Analysis

  • max time kernel
    147s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 01:48

General

  • Target

    019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe

  • Size

    653KB

  • MD5

    522853fc7173f637ae423e558c983ecd

  • SHA1

    fc622564e9b8d2d39197969fd857f85188246b50

  • SHA256

    019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd

  • SHA512

    676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc

  • SSDEEP

    12288:ULmMOBCmXo7OCj+5MlaGBKwFJo6SYrfZfHoA+ybn:ULmxonVj+5MLBK6PrpHZrn

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe
    "C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe
      "C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"
      2⤵
        PID:1192
      • C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe
        "C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"
        2⤵
          PID:1288
        • C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe
          "C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"
          2⤵
            PID:1208
          • C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe
            "C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:812
            • C:\Users\Admin\AppData\Roaming\Windows Update.exe
              "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:568
              • C:\Users\Admin\AppData\Roaming\Windows Update.exe
                "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
                4⤵
                • Executes dropped EXE
                • Deletes itself
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1116
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
                  5⤵
                  • Accesses Microsoft Outlook accounts
                  PID:1560
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
                  5⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2036

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt
          Filesize

          102B

          MD5

          51c13b31a41149833e00bf869af5d9c7

          SHA1

          498834850c5badd9839a567c527beb37fe50313d

          SHA256

          05b831d4e65c1759c69354be763e17df10a45a55e78f2bd053ce54f96cce77ad

          SHA512

          2e441977e6b81e27a7afceb3af0f3d156c7cc601e756d217618edc273bcadbaf8eebf2329dfc60337b04ab4e024c89cb8de2f513e267b53f735a19a325a41579

        • C:\Users\Admin\AppData\Local\Temp\holdermail.txt
          Filesize

          329B

          MD5

          f8ddf0fe04f214d64c3e5094ed622858

          SHA1

          245a91a1c968c45820fbbb319c1bcfc98b01b04e

          SHA256

          f73d76c930aa76b78390a50ee72b9169c7064b9e1256de76ab9ffb43bca8f5d3

          SHA512

          e6385a3d47f8969f2079ae28a4e2753c2da60e37601ebd15049e21f1490e7a1ec760a3cc6c8b75a8049aa8a08735a9f24187d7ad13c6ac8d4a5510dc88718900

        • C:\Users\Admin\AppData\Roaming\Windows Update.exe
          Filesize

          653KB

          MD5

          522853fc7173f637ae423e558c983ecd

          SHA1

          fc622564e9b8d2d39197969fd857f85188246b50

          SHA256

          019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd

          SHA512

          676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc

        • C:\Users\Admin\AppData\Roaming\Windows Update.exe
          Filesize

          653KB

          MD5

          522853fc7173f637ae423e558c983ecd

          SHA1

          fc622564e9b8d2d39197969fd857f85188246b50

          SHA256

          019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd

          SHA512

          676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc

        • C:\Users\Admin\AppData\Roaming\Windows Update.exe
          Filesize

          653KB

          MD5

          522853fc7173f637ae423e558c983ecd

          SHA1

          fc622564e9b8d2d39197969fd857f85188246b50

          SHA256

          019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd

          SHA512

          676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc

        • \Users\Admin\AppData\Roaming\Windows Update.exe
          Filesize

          653KB

          MD5

          522853fc7173f637ae423e558c983ecd

          SHA1

          fc622564e9b8d2d39197969fd857f85188246b50

          SHA256

          019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd

          SHA512

          676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc

        • \Users\Admin\AppData\Roaming\Windows Update.exe
          Filesize

          653KB

          MD5

          522853fc7173f637ae423e558c983ecd

          SHA1

          fc622564e9b8d2d39197969fd857f85188246b50

          SHA256

          019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd

          SHA512

          676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc

        • memory/568-93-0x00000000740E0000-0x000000007468B000-memory.dmp
          Filesize

          5.7MB

        • memory/568-77-0x00000000740E0000-0x000000007468B000-memory.dmp
          Filesize

          5.7MB

        • memory/568-72-0x0000000000000000-mapping.dmp
        • memory/812-61-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/812-70-0x00000000740E0000-0x000000007468B000-memory.dmp
          Filesize

          5.7MB

        • memory/812-67-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/812-65-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/812-63-0x000000000051BB4E-mapping.dmp
        • memory/812-76-0x00000000740E0000-0x000000007468B000-memory.dmp
          Filesize

          5.7MB

        • memory/812-62-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/812-59-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/812-57-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/812-56-0x0000000000400000-0x0000000000522000-memory.dmp
          Filesize

          1.1MB

        • memory/1088-68-0x00000000740E0000-0x000000007468B000-memory.dmp
          Filesize

          5.7MB

        • memory/1088-55-0x00000000740E0000-0x000000007468B000-memory.dmp
          Filesize

          5.7MB

        • memory/1088-54-0x0000000074C91000-0x0000000074C93000-memory.dmp
          Filesize

          8KB

        • memory/1116-94-0x00000000740E0000-0x000000007468B000-memory.dmp
          Filesize

          5.7MB

        • memory/1116-104-0x00000000005E5000-0x00000000005F6000-memory.dmp
          Filesize

          68KB

        • memory/1116-126-0x00000000005E5000-0x00000000005F6000-memory.dmp
          Filesize

          68KB

        • memory/1116-86-0x000000000051BB4E-mapping.dmp
        • memory/1116-96-0x00000000740E0000-0x000000007468B000-memory.dmp
          Filesize

          5.7MB

        • memory/1560-109-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/1560-100-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/1560-106-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/1560-107-0x0000000000462B6D-mapping.dmp
        • memory/1560-97-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/1560-108-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/1560-105-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/1560-98-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/1560-102-0x0000000000400000-0x000000000048E000-memory.dmp
          Filesize

          568KB

        • memory/2036-113-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/2036-115-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/2036-117-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/2036-118-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/2036-119-0x0000000000460E2D-mapping.dmp
        • memory/2036-122-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/2036-123-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/2036-111-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/2036-125-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB

        • memory/2036-110-0x0000000000400000-0x000000000048B000-memory.dmp
          Filesize

          556KB