Analysis

  • max time kernel
    150s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    31-07-2022 17:49

General

  • Target

    5f3cc5d66dba68642ea558418b22bc59ab165263249553ce24ba10af25702396.exe

  • Size

    630KB

  • MD5

    0025306c92ef036623fdd9c8680eb7f6

  • SHA1

    5de4e2d583001cda30b555754321b58c10ed1678

  • SHA256

    5f3cc5d66dba68642ea558418b22bc59ab165263249553ce24ba10af25702396

  • SHA512

    703739ae57893b286ef414f039118cf4995219a6ec7dd0768b6d7696cacdc05161ec9438a18aeaefc54b084ec4de3b6b2d7e5602a770f48d06ce40766fcc8691

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger payload 9 IoCs

    Detects M00nD3v Logger payload in memory.

  • NirSoft MailPassView 7 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 8 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 15 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f3cc5d66dba68642ea558418b22bc59ab165263249553ce24ba10af25702396.exe
    "C:\Users\Admin\AppData\Local\Temp\5f3cc5d66dba68642ea558418b22bc59ab165263249553ce24ba10af25702396.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe"
      2⤵
      • NTFS ADS
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderN\name.exe.lnk" /f
        3⤵
          PID:1720
      • C:\Users\Admin\AppData\Roaming\tmp.exe
        "C:\Users\Admin\AppData\Roaming\tmp.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1604
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp5523.tmp"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1576
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpFC2C.tmp"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:1564
      • C:\Users\Admin\AppData\Local\Temp\5f3cc5d66dba68642ea558418b22bc59ab165263249553ce24ba10af25702396.exe
        "C:\Users\Admin\AppData\Local\Temp\5f3cc5d66dba68642ea558418b22bc59ab165263249553ce24ba10af25702396.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp5533.tmp"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1696
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmpFC4B.tmp"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:1492
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Roaming\FolderN\name.exe.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1880
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 300
          3⤵
          • Delays execution with timeout.exe
          PID:1096

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\9f07e4fe-50f2-34d3-7297-7d84a43dc32b

      Filesize

      152B

      MD5

      91a847ef029338afdf01e295287976c0

      SHA1

      3636fc2936fa605868808ce097056eba91db09e8

      SHA256

      8046c4f36dbf499c88182e63b79c2132d759302d2bf4da4feb88701ce13b3204

      SHA512

      b2a10e1d6687c46e3c32de27d095b0878550a7c12e47483eeff141de1917d60f3c4829f1e3645db695448625e416515a2b0ef501438840e89ce569c8018506a9

    • C:\Users\Admin\AppData\Local\Temp\tmp5523.tmp

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Local\Temp\tmp5533.tmp

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Roaming\FolderN\name.exe

      Filesize

      630KB

      MD5

      0025306c92ef036623fdd9c8680eb7f6

      SHA1

      5de4e2d583001cda30b555754321b58c10ed1678

      SHA256

      5f3cc5d66dba68642ea558418b22bc59ab165263249553ce24ba10af25702396

      SHA512

      703739ae57893b286ef414f039118cf4995219a6ec7dd0768b6d7696cacdc05161ec9438a18aeaefc54b084ec4de3b6b2d7e5602a770f48d06ce40766fcc8691

    • C:\Users\Admin\AppData\Roaming\FolderN\name.exe.bat

      Filesize

      189B

      MD5

      dca86f6bec779bba1b58d992319e88db

      SHA1

      844e656d3603d15ae56f36298f8031ad52935829

      SHA256

      413b4ee68f5400fcd30ae5df957d723989b400637dbc7f5d158fa050bdc20743

      SHA512

      4b9d532a777921543b3243020ea4b655a8b956c400b237ce714b5bd8e9a3ad7fdbcb11410e84e2e0ecc45e87dcd107385a487f5bb5b359aabd1322314ef2d24c

    • C:\Users\Admin\AppData\Roaming\tmp.exe

      Filesize

      552KB

      MD5

      303b744ecc9e04220c120c94d09255b2

      SHA1

      935d2def9b2e6a12621c66a0f490da4a57f3152f

      SHA256

      053ec3c54bdbac87c67d027024b51bb5cb5fa54c2b2b5edbbd9984be073dde3a

      SHA512

      023e85be566aa25342c1cd5132641dbe81b4c83f06652fff4e28bf39c4f42deda180e469ce555e402be57b318b98a1bf305b01a6d85ae529d6946fcb02fd21e9

    • C:\Users\Admin\AppData\Roaming\tmp.exe

      Filesize

      552KB

      MD5

      303b744ecc9e04220c120c94d09255b2

      SHA1

      935d2def9b2e6a12621c66a0f490da4a57f3152f

      SHA256

      053ec3c54bdbac87c67d027024b51bb5cb5fa54c2b2b5edbbd9984be073dde3a

      SHA512

      023e85be566aa25342c1cd5132641dbe81b4c83f06652fff4e28bf39c4f42deda180e469ce555e402be57b318b98a1bf305b01a6d85ae529d6946fcb02fd21e9

    • \Users\Admin\AppData\Roaming\tmp.exe

      Filesize

      552KB

      MD5

      303b744ecc9e04220c120c94d09255b2

      SHA1

      935d2def9b2e6a12621c66a0f490da4a57f3152f

      SHA256

      053ec3c54bdbac87c67d027024b51bb5cb5fa54c2b2b5edbbd9984be073dde3a

      SHA512

      023e85be566aa25342c1cd5132641dbe81b4c83f06652fff4e28bf39c4f42deda180e469ce555e402be57b318b98a1bf305b01a6d85ae529d6946fcb02fd21e9

    • memory/1492-147-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1548-80-0x0000000074C20000-0x00000000751CB000-memory.dmp

      Filesize

      5.7MB

    • memory/1548-68-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1548-69-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1548-72-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1548-74-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1548-118-0x0000000074C20000-0x00000000751CB000-memory.dmp

      Filesize

      5.7MB

    • memory/1548-67-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1548-65-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1548-64-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1564-120-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1564-119-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1564-146-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1564-142-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1564-137-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1564-129-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1564-124-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1564-125-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1564-122-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/1576-100-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1576-83-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1576-112-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1576-84-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1576-113-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1576-108-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1576-88-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1576-92-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1576-96-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1604-115-0x0000000074C20000-0x00000000751CB000-memory.dmp

      Filesize

      5.7MB

    • memory/1604-79-0x0000000074C20000-0x00000000751CB000-memory.dmp

      Filesize

      5.7MB

    • memory/1680-54-0x0000000076901000-0x0000000076903000-memory.dmp

      Filesize

      8KB

    • memory/1680-82-0x0000000074C20000-0x00000000751CB000-memory.dmp

      Filesize

      5.7MB

    • memory/1680-55-0x0000000074C20000-0x00000000751CB000-memory.dmp

      Filesize

      5.7MB

    • memory/1696-114-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1696-111-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB