memory of 4584 3804 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 83 PID 3804 wrote to memory of 4584 3804 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe 83 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe"C:\Users\Admin\AppData\Local\Temp\44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe"C:\Users\Admin\AppData\Local\Temp\44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:3804 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\newesthkraw.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\newesthkraw.exe"3⤵
- Executes dropped EXE
PID:4584
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\44308596213d4042ff1637fbeeca700cae932e8fb85c04da1cd483b2badbcd07.exe.log
Filesize116B
MD5fbcc48ddf361df41da6b0400718841f8
SHA1b6d3641dc3c8186662f3906a350e355f47e373e3
SHA256ecb300191d0e3420d114338ed6850afa649b270f75c181ffe86b435420100870
SHA5121d9d8e3335423152e7b19bc3b0ac8f04d318c342cfeb1567b9b82f0dde0e3d3f57c3fb7c312fbca7d9f46ba2383f32a2abc90df9a924f27da43f854bd490e578
-
Filesize
552KB
MD5c22961455558772a3eb94b470560b9d5
SHA19ab4977126485322978f549a30a6c76e9ea2596b
SHA2563b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c
SHA512d0426a2f5bb4ca1461fab19a5b003e27e955b1f9824824cd581d1671ed525147bc262e45812aba827d5955c50b9c631e97bd88ecf669866dc34a529c9c9918e2
-
Filesize
552KB
MD5c22961455558772a3eb94b470560b9d5
SHA19ab4977126485322978f549a30a6c76e9ea2596b
SHA2563b2bc76df7efa683c4566cc2d86b7b3e094b953eccb6aee14229185c7ee58d0c
SHA512d0426a2f5bb4ca1461fab19a5b003e27e955b1f9824824cd581d1671ed525147bc262e45812aba827d5955c50b9c631e97bd88ecf669866dc34a529c9c9918e2