Analysis

  • max time kernel
    142s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 15:34

General

  • Target

    9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe

  • Size

    1.6MB

  • MD5

    7920294040c481e979653aa3b0184df8

  • SHA1

    6f8ffd5416fe9d40b7afcab95a382d202e367044

  • SHA256

    9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49

  • SHA512

    f1a450f9b167909263bb329f7245af981c977f01f410e6e154c3ad1b4c5db455039ba23f6a01050841f3e845c057f6d9b26bff2cdcb8364becdc837d998634dd

  • SSDEEP

    49152:ZUdM+MZVtNmqtmr29Sl67GkmdfTeWFbni92VKk7iDIZE:CdmNvt829K2Kf3eDj

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe
    "C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe
      "C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe"
      2⤵
        PID:1104
      • C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe
        "C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe"
        2⤵
          PID:1736
        • C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe
          "C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe"
          2⤵
            PID:1692
          • C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe
            "C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe"
            2⤵
              PID:1916
            • C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe
              "C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe"
              2⤵
                PID:1052
              • C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe
                "C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe"
                2⤵
                  PID:580
                • C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe
                  "C:\Users\Admin\AppData\Local\Temp\9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49.exe"
                  2⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1724
                  • C:\Users\Admin\AppData\Roaming\Windows Update.exe
                    "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Maps connected drives based on registry
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1536
                    • C:\Users\Admin\AppData\Roaming\Windows Update.exe
                      "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
                      4⤵
                      • Executes dropped EXE
                      • Deletes itself
                      • Adds Run key to start application
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:1852
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
                        5⤵
                        • Accesses Microsoft Outlook accounts
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1596
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
                        5⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1148

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt
                Filesize

                102B

                MD5

                fdbbb3a4f34e578bab1246d03496dfe7

                SHA1

                76f6e45dbb8497f225769101f5135f3c9bc5d06e

                SHA256

                699ce29e69ee7beda5d425a89e9f62ef81bfd21793f066d1974eadcab1df7bbe

                SHA512

                24dbc8f3e9e420ca54ba8ffdc2987b7f85115cdba14031bbefaae40a2686e29e173f8c39796f19e13e51679e799d1beeb8c8b2e3f163c2a9ba207c235ef8450f

              • C:\Users\Admin\AppData\Local\Temp\holdermail.txt
                Filesize

                400B

                MD5

                de4e5ff058882957cf8a3b5f839a031f

                SHA1

                0b3d8279120fb5fa27efbd9eee89695aa040fc24

                SHA256

                ef54f46b9f1e342fc12e035ae94f57c61ea4e8be4e116f0a1c6f86310f400f49

                SHA512

                a6b0d557e9eec4e56630e5ba64495df318f4fd959fffbdcbf77831185b067906917c9117a0ecd6ac817c7860d5d831cce15820d715657d81e2d817d9fab9fb72

              • C:\Users\Admin\AppData\Local\Temp\holdermail.txt
                Filesize

                329B

                MD5

                f8ddf0fe04f214d64c3e5094ed622858

                SHA1

                245a91a1c968c45820fbbb319c1bcfc98b01b04e

                SHA256

                f73d76c930aa76b78390a50ee72b9169c7064b9e1256de76ab9ffb43bca8f5d3

                SHA512

                e6385a3d47f8969f2079ae28a4e2753c2da60e37601ebd15049e21f1490e7a1ec760a3cc6c8b75a8049aa8a08735a9f24187d7ad13c6ac8d4a5510dc88718900

              • C:\Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.6MB

                MD5

                7920294040c481e979653aa3b0184df8

                SHA1

                6f8ffd5416fe9d40b7afcab95a382d202e367044

                SHA256

                9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49

                SHA512

                f1a450f9b167909263bb329f7245af981c977f01f410e6e154c3ad1b4c5db455039ba23f6a01050841f3e845c057f6d9b26bff2cdcb8364becdc837d998634dd

              • C:\Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.6MB

                MD5

                7920294040c481e979653aa3b0184df8

                SHA1

                6f8ffd5416fe9d40b7afcab95a382d202e367044

                SHA256

                9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49

                SHA512

                f1a450f9b167909263bb329f7245af981c977f01f410e6e154c3ad1b4c5db455039ba23f6a01050841f3e845c057f6d9b26bff2cdcb8364becdc837d998634dd

              • C:\Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.6MB

                MD5

                7920294040c481e979653aa3b0184df8

                SHA1

                6f8ffd5416fe9d40b7afcab95a382d202e367044

                SHA256

                9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49

                SHA512

                f1a450f9b167909263bb329f7245af981c977f01f410e6e154c3ad1b4c5db455039ba23f6a01050841f3e845c057f6d9b26bff2cdcb8364becdc837d998634dd

              • \Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.6MB

                MD5

                7920294040c481e979653aa3b0184df8

                SHA1

                6f8ffd5416fe9d40b7afcab95a382d202e367044

                SHA256

                9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49

                SHA512

                f1a450f9b167909263bb329f7245af981c977f01f410e6e154c3ad1b4c5db455039ba23f6a01050841f3e845c057f6d9b26bff2cdcb8364becdc837d998634dd

              • \Users\Admin\AppData\Roaming\Windows Update.exe
                Filesize

                1.6MB

                MD5

                7920294040c481e979653aa3b0184df8

                SHA1

                6f8ffd5416fe9d40b7afcab95a382d202e367044

                SHA256

                9a53fefa798c0d51e309fe0ceeba84d52f4481e3234cadc18df73a547c0e2d49

                SHA512

                f1a450f9b167909263bb329f7245af981c977f01f410e6e154c3ad1b4c5db455039ba23f6a01050841f3e845c057f6d9b26bff2cdcb8364becdc837d998634dd

              • memory/1148-123-0x0000000000460E2D-mapping.dmp
              • memory/1148-121-0x0000000000400000-0x000000000048B000-memory.dmp
                Filesize

                556KB

              • memory/1148-115-0x0000000000400000-0x000000000048B000-memory.dmp
                Filesize

                556KB

              • memory/1148-128-0x0000000000400000-0x000000000048B000-memory.dmp
                Filesize

                556KB

              • memory/1148-119-0x0000000000400000-0x000000000048B000-memory.dmp
                Filesize

                556KB

              • memory/1148-126-0x0000000000400000-0x000000000048B000-memory.dmp
                Filesize

                556KB

              • memory/1148-122-0x0000000000400000-0x000000000048B000-memory.dmp
                Filesize

                556KB

              • memory/1148-117-0x0000000000400000-0x000000000048B000-memory.dmp
                Filesize

                556KB

              • memory/1148-114-0x0000000000400000-0x000000000048B000-memory.dmp
                Filesize

                556KB

              • memory/1288-70-0x00000000745E0000-0x0000000074B8B000-memory.dmp
                Filesize

                5.7MB

              • memory/1288-55-0x00000000745E0000-0x0000000074B8B000-memory.dmp
                Filesize

                5.7MB

              • memory/1288-54-0x0000000075FE1000-0x0000000075FE3000-memory.dmp
                Filesize

                8KB

              • memory/1536-77-0x00000000745E0000-0x0000000074B8B000-memory.dmp
                Filesize

                5.7MB

              • memory/1536-72-0x0000000000000000-mapping.dmp
              • memory/1536-93-0x00000000745E0000-0x0000000074B8B000-memory.dmp
                Filesize

                5.7MB

              • memory/1596-96-0x0000000000400000-0x000000000048E000-memory.dmp
                Filesize

                568KB

              • memory/1596-113-0x0000000000400000-0x000000000048E000-memory.dmp
                Filesize

                568KB

              • memory/1596-97-0x0000000000400000-0x000000000048E000-memory.dmp
                Filesize

                568KB

              • memory/1596-99-0x0000000000400000-0x000000000048E000-memory.dmp
                Filesize

                568KB

              • memory/1596-101-0x0000000000400000-0x000000000048E000-memory.dmp
                Filesize

                568KB

              • memory/1596-103-0x0000000000400000-0x000000000048E000-memory.dmp
                Filesize

                568KB

              • memory/1596-104-0x0000000000400000-0x000000000048E000-memory.dmp
                Filesize

                568KB

              • memory/1596-105-0x0000000000462B6D-mapping.dmp
              • memory/1596-108-0x0000000000400000-0x000000000048E000-memory.dmp
                Filesize

                568KB

              • memory/1596-110-0x0000000000400000-0x000000000048E000-memory.dmp
                Filesize

                568KB

              • memory/1724-62-0x0000000000400000-0x0000000000522000-memory.dmp
                Filesize

                1.1MB

              • memory/1724-63-0x000000000051BB4E-mapping.dmp
              • memory/1724-56-0x0000000000400000-0x0000000000522000-memory.dmp
                Filesize

                1.1MB

              • memory/1724-57-0x0000000000400000-0x0000000000522000-memory.dmp
                Filesize

                1.1MB

              • memory/1724-76-0x00000000745E0000-0x0000000074B8B000-memory.dmp
                Filesize

                5.7MB

              • memory/1724-69-0x00000000745E0000-0x0000000074B8B000-memory.dmp
                Filesize

                5.7MB

              • memory/1724-59-0x0000000000400000-0x0000000000522000-memory.dmp
                Filesize

                1.1MB

              • memory/1724-65-0x0000000000400000-0x0000000000522000-memory.dmp
                Filesize

                1.1MB

              • memory/1724-67-0x0000000000400000-0x0000000000522000-memory.dmp
                Filesize

                1.1MB

              • memory/1724-61-0x0000000000400000-0x0000000000522000-memory.dmp
                Filesize

                1.1MB

              • memory/1852-109-0x0000000000665000-0x0000000000676000-memory.dmp
                Filesize

                68KB

              • memory/1852-111-0x00000000745E0000-0x0000000074B8B000-memory.dmp
                Filesize

                5.7MB

              • memory/1852-94-0x00000000745E0000-0x0000000074B8B000-memory.dmp
                Filesize

                5.7MB

              • memory/1852-86-0x000000000051BB4E-mapping.dmp
              • memory/1852-129-0x0000000000665000-0x0000000000676000-memory.dmp
                Filesize

                68KB