Analysis

  • max time kernel
    151s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 14:14

General

  • Target

    39701f5c18d18cd690f7ded4f1ea958e.exe

  • Size

    92KB

  • MD5

    39701f5c18d18cd690f7ded4f1ea958e

  • SHA1

    982abd7a3c93c48536917a958fc97252f5e225e1

  • SHA256

    afcaaf746e58ff7c2976963accf7b032cb21a028a6857b5a7f542dbb335b2b2c

  • SHA512

    cb804688ca6496a0f4a06f56a561134aaf1f9631b2e4e8de4ffa5a7ca183c7d8a221a8d3a3ea33efe7a6505bfab5dea115f9ac24b33333f4523bad68433314ff

  • SSDEEP

    1536:sEUQjlDAMOcnNFCEcK3gGrvOAoY7ld0ckN3wTr3iAkHyy+dOrrrrrr:sVulMMlXE+g41jkNyTr

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • UAC bypass 3 TTPs 4 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39701f5c18d18cd690f7ded4f1ea958e.exe
    "C:\Users\Admin\AppData\Local\Temp\39701f5c18d18cd690f7ded4f1ea958e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
        3⤵
        • UAC bypass
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\SysWOW64\reg.exe
          reg add hklm\software\microsoft\windows\currentversion\run /v wins /t reg_sz /d C:\WINDOWS\ctfmon.exe /f
          4⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:2136
      • C:\Users\Admin\AppData\Local\Temp\System\mvscavAP.exe
        "C:\Users\Admin\AppData\Local\Temp\System\mvscavAP.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Users\Admin\AppData\Local\Temp\System\SiaPort.exe
          "C:\Users\Admin\AppData\Local\Temp\System\SiaPort.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1636
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
    1⤵
    • UAC bypass
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\SysWOW64\reg.exe
      reg add hklm\software\microsoft\windows\currentversion\run /v wins /t reg_sz /d C:\WINDOWS\ctfmon.exe /f
      2⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt

    Filesize

    70B

    MD5

    4d634b0678f88061679fb99c1e3c66da

    SHA1

    330746fbe8df353ceccdfa2207684d6e57572fbf

    SHA256

    8ca25fc3a20c1327a273453ed50f225e1c11f1c51b6e00762050b3bb3ed11837

    SHA512

    8d5565ba903d393fc048561da4b0da32f6c459ff6e9a5119f5da970571a12ae097f829718c5b994ea094fc8fc4c3325ba434ae03f02d0f9c3abd75d3d5451a43

  • C:\Users\Admin\AppData\Local\Temp\System\mvscavAP.exe

    Filesize

    7KB

    MD5

    1e065c8186d7d23b9fad718e030ad963

    SHA1

    ed1f41e4d34ed3321eb9dfbc6ac82b322de0c904

    SHA256

    45c1f790d9b856ccc02aa6be9f1102734fd9df534f6cea3b905de0698caedfdb

    SHA512

    feef86acf449371102d4bf7a3b6aa50ebafff01d4f23c9bf24f69e35faf92956f205d8c8ea082d615e62b680ed1038dfda6e4e099707be45c2b7bdf32bffbc23

  • C:\WINDOWS\ctfmon.exe

    Filesize

    54KB

    MD5

    0f01571a3e4c71eb4313175aae86488e

    SHA1

    2ba648afe2cd52edf5f25e304f77d457abf7ac0e

    SHA256

    8cc51c4c2efc8c6a401aa83a0aeced0925d5d9d2a43192f35561893cdf704022

    SHA512

    159dfbb7d385bf92f4fc48ca389b89d69f6c2616e90dfa056e725d7da78a3702694a28f9c5cab7b55adc4d4dbd7bfe5d272c8b1c9931e3ac95f6326d74576794

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe

    Filesize

    92KB

    MD5

    39701f5c18d18cd690f7ded4f1ea958e

    SHA1

    982abd7a3c93c48536917a958fc97252f5e225e1

    SHA256

    afcaaf746e58ff7c2976963accf7b032cb21a028a6857b5a7f542dbb335b2b2c

    SHA512

    cb804688ca6496a0f4a06f56a561134aaf1f9631b2e4e8de4ffa5a7ca183c7d8a221a8d3a3ea33efe7a6505bfab5dea115f9ac24b33333f4523bad68433314ff

  • memory/532-1-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/532-2-0x0000000000520000-0x0000000000560000-memory.dmp

    Filesize

    256KB

  • memory/532-0-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/532-14-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1560-74-0x0000000000360000-0x00000000003BF000-memory.dmp

    Filesize

    380KB

  • memory/1560-81-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1560-76-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1636-87-0x0000000000AC0000-0x0000000000B00000-memory.dmp

    Filesize

    256KB

  • memory/1636-88-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1636-61-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1636-57-0x0000000000AC0000-0x0000000000B00000-memory.dmp

    Filesize

    256KB

  • memory/1636-89-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1636-59-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1924-51-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1924-84-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1924-48-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1924-86-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/1924-85-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1924-55-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1924-49-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/2700-82-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-83-0x00000000008F0000-0x0000000000930000-memory.dmp

    Filesize

    256KB

  • memory/2700-17-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2700-16-0x00000000008F0000-0x0000000000930000-memory.dmp

    Filesize

    256KB

  • memory/2700-15-0x0000000074B00000-0x00000000750AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2752-23-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2752-27-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2752-80-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2752-25-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2752-31-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2752-33-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2752-37-0x00000000002E0000-0x000000000033F000-memory.dmp

    Filesize

    380KB