Analysis

  • max time kernel
    148s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2022 19:02

General

  • Target

    3857aff7641664e134111eb7e2f373ccc2824d5be5f614b0a2992646b87e6560.exe

  • Size

    1.1MB

  • MD5

    c311711a2b54c663916925c8d1171881

  • SHA1

    946d5729d2fa83a4f2f56f29d1f2271dd2cf34af

  • SHA256

    3857aff7641664e134111eb7e2f373ccc2824d5be5f614b0a2992646b87e6560

  • SHA512

    64bbed820440494ae76a63f8517c8781b6903100e3c41b253dbd276dd90ae6371db4626a7aa78ff76efe9f78a76a903677e14f14ba13c2cf329d8217c09502c7

  • SSDEEP

    24576:L72nfRhfpJo+WdC6OJilSdh1l6NYZMeL/3C5essn17hiUMJ:vkJhxJmc64WSn1lvZtbC53sn1liUM

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • NirSoft MailPassView 15 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 15 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 20 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3857aff7641664e134111eb7e2f373ccc2824d5be5f614b0a2992646b87e6560.exe
    "C:\Users\Admin\AppData\Local\Temp\3857aff7641664e134111eb7e2f373ccc2824d5be5f614b0a2992646b87e6560.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\\mata.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Windows\SysWOW64\wscript.exe
        wscript.exe "C:\Users\Admin\AppData\Local\Temp\invs.vbs" "C:\Users\Admin\AppData\Local\Temp\mata2.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1412
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\mata2.bat" "
          4⤵
            PID:1936
      • C:\Users\Admin\AppData\Local\Temp\3857aff7641664e134111eb7e2f373ccc2824d5be5f614b0a2992646b87e6560.exe
        C:\Users\Admin\AppData\Local\Temp\3857aff7641664e134111eb7e2f373ccc2824d5be5f614b0a2992646b87e6560.exe
        2⤵
          PID:1868
        • C:\Users\Admin\AppData\Local\Temp\tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1156
          • C:\Users\Admin\AppData\Roaming\Windows Update.exe
            "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:428
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
              C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
              4⤵
              • Accesses Microsoft Outlook accounts
              PID:744
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
              C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
              4⤵
                PID:1520

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt

          Filesize

          41B

          MD5

          fa4a6393f371a289f6b187ba6aaada19

          SHA1

          84f4f1eedd713c86f97605f7e8a23a1f2d2678a3

          SHA256

          53ea98bb79bd329140803195f5c46b117986bdeba86f301f9613de657f38b528

          SHA512

          2c6d8429aa7bfb9b2357c3ef710a5d98cd1cb62f29ba36091ddf4a05fe28cc7b35a4609aa7cd1e1f59350c004e2ab9f1c18cc2506bde92f64d6fa3413e0a0519

        • C:\Users\Admin\AppData\Local\Temp\file.exe

          Filesize

          1.1MB

          MD5

          c311711a2b54c663916925c8d1171881

          SHA1

          946d5729d2fa83a4f2f56f29d1f2271dd2cf34af

          SHA256

          3857aff7641664e134111eb7e2f373ccc2824d5be5f614b0a2992646b87e6560

          SHA512

          64bbed820440494ae76a63f8517c8781b6903100e3c41b253dbd276dd90ae6371db4626a7aa78ff76efe9f78a76a903677e14f14ba13c2cf329d8217c09502c7

        • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Local\Temp\invs.vbs

          Filesize

          78B

          MD5

          c578d9653b22800c3eb6b6a51219bbb8

          SHA1

          a97aa251901bbe179a48dbc7a0c1872e163b1f2d

          SHA256

          20a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2

          SHA512

          3ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d

        • C:\Users\Admin\AppData\Local\Temp\mata.bat

          Filesize

          47B

          MD5

          58c538a6ae20a3c6031217903cdf8e5d

          SHA1

          399fd50eadf4945b665877facfc4f53d16e18b1e

          SHA256

          6bcc0e04d9bc32209d90a65c320dc6363e523dd94b38b17bcdc5b980b6405f53

          SHA512

          c01828a5390fec3443e19d317137ae873de77c7737db7802650430e6a0a1edbd3aabe362903243b372536418fbd8482c2a6efd122d853744a41ade567956c359

        • C:\Users\Admin\AppData\Local\Temp\mata2.bat

          Filesize

          47B

          MD5

          095b2908ae8b2e0e3704c0163f26e283

          SHA1

          3429b6c1421d448c98c1da9625badcea2484a521

          SHA256

          22b182644ab28f5e9e17b5a03ba404d09b02da367146b80484584adc842a3ed1

          SHA512

          e22e379b4f0d8e11fa7c29c3297a3e24a533fb08895d18e9bb27e8cab84da1dd52ff437aca90c5c32a9bdb578b3c1bfb3ff42d3bc2c5951ffeb5941c8286c731

        • C:\Users\Admin\AppData\Local\Temp\rundll11-.txt

          Filesize

          1.1MB

          MD5

          c311711a2b54c663916925c8d1171881

          SHA1

          946d5729d2fa83a4f2f56f29d1f2271dd2cf34af

          SHA256

          3857aff7641664e134111eb7e2f373ccc2824d5be5f614b0a2992646b87e6560

          SHA512

          64bbed820440494ae76a63f8517c8781b6903100e3c41b253dbd276dd90ae6371db4626a7aa78ff76efe9f78a76a903677e14f14ba13c2cf329d8217c09502c7

        • C:\Users\Admin\AppData\Local\Temp\tmp.exe

          Filesize

          502KB

          MD5

          5d6c71a513f5f6b0a8e879d092f00bcf

          SHA1

          c1029f428c6fe571e5ab2f5c1170f4dd60154f51

          SHA256

          5d17f4b34d508e55cb33af2dd0b190a2c599120c4373ec988e41ba3ff960e590

          SHA512

          364da97a63f8e312cc12c504ce55357e50e1248b6b397cb510fd5e2cc4d6acb4adf0b2c48c554e47b5651679c3f3af2d480ebcb9c9048bfef36c2ffa917ee8e4

        • C:\Users\Admin\AppData\Local\Temp\tmp.exe

          Filesize

          502KB

          MD5

          5d6c71a513f5f6b0a8e879d092f00bcf

          SHA1

          c1029f428c6fe571e5ab2f5c1170f4dd60154f51

          SHA256

          5d17f4b34d508e55cb33af2dd0b190a2c599120c4373ec988e41ba3ff960e590

          SHA512

          364da97a63f8e312cc12c504ce55357e50e1248b6b397cb510fd5e2cc4d6acb4adf0b2c48c554e47b5651679c3f3af2d480ebcb9c9048bfef36c2ffa917ee8e4

        • C:\Users\Admin\AppData\Roaming\Windows Update.exe

          Filesize

          502KB

          MD5

          5d6c71a513f5f6b0a8e879d092f00bcf

          SHA1

          c1029f428c6fe571e5ab2f5c1170f4dd60154f51

          SHA256

          5d17f4b34d508e55cb33af2dd0b190a2c599120c4373ec988e41ba3ff960e590

          SHA512

          364da97a63f8e312cc12c504ce55357e50e1248b6b397cb510fd5e2cc4d6acb4adf0b2c48c554e47b5651679c3f3af2d480ebcb9c9048bfef36c2ffa917ee8e4

        • C:\Users\Admin\AppData\Roaming\Windows Update.exe

          Filesize

          502KB

          MD5

          5d6c71a513f5f6b0a8e879d092f00bcf

          SHA1

          c1029f428c6fe571e5ab2f5c1170f4dd60154f51

          SHA256

          5d17f4b34d508e55cb33af2dd0b190a2c599120c4373ec988e41ba3ff960e590

          SHA512

          364da97a63f8e312cc12c504ce55357e50e1248b6b397cb510fd5e2cc4d6acb4adf0b2c48c554e47b5651679c3f3af2d480ebcb9c9048bfef36c2ffa917ee8e4

        • \Users\Admin\AppData\Local\Temp\tmp.exe

          Filesize

          502KB

          MD5

          5d6c71a513f5f6b0a8e879d092f00bcf

          SHA1

          c1029f428c6fe571e5ab2f5c1170f4dd60154f51

          SHA256

          5d17f4b34d508e55cb33af2dd0b190a2c599120c4373ec988e41ba3ff960e590

          SHA512

          364da97a63f8e312cc12c504ce55357e50e1248b6b397cb510fd5e2cc4d6acb4adf0b2c48c554e47b5651679c3f3af2d480ebcb9c9048bfef36c2ffa917ee8e4

        • \Users\Admin\AppData\Local\Temp\tmp.exe

          Filesize

          502KB

          MD5

          5d6c71a513f5f6b0a8e879d092f00bcf

          SHA1

          c1029f428c6fe571e5ab2f5c1170f4dd60154f51

          SHA256

          5d17f4b34d508e55cb33af2dd0b190a2c599120c4373ec988e41ba3ff960e590

          SHA512

          364da97a63f8e312cc12c504ce55357e50e1248b6b397cb510fd5e2cc4d6acb4adf0b2c48c554e47b5651679c3f3af2d480ebcb9c9048bfef36c2ffa917ee8e4

        • \Users\Admin\AppData\Local\Temp\tmp.exe

          Filesize

          502KB

          MD5

          5d6c71a513f5f6b0a8e879d092f00bcf

          SHA1

          c1029f428c6fe571e5ab2f5c1170f4dd60154f51

          SHA256

          5d17f4b34d508e55cb33af2dd0b190a2c599120c4373ec988e41ba3ff960e590

          SHA512

          364da97a63f8e312cc12c504ce55357e50e1248b6b397cb510fd5e2cc4d6acb4adf0b2c48c554e47b5651679c3f3af2d480ebcb9c9048bfef36c2ffa917ee8e4

        • \Users\Admin\AppData\Roaming\Windows Update.exe

          Filesize

          502KB

          MD5

          5d6c71a513f5f6b0a8e879d092f00bcf

          SHA1

          c1029f428c6fe571e5ab2f5c1170f4dd60154f51

          SHA256

          5d17f4b34d508e55cb33af2dd0b190a2c599120c4373ec988e41ba3ff960e590

          SHA512

          364da97a63f8e312cc12c504ce55357e50e1248b6b397cb510fd5e2cc4d6acb4adf0b2c48c554e47b5651679c3f3af2d480ebcb9c9048bfef36c2ffa917ee8e4

        • \Users\Admin\AppData\Roaming\Windows Update.exe

          Filesize

          502KB

          MD5

          5d6c71a513f5f6b0a8e879d092f00bcf

          SHA1

          c1029f428c6fe571e5ab2f5c1170f4dd60154f51

          SHA256

          5d17f4b34d508e55cb33af2dd0b190a2c599120c4373ec988e41ba3ff960e590

          SHA512

          364da97a63f8e312cc12c504ce55357e50e1248b6b397cb510fd5e2cc4d6acb4adf0b2c48c554e47b5651679c3f3af2d480ebcb9c9048bfef36c2ffa917ee8e4

        • \Users\Admin\AppData\Roaming\Windows Update.exe

          Filesize

          502KB

          MD5

          5d6c71a513f5f6b0a8e879d092f00bcf

          SHA1

          c1029f428c6fe571e5ab2f5c1170f4dd60154f51

          SHA256

          5d17f4b34d508e55cb33af2dd0b190a2c599120c4373ec988e41ba3ff960e590

          SHA512

          364da97a63f8e312cc12c504ce55357e50e1248b6b397cb510fd5e2cc4d6acb4adf0b2c48c554e47b5651679c3f3af2d480ebcb9c9048bfef36c2ffa917ee8e4

        • memory/428-75-0x0000000000000000-mapping.dmp

        • memory/428-82-0x0000000073ED0000-0x000000007447B000-memory.dmp

          Filesize

          5.7MB

        • memory/428-87-0x0000000073ED0000-0x000000007447B000-memory.dmp

          Filesize

          5.7MB

        • memory/744-89-0x0000000000411654-mapping.dmp

        • memory/744-95-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/744-94-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/744-92-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/744-88-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/960-55-0x0000000000000000-mapping.dmp

        • memory/1156-64-0x0000000000000000-mapping.dmp

        • memory/1156-73-0x0000000073ED0000-0x000000007447B000-memory.dmp

          Filesize

          5.7MB

        • memory/1156-81-0x0000000073ED0000-0x000000007447B000-memory.dmp

          Filesize

          5.7MB

        • memory/1412-58-0x0000000000000000-mapping.dmp

        • memory/1520-96-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1520-97-0x0000000000442628-mapping.dmp

        • memory/1520-100-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1520-102-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1520-104-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1936-65-0x0000000000000000-mapping.dmp

        • memory/1956-54-0x0000000075141000-0x0000000075143000-memory.dmp

          Filesize

          8KB

        • memory/1956-59-0x0000000073ED0000-0x000000007447B000-memory.dmp

          Filesize

          5.7MB

        • memory/1956-84-0x0000000073ED0000-0x000000007447B000-memory.dmp

          Filesize

          5.7MB

        • memory/1956-86-0x0000000073ED0000-0x000000007447B000-memory.dmp

          Filesize

          5.7MB