Analysis

  • max time kernel
    152s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2022 00:52

General

  • Target

    a4aa3cbf18e122b9967117aa3ebcb776886ac92973aeb9cfccb6176294d24b94.exe

  • Size

    1.3MB

  • MD5

    24fed3f31bf8912606adb5862ceb3ac8

  • SHA1

    f2ba97e8cba9f8f24142ac2f1daee67783fb80ee

  • SHA256

    a4aa3cbf18e122b9967117aa3ebcb776886ac92973aeb9cfccb6176294d24b94

  • SHA512

    48eeb947ffeaa991e129f70b3782bf7b8d75f1d95a4b25d8dccc871f4e4fe75c9af422590d015c602e3eedda153b7f8015e4153f4f871a9be3a1606452ddedf0

  • SSDEEP

    24576:9BxmWHAs0A6yDW3Yzv7NeGd6znhc2eEUWXXL9VAIEqJTsj7/pTA:9LhHAbz07jMC2eDWnXAIEx/1

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4aa3cbf18e122b9967117aa3ebcb776886ac92973aeb9cfccb6176294d24b94.exe
    "C:\Users\Admin\AppData\Local\Temp\a4aa3cbf18e122b9967117aa3ebcb776886ac92973aeb9cfccb6176294d24b94.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\a4aa3cbf18e122b9967117aa3ebcb776886ac92973aeb9cfccb6176294d24b94.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe"
      2⤵
        PID:1768
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1664
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          3⤵
          • Accesses Microsoft Outlook accounts
          • Suspicious use of AdjustPrivilegeToken
          PID:828
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1288
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1388
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "Load" /d "cmd /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe" /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:108
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "Load" /d "cmd /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe" /f
              5⤵
                PID:400
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1080
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
                5⤵
                  PID:1320
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1436

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scripting

        1
        T1064

        Defense Evasion

        Scripting

        1
        T1064

        Credential Access

        Credentials in Files

        2
        T1081

        Discovery

        System Information Discovery

        1
        T1082

        Collection

        Data from Local System

        2
        T1005

        Email Collection

        1
        T1114

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\holdermail.txt
          Filesize

          400B

          MD5

          de4e5ff058882957cf8a3b5f839a031f

          SHA1

          0b3d8279120fb5fa27efbd9eee89695aa040fc24

          SHA256

          ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49

          SHA512

          a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72

        • C:\Users\Admin\AppData\Local\Temp\holdermail.txt
          Filesize

          329B

          MD5

          f8ddf0fe04f214d64c3e5094ed622858

          SHA1

          245a91a1c968c45820fbbb319c1bcfc98b01b04e

          SHA256

          f73d76c930aa76b78390a50ee72b9169c7064b9e1256de76ab9ffb43bca8f5d3

          SHA512

          e6385a3d47f8969f2079ae28a4e2753c2da60e37601ebd15049e21f1490e7a1ec760a3cc6c8b75a8049aa8a08735a9f24187d7ad13c6ac8d4a5510dc88718900

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe
          Filesize

          1.3MB

          MD5

          24fed3f31bf8912606adb5862ceb3ac8

          SHA1

          f2ba97e8cba9f8f24142ac2f1daee67783fb80ee

          SHA256

          a4aa3cbf18e122b9967117aa3ebcb776886ac92973aeb9cfccb6176294d24b94

          SHA512

          48eeb947ffeaa991e129f70b3782bf7b8d75f1d95a4b25d8dccc871f4e4fe75c9af422590d015c602e3eedda153b7f8015e4153f4f871a9be3a1606452ddedf0

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe
          Filesize

          1.3MB

          MD5

          24fed3f31bf8912606adb5862ceb3ac8

          SHA1

          f2ba97e8cba9f8f24142ac2f1daee67783fb80ee

          SHA256

          a4aa3cbf18e122b9967117aa3ebcb776886ac92973aeb9cfccb6176294d24b94

          SHA512

          48eeb947ffeaa991e129f70b3782bf7b8d75f1d95a4b25d8dccc871f4e4fe75c9af422590d015c602e3eedda153b7f8015e4153f4f871a9be3a1606452ddedf0

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe
          Filesize

          24KB

          MD5

          17f51ab722963d73b5dcd050d06e6d40

          SHA1

          70a1eb538fe961512c74dda727ef185c8eb42884

          SHA256

          e1b1dc86ebe7440828efab389cb9edcfd639463a8ff64742818a84859a7ff417

          SHA512

          041794fb9817e578e3aa00f019ce295b82dc6ee5dd23b49e79785570d3f60c058f6292b1382ff3b0e9999774cb60bc5a76919b4fd79d2bba85ea594d9719ac0d

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe
          Filesize

          24KB

          MD5

          17f51ab722963d73b5dcd050d06e6d40

          SHA1

          70a1eb538fe961512c74dda727ef185c8eb42884

          SHA256

          e1b1dc86ebe7440828efab389cb9edcfd639463a8ff64742818a84859a7ff417

          SHA512

          041794fb9817e578e3aa00f019ce295b82dc6ee5dd23b49e79785570d3f60c058f6292b1382ff3b0e9999774cb60bc5a76919b4fd79d2bba85ea594d9719ac0d

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe
          Filesize

          24KB

          MD5

          17f51ab722963d73b5dcd050d06e6d40

          SHA1

          70a1eb538fe961512c74dda727ef185c8eb42884

          SHA256

          e1b1dc86ebe7440828efab389cb9edcfd639463a8ff64742818a84859a7ff417

          SHA512

          041794fb9817e578e3aa00f019ce295b82dc6ee5dd23b49e79785570d3f60c058f6292b1382ff3b0e9999774cb60bc5a76919b4fd79d2bba85ea594d9719ac0d

        • C:\Users\Admin\AppData\Roaming\pid.txt
          Filesize

          4B

          MD5

          4f398cb9d6bc79ae567298335b51ba8a

          SHA1

          776f707e19f39e6b830856a6cdf3aa605a5a283e

          SHA256

          5aca6f08b6780157a0da46aaaef9d86d2fe55919395b0e2aba71e52a377db90d

          SHA512

          6ea469870849ab48a14a65e433a1dd2fd7741ea7ed01c586424111f35256737a861c4527c66528b3ea489a6e22ed4732074167fdb152de9441d2f1958e94beca

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe
          Filesize

          1.3MB

          MD5

          24fed3f31bf8912606adb5862ceb3ac8

          SHA1

          f2ba97e8cba9f8f24142ac2f1daee67783fb80ee

          SHA256

          a4aa3cbf18e122b9967117aa3ebcb776886ac92973aeb9cfccb6176294d24b94

          SHA512

          48eeb947ffeaa991e129f70b3782bf7b8d75f1d95a4b25d8dccc871f4e4fe75c9af422590d015c602e3eedda153b7f8015e4153f4f871a9be3a1606452ddedf0

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe
          Filesize

          24KB

          MD5

          17f51ab722963d73b5dcd050d06e6d40

          SHA1

          70a1eb538fe961512c74dda727ef185c8eb42884

          SHA256

          e1b1dc86ebe7440828efab389cb9edcfd639463a8ff64742818a84859a7ff417

          SHA512

          041794fb9817e578e3aa00f019ce295b82dc6ee5dd23b49e79785570d3f60c058f6292b1382ff3b0e9999774cb60bc5a76919b4fd79d2bba85ea594d9719ac0d

        • memory/108-76-0x0000000000000000-mapping.dmp
        • memory/400-78-0x0000000000000000-mapping.dmp
        • memory/828-124-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/828-127-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/828-125-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/828-121-0x0000000000462B6D-mapping.dmp
        • memory/828-120-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/828-119-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/828-117-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/828-115-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/828-113-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/828-112-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/1080-92-0x00000000747F0000-0x0000000074D9B000-memory.dmp
          Filesize

          5.7MB

        • memory/1080-83-0x0000000000000000-mapping.dmp
        • memory/1080-111-0x00000000747F0000-0x0000000074D9B000-memory.dmp
          Filesize

          5.7MB

        • memory/1248-56-0x00000000747F0000-0x0000000074D9B000-memory.dmp
          Filesize

          5.7MB

        • memory/1248-55-0x00000000747F0000-0x0000000074D9B000-memory.dmp
          Filesize

          5.7MB

        • memory/1248-54-0x0000000075351000-0x0000000075353000-memory.dmp
          Filesize

          8KB

        • memory/1288-129-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/1288-130-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/1288-145-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/1288-142-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/1288-141-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/1288-132-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/1288-138-0x0000000000460E2D-mapping.dmp
        • memory/1288-137-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/1288-136-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/1288-134-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/1320-126-0x00000000747F0000-0x0000000074D9B000-memory.dmp
          Filesize

          5.7MB

        • memory/1320-100-0x000000000051BB1E-mapping.dmp
        • memory/1320-107-0x00000000747F0000-0x0000000074D9B000-memory.dmp
          Filesize

          5.7MB

        • memory/1388-79-0x00000000747F0000-0x0000000074D9B000-memory.dmp
          Filesize

          5.7MB

        • memory/1388-86-0x00000000747F0000-0x0000000074D9B000-memory.dmp
          Filesize

          5.7MB

        • memory/1388-73-0x0000000000000000-mapping.dmp
        • memory/1436-110-0x00000000747F0000-0x0000000074D9B000-memory.dmp
          Filesize

          5.7MB

        • memory/1436-91-0x00000000747F0000-0x0000000074D9B000-memory.dmp
          Filesize

          5.7MB

        • memory/1436-88-0x0000000000000000-mapping.dmp
        • memory/1664-109-0x0000000000BB5000-0x0000000000BC6000-memory.dmp
          Filesize

          68KB

        • memory/1664-63-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/1664-58-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/1664-67-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/1664-65-0x000000000051BB1E-mapping.dmp
        • memory/1664-64-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/1664-80-0x00000000747F0000-0x0000000074D9B000-memory.dmp
          Filesize

          5.7MB

        • memory/1664-69-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/1664-61-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/1664-59-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/1664-143-0x0000000000BB5000-0x0000000000BC6000-memory.dmp
          Filesize

          68KB

        • memory/1664-108-0x00000000747F0000-0x0000000074D9B000-memory.dmp
          Filesize

          5.7MB

        • memory/1752-70-0x0000000000000000-mapping.dmp
        • memory/1768-57-0x0000000000000000-mapping.dmp
        • memory/1968-87-0x0000000000000000-mapping.dmp