Analysis

  • max time kernel
    170s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 07:50

General

  • Target

    8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe

  • Size

    562KB

  • MD5

    898ef852ab68d02e36300b2e07e696fe

  • SHA1

    564e18049c7962e6f9640ac30eebd9906651432d

  • SHA256

    8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25

  • SHA512

    43d278784d2cbb7a0ce34e1b1023e2acc9da6d78cfa361fb126bd62edbb919b8e7a2e1a374a8631a9e16bd60d2fe91c38289cc05ebe0fa8e96dff0cb2f17bc89

  • SSDEEP

    12288:4My9E1SnPKqz35dxs50H3yLs7C109Zoir1FkGsrsKfCEvHom+K/RHekSF5G2:4MUrX35dWmYmzuir1FGsMCvm7HG53

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 8 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 9 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 13 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe
    "C:\Users\Admin\AppData\Local\Temp\8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mwqezls7.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3732
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3B45.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3B44.tmp"
        3⤵
          PID:3172
      • C:\Users\Admin\AppData\Local\Temp\8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe
        "C:\Users\Admin\AppData\Local\Temp\8bbc573a3e24a5fb911e862638759a1dd1120b8cda5986ada98f92faac1a5f25.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3128
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          3⤵
          • Accesses Microsoft Outlook accounts
          PID:3368
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2772
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\HxXtlhgW.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4732
        • C:\Windows\SysWOW64\reg.exe
          reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\HxXtlhgW.exe
          3⤵
          • Adds Run key to start application
          PID:1760

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Collection

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES3B45.tmp
      Filesize

      1KB

      MD5

      a5ee890ccb19f125a50488961bad402a

      SHA1

      34ca141c95e610b6186de934ffe605614765eeee

      SHA256

      9989b0efae6d68202862af8c55f140432d3d8d1a59ace4590178603e79154766

      SHA512

      066304a45b255d6800389452db895df491e5f3af1e7cafc1ddb39b4144bb0245852efa7f7449427b72d90db5fe39e8d8e37ac77ff2c736f9aa75b76e015bedaa

    • C:\Users\Admin\AppData\Local\Temp\holderwb.txt
      Filesize

      3KB

      MD5

      f94dc819ca773f1e3cb27abbc9e7fa27

      SHA1

      9a7700efadc5ea09ab288544ef1e3cd876255086

      SHA256

      a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92

      SHA512

      72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

    • C:\Users\Admin\AppData\Local\Temp\mwqezls7.dll
      Filesize

      1.1MB

      MD5

      203894498a1da31910c04446c2e5ece1

      SHA1

      68ff3a137817caa46fdc03eb7d27f2aece89ca98

      SHA256

      fa649f6d722274577c6c2b03786a6561941c2d1a13c3abe41f218e469e8125a3

      SHA512

      81bb71114b021b51e488f43bf03ec5dc6b9cbbe9354f281040bcc54f223fa2899c26763b414c75ecdf1f2d61753fe6c3b324cf5919fcc82da5d40d4fed8225ad

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC3B44.tmp
      Filesize

      652B

      MD5

      966fea66b4df31c241bb60c810925dae

      SHA1

      36ffdcf23002dd13e307c6d73190cf1f3f594635

      SHA256

      6941cf40e15916d966f5ff5b12d0da1a395a850dd54bf1a3c2911585352a7188

      SHA512

      175dfe15005f36ba51247e8a063f2e9aa2a446cbac34643fea91a5f68e000dc7d1afd44163a3d35a2e4f84486a70b5d901f90337aba286f7a1785d3465cc7b01

    • \??\c:\Users\Admin\AppData\Local\Temp\mwqezls7.cmdline
      Filesize

      195B

      MD5

      0dc989408041ef68fcbc6c4340921c7d

      SHA1

      0b6f8ee970a25a99fb7d64287e12eb4ff4f48f71

      SHA256

      08854029b47dcd0a3285feb88b2f51e1e6d46d3ad89e3862f90ee6fae64dfebd

      SHA512

      00f3169fbc3a6a6b1c3755b7105550938160d28c3ad6814b848eafa32ba3d4143676aa43f27328f58bea7f8d1554355378e6bd2f1933f4c4afbc3729b3957016

    • \??\c:\Users\Admin\AppData\Local\Temp\tmp659.tmp.txt
      Filesize

      551KB

      MD5

      01082166169ab352b62b7dfe5e40ce37

      SHA1

      cf3cf6bf578afabb77f5f53960a6adebd6f9f37c

      SHA256

      f5d003a70496052da6a8ae94c2a5da2f1ceced0ba0208f7db451a1ccc1dd6ca5

      SHA512

      4838105ebb3a92ee02488da8abd5add8a9da108d57a3ee593562ad0766337db776860cf05d0085138dbdcedf5dd5b3372fa8a80b588384bed1caf82f315eb050

    • memory/1760-146-0x0000000000000000-mapping.dmp
    • memory/1916-132-0x00000000748F0000-0x0000000074EA1000-memory.dmp
      Filesize

      5.7MB

    • memory/2772-155-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/2772-157-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/2772-154-0x0000000000000000-mapping.dmp
    • memory/2772-158-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/2772-160-0x0000000000400000-0x0000000000458000-memory.dmp
      Filesize

      352KB

    • memory/3128-143-0x0000000000400000-0x0000000000484000-memory.dmp
      Filesize

      528KB

    • memory/3128-147-0x00000000748F0000-0x0000000074EA1000-memory.dmp
      Filesize

      5.7MB

    • memory/3128-148-0x00000000748F0000-0x0000000074EA1000-memory.dmp
      Filesize

      5.7MB

    • memory/3128-142-0x0000000000400000-0x0000000000484000-memory.dmp
      Filesize

      528KB

    • memory/3128-141-0x0000000000400000-0x0000000000484000-memory.dmp
      Filesize

      528KB

    • memory/3128-140-0x0000000000000000-mapping.dmp
    • memory/3172-136-0x0000000000000000-mapping.dmp
    • memory/3368-152-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/3368-153-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/3368-150-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/3368-149-0x0000000000000000-mapping.dmp
    • memory/3732-133-0x0000000000000000-mapping.dmp
    • memory/4732-145-0x0000000000000000-mapping.dmp