Analysis

  • max time kernel
    258s
  • max time network
    337s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 08:38

General

  • Target

    e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc.exe

  • Size

    1.4MB

  • MD5

    4cb53d176ff7bcbd128442aae02a099a

  • SHA1

    f36482b9a29ee5e0d200ba2e3243f2b6ff89a635

  • SHA256

    e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc

  • SHA512

    2b86d268176dd5d4597a4d2141570f3736b4bd2ef767ec6da5af392627704c8b99cd1975d017d39af2b99bc048a82f68068e9fdccc9236ec27d9f1eec0299bad

  • SSDEEP

    24576:CiA6O+E+25Zq4qCN3yQtEOzFxa1LBUYrFgzxzFSO2KDAXiW6BlDv:Lrgqc5tza8P0TKP

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 11 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 7 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 11 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc.exe
    "C:\Users\Admin\AppData\Local\Temp\e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:524
    • C:\Windows\SysWOW64\CMD.exe
      "CMD"
      2⤵
        PID:648
      • C:\Windows\SysWOW64\CMD.exe
        "CMD"
        2⤵
          PID:820
        • C:\Users\Admin\AppData\Local\Temp\e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc.exe
          "C:\Users\Admin\AppData\Local\Temp\e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc.exe"
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1392
          • C:\Users\Admin\AppData\Roaming\Windows Update.exe
            "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:952
            • C:\Windows\SysWOW64\CMD.exe
              "CMD"
              4⤵
                PID:1788
              • C:\Windows\SysWOW64\CMD.exe
                "CMD"
                4⤵
                  PID:1324
                • C:\Users\Admin\AppData\Roaming\Windows Update.exe
                  "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
                  4⤵
                  • Executes dropped EXE
                  • Deletes itself
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1508
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
                    5⤵
                      PID:2020
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt" /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
                      5⤵
                        PID:1732

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scripting

              1
              T1064

              Persistence

              Registry Run Keys / Startup Folder

              1
              T1060

              Defense Evasion

              Scripting

              1
              T1064

              Modify Registry

              1
              T1112

              Discovery

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                Filesize

                342B

                MD5

                8046004d47de5fdaa62839b164435b76

                SHA1

                0a19b526458eb52fbf8df339eb343f55338e9b59

                SHA256

                113c45932dd3e68e695ce14daf0e374da3c115994c5c787a180232eb069e9568

                SHA512

                e0d9e474dd1f0fb523c8cc36e82ff18d67985658a9a143b081e13145e4cc8165f17c8bc9ad3f0bcd35c287545a3b442507a768757a56a7fbc0c019ccf12807a6

              • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt
                Filesize

                102B

                MD5

                edce12c3e2927fda6c3dbd6ab1054b4d

                SHA1

                716b2d8289968637c6edf3784659583d843c6ddf

                SHA256

                612499c5e814f763549196ad79500e5863eb71b8b21f8eaa7b3c10541e5b37a5

                SHA512

                c5a344f89ce0833f32069ea150cf2974dd22e063deaf49bd53d282218912439eb3b1c43cfa9d2dab4b18f84b8d5cbba558fc6f0436bf1ed432d4f638d51a4c8a

              • C:\Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.4MB

                MD5

                4cb53d176ff7bcbd128442aae02a099a

                SHA1

                f36482b9a29ee5e0d200ba2e3243f2b6ff89a635

                SHA256

                e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc

                SHA512

                2b86d268176dd5d4597a4d2141570f3736b4bd2ef767ec6da5af392627704c8b99cd1975d017d39af2b99bc048a82f68068e9fdccc9236ec27d9f1eec0299bad

              • C:\Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.4MB

                MD5

                4cb53d176ff7bcbd128442aae02a099a

                SHA1

                f36482b9a29ee5e0d200ba2e3243f2b6ff89a635

                SHA256

                e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc

                SHA512

                2b86d268176dd5d4597a4d2141570f3736b4bd2ef767ec6da5af392627704c8b99cd1975d017d39af2b99bc048a82f68068e9fdccc9236ec27d9f1eec0299bad

              • C:\Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.4MB

                MD5

                4cb53d176ff7bcbd128442aae02a099a

                SHA1

                f36482b9a29ee5e0d200ba2e3243f2b6ff89a635

                SHA256

                e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc

                SHA512

                2b86d268176dd5d4597a4d2141570f3736b4bd2ef767ec6da5af392627704c8b99cd1975d017d39af2b99bc048a82f68068e9fdccc9236ec27d9f1eec0299bad

              • \Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.4MB

                MD5

                4cb53d176ff7bcbd128442aae02a099a

                SHA1

                f36482b9a29ee5e0d200ba2e3243f2b6ff89a635

                SHA256

                e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc

                SHA512

                2b86d268176dd5d4597a4d2141570f3736b4bd2ef767ec6da5af392627704c8b99cd1975d017d39af2b99bc048a82f68068e9fdccc9236ec27d9f1eec0299bad

              • \Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.4MB

                MD5

                4cb53d176ff7bcbd128442aae02a099a

                SHA1

                f36482b9a29ee5e0d200ba2e3243f2b6ff89a635

                SHA256

                e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc

                SHA512

                2b86d268176dd5d4597a4d2141570f3736b4bd2ef767ec6da5af392627704c8b99cd1975d017d39af2b99bc048a82f68068e9fdccc9236ec27d9f1eec0299bad

              • \Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.4MB

                MD5

                4cb53d176ff7bcbd128442aae02a099a

                SHA1

                f36482b9a29ee5e0d200ba2e3243f2b6ff89a635

                SHA256

                e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc

                SHA512

                2b86d268176dd5d4597a4d2141570f3736b4bd2ef767ec6da5af392627704c8b99cd1975d017d39af2b99bc048a82f68068e9fdccc9236ec27d9f1eec0299bad

              • \Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.4MB

                MD5

                4cb53d176ff7bcbd128442aae02a099a

                SHA1

                f36482b9a29ee5e0d200ba2e3243f2b6ff89a635

                SHA256

                e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc

                SHA512

                2b86d268176dd5d4597a4d2141570f3736b4bd2ef767ec6da5af392627704c8b99cd1975d017d39af2b99bc048a82f68068e9fdccc9236ec27d9f1eec0299bad

              • \Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.4MB

                MD5

                4cb53d176ff7bcbd128442aae02a099a

                SHA1

                f36482b9a29ee5e0d200ba2e3243f2b6ff89a635

                SHA256

                e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc

                SHA512

                2b86d268176dd5d4597a4d2141570f3736b4bd2ef767ec6da5af392627704c8b99cd1975d017d39af2b99bc048a82f68068e9fdccc9236ec27d9f1eec0299bad

              • \Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.4MB

                MD5

                4cb53d176ff7bcbd128442aae02a099a

                SHA1

                f36482b9a29ee5e0d200ba2e3243f2b6ff89a635

                SHA256

                e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc

                SHA512

                2b86d268176dd5d4597a4d2141570f3736b4bd2ef767ec6da5af392627704c8b99cd1975d017d39af2b99bc048a82f68068e9fdccc9236ec27d9f1eec0299bad

              • \Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.4MB

                MD5

                4cb53d176ff7bcbd128442aae02a099a

                SHA1

                f36482b9a29ee5e0d200ba2e3243f2b6ff89a635

                SHA256

                e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc

                SHA512

                2b86d268176dd5d4597a4d2141570f3736b4bd2ef767ec6da5af392627704c8b99cd1975d017d39af2b99bc048a82f68068e9fdccc9236ec27d9f1eec0299bad

              • \Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.4MB

                MD5

                4cb53d176ff7bcbd128442aae02a099a

                SHA1

                f36482b9a29ee5e0d200ba2e3243f2b6ff89a635

                SHA256

                e88277164def6f447b033bd93e3f3279518182a538a7ed377af3aba8b30cc4bc

                SHA512

                2b86d268176dd5d4597a4d2141570f3736b4bd2ef767ec6da5af392627704c8b99cd1975d017d39af2b99bc048a82f68068e9fdccc9236ec27d9f1eec0299bad

              • memory/524-55-0x00000000747C0000-0x0000000074D6B000-memory.dmp
                Filesize

                5.7MB

              • memory/524-71-0x00000000747C0000-0x0000000074D6B000-memory.dmp
                Filesize

                5.7MB

              • memory/524-54-0x00000000767C1000-0x00000000767C3000-memory.dmp
                Filesize

                8KB

              • memory/648-56-0x0000000000000000-mapping.dmp
              • memory/820-57-0x0000000000000000-mapping.dmp
              • memory/952-107-0x00000000747C0000-0x0000000074D6B000-memory.dmp
                Filesize

                5.7MB

              • memory/952-74-0x0000000000000000-mapping.dmp
              • memory/952-82-0x00000000747C0000-0x0000000074D6B000-memory.dmp
                Filesize

                5.7MB

              • memory/1324-85-0x0000000000000000-mapping.dmp
              • memory/1392-72-0x00000000747C0000-0x0000000074D6B000-memory.dmp
                Filesize

                5.7MB

              • memory/1392-68-0x0000000000400000-0x00000000004F0000-memory.dmp
                Filesize

                960KB

              • memory/1392-61-0x0000000000400000-0x00000000004F0000-memory.dmp
                Filesize

                960KB

              • memory/1392-58-0x0000000000400000-0x00000000004F0000-memory.dmp
                Filesize

                960KB

              • memory/1392-66-0x0000000000400000-0x00000000004F0000-memory.dmp
                Filesize

                960KB

              • memory/1392-63-0x0000000000400000-0x00000000004F0000-memory.dmp
                Filesize

                960KB

              • memory/1392-64-0x00000000004EB1AE-mapping.dmp
              • memory/1392-62-0x0000000000400000-0x00000000004F0000-memory.dmp
                Filesize

                960KB

              • memory/1392-81-0x00000000747C0000-0x0000000074D6B000-memory.dmp
                Filesize

                5.7MB

              • memory/1392-70-0x00000000747C0000-0x0000000074D6B000-memory.dmp
                Filesize

                5.7MB

              • memory/1392-59-0x0000000000400000-0x00000000004F0000-memory.dmp
                Filesize

                960KB

              • memory/1508-105-0x00000000747C0000-0x0000000074D6B000-memory.dmp
                Filesize

                5.7MB

              • memory/1508-108-0x00000000747C0000-0x0000000074D6B000-memory.dmp
                Filesize

                5.7MB

              • memory/1508-95-0x00000000004EB1AE-mapping.dmp
              • memory/1732-117-0x0000000000400000-0x000000000041B000-memory.dmp
                Filesize

                108KB

              • memory/1732-110-0x0000000000411714-mapping.dmp
              • memory/1732-109-0x0000000000400000-0x000000000041B000-memory.dmp
                Filesize

                108KB

              • memory/1732-115-0x0000000000400000-0x000000000041B000-memory.dmp
                Filesize

                108KB

              • memory/1788-84-0x0000000000000000-mapping.dmp
              • memory/2020-113-0x00000000000003D5-mapping.dmp