Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-03-2024 01:15

General

  • Target

    Spyware/HawkEye.exe

  • Size

    232KB

  • MD5

    60fabd1a2509b59831876d5e2aa71a6b

  • SHA1

    8b91f3c4f721cb04cc4974fc91056f397ae78faa

  • SHA256

    1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

  • SHA512

    3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

  • SSDEEP

    3072:BMhIBKH7j7DzQi7y5bvl4YAbdY9KWvwn7XHMzqEOf64CEEl64HBVdGXPKD:BMh5H7j5g54YZKXoxOuEEl64HZAi

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Renames multiple (2001) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 37 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Spyware\HawkEye.exe
    "C:\Users\Admin\AppData\Local\Temp\Spyware\HawkEye.exe"
    1⤵
    • Chimera
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Music\YOUR_FILES_ARE_ENCRYPTED.HTML"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\YOUR_FILES_ARE_ENCRYPTED.HTML

    Filesize

    4KB

    MD5

    f01fb103ca5db26062339b9f7b20605e

    SHA1

    7d8a6ecf77cce8eb955825c90e3450c9a6b7ba8e

    SHA256

    f98a5e0be73ebf749515b585f47de52d93fe941e0875f40641fc5a89ebc94b26

    SHA512

    c0d1aa4e768428ce76c07fb67f2f00acc5f460ece49621cba8da819e996df1bd72fd2885ac0ae0e6a6c35666edd03dfd5b3430d6d573608f883fc7bb46b804e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9a775e565ed65af9161d5feaaa81abf2

    SHA1

    3992aa1274abd315c35c9a1a7d6478d54e29889d

    SHA256

    68f44a484d42fbc29cc322b5e12a6ba30683f3e8d6b41383e23f0b9fcb66baf8

    SHA512

    1ca5577544e7eba3aa632fc9544c05528c8c0105a665f0c45015b1cd7458ffa847cd44021cdc2f16677acac64356719ede7d23ec83e5cfb9095eb3efa7ed7ed3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d453c3b9f1ecd9af285ccfd8e99d442d

    SHA1

    960a8205957e84f4977126c4f7460511f1c98c16

    SHA256

    9d94dd8a8eb663ddd93133ea8225998b0e31d0cac65d3653af3bf68defcd0db5

    SHA512

    52a9ff443b5e475720d88c9418757d01529c2e0a0878dd03992b5b214423110be1e1a57e91581252a76173345ddd8cc3443af9c416531d1938feabde81db6798

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d24b7f8b008c7c935c7c19868c3a1e81

    SHA1

    893ae797fb6ead796f8b5cad24c951ab78bd0065

    SHA256

    9ee34514c58ae2b7460f7077020a2221e480e39005fa06ca9780e20efd9cbc5e

    SHA512

    8eaeca944c41e3b5dd8304ef9966e156c4af926254e1d9defda7502cd06d2cf5a186b07712c1dbe9cbe358979dd26559c114a00f76eff93ebf59b4e8b9572da1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d8e88475cbae9a59b677969c92d3cfb7

    SHA1

    037134fbd0b215b6a410bce5255b025b65686a18

    SHA256

    95f2590eb7937149e6db4429bfa286297756460110b0c981df9f126df0e28a4e

    SHA512

    34181fef1ea469a171d2de5c4728a4464ffaf230faf50a7380f4e5442df94bf688d8fe0f555d1b553d233a20ec154824141e996f785e868076101db229037e38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be2290c98538a2ea22346da72590cea2

    SHA1

    261cd805b5e762552214bd35e59876b5e901bc89

    SHA256

    99a4cc4feef3196f289bc3c9f274b77e5e634fd77f90f240c30d4c219f6ec089

    SHA512

    0c3b7d6137b9b832b078fcdbb178c8694835b8837348c0887bb9fafbefd5bc6f95ad2102b38a68525fa3766be6bbea9af92c71f3c210f2b7a300dc8bd39a2ce7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    30b8fa8587959f09dad54d8b5b31a152

    SHA1

    b326cdec96cb1950bdd52894f12dc96258a7d6e5

    SHA256

    e8a2f27f954d9001650bef85f1cc5d236afe8f1e22fe2dc6adb58cbb04e6b2ca

    SHA512

    a069ec7d66a6b670d2ce427cd36f3d125abf5230df916207245c2d78b15229c813548732fd8bb944bbc064c4bbf1f4625a87a73d10fa544ba45df46e53dfe45a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1ce82eeaf55c11289dccdd1d58149734

    SHA1

    0349763099485b7727ecc8d1a30ba8af224ad6ad

    SHA256

    4248f423cbec07c322d5a31dab13603ff07e88a933163ad893dad05c4ad21a03

    SHA512

    07f1c1594e21092f17afa6fe88b7e4b7be2c767485ddc8f8adb5a24058a9a12a688265ce8df93858d919d1dea57aec43fd95339b22815c8e549ad642a85e1045

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    824e14e82c922273fef2146e1064ba0c

    SHA1

    e15bccfc01c55c32b922083d509b3ddca01a077b

    SHA256

    e13efe3a577ce5cacb6004b1c4845ea6e813d75042485773b372354acd8975ed

    SHA512

    4fa2eca089ff8b6c0dedf24774cbe9238851528a7528acb4a3edaa93f94b753a240eb12d4d7d33761bb63f7de93611034af5ce7a1d94bd6aeaa80055665e43c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    74e38b9f4f2f8eee7e4e53e9aee8b8c7

    SHA1

    715b5ded6db1ee5dc2ddf7d9672a1e6d4afb26f7

    SHA256

    7551fbd8ad4cbf563dc2628add2400a7c567f97bcb2494ee796c997d8a169da7

    SHA512

    09ef51c9e9edc203f58af939189a3a2f4e75d438e526981ce7050d7aa795b9926c4f2a3641400200000727769d7167fa7c2a5f50cacfdf3e58c1172d21ecc76d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    704271ab8ac3cdf0c4991b56fc9ac568

    SHA1

    1d59beb340fbd8c0ec1c047e637c261d10f6efa6

    SHA256

    4cf92f4fd1eea248f53be9ade27304df766836d485ede7987539063e8fc420b9

    SHA512

    94a76be22816727768a7347c64093fb9c968fd89cae9259d556de4d8460519d9a042f793b50266060a7e8e75c83045c5911dffce6a956f333aabce63e691ab9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7b747c6c83d68178d6215933d8af1d27

    SHA1

    5fb87d11fc848327e517e1453ac5a86e6eadfd71

    SHA256

    d4e6fad2290dfeeb893a0da82f09722d402112420f65eaafaa8e23ed6c88a1fb

    SHA512

    97c6eba8f3ee86ac98aac81e1b4583cd5a72916109491ced02c8dd82e9a4ef363e2ace8c95119bc74a8f52cb3631d0c456f175dd2c82b6044cc3281ca23fdaaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e684032b406aca8a50eeb336da7f0c97

    SHA1

    0920b479a44fb4c11e0f7abd67f1707e065829a9

    SHA256

    32dfacdc8ec30e413450b92f2c97adaa8fe16374597ba01de02286f4fab07df7

    SHA512

    4f64c826c3ae9cf46462e7ce4b547d83b7bc1a87a0373692c1cd30c589e6f108287c1d277bf844202612a88ec72e9375044993fe92417d6114bfe6ba9cd1e451

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bd8b8e85f5ed4a42b732fc5ff6047ae7

    SHA1

    f6c69a57473005607c2a9bccf436030c73d59bd5

    SHA256

    2606a24e9d8e77346a12bde54132da764dd1eb003044b3fe3ac1c836f5e4e2d7

    SHA512

    0bbba49351aee84e36a74a0e6ffea825d03d58d572cb5520245ef4f6749b4e8a7d2ebe980d75902a731e5fb53641befdbfe223a6e3ff30a91950169bf6d8b148

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f77131db0567b2a14f8915c5f31e5327

    SHA1

    5dd6250fdd8e25b8d8b9f633fb409b0e15c173f7

    SHA256

    d278f9a43c9a08d5d0dcecb0ceb067f75bbbb615d5c939ec095ca5624e59c5d8

    SHA512

    b07d94452d4847d38b3062913143e8050ebd462f4ff0e615871f4172e4f98c04f40a51b78ceb960c3ab67a88a5ac5b927c871756154218801b146d138727933f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb8fc9d1c052fcdf15f8e4b2bc86575b

    SHA1

    e3d48dff2ca86990e1029d6bd323c2407c639519

    SHA256

    10d46ab3c5698dffd1811d69eab62a0a6ee8f96ab87447dfec3a599b409a5437

    SHA512

    9f315c8792948f8766479b55706ca4454abcb0bb83dad29d4d38c13ed37eb0af0cf8c47da17444cf95417fae004a8f3b7d057aa3e1a661e0e00b5c25ce0c7be3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5ac56abb5cfb2c01b705216065e8f759

    SHA1

    459cd8b65c10333816483f442a4a6da33b00a4c4

    SHA256

    7fd802f1ba70fa25aa169533034e6ee4d5486266d9f601d47d234b9ce1040d82

    SHA512

    6577a49812b94f7283c7f8332db0049bcd7f9024e884274990bd3caf01760919d93ed132dff526e6d5688f1f311fad2598bac47db21733567e282fc3695a7af8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f1e063faa6e18afc4ac8c1f29caae77

    SHA1

    25b69a72f2b47db0e212a046acc85d0180257dc9

    SHA256

    d8749c4e0f79baa351e0715e15a03a5f6b5b79d888c8d01cf2b7bb317a4b70c1

    SHA512

    4ab2cb4f079b8a0a123560286664306d65e4fae00b4500af6b72a80a57d885c76488b6cd1bae97c4eb2da761cb70af021eb34054498c7580b58df58e9f3d9a69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e607b6015bfa10655b638808721b9edc

    SHA1

    4d63ba00fc2328271bbc5a145a8f947687a5d4a1

    SHA256

    c6d1a0c581541a0fa91fd9f7847af2273333eda537b152120e3e455509e3c747

    SHA512

    e0424067d687250c189a90266390b29acdd85096113029c20ddb52ab9d4c7fb57f54c3fed0b19ddd9a1aa0f12efd97e5dc8d322d9aec86b9056d4d08a13da4e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0750ffa5f2350152d6ec933d7d7b3841

    SHA1

    82ed8a821cad743ec764c8227c4b5f59a89a2752

    SHA256

    e3a48a742e915f746d9f4bcd7e2d41e68cade619e8d4d2b00da03db02a8a55ec

    SHA512

    ab55ec0dab124d5574b7603167dad61c1416d9a5be772c303bb0bd8ce216a364c7fa48a6ea22091d01faf370d7b695732f40527cc1170c40a33175fbb15db1a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e3bff39a877c582863c7f9b820714ce6

    SHA1

    32856daf77c8eb239151666b82e92374c86ec9ef

    SHA256

    421059ac08f7a4cf059581a001d4e87c7634618c1dee7b6f28dc4adef194b41b

    SHA512

    8b455b12a9635cace75b384b9869c622ca5358bb27b01ba799418b263a5175c6d15c211c5ba2ae3b2b7d2232578afd099c07ce2821fc87a3116b77c8216cde40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    35a9cbb6528a2629e66be1ebf7564505

    SHA1

    15060eab6b2364c10dc1b6d502877f9247447fa4

    SHA256

    c849fbef54f4bb399779129be160dba67d9181813e8f4d9b3c74d7c9ff781cf8

    SHA512

    b828a3e580dbadfa5662bc970135796a83d8b90166f5fbbe52457d7bd70c96b32228bc9dc45e1ed0634de6dcf044915b45c91910e1d882a1f8f3a58dd476b206

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4a6c4816d8558024e788da6fdd23cb6c

    SHA1

    73b38a10703be711a494ebb40c8778f75dce5572

    SHA256

    48941d38290840d09c1b2ce3c08c3c6723f5dcef52c8193a2ce3e20087a89fc1

    SHA512

    fbd643d245527f5a6716c32223f7ccd2733a6281862c45dcb88b7f899e3823fe52f8c1558f47608c93018083d7ba01f82e01065f953a6b3013fbe0be5653e3d3

  • C:\Users\Admin\AppData\Local\Temp\Tar24B7.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • memory/1936-9-0x0000000000440000-0x000000000045A000-memory.dmp

    Filesize

    104KB

  • memory/1936-0-0x0000000074720000-0x0000000074CCB000-memory.dmp

    Filesize

    5.7MB

  • memory/1936-1-0x0000000074720000-0x0000000074CCB000-memory.dmp

    Filesize

    5.7MB

  • memory/1936-2-0x0000000000C70000-0x0000000000CB0000-memory.dmp

    Filesize

    256KB

  • memory/1936-3-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/1936-8-0x0000000000480000-0x0000000000580000-memory.dmp

    Filesize

    1024KB

  • memory/1936-4326-0x0000000000480000-0x0000000000580000-memory.dmp

    Filesize

    1024KB

  • memory/1936-10-0x0000000000440000-0x000000000045A000-memory.dmp

    Filesize

    104KB

  • memory/1936-3445-0x0000000074720000-0x0000000074CCB000-memory.dmp

    Filesize

    5.7MB

  • memory/1936-4318-0x0000000000C70000-0x0000000000CB0000-memory.dmp

    Filesize

    256KB