Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:01

General

  • Target

    77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7.exe

  • Size

    862KB

  • MD5

    a825e6d2fdc7fb2f4b094f66f14827a5

  • SHA1

    030bf2d57e5b39e837d990f056775765e1e6646d

  • SHA256

    77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7

  • SHA512

    ac0410d411368ed60c76017396722061450fc5a34c5f73d458ab1e855fa8302de67ba4b53bacc4912c2eed1207216a418cf85f5ed3385d565038c891e699da38

  • SSDEEP

    12288:njue1nWr9iA/JFv0c3Um3eLSJk9KqjC1u6MXCITIFI3NlAaiSQu8G:x9WrRum3WjqFU

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 5 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 6 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 10 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7.exe
    "C:\Users\Admin\AppData\Local\Temp\77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\SysWOW64\CMD.exe
      "CMD"
      2⤵
        PID:740
      • C:\Windows\SysWOW64\CMD.exe
        "CMD"
        2⤵
          PID:2256
        • C:\Users\Admin\AppData\Local\Temp\77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7.exe
          "C:\Users\Admin\AppData\Local\Temp\77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7.exe"
          2⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:1744
          • C:\Users\Admin\AppData\Roaming\Windows Update.exe
            "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4588
        • C:\Users\Admin\AppData\Local\Temp\77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7.exe
          "C:\Users\Admin\AppData\Local\Temp\77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7.exe"
          2⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
            3⤵
            • Accesses Microsoft Outlook accounts
            PID:3668
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2248

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scripting

      1
      T1064

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Scripting

      1
      T1064

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7.exe.log
        Filesize

        774B

        MD5

        049b2c7e274ebb68f3ada1961c982a22

        SHA1

        796b9f03c8cd94617ea26aaf861af9fb2a5731db

        SHA256

        5c69c41dceda1bb32d4054d6b483bb3e3af84c8cf0a6191c79068168a1d506b3

        SHA512

        fb2ee642e1401772d514e86b0b8dd117659335066242e85c158b40e8912572f2bd7b9a0f63f9b9f4d7a2e051579345215f6b1f147881f3d1e78f335c45d78ebf

      • C:\Users\Admin\AppData\Local\Temp\77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7.exe
        Filesize

        862KB

        MD5

        a825e6d2fdc7fb2f4b094f66f14827a5

        SHA1

        030bf2d57e5b39e837d990f056775765e1e6646d

        SHA256

        77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7

        SHA512

        ac0410d411368ed60c76017396722061450fc5a34c5f73d458ab1e855fa8302de67ba4b53bacc4912c2eed1207216a418cf85f5ed3385d565038c891e699da38

      • C:\Users\Admin\AppData\Local\Temp\77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7.exe
        Filesize

        862KB

        MD5

        a825e6d2fdc7fb2f4b094f66f14827a5

        SHA1

        030bf2d57e5b39e837d990f056775765e1e6646d

        SHA256

        77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7

        SHA512

        ac0410d411368ed60c76017396722061450fc5a34c5f73d458ab1e855fa8302de67ba4b53bacc4912c2eed1207216a418cf85f5ed3385d565038c891e699da38

      • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt
        Filesize

        102B

        MD5

        e1e2e341f1eeead3e8d70456e735243a

        SHA1

        8bfae624d7b73904fdd74593e2f129153c3d6e0e

        SHA256

        c225a4f318726e346c676b8182b20aca26848acb7930a9bc9b191c4f61177895

        SHA512

        fa22ce76eb05f455eecb01ff9482b915c462c5a57ad384d4ac73c46b2924824fe467f52aeb568daf8da36500054fc503cf193696fa66ba3eccee3ff4704161bd

      • C:\Users\Admin\AppData\Local\Temp\holderwb.txt
        Filesize

        3KB

        MD5

        f94dc819ca773f1e3cb27abbc9e7fa27

        SHA1

        9a7700efadc5ea09ab288544ef1e3cd876255086

        SHA256

        a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92

        SHA512

        72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

      • C:\Users\Admin\AppData\Roaming\Windows Update.exe
        Filesize

        862KB

        MD5

        a825e6d2fdc7fb2f4b094f66f14827a5

        SHA1

        030bf2d57e5b39e837d990f056775765e1e6646d

        SHA256

        77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7

        SHA512

        ac0410d411368ed60c76017396722061450fc5a34c5f73d458ab1e855fa8302de67ba4b53bacc4912c2eed1207216a418cf85f5ed3385d565038c891e699da38

      • C:\Users\Admin\AppData\Roaming\Windows Update.exe
        Filesize

        862KB

        MD5

        a825e6d2fdc7fb2f4b094f66f14827a5

        SHA1

        030bf2d57e5b39e837d990f056775765e1e6646d

        SHA256

        77ff00bf84a5920c94046c55d630a28ff0f45d1ca607f6e42b23c6fe7779d9f7

        SHA512

        ac0410d411368ed60c76017396722061450fc5a34c5f73d458ab1e855fa8302de67ba4b53bacc4912c2eed1207216a418cf85f5ed3385d565038c891e699da38

      • memory/740-134-0x0000000000000000-mapping.dmp
      • memory/1724-157-0x0000000074C70000-0x0000000075221000-memory.dmp
        Filesize

        5.7MB

      • memory/1724-149-0x0000000074C70000-0x0000000075221000-memory.dmp
        Filesize

        5.7MB

      • memory/1724-145-0x0000000000000000-mapping.dmp
      • memory/1744-140-0x0000000074C70000-0x0000000075221000-memory.dmp
        Filesize

        5.7MB

      • memory/1744-137-0x0000000000400000-0x0000000000488000-memory.dmp
        Filesize

        544KB

      • memory/1744-144-0x0000000074C70000-0x0000000075221000-memory.dmp
        Filesize

        5.7MB

      • memory/1744-136-0x0000000000000000-mapping.dmp
      • memory/1744-139-0x0000000074C70000-0x0000000075221000-memory.dmp
        Filesize

        5.7MB

      • memory/2248-162-0x0000000000400000-0x0000000000458000-memory.dmp
        Filesize

        352KB

      • memory/2248-159-0x0000000000000000-mapping.dmp
      • memory/2248-165-0x0000000000400000-0x0000000000458000-memory.dmp
        Filesize

        352KB

      • memory/2248-163-0x0000000000400000-0x0000000000458000-memory.dmp
        Filesize

        352KB

      • memory/2248-160-0x0000000000400000-0x0000000000458000-memory.dmp
        Filesize

        352KB

      • memory/2256-135-0x0000000000000000-mapping.dmp
      • memory/2672-132-0x0000000074C70000-0x0000000075221000-memory.dmp
        Filesize

        5.7MB

      • memory/2672-133-0x0000000074C70000-0x0000000075221000-memory.dmp
        Filesize

        5.7MB

      • memory/3668-156-0x0000000000400000-0x000000000041B000-memory.dmp
        Filesize

        108KB

      • memory/3668-155-0x0000000000400000-0x000000000041B000-memory.dmp
        Filesize

        108KB

      • memory/3668-153-0x0000000000400000-0x000000000041B000-memory.dmp
        Filesize

        108KB

      • memory/3668-152-0x0000000000000000-mapping.dmp
      • memory/4588-158-0x0000000074C70000-0x0000000075221000-memory.dmp
        Filesize

        5.7MB

      • memory/4588-141-0x0000000000000000-mapping.dmp
      • memory/4588-151-0x0000000074C70000-0x0000000075221000-memory.dmp
        Filesize

        5.7MB

      • memory/4588-166-0x0000000074C70000-0x0000000075221000-memory.dmp
        Filesize

        5.7MB