General

  • Target

    c7448faf4e8737ed7260e0c0d48c56ba74b54e558805b869d28902d0b5a911eb.zip

  • Size

    794KB

  • Sample

    240402-q7pz1acc5v

  • MD5

    0e00586234cf03c95878668d2630c13f

  • SHA1

    fc49b5c3d4421305e4f0b52d814b95b7b28a52db

  • SHA256

    54f6762a327e73e3e63258be5920cda815e26e071fb329bb9187b03adf0e8147

  • SHA512

    8f3bbe7ae350fb71de4a43ee7521d1c07c0c214b10d80c22857514a70ca6bfa66132b84778b946365bad98b5cbda4d2898a9ce86ec2a8316c15d08fb02b1ac1b

  • SSDEEP

    12288:TKcLHXbmCzw9nz0FnZ0Svet2d7d9Pnk5ckc/RJSvXsTDZ2p3DdvR8EgqLL:TKcLHvmS2IvXRJwcToZD7L

Malware Config

Targets

    • Target

      NO#CU-92504 Xls.exe

    • Size

      1.1MB

    • MD5

      59d184058f8e0a314db11d6f07f600fd

    • SHA1

      5e4b55295fd2b4cc5965fa1e8b322260c5d2a2b6

    • SHA256

      65df886edbea1a5bc833dba4e8e5126ad6326fa44f49e146a9c4b8b34fe75333

    • SHA512

      94adda18b842f927693d6831becbb10c249867c466cb3f2659dc1def9ae05024c7d8cf8a4567fc19f5a1c67495a7994010e1e3e3b3f7784f55f8f7916e190d8c

    • SSDEEP

      24576:mZRToVSu+nsc24YQeP18a5v8UKyd0c7u3yd2OluON4fA9uC:mZRToAu+ns082evFbdLu3yd2OluON4ff

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Looks for VirtualBox Guest Additions in registry

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Email Collection

1
T1114

Tasks