Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2022 18:42

General

  • Target

    12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe

  • Size

    1.0MB

  • MD5

    03a6f05f998a2c1da3bbe3dba6f44917

  • SHA1

    b9a38f68387f77ed9b752f056bda282580a52ca8

  • SHA256

    12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b

  • SHA512

    d45f3792eba2e04b5f1c9686ee7711f6a2edc976e4f770f34cdff86bb537aeb247d1fe0b705c5cea8860cf32245794b95f2a156597136a168e5c1a953ef929f9

  • SSDEEP

    24576:jBxiZeC6Lj/mHlOdBBR6x/a2fQY5kfqFGlwpV:jLiZeC4TOOdBn0LfTqfqFJL

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe
    "C:\Users\Admin\AppData\Local\Temp\12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe"
      2⤵
        PID:1624
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1416
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          3⤵
          • Accesses Microsoft Outlook accounts
          • Suspicious use of AdjustPrivilegeToken
          PID:1512
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:948
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:324
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1700
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "Load" /d "cmd /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe" /f
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1180
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "Load" /d "cmd /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe" /f
              5⤵
                PID:952
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1612
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
                5⤵
                  PID:1072

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scripting

        1
        T1064

        Defense Evasion

        Scripting

        1
        T1064

        Credential Access

        Credentials in Files

        2
        T1081

        Discovery

        System Information Discovery

        1
        T1082

        Collection

        Data from Local System

        2
        T1005

        Email Collection

        1
        T1114

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\holdermail.txt
          Filesize

          321B

          MD5

          e62221a3bb549a72fcc4afa60d34e620

          SHA1

          d60b16b540e0e3ed459a30cce0678d1fc8a1989a

          SHA256

          587f8f51485b575f30e5e1608f70b31b9d8bb384318802373cc52cbdf2a4aa95

          SHA512

          5b6f6a3a88961b62870e486b02e41d065b3f054f3ad45f7c7e01aff3ba151893e36fd3c13771ed9e3738aaa525296a8ee72adc05fb32932ec3af259404172aed

        • C:\Users\Admin\AppData\Local\Temp\holdermail.txt
          Filesize

          321B

          MD5

          c3609e29395ccd5fd8407fed36414e75

          SHA1

          04c0c5dc3fcced0c5581c44af17fa60260fb591a

          SHA256

          a32df1c247d5738af4241edc4aa520dbb21013d05d47cac5db96ccfb48de7857

          SHA512

          8bbd7b458f2be6e91c46cad8f682e109c7a7317f9ae89e5ce889ae7d4db5775b83d03016f47b56aa75bd5646a50c06ae7adbf2fc8af6b9f8a976f2ce30de3533

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe
          Filesize

          1.0MB

          MD5

          03a6f05f998a2c1da3bbe3dba6f44917

          SHA1

          b9a38f68387f77ed9b752f056bda282580a52ca8

          SHA256

          12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b

          SHA512

          d45f3792eba2e04b5f1c9686ee7711f6a2edc976e4f770f34cdff86bb537aeb247d1fe0b705c5cea8860cf32245794b95f2a156597136a168e5c1a953ef929f9

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe
          Filesize

          1.0MB

          MD5

          03a6f05f998a2c1da3bbe3dba6f44917

          SHA1

          b9a38f68387f77ed9b752f056bda282580a52ca8

          SHA256

          12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b

          SHA512

          d45f3792eba2e04b5f1c9686ee7711f6a2edc976e4f770f34cdff86bb537aeb247d1fe0b705c5cea8860cf32245794b95f2a156597136a168e5c1a953ef929f9

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe
          Filesize

          24KB

          MD5

          17f51ab722963d73b5dcd050d06e6d40

          SHA1

          70a1eb538fe961512c74dda727ef185c8eb42884

          SHA256

          e1b1dc86ebe7440828efab389cb9edcfd639463a8ff64742818a84859a7ff417

          SHA512

          041794fb9817e578e3aa00f019ce295b82dc6ee5dd23b49e79785570d3f60c058f6292b1382ff3b0e9999774cb60bc5a76919b4fd79d2bba85ea594d9719ac0d

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe
          Filesize

          24KB

          MD5

          17f51ab722963d73b5dcd050d06e6d40

          SHA1

          70a1eb538fe961512c74dda727ef185c8eb42884

          SHA256

          e1b1dc86ebe7440828efab389cb9edcfd639463a8ff64742818a84859a7ff417

          SHA512

          041794fb9817e578e3aa00f019ce295b82dc6ee5dd23b49e79785570d3f60c058f6292b1382ff3b0e9999774cb60bc5a76919b4fd79d2bba85ea594d9719ac0d

        • C:\Users\Admin\AppData\Roaming\pid.txt
          Filesize

          4B

          MD5

          23ad3e314e2a2b43b4c720507cec0723

          SHA1

          7197aab2aa1010716c7ac34668ce1efa0a6647ce

          SHA256

          c775788b4db45b59989df2c70fdbf7895f0de12023618a38f5c0a417b7f3699e

          SHA512

          b6dfd12ffc11e847a6e439a3d5f436b06bd257f5de478241fe357e4fa16c3dbfbcdf0cc1d35bf747cb529da3e2daeb9a0013b336fbe1eb2c1b97f42d53a99557

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe
          Filesize

          1.0MB

          MD5

          03a6f05f998a2c1da3bbe3dba6f44917

          SHA1

          b9a38f68387f77ed9b752f056bda282580a52ca8

          SHA256

          12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b

          SHA512

          d45f3792eba2e04b5f1c9686ee7711f6a2edc976e4f770f34cdff86bb537aeb247d1fe0b705c5cea8860cf32245794b95f2a156597136a168e5c1a953ef929f9

        • \Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe
          Filesize

          24KB

          MD5

          17f51ab722963d73b5dcd050d06e6d40

          SHA1

          70a1eb538fe961512c74dda727ef185c8eb42884

          SHA256

          e1b1dc86ebe7440828efab389cb9edcfd639463a8ff64742818a84859a7ff417

          SHA512

          041794fb9817e578e3aa00f019ce295b82dc6ee5dd23b49e79785570d3f60c058f6292b1382ff3b0e9999774cb60bc5a76919b4fd79d2bba85ea594d9719ac0d

        • memory/324-69-0x0000000000000000-mapping.dmp
        • memory/948-125-0x0000000000400000-0x000000000046F000-memory.dmp
          Filesize

          444KB

        • memory/948-123-0x0000000000400000-0x000000000046F000-memory.dmp
          Filesize

          444KB

        • memory/948-119-0x0000000000400000-0x000000000046F000-memory.dmp
          Filesize

          444KB

        • memory/948-120-0x0000000000442C62-mapping.dmp
        • memory/952-77-0x0000000000000000-mapping.dmp
        • memory/1072-105-0x00000000008A6000-0x00000000008B7000-memory.dmp
          Filesize

          68KB

        • memory/1072-92-0x00000000004E1E9E-mapping.dmp
        • memory/1072-109-0x0000000074B30000-0x00000000750DB000-memory.dmp
          Filesize

          5.7MB

        • memory/1072-104-0x0000000074B30000-0x00000000750DB000-memory.dmp
          Filesize

          5.7MB

        • memory/1072-101-0x0000000000090000-0x0000000000176000-memory.dmp
          Filesize

          920KB

        • memory/1072-98-0x0000000000090000-0x0000000000176000-memory.dmp
          Filesize

          920KB

        • memory/1072-94-0x0000000000090000-0x0000000000176000-memory.dmp
          Filesize

          920KB

        • memory/1180-76-0x0000000000000000-mapping.dmp
        • memory/1416-115-0x0000000000886000-0x0000000000897000-memory.dmp
          Filesize

          68KB

        • memory/1416-107-0x0000000074B30000-0x00000000750DB000-memory.dmp
          Filesize

          5.7MB

        • memory/1416-64-0x00000000004E1E9E-mapping.dmp
        • memory/1416-59-0x0000000000400000-0x00000000004E6000-memory.dmp
          Filesize

          920KB

        • memory/1416-61-0x0000000000400000-0x00000000004E6000-memory.dmp
          Filesize

          920KB

        • memory/1416-63-0x0000000000400000-0x00000000004E6000-memory.dmp
          Filesize

          920KB

        • memory/1416-79-0x0000000074B30000-0x00000000750DB000-memory.dmp
          Filesize

          5.7MB

        • memory/1416-58-0x0000000000400000-0x00000000004E6000-memory.dmp
          Filesize

          920KB

        • memory/1416-126-0x0000000000886000-0x0000000000897000-memory.dmp
          Filesize

          68KB

        • memory/1416-62-0x0000000000400000-0x00000000004E6000-memory.dmp
          Filesize

          920KB

        • memory/1416-66-0x0000000000400000-0x00000000004E6000-memory.dmp
          Filesize

          920KB

        • memory/1416-68-0x0000000000400000-0x00000000004E6000-memory.dmp
          Filesize

          920KB

        • memory/1488-54-0x0000000075AD1000-0x0000000075AD3000-memory.dmp
          Filesize

          8KB

        • memory/1488-55-0x0000000074B30000-0x00000000750DB000-memory.dmp
          Filesize

          5.7MB

        • memory/1488-56-0x0000000074B30000-0x00000000750DB000-memory.dmp
          Filesize

          5.7MB

        • memory/1512-111-0x0000000000442FBF-mapping.dmp
        • memory/1512-110-0x0000000000400000-0x000000000046E000-memory.dmp
          Filesize

          440KB

        • memory/1512-114-0x0000000000400000-0x000000000046E000-memory.dmp
          Filesize

          440KB

        • memory/1512-116-0x0000000000400000-0x000000000046E000-memory.dmp
          Filesize

          440KB

        • memory/1512-118-0x0000000000400000-0x000000000046E000-memory.dmp
          Filesize

          440KB

        • memory/1612-108-0x0000000074B30000-0x00000000750DB000-memory.dmp
          Filesize

          5.7MB

        • memory/1612-82-0x0000000000000000-mapping.dmp
        • memory/1612-85-0x0000000074B30000-0x00000000750DB000-memory.dmp
          Filesize

          5.7MB

        • memory/1624-57-0x0000000000000000-mapping.dmp
        • memory/1700-72-0x0000000000000000-mapping.dmp
        • memory/1700-106-0x0000000074B30000-0x00000000750DB000-memory.dmp
          Filesize

          5.7MB

        • memory/1700-78-0x0000000074B30000-0x00000000750DB000-memory.dmp
          Filesize

          5.7MB