Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    205s
  • max time network
    235s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/07/2022, 22:22 UTC

General

  • Target

    610cec0b003700eb425475798599e5bde41b659df6c9e5e9692054b26597d848.exe

  • Size

    1.0MB

  • MD5

    d9723268c4f4b9e408648b8d8a0c9174

  • SHA1

    e4e7aabd42557a7b8bf5ce83a9535c8f841792a6

  • SHA256

    610cec0b003700eb425475798599e5bde41b659df6c9e5e9692054b26597d848

  • SHA512

    0be9e3d2995c6bede1c47b1c9d81126b0fb7a2f702a333c7286dde6ae37bf04e31a09ade0d90270399daeab3d0c8cd9b7e60b7178360751d7c7a01965b52eba5

Malware Config

Extracted

Family

hawkeye_reborn

Version

9.0.0.5

Credentials

  • Protocol:
    smtp
  • Host:
    mail.privateemail.com
  • Port:
    587
  • Username:
    obi@israelimonks.us
  • Password:
    elvisgbp43
Mutex

bf933fbb-2838-4c69-a19a-8e8c7807bd7f

Attributes
  • fields

    map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:elvisgbp43 _EmailPort:587 _EmailSSL:true _EmailServer:mail.privateemail.com _EmailUsername:obi@israelimonks.us _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:bf933fbb-2838-4c69-a19a-8e8c7807bd7f _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:true _Version:9.0.0.5 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]

  • name

    HawkEye Keylogger - Reborn v9, Version=9.0.0.5, Culture=neutral, PublicKeyToken=null

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\610cec0b003700eb425475798599e5bde41b659df6c9e5e9692054b26597d848.exe
    "C:\Users\Admin\AppData\Local\Temp\610cec0b003700eb425475798599e5bde41b659df6c9e5e9692054b26597d848.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
      2⤵
        PID:3164

    Network

    • flag-us
      DNS
      bot.whatismyipaddress.com
      RegAsm.exe
      Remote address:
      8.8.8.8:53
      Request
      bot.whatismyipaddress.com
      IN A
      Response
    • 93.184.221.240:80
      322 B
      7
    • 93.184.221.240:80
      322 B
      7
    • 40.79.150.120:443
      322 B
      7
    • 93.184.221.240:80
      322 B
      7
    • 2.16.119.157:443
      tls
      92 B
      111 B
      2
      2
    • 2.16.119.157:443
      tls
      92 B
      111 B
      2
      2
    • 2.22.147.17:80
      46 B
      40 B
      1
      1
    • 8.8.8.8:53
      bot.whatismyipaddress.com
      dns
      RegAsm.exe
      71 B
      130 B
      1
      1

      DNS Request

      bot.whatismyipaddress.com

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1996-130-0x0000000074FF0000-0x00000000755A1000-memory.dmp

      Filesize

      5.7MB

    • memory/1996-131-0x0000000074FF0000-0x00000000755A1000-memory.dmp

      Filesize

      5.7MB

    • memory/1996-135-0x0000000074FF0000-0x00000000755A1000-memory.dmp

      Filesize

      5.7MB

    • memory/3164-133-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/3164-134-0x0000000074FF0000-0x00000000755A1000-memory.dmp

      Filesize

      5.7MB

    • memory/3164-136-0x0000000074FF0000-0x00000000755A1000-memory.dmp

      Filesize

      5.7MB

    • memory/3164-137-0x0000000074FF0000-0x00000000755A1000-memory.dmp

      Filesize

      5.7MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.