Analysis

  • max time kernel
    182s
  • max time network
    214s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 17:25

General

  • Target

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe

  • Size

    814KB

  • MD5

    401072f6b087f742d80cb9b6f4394141

  • SHA1

    58024ebb3fd04470984581b4cdafd732748774e1

  • SHA256

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f

  • SHA512

    422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375

  • SSDEEP

    12288:LmQZ4NUMNEUHLsrUYVcYkzot2bdOHOJWZDFonFucyJoES+AXV:ZZ4CreJYVcYYoD2OAXV

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 5 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 5 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe
    "C:\Users\Admin\AppData\Local\Temp\8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\Temp\8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe
      C:\Users\Admin\AppData\Local\Temp\8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:380
      • C:\Users\Admin\AppData\Roaming\Windows Update.exe
        "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:900
        • C:\Users\Admin\AppData\Roaming\Windows Update.exe
          C:\Users\Admin\AppData\Roaming\Windows Update.exe"
          4⤵
          • Executes dropped EXE
          • Deletes itself
          • Loads dropped DLL
          • Suspicious use of UnmapMainImage
          PID:1228

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt
    Filesize

    102B

    MD5

    90e596ae92585afa71957195fcbdbf1e

    SHA1

    769dd1aedfcc1b9234d5c07d519b940f64a1ac14

    SHA256

    6386532d676f4127450c995f0c6797b27fac96f88edab9d36f25d047ec439d9c

    SHA512

    8e6de26a62a6bf6d174df032aba8ee9fb40f4cb925c35b4a92d4707611ea5f3177a0a8dffb47b90f30689af2fdfb01b570afbc47fafaaeff16e6f2f4a31e292d

  • C:\Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    814KB

    MD5

    401072f6b087f742d80cb9b6f4394141

    SHA1

    58024ebb3fd04470984581b4cdafd732748774e1

    SHA256

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f

    SHA512

    422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375

  • C:\Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    814KB

    MD5

    401072f6b087f742d80cb9b6f4394141

    SHA1

    58024ebb3fd04470984581b4cdafd732748774e1

    SHA256

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f

    SHA512

    422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375

  • C:\Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    814KB

    MD5

    401072f6b087f742d80cb9b6f4394141

    SHA1

    58024ebb3fd04470984581b4cdafd732748774e1

    SHA256

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f

    SHA512

    422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375

  • \Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    814KB

    MD5

    401072f6b087f742d80cb9b6f4394141

    SHA1

    58024ebb3fd04470984581b4cdafd732748774e1

    SHA256

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f

    SHA512

    422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375

  • \Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    814KB

    MD5

    401072f6b087f742d80cb9b6f4394141

    SHA1

    58024ebb3fd04470984581b4cdafd732748774e1

    SHA256

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f

    SHA512

    422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375

  • \Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    814KB

    MD5

    401072f6b087f742d80cb9b6f4394141

    SHA1

    58024ebb3fd04470984581b4cdafd732748774e1

    SHA256

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f

    SHA512

    422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375

  • \Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    814KB

    MD5

    401072f6b087f742d80cb9b6f4394141

    SHA1

    58024ebb3fd04470984581b4cdafd732748774e1

    SHA256

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f

    SHA512

    422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375

  • \Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    814KB

    MD5

    401072f6b087f742d80cb9b6f4394141

    SHA1

    58024ebb3fd04470984581b4cdafd732748774e1

    SHA256

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f

    SHA512

    422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375

  • \Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    814KB

    MD5

    401072f6b087f742d80cb9b6f4394141

    SHA1

    58024ebb3fd04470984581b4cdafd732748774e1

    SHA256

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f

    SHA512

    422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375

  • \Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    814KB

    MD5

    401072f6b087f742d80cb9b6f4394141

    SHA1

    58024ebb3fd04470984581b4cdafd732748774e1

    SHA256

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f

    SHA512

    422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375

  • \Users\Admin\AppData\Roaming\Windows Update.exe
    Filesize

    814KB

    MD5

    401072f6b087f742d80cb9b6f4394141

    SHA1

    58024ebb3fd04470984581b4cdafd732748774e1

    SHA256

    8b99d632f384bc365e1b478dde82e030a5dc3eb51b9f58767bd4012a50d83f8f

    SHA512

    422bfc1ea8e0ef7fb7f04325ef619ec7f6c8e865a20d62a7e30e9647186e9d6421f410228ebfc70611413bde8d7ca112536ed42e2e8cd3faec79ac2b2e184375

  • memory/380-79-0x0000000074170000-0x000000007471B000-memory.dmp
    Filesize

    5.7MB

  • memory/380-58-0x00000000004ACE57-mapping.dmp
  • memory/380-78-0x0000000076FA0000-0x0000000077120000-memory.dmp
    Filesize

    1.5MB

  • memory/380-71-0x0000000008C00000-0x00000000096F8000-memory.dmp
    Filesize

    11.0MB

  • memory/380-69-0x0000000076FA0000-0x0000000077120000-memory.dmp
    Filesize

    1.5MB

  • memory/380-66-0x00000000024F0000-0x0000000002580000-memory.dmp
    Filesize

    576KB

  • memory/380-63-0x0000000000400000-0x0000000000477000-memory.dmp
    Filesize

    476KB

  • memory/380-72-0x0000000074170000-0x000000007471B000-memory.dmp
    Filesize

    5.7MB

  • memory/380-70-0x0000000076FA0000-0x0000000077120000-memory.dmp
    Filesize

    1.5MB

  • memory/900-90-0x0000000076FA0000-0x0000000077120000-memory.dmp
    Filesize

    1.5MB

  • memory/900-85-0x00000000002D0000-0x000000000039A000-memory.dmp
    Filesize

    808KB

  • memory/900-74-0x0000000000000000-mapping.dmp
  • memory/1228-87-0x00000000004ACE57-mapping.dmp
  • memory/1228-96-0x0000000000400000-0x0000000000477000-memory.dmp
    Filesize

    476KB

  • memory/1228-101-0x0000000000480000-0x0000000000510000-memory.dmp
    Filesize

    576KB

  • memory/1228-100-0x0000000000482000-0x000000000050A000-memory.dmp
    Filesize

    544KB

  • memory/1228-103-0x0000000076FA0000-0x0000000077120000-memory.dmp
    Filesize

    1.5MB

  • memory/1228-104-0x0000000073A90000-0x000000007403B000-memory.dmp
    Filesize

    5.7MB

  • memory/1484-59-0x0000000076FA0000-0x0000000077120000-memory.dmp
    Filesize

    1.5MB

  • memory/1484-56-0x00000000004E0000-0x00000000004E7000-memory.dmp
    Filesize

    28KB

  • memory/1484-57-0x0000000075A31000-0x0000000075A33000-memory.dmp
    Filesize

    8KB