Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-12-2023 01:40

General

  • Target

    Costa Order.exe

  • Size

    961KB

  • MD5

    bc4e444c2dd7463dc563119593bc7764

  • SHA1

    d54092772dd1d8ca8b20b84f44e0931d089d79d7

  • SHA256

    fd95b0eb1d2a5650592de694cda956d9dcf0b1c3312fcb3273571f858762ae15

  • SHA512

    e78aedccca55ffd1ec5aa8f0c236443d442e1661d041007c54a6aba767f3970495772d2ea7916056b5cc8c0107451acb58da612f2d4dd1574205470f12850742

  • SSDEEP

    24576:UNkLg6I80i3PQFMpB3+3Lf4uY7AvwRBU:UNk06I83PQysLf1Y7UwRBU

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    safeconnectplus.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    3safe21

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 9 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 9 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 13 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Costa Order.exe
    "C:\Users\Admin\AppData\Local\Temp\Costa Order.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\Costa Order.exe
      "{path}"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2824
    • C:\Users\Admin\AppData\Local\Temp\Costa Order.exe
      "{path}"
      2⤵
        PID:2696
      • C:\Users\Admin\AppData\Local\Temp\Costa Order.exe
        "{path}"
        2⤵
          PID:2672
      • C:\Users\Admin\AppData\Roaming\Windows Update.exe
        "C:\Users\Admin\AppData\Roaming\Windows Update.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Users\Admin\AppData\Roaming\Windows Update.exe
          "{path}"
          2⤵
          • Deletes itself
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2008
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
            3⤵
            • Accesses Microsoft Outlook accounts
            PID:2412
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
            3⤵
              PID:1600

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          465c77771d1bb4fb38eebf678e7ce6c0

          SHA1

          362b1bbb0627c4d3a6fd5dae8814daa66dde6f85

          SHA256

          c4069e081490bc3f1c97f0fcfffc5f87ee7ba7369424782b57a349af223cadbb

          SHA512

          c1ce434436467b0c1a5bf31409e17c4528c8c2512d02326fe765970b2386e771f416017263d246b44c1bf29373266d3aac44f3152dd6599e9136399e40d74b91

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          f3b1e99319122833aeca60439d2721cf

          SHA1

          2f3b9e7d7bfcf27927e581858cabbdc4e18846ce

          SHA256

          67dfa4923535e8462d272602f559ba6b81a9912becca5beca30a59b5f6eeb516

          SHA512

          dc403fcd599f1cf2e9802a7b913a3326811b978e499a5711e03c43092f35e696eab348e1aabed4d359afa7ff7094f4808096518845b8849867acd4a14f2f979c

        • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt

          Filesize

          49B

          MD5

          0ead9cdf8737b31ffb70b56dfb236c93

          SHA1

          fa867eb89ce3debeb4603a834d9a569b2283ea51

          SHA256

          0e4a39c0b77d1c2b426b44f5dd329d19b1af44f8455a01758abc1e410c2d8fa5

          SHA512

          c27f580ea00648dac6f7e349131d8c4892a08b29073ae3f819ac821ede668be232f728e8ae73d19d8f2700d25453ff8f24851886030be3545c55d3097994cc94

        • C:\Users\Admin\AppData\Local\Temp\TarA124.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Roaming\Windows Update.exe

          Filesize

          893KB

          MD5

          a0f7e52c55b8a86b6d3d3b36fe24cd58

          SHA1

          933a1e9ea6be61725dce0f19a148161e499ac2bd

          SHA256

          3105b2a9fb72bc81a680edd7f3ea2f088536af7867b40bbf6a70315e5ddb0402

          SHA512

          e775d2d129cf908feb03f9bc0ecc5f4376cf89c5fe29e50cc43a601392692cb5328d14474f40ffa2166c82514375a520b1d7b03d2042de12644c1de24378bcea

        • C:\Users\Admin\AppData\Roaming\Windows Update.exe

          Filesize

          92KB

          MD5

          44d9e6b0b74c4e180e3949830899711f

          SHA1

          85b1977443c4c64e564c871bb94637ac6d585a6a

          SHA256

          60e4b01a2ad5c441e4313408b47355764523894c9411502c9f04770dd8a746c2

          SHA512

          77b884f86cf7a193ba2a94efcacb79235013a2ea631f3cfcb23d8778400873fec7bdcc05f4946e2bb5abd2db31804c116c6dbb219c6ce77342f906a9533fec8c

        • C:\Users\Admin\AppData\Roaming\WindowsUpdate.exe

          Filesize

          45KB

          MD5

          bb17d25610d1ea80ff97249d56582042

          SHA1

          5ef617d3403327eaac62387d41dec31aa191402f

          SHA256

          4c771ec8ecca9f0b3f25646e0a6d9c19f5990e6da320bbdcceb29557723f869d

          SHA512

          9894d21122b315003f96930e27b252ec380110a9b35b6adfee5a9f9fbbb6beb0ec3d752ced0353fa526cc374f909594818ec6e57ba72805b080872ffdc1d2088

        • \Users\Admin\AppData\Roaming\Windows Update.exe

          Filesize

          961KB

          MD5

          bc4e444c2dd7463dc563119593bc7764

          SHA1

          d54092772dd1d8ca8b20b84f44e0931d089d79d7

          SHA256

          fd95b0eb1d2a5650592de694cda956d9dcf0b1c3312fcb3273571f858762ae15

          SHA512

          e78aedccca55ffd1ec5aa8f0c236443d442e1661d041007c54a6aba767f3970495772d2ea7916056b5cc8c0107451acb58da612f2d4dd1574205470f12850742

        • memory/1600-64-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1600-66-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1600-70-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1600-67-0x0000000000400000-0x0000000000458000-memory.dmp

          Filesize

          352KB

        • memory/1976-3-0x0000000000620000-0x0000000000628000-memory.dmp

          Filesize

          32KB

        • memory/1976-6-0x0000000008000000-0x00000000080C8000-memory.dmp

          Filesize

          800KB

        • memory/1976-4-0x0000000074690000-0x0000000074D7E000-memory.dmp

          Filesize

          6.9MB

        • memory/1976-2-0x0000000004C40000-0x0000000004C80000-memory.dmp

          Filesize

          256KB

        • memory/1976-1-0x0000000074690000-0x0000000074D7E000-memory.dmp

          Filesize

          6.9MB

        • memory/1976-5-0x0000000004C40000-0x0000000004C80000-memory.dmp

          Filesize

          256KB

        • memory/1976-19-0x0000000074690000-0x0000000074D7E000-memory.dmp

          Filesize

          6.9MB

        • memory/1976-0-0x00000000001D0000-0x00000000002C6000-memory.dmp

          Filesize

          984KB

        • memory/1976-7-0x0000000005DA0000-0x0000000005E34000-memory.dmp

          Filesize

          592KB

        • memory/2008-56-0x00000000007F0000-0x00000000007F8000-memory.dmp

          Filesize

          32KB

        • memory/2008-41-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2008-50-0x0000000074610000-0x0000000074CFE000-memory.dmp

          Filesize

          6.9MB

        • memory/2008-63-0x0000000074610000-0x0000000074CFE000-memory.dmp

          Filesize

          6.9MB

        • memory/2412-59-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2412-57-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2412-60-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2412-62-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2716-32-0x0000000074690000-0x0000000074D7E000-memory.dmp

          Filesize

          6.9MB

        • memory/2716-46-0x0000000074690000-0x0000000074D7E000-memory.dmp

          Filesize

          6.9MB

        • memory/2716-35-0x0000000004E80000-0x0000000004EC0000-memory.dmp

          Filesize

          256KB

        • memory/2716-34-0x0000000074690000-0x0000000074D7E000-memory.dmp

          Filesize

          6.9MB

        • memory/2716-30-0x0000000001370000-0x0000000001466000-memory.dmp

          Filesize

          984KB

        • memory/2716-33-0x0000000004E80000-0x0000000004EC0000-memory.dmp

          Filesize

          256KB

        • memory/2824-14-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/2824-11-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/2824-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2824-10-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/2824-16-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/2824-18-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/2824-9-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/2824-31-0x0000000074690000-0x0000000074D7E000-memory.dmp

          Filesize

          6.9MB

        • memory/2824-8-0x0000000000400000-0x0000000000488000-memory.dmp

          Filesize

          544KB

        • memory/2824-21-0x0000000004D10000-0x0000000004D50000-memory.dmp

          Filesize

          256KB

        • memory/2824-20-0x0000000074690000-0x0000000074D7E000-memory.dmp

          Filesize

          6.9MB