Analysis

  • max time kernel
    139s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 15:21

General

  • Target

    2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe

  • Size

    1.1MB

  • MD5

    ba3cc56d2789e98e6ec31a5d3a455dc9

  • SHA1

    598a791b139482c0dfe5b82efce49ab33e45937e

  • SHA256

    2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4

  • SHA512

    f4cd0461956a3dce719f5f683a214ab1ef9c88537073810b3afa9ad21c9df7cb61df44869c486ac53c5c9a61ad30764737b4e30a7fcc5f97e208572b6b6f93e4

  • SSDEEP

    24576:/L/VPEY9IouAH3TDnIODApL76fjpDxuGhQHJEocBRBkPU7:DVPEKIQDDnIOs576pDxuG+pE5XWw

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 14 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 14 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 19 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe
    "C:\Users\Admin\AppData\Local\Temp\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
        3⤵
        • Accesses Microsoft Outlook accounts
        PID:884
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
        3⤵
          PID:1900
      • C:\Users\Admin\AppData\Local\Temp\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe
        C:\Users\Admin\AppData\Local\Temp\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe
        2⤵
          PID:1568

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scripting

      1
      T1064

      Defense Evasion

      Scripting

      1
      T1064

      Discovery

      System Information Discovery

      1
      T1082

      Collection

      Email Collection

      1
      T1114

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\holderwb.txt
        Filesize

        2B

        MD5

        f3b25701fe362ec84616a93a45ce9998

        SHA1

        d62636d8caec13f04e28442a0a6fa1afeb024bbb

        SHA256

        b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

        SHA512

        98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        Filesize

        521KB

        MD5

        1d1d46f74986d9bb59d9c1168b61f352

        SHA1

        8a3c0da1a653fd6d6b96606ec5a9cf53be3e9465

        SHA256

        6e9e3275d56c24e7e13dfe749dd0c8999ffba6f2aba184f108b226175c798514

        SHA512

        2c70656c99b72d7bfb15fa58523b3825f416b5525c8e5f293be41fb3de6fa708cb68c79575ec8015d6259df99eb4645368f403ed23df1c2f7db93b3ad73ad9cd

      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        Filesize

        521KB

        MD5

        1d1d46f74986d9bb59d9c1168b61f352

        SHA1

        8a3c0da1a653fd6d6b96606ec5a9cf53be3e9465

        SHA256

        6e9e3275d56c24e7e13dfe749dd0c8999ffba6f2aba184f108b226175c798514

        SHA512

        2c70656c99b72d7bfb15fa58523b3825f416b5525c8e5f293be41fb3de6fa708cb68c79575ec8015d6259df99eb4645368f403ed23df1c2f7db93b3ad73ad9cd

      • \Users\Admin\AppData\Local\Temp\tmp.exe
        Filesize

        521KB

        MD5

        1d1d46f74986d9bb59d9c1168b61f352

        SHA1

        8a3c0da1a653fd6d6b96606ec5a9cf53be3e9465

        SHA256

        6e9e3275d56c24e7e13dfe749dd0c8999ffba6f2aba184f108b226175c798514

        SHA512

        2c70656c99b72d7bfb15fa58523b3825f416b5525c8e5f293be41fb3de6fa708cb68c79575ec8015d6259df99eb4645368f403ed23df1c2f7db93b3ad73ad9cd

      • memory/864-74-0x00000000742C0000-0x000000007486B000-memory.dmp
        Filesize

        5.7MB

      • memory/864-55-0x00000000742C0000-0x000000007486B000-memory.dmp
        Filesize

        5.7MB

      • memory/864-54-0x0000000075141000-0x0000000075143000-memory.dmp
        Filesize

        8KB

      • memory/884-91-0x0000000000400000-0x000000000041B000-memory.dmp
        Filesize

        108KB

      • memory/884-84-0x0000000000400000-0x000000000041B000-memory.dmp
        Filesize

        108KB

      • memory/884-81-0x0000000000400000-0x000000000041B000-memory.dmp
        Filesize

        108KB

      • memory/884-78-0x0000000000411654-mapping.dmp
      • memory/884-77-0x0000000000400000-0x000000000041B000-memory.dmp
        Filesize

        108KB

      • memory/944-82-0x00000000742C0000-0x000000007486B000-memory.dmp
        Filesize

        5.7MB

      • memory/944-83-0x0000000000425000-0x0000000000436000-memory.dmp
        Filesize

        68KB

      • memory/944-57-0x0000000000000000-mapping.dmp
      • memory/944-92-0x0000000000425000-0x0000000000436000-memory.dmp
        Filesize

        68KB

      • memory/944-76-0x00000000742C0000-0x000000007486B000-memory.dmp
        Filesize

        5.7MB

      • memory/1568-64-0x0000000000400000-0x0000000000488000-memory.dmp
        Filesize

        544KB

      • memory/1568-61-0x0000000000400000-0x0000000000488000-memory.dmp
        Filesize

        544KB

      • memory/1568-66-0x0000000000400000-0x0000000000488000-memory.dmp
        Filesize

        544KB

      • memory/1568-68-0x0000000000480C0E-mapping.dmp
      • memory/1568-72-0x0000000000400000-0x0000000000488000-memory.dmp
        Filesize

        544KB

      • memory/1568-62-0x0000000000400000-0x0000000000488000-memory.dmp
        Filesize

        544KB

      • memory/1568-70-0x0000000000400000-0x0000000000488000-memory.dmp
        Filesize

        544KB

      • memory/1568-75-0x00000000742C0000-0x000000007486B000-memory.dmp
        Filesize

        5.7MB

      • memory/1568-67-0x0000000000400000-0x0000000000488000-memory.dmp
        Filesize

        544KB

      • memory/1900-90-0x0000000000400000-0x0000000000458000-memory.dmp
        Filesize

        352KB

      • memory/1900-89-0x0000000000400000-0x0000000000458000-memory.dmp
        Filesize

        352KB

      • memory/1900-86-0x0000000000442628-mapping.dmp
      • memory/1900-85-0x0000000000400000-0x0000000000458000-memory.dmp
        Filesize

        352KB

      • memory/1900-94-0x0000000000400000-0x0000000000458000-memory.dmp
        Filesize

        352KB