Analysis

  • max time kernel
    163s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:25

General

  • Target

    3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe

  • Size

    1.4MB

  • MD5

    e30c81f42a72512d32754e595e80e942

  • SHA1

    fe665ba908128e59957ff756a6a7984a0f71b2c6

  • SHA256

    3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e

  • SHA512

    d5c1c0937ddcea859c4b4fbc4ebdc1c8f8c04f1a49b2082e0968dc6b019d87bae88679983f1322a0fa4db15c1efa853a97375c2e175dfbced240cea89f71f8ff

  • SSDEEP

    24576:j0AZbveE+KiB7+AwKeAm8J7X32A66MisH+98OqoYaejLs13doYg7:vbveE+tyAwBAm8RXale980sjLMA7

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mail.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    general123

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • NirSoft WebBrowserPassView 7 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 7 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe
    "C:\Users\Admin\AppData\Local\Temp\3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\dwm\mata.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3800
      • C:\Windows\SysWOW64\wscript.exe
        wscript.exe "C:\Users\Admin\AppData\Local\Temp\dwm\invs.vbs" "C:\Users\Admin\AppData\Local\Temp\dwm\mata2.bat
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:3344
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dwm\mata2.bat" "
          4⤵
            PID:3768
      • C:\Users\Admin\AppData\Local\Temp\notepad .exe
        "C:\Users\Admin\AppData\Local\Temp\notepad .exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4348
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1248
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dwm\stres.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:388
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 300
          3⤵
          • Delays execution with timeout.exe
          PID:2388
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\dwm\melt.bat
        2⤵
          PID:4920

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\dwm\dwm.exe

        Filesize

        1.4MB

        MD5

        e30c81f42a72512d32754e595e80e942

        SHA1

        fe665ba908128e59957ff756a6a7984a0f71b2c6

        SHA256

        3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e

        SHA512

        d5c1c0937ddcea859c4b4fbc4ebdc1c8f8c04f1a49b2082e0968dc6b019d87bae88679983f1322a0fa4db15c1efa853a97375c2e175dfbced240cea89f71f8ff

      • C:\Users\Admin\AppData\Local\Temp\dwm\invs.vbs

        Filesize

        78B

        MD5

        c578d9653b22800c3eb6b6a51219bbb8

        SHA1

        a97aa251901bbe179a48dbc7a0c1872e163b1f2d

        SHA256

        20a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2

        SHA512

        3ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d

      • C:\Users\Admin\AppData\Local\Temp\dwm\mata.bat

        Filesize

        55B

        MD5

        3869b1297bc06c40dc6f5ea31718bff0

        SHA1

        e5653782e1b9744e96986f39193efcc6387738db

        SHA256

        f93541eaa86aee5f93d653aba074dc54036930dce6bc451aa34a8e70040c9b12

        SHA512

        3ba9e57331a04511edc2539827e056f4ad9dde0290638d5e628d1b29e2d367bfc17b1143b1f2cb5f07ebafac68464efdf562d98e29bf2f5622f3773fc0ec5b45

      • C:\Users\Admin\AppData\Local\Temp\dwm\mata2.bat

        Filesize

        56B

        MD5

        be1178e094e74d093f967770b1a7964c

        SHA1

        72be3cc73763b4cf3363aad44893a87090601c1f

        SHA256

        c54a8f69995f08d626a728a4df16011e509f314f6ab9ffaa951def8493198d46

        SHA512

        02af9f756ed552f6f0b14b4ea1482ef4b8479d53c42e35e905b1c67bd0362766d6484613880dbca45c20cb5730f5bdf6ba5d2141e830d1cf971388860492a9e2

      • C:\Users\Admin\AppData\Local\Temp\dwm\rundll11-.txt

        Filesize

        1.4MB

        MD5

        e30c81f42a72512d32754e595e80e942

        SHA1

        fe665ba908128e59957ff756a6a7984a0f71b2c6

        SHA256

        3f572899a22d1111e4169fe2c55f5817a7b1a9e138614e97e9334d809fef334e

        SHA512

        d5c1c0937ddcea859c4b4fbc4ebdc1c8f8c04f1a49b2082e0968dc6b019d87bae88679983f1322a0fa4db15c1efa853a97375c2e175dfbced240cea89f71f8ff

      • C:\Users\Admin\AppData\Local\Temp\dwm\stres.bat

        Filesize

        203B

        MD5

        b925c3b33f6d0202920661322f1ec35f

        SHA1

        1ead16fd004506d5ca48d9fcf39153b59baa50ec

        SHA256

        e5b85a2f172ba9f4f91eb938abb8d53bbf3a354cc84cee404717788d95542f91

        SHA512

        152c5f2a8753d0f369bd268d4c2244abde92bcc7fad0607a0c99aaeacfa91e13e6a6c7aec2ab9a5a34864517df2bbcb2a0d59a6949cd35f1441d3701df9e283b

      • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

        Filesize

        3KB

        MD5

        f94dc819ca773f1e3cb27abbc9e7fa27

        SHA1

        9a7700efadc5ea09ab288544ef1e3cd876255086

        SHA256

        a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92

        SHA512

        72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

      • C:\Users\Admin\AppData\Local\Temp\notepad .exe

        Filesize

        52KB

        MD5

        a64daca3cfbcd039df3ec29d3eddd001

        SHA1

        eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3

        SHA256

        403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36

        SHA512

        b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479

      • C:\Users\Admin\AppData\Local\Temp\notepad .exe

        Filesize

        52KB

        MD5

        a64daca3cfbcd039df3ec29d3eddd001

        SHA1

        eee8b2573f71e8d5c3ee7e53af3e6772e090d0f3

        SHA256

        403752009f29381d5e4036b8be94589c89188f9ce8ef5f86959eaaada019ed36

        SHA512

        b6fe2d0ae3fcd4442579ecf10d498d61e0f042813c8fc4be8019da77d849cfcf0b168507139a1b5697227c272de9091788f8e03cf1ce13d5b5077568cfa6a479

      • memory/388-147-0x0000000000000000-mapping.dmp

      • memory/1248-159-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/1248-157-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/1248-156-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/1248-154-0x0000000000400000-0x0000000000458000-memory.dmp

        Filesize

        352KB

      • memory/1248-153-0x0000000000000000-mapping.dmp

      • memory/1916-152-0x00000000751A0000-0x0000000075751000-memory.dmp

        Filesize

        5.7MB

      • memory/1916-133-0x00000000751A0000-0x0000000075751000-memory.dmp

        Filesize

        5.7MB

      • memory/1916-132-0x00000000751A0000-0x0000000075751000-memory.dmp

        Filesize

        5.7MB

      • memory/2388-149-0x0000000000000000-mapping.dmp

      • memory/3344-137-0x0000000000000000-mapping.dmp

      • memory/3768-140-0x0000000000000000-mapping.dmp

      • memory/3800-134-0x0000000000000000-mapping.dmp

      • memory/4348-136-0x0000000000000000-mapping.dmp

      • memory/4348-146-0x00000000751A0000-0x0000000075751000-memory.dmp

        Filesize

        5.7MB

      • memory/4348-145-0x00000000751A0000-0x0000000075751000-memory.dmp

        Filesize

        5.7MB

      • memory/4348-142-0x0000000000400000-0x000000000046C000-memory.dmp

        Filesize

        432KB

      • memory/4920-151-0x0000000000000000-mapping.dmp