Analysis

  • max time kernel
    131s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-03-2024 05:23

General

  • Target

    HawkEye.exe

  • Size

    232KB

  • MD5

    60fabd1a2509b59831876d5e2aa71a6b

  • SHA1

    8b91f3c4f721cb04cc4974fc91056f397ae78faa

  • SHA256

    1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

  • SHA512

    3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

  • SSDEEP

    3072:BMhIBKH7j7DzQi7y5bvl4YAbdY9KWvwn7XHMzqEOf64CEEl64HBVdGXPKD:BMh5H7j5g54YZKXoxOuEEl64HZAi

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Detects Reflective DLL injection artifacts 2 IoCs
  • Renames multiple (2007) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 37 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HawkEye.exe
    "C:\Users\Admin\AppData\Local\Temp\HawkEye.exe"
    1⤵
    • Chimera
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Music\YOUR_FILES_ARE_ENCRYPTED.HTML"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\YOUR_FILES_ARE_ENCRYPTED.HTML

    Filesize

    4KB

    MD5

    63ca0ab15d7ea34c4f99e032d8706746

    SHA1

    d8e10c06cd26e3970f9a7241987aeb5549592cc4

    SHA256

    20486236cfbbd8eb24d91063b9725e0bfd1b716b13aa6269753204c88157d25b

    SHA512

    93057e090424726ae3ddb8df53c95184959604e624eb6351bd8c1b0d0eb8ac74adbb6ac2bcce619b9ddb47115fe4f1d265b120c5fb7b3a58717006ccbfa85bf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17437799ab12e22315ec35f55ce1ad89

    SHA1

    e7b9977498dfa435590fa516bace0fb8ddfb1650

    SHA256

    772261f9651a74d3f13d0a334caa62d97a18a8468ef5ff7e31dd02e022c0103d

    SHA512

    f6c427a102d45fc0ea0f3a5215caaadf06103cc576a4e6b94bed759f084057325f0e4cc844c3a9faabb2a1478f8c59fe604e1061081023ba8991e5a82fb08647

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b102a445c174c2a795fde8d23dbebe97

    SHA1

    423f3d0f8010c4c477bc41a2c01379b45ca25b49

    SHA256

    9d218c3f41e5c05d13cbb5860a2fe6a155d88bd4bf79d910462b27716b4879ba

    SHA512

    7768da2922896093e5a0a4638f801e3fc213eb2dfb6fdfc4ccbd30faed33c6520b315ae3f8ca66878cdde09e933b6c66ea81bd3b147b3baec7f46198a2860c6d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e75a65d01beb278fcd5721af702b631f

    SHA1

    66b0bbde6aa9c3164ba8519914e6d36939921143

    SHA256

    94d85dd3d94201df2dcbf411efe649be6bdb0e0acf1fb619c082381775f3f797

    SHA512

    20010ac49ccfd127f3cee51d59e029717917e71250b1b73af27719fe2499aefa15949830a723db14208ca236644db47212504e39657f39e813ce95c9efabd2cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d6cb97d1742100c8196d3d5d169a623a

    SHA1

    71bd76724cf73176e137ecd276583019eeeb9bdc

    SHA256

    74141587ded23236472608661ef54eb96ba06564078c4322f9a0aebd9001ba63

    SHA512

    57e1f20b71dfea2c51e7c059a3517b398c1a23efc36bc865eabaf4683e53858086e160afaf4a8b4981e5373e67c5b509c5b48bee73b8633f7e032ad3d0093d40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3224f1ef09666cbeb374810da5746a38

    SHA1

    82d11b6d1f493b59bfa52d6344db71bceb5e3172

    SHA256

    bcd519d35f66998b143329e61396d47ba11d3b9413a8f9ec769e5d1c53c7df0e

    SHA512

    9eb6a01d9630bd7d169e3ac3a34bec9aaec2b811c8fdbfd1db38cdb0af7578183b44fc9f01d563be6b461290276d13dbefb5070cab2a1cbcbf378b8bad85ea2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86efc81b5ec0eb162fbecdcc742da619

    SHA1

    c659a633803afdfa5f187045670e9a6bb3e7b825

    SHA256

    90c76ed74fef5d0d58f11f587cee9d55f575f2dc12a87ce5fc5cfd94bd591f67

    SHA512

    8144401b75bf429e2b6de9d0ce14831de426e8d7c237868969ff9880b53569bf9ec3f748cc57810805e42c38e39862426e216c905d06355dbc6d95c23de2a395

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb954de66680166f9ae7b8170f70dc46

    SHA1

    8dd7af46ed6b44b17d7c0b69d46eeaba71a3670a

    SHA256

    c21d9d8f90ba4983013f7c3e4af23d7d5b3c22b4693f691007faaf5ad573f5b1

    SHA512

    2c9cea77706a7887041d41bde30ae8ee512bd877e3fdbe103d9d4c6740ad2cf0accede69cd1c33618708a56124be9fb4d629f12793da5a10dad5e70c2c3dbc94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d9ea5c3e0ef85070a0f5f34fd5262783

    SHA1

    e6fd4cabdb659870a2d650caff8d20df34175030

    SHA256

    1afb9a09bf0a592b805bac458ddbbd2d369e8b39b7987ccb5f2bc71b735b2c37

    SHA512

    df454f85afec2cfcdfa8c710135ad624442ed79ae74f6dbfd23b5ffa63d98de8c6024c5cb436c4746ce45b1d6f623bc3e4713edb591bd97f2a31b8a5fb00e0b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    71b70c12d674b87fb8a0d8d58aea1c77

    SHA1

    212d23c344ce0f7c935a753d791d612b55968f81

    SHA256

    467d11913cdb605e4595adfdb040dcdbb74154dfc1b31c53cb932504c6af9344

    SHA512

    dd141cc249eedb430624d39fa80771a067492b401ceec6fe37537314d9a1d5c4de122773cc209bc6182c3b41718fe829a468974d02ea99f2c173048e2625b643

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4106bfbe3c7c2dbb321e8e10f3b55a96

    SHA1

    62543cca5f1a779662bcc4a010fed3bc087349e4

    SHA256

    a74160a892bb25fbae5fdc64e5b0c845088acc39f7cc8e1381b1187134355377

    SHA512

    5d8f64d094cd49a7e212fd12baa1bc605ca28f926aa7e1b6efcdc3bb21222708b3acf07eae1996039e7b13b83bead4ec1a8ea396f82cad54b27fd649307399e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    301bc28093c19098dcfeabb3c89412bb

    SHA1

    48dab0991014b9b853ac3ddd4d009f705b22683f

    SHA256

    9542fa6df7473b93f072a40660c0d3af1f55df3ca0a2831a5e1d77b5373da1da

    SHA512

    0935d90602f8c0f013d8b31a611a95a110a2e83761cea684b42fd67a6ec79d539ad6977769fefebe79567debd83128e9ae4a5064a52260634bbfe823a954bd85

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7603e22879a9b434982112850b3dd384

    SHA1

    7b1754a410068373daafb1b6db7fef597c31bdbe

    SHA256

    61bc2d064af5b662306fa14268c2171b2570bc5a135b838eacdfb49bc41a3204

    SHA512

    0a45f911f275befd9b35210843ad7c13c08f3e332b1bcdfe8525baa83ccf840df757e71e4a9d4f59f4a1fd79cb10c55db42dc624b9780ec661c839978bcc4e6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    775773c7442d244118f244d9ffcd3f25

    SHA1

    ab7f5ab16e9a4c756282740f68af861574ee4d4f

    SHA256

    fd71f44440c8e5a4102de85fb8f6ece5f5e9469b7231e55b1db6cdb7d5baafbf

    SHA512

    178b31dc4ebc74768d23c04c11af9fe87f6f6e431e057d16740d4f45ca126e9f4c05d92e494017b783a7e48186c2a9e2393e5c02fa1ca23c274c6671567decdc

  • C:\Users\Admin\AppData\Local\Temp\CabF52A.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarF669.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • memory/2208-9-0x00000000005D0000-0x00000000005EA000-memory.dmp

    Filesize

    104KB

  • memory/2208-1-0x00000000003D0000-0x0000000000410000-memory.dmp

    Filesize

    256KB

  • memory/2208-0-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/2208-2-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2208-3-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB

  • memory/2208-8-0x0000000000430000-0x0000000000530000-memory.dmp

    Filesize

    1024KB

  • memory/2208-10-0x00000000005D0000-0x00000000005EA000-memory.dmp

    Filesize

    104KB

  • memory/2208-3275-0x0000000000430000-0x0000000000530000-memory.dmp

    Filesize

    1024KB

  • memory/2208-2694-0x00000000003D0000-0x0000000000410000-memory.dmp

    Filesize

    256KB

  • memory/2208-1935-0x0000000074170000-0x000000007471B000-memory.dmp

    Filesize

    5.7MB