Analysis
-
max time kernel
153s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 20:13
Static task
static1
Behavioral task
behavioral1
Sample
5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe
Resource
win10v2004-20220721-en
General
-
Target
5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe
-
Size
1.1MB
-
MD5
17317e485baaee24963ba10b4fbb02de
-
SHA1
b738ea496f24c0bf920dcd662047880fb880630f
-
SHA256
5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330
-
SHA512
6b245005c6dfbfaa85f349041bdc42f6d77f5bc0b6c8d81134b3d8049a029aa4b933eb7eb8ff3d0cb015440c1a0c0682e7bd53644f0952ddfc2090f532d99065
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Extracted
netwire
wealthyman.brasilia.me:39560
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
WEALTH
-
keylogger_dir
%AppData%\music\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
NetWire RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1644-63-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
resource yara_rule behavioral1/files/0x0009000000012719-58.dat m00nd3v_logger behavioral1/files/0x0009000000012719-60.dat m00nd3v_logger behavioral1/files/0x0009000000012719-61.dat m00nd3v_logger -
NirSoft WebBrowserPassView 5 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/1540-82-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView behavioral1/memory/1540-83-0x000000000044472E-mapping.dmp WebBrowserPassView behavioral1/memory/1540-86-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView behavioral1/memory/1540-87-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView behavioral1/memory/1540-88-0x0000000000400000-0x000000000045B000-memory.dmp WebBrowserPassView -
Nirsoft 5 IoCs
resource yara_rule behavioral1/memory/1540-82-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral1/memory/1540-83-0x000000000044472E-mapping.dmp Nirsoft behavioral1/memory/1540-86-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral1/memory/1540-87-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft behavioral1/memory/1540-88-0x0000000000400000-0x000000000045B000-memory.dmp Nirsoft -
Executes dropped EXE 1 IoCs
pid Process 2036 HKSERVER.exe -
Loads dropped DLL 1 IoCs
pid Process 1644 5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2036 set thread context of 1540 2036 HKSERVER.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1540 vbc.exe 1540 vbc.exe 1540 vbc.exe 1540 vbc.exe 1540 vbc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1644 5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe 1644 5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1644 5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe 1644 5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1644 5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1644 5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2036 1644 5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe 26 PID 1644 wrote to memory of 2036 1644 5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe 26 PID 1644 wrote to memory of 2036 1644 5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe 26 PID 1644 wrote to memory of 2036 1644 5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe 26 PID 2036 wrote to memory of 1540 2036 HKSERVER.exe 28 PID 2036 wrote to memory of 1540 2036 HKSERVER.exe 28 PID 2036 wrote to memory of 1540 2036 HKSERVER.exe 28 PID 2036 wrote to memory of 1540 2036 HKSERVER.exe 28 PID 2036 wrote to memory of 1540 2036 HKSERVER.exe 28 PID 2036 wrote to memory of 1540 2036 HKSERVER.exe 28 PID 2036 wrote to memory of 1540 2036 HKSERVER.exe 28 PID 2036 wrote to memory of 1540 2036 HKSERVER.exe 28 PID 2036 wrote to memory of 1540 2036 HKSERVER.exe 28 PID 2036 wrote to memory of 1540 2036 HKSERVER.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe"C:\Users\Admin\AppData\Local\Temp\5420a4b5bde081383f5cd023e5e270fa940f066087b83ada3e290550fd27f330.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\HKSERVER.exe"C:\Users\Admin\AppData\Local\Temp\HKSERVER.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpC41B.tmp"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD579cb789655a53a9844ed4bcc859e7931
SHA17792b6ab97d927dd6ef1a254dc0dc72b363f99a5
SHA256d93d3b7171120b37fc1e1ce495e6b7000befdd846bd4d27d7aa43d1289405a7f
SHA512c8b0d46c40cb541e87490a48d61044f76190fa5b31db172d8bc1d788050e5b287b824ddcb4f2afb543ffc900947a0a0af9d85579d134d2c584a73a8d97ddd173
-
Filesize
552KB
MD579cb789655a53a9844ed4bcc859e7931
SHA17792b6ab97d927dd6ef1a254dc0dc72b363f99a5
SHA256d93d3b7171120b37fc1e1ce495e6b7000befdd846bd4d27d7aa43d1289405a7f
SHA512c8b0d46c40cb541e87490a48d61044f76190fa5b31db172d8bc1d788050e5b287b824ddcb4f2afb543ffc900947a0a0af9d85579d134d2c584a73a8d97ddd173
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
552KB
MD579cb789655a53a9844ed4bcc859e7931
SHA17792b6ab97d927dd6ef1a254dc0dc72b363f99a5
SHA256d93d3b7171120b37fc1e1ce495e6b7000befdd846bd4d27d7aa43d1289405a7f
SHA512c8b0d46c40cb541e87490a48d61044f76190fa5b31db172d8bc1d788050e5b287b824ddcb4f2afb543ffc900947a0a0af9d85579d134d2c584a73a8d97ddd173