Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-04-2024 18:56

General

  • Target

    dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7.exe

  • Size

    998KB

  • MD5

    88d19703623192e4ddf73cec4aa24a89

  • SHA1

    c23025a02259e6da9a7db46ce7a12274a3cd4b18

  • SHA256

    dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7

  • SHA512

    83e366948e5a8e80fc31e98771029add13293387fa876a2ba8a420032db9b23c043e2ee228eaafce8c7224d1d3b5081a1c9de26b003b7877657d44741abc03e6

  • SSDEEP

    24576:M1eKhP8/X0LknDY1zhdpACe+0RJ7Vz5xDIaTyEYKlZUOXJ:MXhP9LkD4T0htmJWt

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 4 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 5 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 14 IoCs
  • Executes dropped EXE 8 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7.exe
    "C:\Users\Admin\AppData\Local\Temp\dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3104
    • C:\Users\Admin\AppData\Local\Temp\dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7.exe
      "C:\Users\Admin\AppData\Local\Temp\dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:428
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
        3⤵
        • Accesses Microsoft Outlook accounts
        PID:3096
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
        3⤵
          PID:2940
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderprodkey.txt"
          3⤵
            PID:4412
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderskypeview.txt"
            3⤵
              PID:4380
          • C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"
            2⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2008
            • C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2232
              • C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe"
                4⤵
                • Executes dropped EXE
                PID:4188
              • C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of AdjustPrivilegeToken
                PID:3264
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            PID:4316
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe"
              3⤵
                PID:2040
              • C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"
                3⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of AdjustPrivilegeToken
                PID:2740
                • C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5056
                  • C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe"
                    5⤵
                    • Executes dropped EXE
                    PID:3604
                  • C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"
                    5⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4112

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\LookupSvi.exe.log

            Filesize

            128B

            MD5

            c748e8ca8696cef7e06115966216593a

            SHA1

            de51083153bc4e802050a6f3f8e2d273ea36e564

            SHA256

            b83056f659f6c279f69432c96fcf4d90adde41c8a3798d3105e26fe8b864759d

            SHA512

            d29689f58a3c672c5c2bc1a13d9b7ce7cf147f95364f54265f40783817b66e112e81e72a4e215e745a66d3ebfe57985c38d98b484646bfb01a7e92e805660ca2

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\secdrv.exe.log

            Filesize

            774B

            MD5

            568e6f2b186c39075772d775e4189f57

            SHA1

            02f642cfdd1491b1ce69e81925ed336975e2f972

            SHA256

            d29bbfbb510acd8716133feeade8f914076963ccc38abb4b5a64a8d32bac44e4

            SHA512

            ef3b7f6d6b355c41ca9abb40d769622ea3f79787d8d2501ad5a135fa5cc78712175190386c8e05ee863a3bc046bc09eee22310555d31e4d57a4652f280283156

          • C:\Users\Admin\AppData\Local\Temp\holderprodkey.txt

            Filesize

            723B

            MD5

            35349b5569e3a40730b2f3af09b6acdd

            SHA1

            4fe4aee6079ad38ef33d8902eb6a25dab834fbf8

            SHA256

            d01eaf034899948813fd2b5757f1343fc6191e03f1c8fca979906edfe3455b06

            SHA512

            a580fc5547c323edc388f86b1f7deb1cf4b3eb9b6f5798b1780d680166047971b5badc35627ec620bdbf93bcbd2a69b783e81636304bd4ef5e0e3efa276c3e20

          • C:\Users\Admin\AppData\Local\Temp\holderskypeview.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

            Filesize

            3KB

            MD5

            f94dc819ca773f1e3cb27abbc9e7fa27

            SHA1

            9a7700efadc5ea09ab288544ef1e3cd876255086

            SHA256

            a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92

            SHA512

            72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

          • C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe

            Filesize

            7KB

            MD5

            c283efa34a736e2e98e64da9b1f927ae

            SHA1

            53c991156979b3a7ecdcdb799fb33440cb73ed55

            SHA256

            2a11fd8fdb1108cdac9c38d9b3fee701ece885e9de4766ab26779c4a994aabfa

            SHA512

            9b7c433a2f0362d82af4d31000b108962ca2d6090f5d3aaaae4dd4be41c9cde3c27cf2869193755da8bd0880732f815b9875cbbb2d44f30b64d55659a38c90ec

          • C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe

            Filesize

            998KB

            MD5

            88d19703623192e4ddf73cec4aa24a89

            SHA1

            c23025a02259e6da9a7db46ce7a12274a3cd4b18

            SHA256

            dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7

            SHA512

            83e366948e5a8e80fc31e98771029add13293387fa876a2ba8a420032db9b23c043e2ee228eaafce8c7224d1d3b5081a1c9de26b003b7877657d44741abc03e6

          • memory/428-9-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/428-31-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/428-15-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/428-38-0x0000000002460000-0x0000000002470000-memory.dmp

            Filesize

            64KB

          • memory/428-50-0x0000000002460000-0x0000000002470000-memory.dmp

            Filesize

            64KB

          • memory/428-20-0x0000000002460000-0x0000000002470000-memory.dmp

            Filesize

            64KB

          • memory/428-11-0x0000000002460000-0x0000000002470000-memory.dmp

            Filesize

            64KB

          • memory/428-28-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/428-23-0x0000000002460000-0x0000000002470000-memory.dmp

            Filesize

            64KB

          • memory/2008-67-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2008-37-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2008-32-0x0000000002F10000-0x0000000002F20000-memory.dmp

            Filesize

            64KB

          • memory/2008-33-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2008-17-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2008-16-0x0000000002F10000-0x0000000002F20000-memory.dmp

            Filesize

            64KB

          • memory/2040-101-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2040-102-0x0000000003030000-0x0000000003040000-memory.dmp

            Filesize

            64KB

          • memory/2040-103-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2040-111-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2232-93-0x0000000002220000-0x0000000002230000-memory.dmp

            Filesize

            64KB

          • memory/2232-62-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2232-36-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2232-95-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2232-68-0x0000000002220000-0x0000000002230000-memory.dmp

            Filesize

            64KB

          • memory/2232-35-0x0000000002220000-0x0000000002230000-memory.dmp

            Filesize

            64KB

          • memory/2232-63-0x0000000002220000-0x0000000002230000-memory.dmp

            Filesize

            64KB

          • memory/2232-34-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2740-109-0x0000000000F90000-0x0000000000FA0000-memory.dmp

            Filesize

            64KB

          • memory/2740-108-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2740-120-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2740-119-0x0000000000F90000-0x0000000000FA0000-memory.dmp

            Filesize

            64KB

          • memory/2740-118-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/2940-42-0x0000000000400000-0x0000000000459000-memory.dmp

            Filesize

            356KB

          • memory/2940-49-0x0000000000400000-0x0000000000459000-memory.dmp

            Filesize

            356KB

          • memory/2940-41-0x0000000000400000-0x0000000000459000-memory.dmp

            Filesize

            356KB

          • memory/2940-39-0x0000000000400000-0x0000000000459000-memory.dmp

            Filesize

            356KB

          • memory/3096-27-0x0000000000400000-0x000000000041B000-memory.dmp

            Filesize

            108KB

          • memory/3096-24-0x0000000000400000-0x000000000041B000-memory.dmp

            Filesize

            108KB

          • memory/3096-21-0x0000000000400000-0x000000000041B000-memory.dmp

            Filesize

            108KB

          • memory/3104-25-0x0000000002C40000-0x0000000002C50000-memory.dmp

            Filesize

            64KB

          • memory/3104-1-0x0000000002C40000-0x0000000002C50000-memory.dmp

            Filesize

            64KB

          • memory/3104-7-0x0000000002C40000-0x0000000002C50000-memory.dmp

            Filesize

            64KB

          • memory/3104-0-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/3104-60-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/3104-4-0x0000000002C40000-0x0000000002C50000-memory.dmp

            Filesize

            64KB

          • memory/3104-2-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/3104-3-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/3264-96-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/3264-80-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/3604-133-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/4188-70-0x0000000000400000-0x00000000004F0000-memory.dmp

            Filesize

            960KB

          • memory/4188-82-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/4188-79-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/4188-72-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/4188-73-0x0000000002F00000-0x0000000002F10000-memory.dmp

            Filesize

            64KB

          • memory/4316-92-0x0000000001430000-0x0000000001440000-memory.dmp

            Filesize

            64KB

          • memory/4316-64-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/4316-97-0x0000000001430000-0x0000000001440000-memory.dmp

            Filesize

            64KB

          • memory/4316-91-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/4316-122-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/4316-61-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/4316-117-0x0000000001430000-0x0000000001440000-memory.dmp

            Filesize

            64KB

          • memory/4316-65-0x0000000001430000-0x0000000001440000-memory.dmp

            Filesize

            64KB

          • memory/4380-83-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/4380-85-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/4380-89-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/4412-53-0x0000000000400000-0x0000000000415000-memory.dmp

            Filesize

            84KB

          • memory/4412-51-0x0000000000400000-0x0000000000415000-memory.dmp

            Filesize

            84KB

          • memory/4412-57-0x0000000000400000-0x0000000000415000-memory.dmp

            Filesize

            84KB

          • memory/4412-56-0x0000000000420000-0x00000000004E5000-memory.dmp

            Filesize

            788KB

          • memory/5056-115-0x00000000023B0000-0x00000000023C0000-memory.dmp

            Filesize

            64KB

          • memory/5056-114-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/5056-116-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/5056-123-0x00000000732E0000-0x0000000073890000-memory.dmp

            Filesize

            5.7MB

          • memory/5056-124-0x00000000023B0000-0x00000000023C0000-memory.dmp

            Filesize

            64KB

          • memory/5056-127-0x00000000023B0000-0x00000000023C0000-memory.dmp

            Filesize

            64KB