Analysis

  • max time kernel
    145s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:40

General

  • Target

    64a73cc4e0b19852bf4d37ef96d8c80ace2eb7a810807d8516353d5e8124a85b.exe

  • Size

    469KB

  • MD5

    281301ef0a83967024fb992845b603a0

  • SHA1

    5e84df4a2fe03de8bb25a916b5759abdcb446aa6

  • SHA256

    64a73cc4e0b19852bf4d37ef96d8c80ace2eb7a810807d8516353d5e8124a85b

  • SHA512

    4cd90a7cd0c8acfd8fb16c434cd7a1af46f5a3eb9aee8a20315fb441eeb0b7bd9d97a4110410baedab06c81ba8c71ef90d820577d366b7ed447486d6f88831a5

  • SSDEEP

    12288:nvYoZfvS2EYifLrH8MdW9ibn0C+CKp45:nwoZfvWLxoyn0DCD5

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 12 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 7 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 12 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64a73cc4e0b19852bf4d37ef96d8c80ace2eb7a810807d8516353d5e8124a85b.exe
    "C:\Users\Admin\AppData\Local\Temp\64a73cc4e0b19852bf4d37ef96d8c80ace2eb7a810807d8516353d5e8124a85b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\64a73cc4e0b19852bf4d37ef96d8c80ace2eb7a810807d8516353d5e8124a85b.exe
      "C:\Users\Admin\AppData\Local\Temp\64a73cc4e0b19852bf4d37ef96d8c80ace2eb7a810807d8516353d5e8124a85b.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Users\Admin\AppData\Roaming\Windows Update.exe
        "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1124
        • C:\Users\Admin\AppData\Roaming\Windows Update.exe
          "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
          4⤵
          • Executes dropped EXE
          • Deletes itself
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:964
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
            5⤵
              PID:1600
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
              C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt" /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
              5⤵
                PID:1608
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1048
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 36
                  6⤵
                  • Program crash
                  PID:524

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt

        Filesize

        102B

        MD5

        98c21eda36e1b039a898577de56da9f6

        SHA1

        941587260de70b9efda5b0a46133277edf5f0770

        SHA256

        fa88869a320430cc0cdabfd53fabed5f270bc3d2c4470adbcfd3e4b697d3bfc6

        SHA512

        05ec83871c73b4392961b92b06fb189e4ba05495df58ce137319a756fc505264b5f0f6d27deaceb1a44aa301ca9fd6f887f1681c26b2174ecde126751c885c49

      • C:\Users\Admin\AppData\Roaming\Windows Update.exe

        Filesize

        469KB

        MD5

        281301ef0a83967024fb992845b603a0

        SHA1

        5e84df4a2fe03de8bb25a916b5759abdcb446aa6

        SHA256

        64a73cc4e0b19852bf4d37ef96d8c80ace2eb7a810807d8516353d5e8124a85b

        SHA512

        4cd90a7cd0c8acfd8fb16c434cd7a1af46f5a3eb9aee8a20315fb441eeb0b7bd9d97a4110410baedab06c81ba8c71ef90d820577d366b7ed447486d6f88831a5

      • C:\Users\Admin\AppData\Roaming\Windows Update.exe

        Filesize

        469KB

        MD5

        281301ef0a83967024fb992845b603a0

        SHA1

        5e84df4a2fe03de8bb25a916b5759abdcb446aa6

        SHA256

        64a73cc4e0b19852bf4d37ef96d8c80ace2eb7a810807d8516353d5e8124a85b

        SHA512

        4cd90a7cd0c8acfd8fb16c434cd7a1af46f5a3eb9aee8a20315fb441eeb0b7bd9d97a4110410baedab06c81ba8c71ef90d820577d366b7ed447486d6f88831a5

      • C:\Users\Admin\AppData\Roaming\Windows Update.exe

        Filesize

        469KB

        MD5

        281301ef0a83967024fb992845b603a0

        SHA1

        5e84df4a2fe03de8bb25a916b5759abdcb446aa6

        SHA256

        64a73cc4e0b19852bf4d37ef96d8c80ace2eb7a810807d8516353d5e8124a85b

        SHA512

        4cd90a7cd0c8acfd8fb16c434cd7a1af46f5a3eb9aee8a20315fb441eeb0b7bd9d97a4110410baedab06c81ba8c71ef90d820577d366b7ed447486d6f88831a5

      • \Users\Admin\AppData\Roaming\Windows Update.exe

        Filesize

        469KB

        MD5

        281301ef0a83967024fb992845b603a0

        SHA1

        5e84df4a2fe03de8bb25a916b5759abdcb446aa6

        SHA256

        64a73cc4e0b19852bf4d37ef96d8c80ace2eb7a810807d8516353d5e8124a85b

        SHA512

        4cd90a7cd0c8acfd8fb16c434cd7a1af46f5a3eb9aee8a20315fb441eeb0b7bd9d97a4110410baedab06c81ba8c71ef90d820577d366b7ed447486d6f88831a5

      • \Users\Admin\AppData\Roaming\Windows Update.exe

        Filesize

        469KB

        MD5

        281301ef0a83967024fb992845b603a0

        SHA1

        5e84df4a2fe03de8bb25a916b5759abdcb446aa6

        SHA256

        64a73cc4e0b19852bf4d37ef96d8c80ace2eb7a810807d8516353d5e8124a85b

        SHA512

        4cd90a7cd0c8acfd8fb16c434cd7a1af46f5a3eb9aee8a20315fb441eeb0b7bd9d97a4110410baedab06c81ba8c71ef90d820577d366b7ed447486d6f88831a5

      • memory/524-110-0x0000000000000000-mapping.dmp

      • memory/584-59-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/584-72-0x0000000074550000-0x0000000074AFB000-memory.dmp

        Filesize

        5.7MB

      • memory/584-64-0x000000000047EA8E-mapping.dmp

      • memory/584-66-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/584-68-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/584-78-0x0000000074550000-0x0000000074AFB000-memory.dmp

        Filesize

        5.7MB

      • memory/584-58-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/584-63-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/584-62-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/584-61-0x0000000000400000-0x0000000000484000-memory.dmp

        Filesize

        528KB

      • memory/964-99-0x0000000074550000-0x0000000074AFB000-memory.dmp

        Filesize

        5.7MB

      • memory/964-97-0x0000000074550000-0x0000000074AFB000-memory.dmp

        Filesize

        5.7MB

      • memory/964-88-0x000000000047EA8E-mapping.dmp

      • memory/964-109-0x0000000000AF5000-0x0000000000B06000-memory.dmp

        Filesize

        68KB

      • memory/1048-107-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/1048-106-0x000000007316078C-mapping.dmp

      • memory/1124-79-0x0000000074550000-0x0000000074AFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1124-74-0x0000000000000000-mapping.dmp

      • memory/1124-95-0x0000000000C06000-0x0000000000C17000-memory.dmp

        Filesize

        68KB

      • memory/1124-94-0x0000000074550000-0x0000000074AFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1124-80-0x0000000000C06000-0x0000000000C17000-memory.dmp

        Filesize

        68KB

      • memory/1600-102-0x000000000007120C-mapping.dmp

      • memory/1608-100-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1608-101-0x0000000000411654-mapping.dmp

      • memory/1608-105-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1608-111-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1608-112-0x0000000000400000-0x000000000041B000-memory.dmp

        Filesize

        108KB

      • memory/1740-70-0x0000000074550000-0x0000000074AFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1740-54-0x00000000759C1000-0x00000000759C3000-memory.dmp

        Filesize

        8KB

      • memory/1740-71-0x00000000002B6000-0x00000000002C7000-memory.dmp

        Filesize

        68KB

      • memory/1740-57-0x0000000074550000-0x0000000074AFB000-memory.dmp

        Filesize

        5.7MB

      • memory/1740-56-0x00000000002B6000-0x00000000002C7000-memory.dmp

        Filesize

        68KB

      • memory/1740-55-0x0000000074550000-0x0000000074AFB000-memory.dmp

        Filesize

        5.7MB