Analysis

  • max time kernel
    178s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 18:00

General

  • Target

    26208c834b6cf1ceaafe62ff1398b479db24e2dd92c0e61e38b05f90fbc34749.exe

  • Size

    1005KB

  • MD5

    ba11d47be9d8609d31c1e71c839ccfef

  • SHA1

    5829d66ab0ac2b626c826a7656aaca439eeed2f7

  • SHA256

    26208c834b6cf1ceaafe62ff1398b479db24e2dd92c0e61e38b05f90fbc34749

  • SHA512

    8cc56f8a491fd0cb07a803f9ee1ba07c8ab3fde814decb3f5c53096ac3a47362b5ddab2caad787ac215d13d095ef6dc3df8e4196ee98cba51d69a34c7fe75693

  • SSDEEP

    24576:ajr1UHd4dk8XzoE7vOFH91VYyNEJ96HJPi8UnQsWqSfz3:Ir3d2GvOh9gYEJ0Vi8UnSfz

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 6 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 6 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 11 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26208c834b6cf1ceaafe62ff1398b479db24e2dd92c0e61e38b05f90fbc34749.exe
    "C:\Users\Admin\AppData\Local\Temp\26208c834b6cf1ceaafe62ff1398b479db24e2dd92c0e61e38b05f90fbc34749.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3476
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
        3⤵
          PID:2132
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
          3⤵
            PID:4956
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderprodkey.txt"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2264
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 188
              4⤵
              • Program crash
              PID:4688
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 188
              4⤵
              • Program crash
              PID:1268
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt" /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
            3⤵
            • Accesses Microsoft Outlook accounts
            PID:1888
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt" /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
            3⤵
              PID:536
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
              dw20.exe -x -s 2648
              3⤵
              • Drops file in Windows directory
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious use of AdjustPrivilegeToken
              PID:4636
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" /ESILlzCw /C:\Users\Admin\AppData\Roaming\ESILlzCw\ESILlzCw.exe
            2⤵
              PID:1492
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe" /ESILlzCw /C:\Users\Admin\AppData\Roaming\ESILlzCw\ESILlzCw.exe
              2⤵
              • Adds Run key to start application
              PID:2700
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2264 -ip 2264
            1⤵
              PID:2168

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Execution

            Scripting

            1
            T1064

            Persistence

            Registry Run Keys / Startup Folder

            1
            T1060

            Defense Evasion

            Scripting

            1
            T1064

            Modify Registry

            1
            T1112

            Discovery

            Query Registry

            2
            T1012

            System Information Discovery

            2
            T1082

            Collection

            Email Collection

            1
            T1114

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/536-165-0x0000000000400000-0x0000000000459000-memory.dmp
              Filesize

              356KB

            • memory/536-163-0x0000000000400000-0x0000000000459000-memory.dmp
              Filesize

              356KB

            • memory/536-156-0x0000000000400000-0x0000000000459000-memory.dmp
              Filesize

              356KB

            • memory/536-147-0x0000000000400000-0x0000000000459000-memory.dmp
              Filesize

              356KB

            • memory/536-143-0x0000000000000000-mapping.dmp
            • memory/1492-138-0x0000000000000000-mapping.dmp
            • memory/1888-146-0x0000000000400000-0x000000000041B000-memory.dmp
              Filesize

              108KB

            • memory/1888-162-0x0000000000400000-0x000000000041B000-memory.dmp
              Filesize

              108KB

            • memory/1888-159-0x0000000000400000-0x000000000041B000-memory.dmp
              Filesize

              108KB

            • memory/1888-157-0x0000000000400000-0x000000000041B000-memory.dmp
              Filesize

              108KB

            • memory/1888-144-0x0000000000000000-mapping.dmp
            • memory/2132-153-0x0000000000000000-mapping.dmp
            • memory/2264-142-0x0000000000000000-mapping.dmp
            • memory/2264-145-0x0000000000400000-0x0000000000415000-memory.dmp
              Filesize

              84KB

            • memory/2700-149-0x0000000075080000-0x0000000075631000-memory.dmp
              Filesize

              5.7MB

            • memory/2700-141-0x0000000075080000-0x0000000075631000-memory.dmp
              Filesize

              5.7MB

            • memory/2700-139-0x0000000000000000-mapping.dmp
            • memory/2700-140-0x0000000000400000-0x0000000000408000-memory.dmp
              Filesize

              32KB

            • memory/2700-161-0x0000000075080000-0x0000000075631000-memory.dmp
              Filesize

              5.7MB

            • memory/2720-133-0x0000000075080000-0x0000000075631000-memory.dmp
              Filesize

              5.7MB

            • memory/2720-132-0x0000000075080000-0x0000000075631000-memory.dmp
              Filesize

              5.7MB

            • memory/2720-160-0x0000000075080000-0x0000000075631000-memory.dmp
              Filesize

              5.7MB

            • memory/3476-135-0x0000000000400000-0x00000000004F0000-memory.dmp
              Filesize

              960KB

            • memory/3476-136-0x0000000075080000-0x0000000075631000-memory.dmp
              Filesize

              5.7MB

            • memory/3476-137-0x0000000075080000-0x0000000075631000-memory.dmp
              Filesize

              5.7MB

            • memory/3476-134-0x0000000000000000-mapping.dmp
            • memory/3476-164-0x0000000075080000-0x0000000075631000-memory.dmp
              Filesize

              5.7MB

            • memory/4636-148-0x0000000000000000-mapping.dmp
            • memory/4688-158-0x0000000000000000-mapping.dmp
            • memory/4956-152-0x0000000000000000-mapping.dmp