Analysis

  • max time kernel
    148s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 02:13

General

  • Target

    a3ad6380bb7ca56ce6b0198ccbee6d4782510dbcbb31681ced66387496081a3e.exe

  • Size

    550KB

  • MD5

    5a9fff2de2f9912b553c6d4d2eab3d66

  • SHA1

    e43bd2c688b48db645d37a598eeccf9c7570b99e

  • SHA256

    a3ad6380bb7ca56ce6b0198ccbee6d4782510dbcbb31681ced66387496081a3e

  • SHA512

    9c99e8ecdd55738cb51d661e34f654d6e25293d92041da281327a3dd73b0c28b917e6fbed4164ab3f9195fd5e120f3be598f6395872db15fcb200a9c7897d7db

  • SSDEEP

    12288:PBFZTK6hTEJmB5yC9TgIdwV1FqMd+f7eZX:PBFZu6h0mZpDK+f7e

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • NirSoft MailPassView 6 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 6 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3ad6380bb7ca56ce6b0198ccbee6d4782510dbcbb31681ced66387496081a3e.exe
    "C:\Users\Admin\AppData\Local\Temp\a3ad6380bb7ca56ce6b0198ccbee6d4782510dbcbb31681ced66387496081a3e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Users\Admin\AppData\Local\Temp\a3ad6380bb7ca56ce6b0198ccbee6d4782510dbcbb31681ced66387496081a3e.exe
      "C:\Users\Admin\AppData\Local\Temp\a3ad6380bb7ca56ce6b0198ccbee6d4782510dbcbb31681ced66387496081a3e.exe"
      2⤵
        PID:4108
      • C:\Users\Admin\AppData\Local\Temp\a3ad6380bb7ca56ce6b0198ccbee6d4782510dbcbb31681ced66387496081a3e.exe
        "C:\Users\Admin\AppData\Local\Temp\a3ad6380bb7ca56ce6b0198ccbee6d4782510dbcbb31681ced66387496081a3e.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:2004
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:5052

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\a3ad6380bb7ca56ce6b0198ccbee6d4782510dbcbb31681ced66387496081a3e.exe.log
      Filesize

      400B

      MD5

      0a9b4592cd49c3c21f6767c2dabda92f

      SHA1

      f534297527ae5ccc0ecb2221ddeb8e58daeb8b74

      SHA256

      c7effe9cb81a70d738dee863991afefab040290d4c4b78b4202383bcb9f88fcd

      SHA512

      6b878df474e5bbfb8e9e265f15a76560c2ef151dcebc6388c82d7f6f86ffaf83f5ade5a09f1842e493cb6c8fd63b0b88d088c728fd725f7139f965a5ee332307

    • C:\Users\Admin\AppData\Local\Temp\holdermail.txt
      Filesize

      3KB

      MD5

      f94dc819ca773f1e3cb27abbc9e7fa27

      SHA1

      9a7700efadc5ea09ab288544ef1e3cd876255086

      SHA256

      a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92

      SHA512

      72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

    • memory/964-132-0x0000000074E30000-0x00000000753E1000-memory.dmp
      Filesize

      5.7MB

    • memory/964-139-0x0000000074E30000-0x00000000753E1000-memory.dmp
      Filesize

      5.7MB

    • memory/2004-141-0x0000000000000000-mapping.dmp
    • memory/2004-146-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2004-145-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2004-144-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2004-142-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2752-137-0x0000000074E30000-0x00000000753E1000-memory.dmp
      Filesize

      5.7MB

    • memory/2752-140-0x0000000074E30000-0x00000000753E1000-memory.dmp
      Filesize

      5.7MB

    • memory/2752-138-0x0000000074E30000-0x00000000753E1000-memory.dmp
      Filesize

      5.7MB

    • memory/2752-135-0x0000000000400000-0x000000000048C000-memory.dmp
      Filesize

      560KB

    • memory/2752-134-0x0000000000000000-mapping.dmp
    • memory/4108-133-0x0000000000000000-mapping.dmp
    • memory/5052-147-0x0000000000000000-mapping.dmp
    • memory/5052-148-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/5052-150-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/5052-151-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/5052-153-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB