Analysis

  • max time kernel
    149s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 03:09

General

  • Target

    567963ab67118eba223ec95f6a9106681f4fed348c655139208c48e969bd568a.exe

  • Size

    1.1MB

  • MD5

    bc50a53d9a77b3eb7df4a2f1ce3b8acd

  • SHA1

    8f482f408a9d4ea1bb52c18210cc3213e56af21f

  • SHA256

    567963ab67118eba223ec95f6a9106681f4fed348c655139208c48e969bd568a

  • SHA512

    59388652a5546680fb0c9f3ca41254fb1d71aefbbed1548114077eee797ace783321316965120216108f80d0f07fd536bf55af4f9f62c0a639460ee3d2c0cbe1

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger payload 5 IoCs

    Detects M00nD3v Logger payload in memory.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 6 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\567963ab67118eba223ec95f6a9106681f4fed348c655139208c48e969bd568a.exe
    "C:\Users\Admin\AppData\Local\Temp\567963ab67118eba223ec95f6a9106681f4fed348c655139208c48e969bd568a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Roaming\BuildAT.exe
      "C:\Users\Admin\AppData\Roaming\BuildAT.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:932
    • C:\Users\Admin\AppData\Local\Temp\567963ab67118eba223ec95f6a9106681f4fed348c655139208c48e969bd568a.exe
      "C:\Users\Admin\AppData\Local\Temp\567963ab67118eba223ec95f6a9106681f4fed348c655139208c48e969bd568a.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1700
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C TASKKILL /F /IM wscript.exe
        3⤵
          PID:1912
          • C:\Windows\SysWOW64\taskkill.exe
            TASKKILL /F /IM wscript.exe
            4⤵
            • Kills process with taskkill
            PID:1376
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C TASKKILL /F /IM cmd.exe
          3⤵
            PID:1984
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpF20D.tmp"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:1664

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scripting

      1
      T1064

      Defense Evasion

      Scripting

      1
      T1064

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmpF20D.tmp
        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Roaming\BuildAT.exe
        Filesize

        203KB

        MD5

        95fd03119642748d5fc74f0b2846c956

        SHA1

        e9053f6db4e0886b2c5cc353c135e441c248245e

        SHA256

        07aad7d157bc3cfe3ca4fa90816ba0689b365d1d6dff65df2a20dd5ea8b7fe36

        SHA512

        7af3a975e9e6a3dcadf050684236a5f9b17f6ad184d30927d1517cc4caeb074acb41821b98ff570e2c7a5d81b85b24c58335009cbd5d218029efc1f1d7e88e2d

      • C:\Users\Admin\AppData\Roaming\BuildAT.exe
        Filesize

        203KB

        MD5

        95fd03119642748d5fc74f0b2846c956

        SHA1

        e9053f6db4e0886b2c5cc353c135e441c248245e

        SHA256

        07aad7d157bc3cfe3ca4fa90816ba0689b365d1d6dff65df2a20dd5ea8b7fe36

        SHA512

        7af3a975e9e6a3dcadf050684236a5f9b17f6ad184d30927d1517cc4caeb074acb41821b98ff570e2c7a5d81b85b24c58335009cbd5d218029efc1f1d7e88e2d

      • \Users\Admin\AppData\Roaming\BuildAT.exe
        Filesize

        203KB

        MD5

        95fd03119642748d5fc74f0b2846c956

        SHA1

        e9053f6db4e0886b2c5cc353c135e441c248245e

        SHA256

        07aad7d157bc3cfe3ca4fa90816ba0689b365d1d6dff65df2a20dd5ea8b7fe36

        SHA512

        7af3a975e9e6a3dcadf050684236a5f9b17f6ad184d30927d1517cc4caeb074acb41821b98ff570e2c7a5d81b85b24c58335009cbd5d218029efc1f1d7e88e2d

      • memory/932-58-0x0000000000000000-mapping.dmp
      • memory/932-61-0x0000000000CD0000-0x0000000000D0A000-memory.dmp
        Filesize

        232KB

      • memory/1108-54-0x0000000001350000-0x000000000146C000-memory.dmp
        Filesize

        1.1MB

      • memory/1108-55-0x0000000000460000-0x0000000000482000-memory.dmp
        Filesize

        136KB

      • memory/1108-56-0x00000000762A1000-0x00000000762A3000-memory.dmp
        Filesize

        8KB

      • memory/1664-87-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/1664-88-0x000000000044472E-mapping.dmp
      • memory/1664-94-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/1664-93-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/1664-91-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/1664-85-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/1664-83-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/1664-78-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/1664-79-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/1664-81-0x0000000000400000-0x000000000045B000-memory.dmp
        Filesize

        364KB

      • memory/1700-65-0x0000000000080000-0x0000000000110000-memory.dmp
        Filesize

        576KB

      • memory/1700-66-0x0000000000080000-0x0000000000110000-memory.dmp
        Filesize

        576KB

      • memory/1700-74-0x0000000000F00000-0x0000000000F76000-memory.dmp
        Filesize

        472KB

      • memory/1700-92-0x00000000005F5000-0x0000000000606000-memory.dmp
        Filesize

        68KB

      • memory/1700-73-0x0000000000080000-0x0000000000110000-memory.dmp
        Filesize

        576KB

      • memory/1700-70-0x0000000000080000-0x0000000000110000-memory.dmp
        Filesize

        576KB

      • memory/1700-64-0x000000000048B1CE-mapping.dmp
      • memory/1912-76-0x0000000000000000-mapping.dmp
      • memory/1984-77-0x0000000000000000-mapping.dmp