Analysis

  • max time kernel
    101s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/12/2023, 01:36 UTC

General

  • Target

    9b6b4686d55afe1479011ee77b5ffb24.exe

  • Size

    526KB

  • MD5

    9b6b4686d55afe1479011ee77b5ffb24

  • SHA1

    df3cc344a71e5bf855e3bc97b8848eb2daaf8afc

  • SHA256

    c0498d7a70e78c236241d0e91b3bb599c1961ea62a10bd76a16fe7b18824f646

  • SHA512

    dff029b93178d47a621f637ce82b710412c59784634bad760beaaa5255d7118474fd8f5f903be9ccba623bd3f42de4a06f09fe6f3799a85a8cf692184b346a4e

  • SSDEEP

    12288:tUiQnjozy4J/aA/z+DNZFFQ6yunCjo3QkFLcnhpSVfBPp9bJ:yrrstr+JFQ6jFAS

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • NirSoft MailPassView 3 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 4 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 7 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b6b4686d55afe1479011ee77b5ffb24.exe
    "C:\Users\Admin\AppData\Local\Temp\9b6b4686d55afe1479011ee77b5ffb24.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3280
    • C:\Users\Admin\AppData\Local\Temp\9b6b4686d55afe1479011ee77b5ffb24.exe
      "C:\Users\Admin\AppData\Local\Temp\9b6b4686d55afe1479011ee77b5ffb24.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1300
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp8B67.tmp"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4192
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\tmp8F7F.tmp"
        3⤵
        • Accesses Microsoft Outlook accounts
        PID:4736
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 1084
      2⤵
      • Program crash
      PID:4584
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3280 -ip 3280
    1⤵
      PID:5064

    Network

    • flag-us
      DNS
      g.bing.com
      Remote address:
      8.8.8.8:53
      Request
      g.bing.com
      IN A
      Response
      g.bing.com
      IN CNAME
      g-bing-com.a-0001.a-msedge.net
      g-bing-com.a-0001.a-msedge.net
      IN CNAME
      dual-a-0001.a-msedge.net
      dual-a-0001.a-msedge.net
      IN A
      204.79.197.200
      dual-a-0001.a-msedge.net
      IN A
      13.107.21.200
    • flag-us
      DNS
      g.bing.com
      Remote address:
      8.8.8.8:53
      Request
      g.bing.com
      IN A
    • flag-us
      GET
      https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=87af87fbdf89413199637d275377637b&localId=w:8DF2633F-10BE-C247-8B12-9A64CE5AE8FE&deviceId=6896190589629886&anid=
      Remote address:
      204.79.197.200:443
      Request
      GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=87af87fbdf89413199637d275377637b&localId=w:8DF2633F-10BE-C247-8B12-9A64CE5AE8FE&deviceId=6896190589629886&anid= HTTP/2.0
      host: g.bing.com
      accept-encoding: gzip, deflate
      user-agent: WindowsShellClient/9.0.40929.0 (Windows)
      Response
      HTTP/2.0 204
      cache-control: no-cache, must-revalidate
      pragma: no-cache
      expires: Fri, 01 Jan 1990 00:00:00 GMT
      set-cookie: MUID=3D863D07308E65E0014B2EF2316E641D; domain=.bing.com; expires=Tue, 21-Jan-2025 20:29:33 GMT; path=/; SameSite=None; Secure; Priority=High;
      strict-transport-security: max-age=31536000; includeSubDomains; preload
      access-control-allow-origin: *
      x-cache: CONFIG_NOCACHE
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: DA01CFC5D7554C319D3D50233C5A8534 Ref B: LON04EDGE1106 Ref C: 2023-12-28T20:29:33Z
      date: Thu, 28 Dec 2023 20:29:33 GMT
    • flag-us
      GET
      https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=87af87fbdf89413199637d275377637b&localId=w:8DF2633F-10BE-C247-8B12-9A64CE5AE8FE&deviceId=6896190589629886&anid=
      Remote address:
      204.79.197.200:443
      Request
      GET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=87af87fbdf89413199637d275377637b&localId=w:8DF2633F-10BE-C247-8B12-9A64CE5AE8FE&deviceId=6896190589629886&anid= HTTP/2.0
      host: g.bing.com
      accept-encoding: gzip, deflate
      user-agent: WindowsShellClient/9.0.40929.0 (Windows)
      cookie: MUID=3D863D07308E65E0014B2EF2316E641D
      Response
      HTTP/2.0 204
      cache-control: no-cache, must-revalidate
      pragma: no-cache
      expires: Fri, 01 Jan 1990 00:00:00 GMT
      set-cookie: MSPTC=0hkrqJ5bglJ92m-EKmjxKLR0x1T3IsCCs-516z2ppU8; domain=.bing.com; expires=Tue, 21-Jan-2025 20:29:33 GMT; path=/; Partitioned; secure; SameSite=None
      strict-transport-security: max-age=31536000; includeSubDomains; preload
      access-control-allow-origin: *
      x-cache: CONFIG_NOCACHE
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: 89E9BF08977B49A3B213C0569C91A830 Ref B: LON04EDGE1106 Ref C: 2023-12-28T20:29:33Z
      date: Thu, 28 Dec 2023 20:29:33 GMT
    • flag-us
      GET
      https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=87af87fbdf89413199637d275377637b&localId=w:8DF2633F-10BE-C247-8B12-9A64CE5AE8FE&deviceId=6896190589629886&anid=
      Remote address:
      204.79.197.200:443
      Request
      GET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=87af87fbdf89413199637d275377637b&localId=w:8DF2633F-10BE-C247-8B12-9A64CE5AE8FE&deviceId=6896190589629886&anid= HTTP/2.0
      host: g.bing.com
      accept-encoding: gzip, deflate
      user-agent: WindowsShellClient/9.0.40929.0 (Windows)
      cookie: MUID=3D863D07308E65E0014B2EF2316E641D; MSPTC=0hkrqJ5bglJ92m-EKmjxKLR0x1T3IsCCs-516z2ppU8
      Response
      HTTP/2.0 204
      cache-control: no-cache, must-revalidate
      pragma: no-cache
      expires: Fri, 01 Jan 1990 00:00:00 GMT
      strict-transport-security: max-age=31536000; includeSubDomains; preload
      access-control-allow-origin: *
      x-cache: CONFIG_NOCACHE
      accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
      x-msedge-ref: Ref A: 9F74E65FD445468FBF8369EC90050318 Ref B: LON04EDGE1106 Ref C: 2023-12-28T20:29:33Z
      date: Thu, 28 Dec 2023 20:29:33 GMT
    • flag-us
      DNS
      161.191.110.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      161.191.110.104.in-addr.arpa
      IN PTR
      Response
      161.191.110.104.in-addr.arpa
      IN PTR
      a104-110-191-161deploystaticakamaitechnologiescom
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      23.159.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      23.159.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      9.228.82.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      9.228.82.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      195.233.44.23.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      195.233.44.23.in-addr.arpa
      IN PTR
      Response
      195.233.44.23.in-addr.arpa
      IN PTR
      a23-44-233-195deploystaticakamaitechnologiescom
    • flag-us
      DNS
      195.233.44.23.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      195.233.44.23.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      26.165.165.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      26.165.165.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      15.164.165.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      15.164.165.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      28.160.77.104.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      28.160.77.104.in-addr.arpa
      IN PTR
      Response
      28.160.77.104.in-addr.arpa
      IN PTR
      a104-77-160-28deploystaticakamaitechnologiescom
    • flag-us
      DNS
      49.179.17.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      49.179.17.96.in-addr.arpa
      IN PTR
      Response
      49.179.17.96.in-addr.arpa
      IN PTR
      a96-17-179-49deploystaticakamaitechnologiescom
    • flag-us
      DNS
      61.179.17.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      61.179.17.96.in-addr.arpa
      IN PTR
      Response
      61.179.17.96.in-addr.arpa
      IN PTR
      a96-17-179-61deploystaticakamaitechnologiescom
    • flag-us
      DNS
      mail.kgcretail.com
      9b6b4686d55afe1479011ee77b5ffb24.exe
      Remote address:
      8.8.8.8:53
      Request
      mail.kgcretail.com
      IN A
      Response
    • flag-us
      DNS
      48.229.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      48.229.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      179.178.17.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      179.178.17.96.in-addr.arpa
      IN PTR
      Response
      179.178.17.96.in-addr.arpa
      IN PTR
      a96-17-178-179deploystaticakamaitechnologiescom
    • flag-us
      DNS
      179.178.17.96.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      179.178.17.96.in-addr.arpa
      IN PTR
    • 204.79.197.200:443
      https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=87af87fbdf89413199637d275377637b&localId=w:8DF2633F-10BE-C247-8B12-9A64CE5AE8FE&deviceId=6896190589629886&anid=
      tls, http2
      2.0kB
      9.4kB
      21
      18

      HTTP Request

      GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=87af87fbdf89413199637d275377637b&localId=w:8DF2633F-10BE-C247-8B12-9A64CE5AE8FE&deviceId=6896190589629886&anid=

      HTTP Response

      204

      HTTP Request

      GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=87af87fbdf89413199637d275377637b&localId=w:8DF2633F-10BE-C247-8B12-9A64CE5AE8FE&deviceId=6896190589629886&anid=

      HTTP Response

      204

      HTTP Request

      GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=87af87fbdf89413199637d275377637b&localId=w:8DF2633F-10BE-C247-8B12-9A64CE5AE8FE&deviceId=6896190589629886&anid=

      HTTP Response

      204
    • 20.231.121.79:80
      46 B
      1
    • 8.8.8.8:53
      g.bing.com
      dns
      112 B
      158 B
      2
      1

      DNS Request

      g.bing.com

      DNS Request

      g.bing.com

      DNS Response

      204.79.197.200
      13.107.21.200

    • 8.8.8.8:53
      161.191.110.104.in-addr.arpa
      dns
      74 B
      141 B
      1
      1

      DNS Request

      161.191.110.104.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      23.159.190.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      23.159.190.20.in-addr.arpa

    • 8.8.8.8:53
      9.228.82.20.in-addr.arpa
      dns
      70 B
      156 B
      1
      1

      DNS Request

      9.228.82.20.in-addr.arpa

    • 8.8.8.8:53
      195.233.44.23.in-addr.arpa
      dns
      144 B
      137 B
      2
      1

      DNS Request

      195.233.44.23.in-addr.arpa

      DNS Request

      195.233.44.23.in-addr.arpa

    • 8.8.8.8:53
      26.165.165.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      26.165.165.52.in-addr.arpa

    • 8.8.8.8:53
      15.164.165.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      15.164.165.52.in-addr.arpa

    • 8.8.8.8:53
      28.160.77.104.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      28.160.77.104.in-addr.arpa

    • 8.8.8.8:53
      49.179.17.96.in-addr.arpa
      dns
      71 B
      135 B
      1
      1

      DNS Request

      49.179.17.96.in-addr.arpa

    • 8.8.8.8:53
      61.179.17.96.in-addr.arpa
      dns
      71 B
      135 B
      1
      1

      DNS Request

      61.179.17.96.in-addr.arpa

    • 8.8.8.8:53
      mail.kgcretail.com
      dns
      9b6b4686d55afe1479011ee77b5ffb24.exe
      64 B
      137 B
      1
      1

      DNS Request

      mail.kgcretail.com

    • 8.8.8.8:53
      48.229.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      48.229.111.52.in-addr.arpa

    • 8.8.8.8:53
      179.178.17.96.in-addr.arpa
      dns
      144 B
      137 B
      2
      1

      DNS Request

      179.178.17.96.in-addr.arpa

      DNS Request

      179.178.17.96.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp8B67.tmp

      Filesize

      4KB

      MD5

      9d1c4331e92ea47959e79f26ca09d973

      SHA1

      f8baa65953243feba3299fbaa7af110fbc7011b2

      SHA256

      ffddf68859952ecc2a486189ef0b15519f898d4d1ba04f6555264714b2d9108f

      SHA512

      76cc4cfa6a89d69035c0539294a5903f5b9b01314aaa2ffef7ccc6a5cdc163bf2336fa98e6f5406510b74c8da8bf5cbac5c55718df58f3b082b7fe8f8dda3daf

    • memory/1300-7-0x0000000001410000-0x0000000001420000-memory.dmp

      Filesize

      64KB

    • memory/1300-5-0x0000000000400000-0x0000000000490000-memory.dmp

      Filesize

      576KB

    • memory/1300-6-0x0000000074D80000-0x0000000075331000-memory.dmp

      Filesize

      5.7MB

    • memory/1300-8-0x0000000074D80000-0x0000000075331000-memory.dmp

      Filesize

      5.7MB

    • memory/1300-31-0x0000000001410000-0x0000000001420000-memory.dmp

      Filesize

      64KB

    • memory/1300-30-0x0000000001410000-0x0000000001420000-memory.dmp

      Filesize

      64KB

    • memory/1300-29-0x0000000001410000-0x0000000001420000-memory.dmp

      Filesize

      64KB

    • memory/1300-28-0x0000000074D80000-0x0000000075331000-memory.dmp

      Filesize

      5.7MB

    • memory/3280-2-0x0000000074D80000-0x0000000075331000-memory.dmp

      Filesize

      5.7MB

    • memory/3280-1-0x0000000000F40000-0x0000000000F50000-memory.dmp

      Filesize

      64KB

    • memory/3280-10-0x0000000074D80000-0x0000000075331000-memory.dmp

      Filesize

      5.7MB

    • memory/3280-0-0x0000000074D80000-0x0000000075331000-memory.dmp

      Filesize

      5.7MB

    • memory/4192-15-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/4192-21-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/4192-20-0x0000000000460000-0x0000000000529000-memory.dmp

      Filesize

      804KB

    • memory/4192-14-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/4192-12-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/4736-23-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4736-25-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4736-26-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.