Analysis

  • max time kernel
    257s
  • max time network
    361s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 11:32

General

  • Target

    d0dad8f66c443a86d9c863941d10166c0d512bc59f093eb3dd99ece3fc8aff4b.exe

  • Size

    2.1MB

  • MD5

    3fdd44fca6e5b994734a575c7b7e5069

  • SHA1

    2c6ff085c796a87b321696ce4192b9506e93b611

  • SHA256

    d0dad8f66c443a86d9c863941d10166c0d512bc59f093eb3dd99ece3fc8aff4b

  • SHA512

    ec96c9cedd99624d0c054494c916da1f228a3259dc3fde6e60b28d5d38a57769f5043ae8a94b5a4aacfabd2beae3e77beb828d837413a1bc51eaeaaadb953e04

  • SSDEEP

    49152:kkwkn9IMHeaKP6vC4CS1oR72/nbI9pveshwaPCS:PdnVPCOe4bapvh1PC

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 11 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 11 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 24 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0dad8f66c443a86d9c863941d10166c0d512bc59f093eb3dd99ece3fc8aff4b.exe
    "C:\Users\Admin\AppData\Local\Temp\d0dad8f66c443a86d9c863941d10166c0d512bc59f093eb3dd99ece3fc8aff4b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Users\Admin\AppData\Local\Temp\3991\3991.exe
      "C:\Users\Admin\AppData\Local\Temp\3991\3991.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
        3⤵
        • Accesses Microsoft Outlook accounts
        PID:688
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
        3⤵
          PID:1844
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderprodkey.txt"
          3⤵
            PID:952
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderskypeview.txt"
            3⤵
              PID:1720

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\3991\3991.exe
          Filesize

          936KB

          MD5

          866354c49d56703311d1897559128db5

          SHA1

          06a49e9d211d6f70cb1ae55605b2d554f1d260ea

          SHA256

          001ffaf28b2a853bd11f9fd857add82fc71999742dfe7ba6194f92d8abb76a95

          SHA512

          b23ea56e4051428404e0cdf681d51b3abff982d472f508b050059ead1d3e42930b97744719b7415ec304eeceae129b0c7e94aaafd7a4c51bdd08c386b2b1dd50

        • C:\Users\Admin\AppData\Local\Temp\3991\3991.exe
          Filesize

          936KB

          MD5

          866354c49d56703311d1897559128db5

          SHA1

          06a49e9d211d6f70cb1ae55605b2d554f1d260ea

          SHA256

          001ffaf28b2a853bd11f9fd857add82fc71999742dfe7ba6194f92d8abb76a95

          SHA512

          b23ea56e4051428404e0cdf681d51b3abff982d472f508b050059ead1d3e42930b97744719b7415ec304eeceae129b0c7e94aaafd7a4c51bdd08c386b2b1dd50

        • C:\Users\Admin\AppData\Local\Temp\holderprodkey.txt
          Filesize

          1KB

          MD5

          929de92d1b5214c98ed57d1955a2e693

          SHA1

          52c7facb596d3a24af067e35a420632578d3c8f7

          SHA256

          a620e0183ef4ada64a1a8761ad1abe3819557ebea1b3f5e04b3891000d59de22

          SHA512

          e08ee0efb26ad0d56a528ae8508a362e7115b4822765ab36f52b13ef82ef3945b8e82a6d6bf52ed047d3370f77a98eba3e69224a304f5ff4344f17f76ef4bfc3

        • C:\Users\Admin\AppData\Local\Temp\holderskypeview.txt
          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Local\Temp\holderwb.txt
          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • \Users\Admin\AppData\Local\Temp\3991\3991.exe
          Filesize

          936KB

          MD5

          866354c49d56703311d1897559128db5

          SHA1

          06a49e9d211d6f70cb1ae55605b2d554f1d260ea

          SHA256

          001ffaf28b2a853bd11f9fd857add82fc71999742dfe7ba6194f92d8abb76a95

          SHA512

          b23ea56e4051428404e0cdf681d51b3abff982d472f508b050059ead1d3e42930b97744719b7415ec304eeceae129b0c7e94aaafd7a4c51bdd08c386b2b1dd50

        • \Users\Admin\AppData\Local\Temp\3991\3991.exe
          Filesize

          936KB

          MD5

          866354c49d56703311d1897559128db5

          SHA1

          06a49e9d211d6f70cb1ae55605b2d554f1d260ea

          SHA256

          001ffaf28b2a853bd11f9fd857add82fc71999742dfe7ba6194f92d8abb76a95

          SHA512

          b23ea56e4051428404e0cdf681d51b3abff982d472f508b050059ead1d3e42930b97744719b7415ec304eeceae129b0c7e94aaafd7a4c51bdd08c386b2b1dd50

        • \Users\Admin\AppData\Local\Temp\3991\3991.exe
          Filesize

          936KB

          MD5

          866354c49d56703311d1897559128db5

          SHA1

          06a49e9d211d6f70cb1ae55605b2d554f1d260ea

          SHA256

          001ffaf28b2a853bd11f9fd857add82fc71999742dfe7ba6194f92d8abb76a95

          SHA512

          b23ea56e4051428404e0cdf681d51b3abff982d472f508b050059ead1d3e42930b97744719b7415ec304eeceae129b0c7e94aaafd7a4c51bdd08c386b2b1dd50

        • \Users\Admin\AppData\Local\Temp\3991\3991.exe
          Filesize

          936KB

          MD5

          866354c49d56703311d1897559128db5

          SHA1

          06a49e9d211d6f70cb1ae55605b2d554f1d260ea

          SHA256

          001ffaf28b2a853bd11f9fd857add82fc71999742dfe7ba6194f92d8abb76a95

          SHA512

          b23ea56e4051428404e0cdf681d51b3abff982d472f508b050059ead1d3e42930b97744719b7415ec304eeceae129b0c7e94aaafd7a4c51bdd08c386b2b1dd50

        • memory/664-54-0x0000000075671000-0x0000000075673000-memory.dmp
          Filesize

          8KB

        • memory/688-65-0x0000000000400000-0x000000000041B000-memory.dmp
          Filesize

          108KB

        • memory/688-66-0x0000000000411714-mapping.dmp
        • memory/688-69-0x0000000000400000-0x000000000041B000-memory.dmp
          Filesize

          108KB

        • memory/688-71-0x0000000000400000-0x000000000041B000-memory.dmp
          Filesize

          108KB

        • memory/688-79-0x0000000000400000-0x000000000041B000-memory.dmp
          Filesize

          108KB

        • memory/952-88-0x0000000000400000-0x0000000000415000-memory.dmp
          Filesize

          84KB

        • memory/952-86-0x0000000000400000-0x0000000000415000-memory.dmp
          Filesize

          84KB

        • memory/952-82-0x0000000000400000-0x0000000000415000-memory.dmp
          Filesize

          84KB

        • memory/952-83-0x000000000040BEC0-mapping.dmp
        • memory/1168-63-0x0000000073C60000-0x000000007420B000-memory.dmp
          Filesize

          5.7MB

        • memory/1168-70-0x0000000000C05000-0x0000000000C16000-memory.dmp
          Filesize

          68KB

        • memory/1168-59-0x0000000000000000-mapping.dmp
        • memory/1168-78-0x0000000000C05000-0x0000000000C16000-memory.dmp
          Filesize

          68KB

        • memory/1168-64-0x0000000073C60000-0x000000007420B000-memory.dmp
          Filesize

          5.7MB

        • memory/1720-90-0x000000000043BC50-mapping.dmp
        • memory/1720-89-0x0000000000400000-0x000000000044F000-memory.dmp
          Filesize

          316KB

        • memory/1720-93-0x0000000000400000-0x000000000044F000-memory.dmp
          Filesize

          316KB

        • memory/1720-95-0x0000000000400000-0x000000000044F000-memory.dmp
          Filesize

          316KB

        • memory/1844-72-0x0000000000400000-0x0000000000459000-memory.dmp
          Filesize

          356KB

        • memory/1844-73-0x0000000000442F04-mapping.dmp
        • memory/1844-76-0x0000000000400000-0x0000000000459000-memory.dmp
          Filesize

          356KB

        • memory/1844-81-0x0000000000400000-0x0000000000459000-memory.dmp
          Filesize

          356KB

        • memory/1844-77-0x0000000000400000-0x0000000000459000-memory.dmp
          Filesize

          356KB