Analysis

  • max time kernel
    158s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 15:21

General

  • Target

    2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe

  • Size

    1.1MB

  • MD5

    ba3cc56d2789e98e6ec31a5d3a455dc9

  • SHA1

    598a791b139482c0dfe5b82efce49ab33e45937e

  • SHA256

    2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4

  • SHA512

    f4cd0461956a3dce719f5f683a214ab1ef9c88537073810b3afa9ad21c9df7cb61df44869c486ac53c5c9a61ad30764737b4e30a7fcc5f97e208572b6b6f93e4

  • SSDEEP

    24576:/L/VPEY9IouAH3TDnIODApL76fjpDxuGhQHJEocBRBkPU7:DVPEKIQDDnIOs576pDxuG+pE5XWw

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 7 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 8 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 12 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe
    "C:\Users\Admin\AppData\Local\Temp\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3648
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
        3⤵
        • Accesses Microsoft Outlook accounts
        PID:2592
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4832
    • C:\Users\Admin\AppData\Local\Temp\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe
      C:\Users\Admin\AppData\Local\Temp\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe
      2⤵
        PID:4676

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Defense Evasion

    Scripting

    1
    T1064

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\2c62d991fc6be811acae1abb5c4f7a917c903e1b224d1f37ddf2f622ab0c33f4.exe.log
      Filesize

      408B

      MD5

      40b0c3caa1b14a4c83e8475c46bf2016

      SHA1

      af9575cda4d842f028d18b17063796a894ecd9d0

      SHA256

      70e88a428d92b6ab5905dac9f324824c4c6f120bc3f385c82b2d12f707a4a867

      SHA512

      916437df737de4b6063b7116b4d148229d4a975eb4046122d47434b81fba06e88e09e5f273ec496c81ef3feecb843ccad20a7a04074224416c1fa9951acbdac7

    • C:\Users\Admin\AppData\Local\Temp\holderwb.txt
      Filesize

      3KB

      MD5

      f94dc819ca773f1e3cb27abbc9e7fa27

      SHA1

      9a7700efadc5ea09ab288544ef1e3cd876255086

      SHA256

      a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92

      SHA512

      72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      Filesize

      521KB

      MD5

      1d1d46f74986d9bb59d9c1168b61f352

      SHA1

      8a3c0da1a653fd6d6b96606ec5a9cf53be3e9465

      SHA256

      6e9e3275d56c24e7e13dfe749dd0c8999ffba6f2aba184f108b226175c798514

      SHA512

      2c70656c99b72d7bfb15fa58523b3825f416b5525c8e5f293be41fb3de6fa708cb68c79575ec8015d6259df99eb4645368f403ed23df1c2f7db93b3ad73ad9cd

    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      Filesize

      521KB

      MD5

      1d1d46f74986d9bb59d9c1168b61f352

      SHA1

      8a3c0da1a653fd6d6b96606ec5a9cf53be3e9465

      SHA256

      6e9e3275d56c24e7e13dfe749dd0c8999ffba6f2aba184f108b226175c798514

      SHA512

      2c70656c99b72d7bfb15fa58523b3825f416b5525c8e5f293be41fb3de6fa708cb68c79575ec8015d6259df99eb4645368f403ed23df1c2f7db93b3ad73ad9cd

    • memory/1392-140-0x00000000751A0000-0x0000000075751000-memory.dmp
      Filesize

      5.7MB

    • memory/1392-133-0x00000000751A0000-0x0000000075751000-memory.dmp
      Filesize

      5.7MB

    • memory/1392-132-0x00000000751A0000-0x0000000075751000-memory.dmp
      Filesize

      5.7MB

    • memory/2592-148-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2592-146-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2592-149-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2592-145-0x0000000000000000-mapping.dmp
    • memory/3648-134-0x0000000000000000-mapping.dmp
    • memory/3648-139-0x00000000751A0000-0x0000000075751000-memory.dmp
      Filesize

      5.7MB

    • memory/3648-144-0x00000000751A0000-0x0000000075751000-memory.dmp
      Filesize

      5.7MB

    • memory/4676-143-0x00000000751A0000-0x0000000075751000-memory.dmp
      Filesize

      5.7MB

    • memory/4676-137-0x0000000000000000-mapping.dmp
    • memory/4676-138-0x0000000000400000-0x0000000000488000-memory.dmp
      Filesize

      544KB

    • memory/4676-141-0x00000000751A0000-0x0000000075751000-memory.dmp
      Filesize

      5.7MB

    • memory/4832-150-0x0000000000000000-mapping.dmp
    • memory/4832-151-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/4832-153-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/4832-154-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/4832-156-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB