Analysis

  • max time kernel
    2s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 05:01

General

  • Target

    06914834645d9ab3058300de4c756954.exe

  • Size

    410KB

  • MD5

    06914834645d9ab3058300de4c756954

  • SHA1

    437546390ab6be7ab887e82148ba8b923bedd844

  • SHA256

    50c6eeab65b9c35d55dde8ba5cca1eaba4091d0a5611a353f9561e3e37453e67

  • SHA512

    08869a715d99a8034ee9e473c0c56f8fa4d35afbb67467a4d27ffd9d34f7d32f87a2b1f1141657ce7de27888fdca477af3d4756d6e5799d5dd27b5acbe2ff953

  • SSDEEP

    12288:3w06cUYTczdkibnD3WUgFooE3cVkO3rHGa6vSoW1:7TUHkibDGencVnHq6f

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06914834645d9ab3058300de4c756954.exe
    "C:\Users\Admin\AppData\Local\Temp\06914834645d9ab3058300de4c756954.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:448
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
        3⤵
          PID:1352
        • C:\Users\Admin\AppData\Local\Temp\System\lsn.exe
          "C:\Users\Admin\AppData\Local\Temp\System\lsn.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4536
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      1⤵
        PID:640
      • C:\Users\Admin\AppData\Local\Temp\System\spolsv.exe
        "C:\Users\Admin\AppData\Local\Temp\System\spolsv.exe"
        1⤵
          PID:2340

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
          Filesize

          92KB

          MD5

          a776602c547de286306369097501bffa

          SHA1

          b20f91c6beea8d7be221d05f3f5aa5e068951e2d

          SHA256

          793fa9af44b51ff4a9cbfb90f612f04b0568ca940ef99b22ae50dd51412c24a2

          SHA512

          e311bc651de20a6b3179a32d8c699c520774a119d0a495b10a12b8866b9e6dbe74232fec327cdc5a32936a711a3c953ea8d4fa9f37620913072809cd3d492d46

        • memory/448-48-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/448-16-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/448-15-0x00000000007D0000-0x00000000007E0000-memory.dmp
          Filesize

          64KB

        • memory/448-14-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/448-47-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/1352-25-0x0000000000400000-0x0000000000466000-memory.dmp
          Filesize

          408KB

        • memory/1352-22-0x0000000000400000-0x0000000000466000-memory.dmp
          Filesize

          408KB

        • memory/1352-23-0x0000000000400000-0x0000000000466000-memory.dmp
          Filesize

          408KB

        • memory/1352-24-0x0000000000400000-0x0000000000466000-memory.dmp
          Filesize

          408KB

        • memory/2180-2-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/2180-13-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/2180-1-0x0000000000BB0000-0x0000000000BC0000-memory.dmp
          Filesize

          64KB

        • memory/2180-0-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/2340-41-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/2340-43-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/2340-52-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/2340-53-0x0000000001520000-0x0000000001530000-memory.dmp
          Filesize

          64KB

        • memory/4536-36-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/4536-37-0x0000000000EC0000-0x0000000000ED0000-memory.dmp
          Filesize

          64KB

        • memory/4536-50-0x0000000000EC0000-0x0000000000ED0000-memory.dmp
          Filesize

          64KB

        • memory/4536-49-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/4536-51-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB

        • memory/4536-38-0x0000000074670000-0x0000000074C21000-memory.dmp
          Filesize

          5.7MB