Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-04-2024 18:56

General

  • Target

    dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7.exe

  • Size

    998KB

  • MD5

    88d19703623192e4ddf73cec4aa24a89

  • SHA1

    c23025a02259e6da9a7db46ce7a12274a3cd4b18

  • SHA256

    dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7

  • SHA512

    83e366948e5a8e80fc31e98771029add13293387fa876a2ba8a420032db9b23c043e2ee228eaafce8c7224d1d3b5081a1c9de26b003b7877657d44741abc03e6

  • SSDEEP

    24576:M1eKhP8/X0LknDY1zhdpACe+0RJ7Vz5xDIaTyEYKlZUOXJ:MXhP9LkD4T0htmJWt

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • NirSoft MailPassView 4 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 5 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 16 IoCs
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7.exe
    "C:\Users\Admin\AppData\Local\Temp\dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4712
    • C:\Users\Admin\AppData\Local\Temp\dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7.exe
      "C:\Users\Admin\AppData\Local\Temp\dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5088
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"
        3⤵
        • Accesses Microsoft Outlook accounts
        PID:2136
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"
        3⤵
          PID:3540
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderprodkey.txt"
          3⤵
            PID:2344
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderskypeview.txt"
            3⤵
              PID:3448
          • C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4104
            • C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe"
              3⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4736
              • C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe"
                4⤵
                • Executes dropped EXE
                PID:4660
              • C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of AdjustPrivilegeToken
                PID:880
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe"
            2⤵
            • Checks computer location settings
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            PID:4944
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\takshost.exe"
              3⤵
                PID:3640
              • C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"
                3⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of AdjustPrivilegeToken
                PID:392
                • C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe"
                  4⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3432
                  • C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe"
                    5⤵
                    • Executes dropped EXE
                    PID:2224
                  • C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe"
                    5⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4436

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\LookupSvi.exe.log

            Filesize

            128B

            MD5

            a5dcc7c9c08af7dddd82be5b036a4416

            SHA1

            4f998ca1526d199e355ffb435bae111a2779b994

            SHA256

            e24033ceec97fd03402b03acaaabd1d1e378e83bb1683afbccac760e00f8ead5

            SHA512

            56035de734836c0c39f0b48641c51c26adb6e79c6c65e23ca96603f71c95b8673e2ef853146e87efc899dd1878d0bbc2c82d91fbf0fce81c552048e986f9bb5a

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\secdrv.exe.log

            Filesize

            774B

            MD5

            049b2c7e274ebb68f3ada1961c982a22

            SHA1

            796b9f03c8cd94617ea26aaf861af9fb2a5731db

            SHA256

            5c69c41dceda1bb32d4054d6b483bb3e3af84c8cf0a6191c79068168a1d506b3

            SHA512

            fb2ee642e1401772d514e86b0b8dd117659335066242e85c158b40e8912572f2bd7b9a0f63f9b9f4d7a2e051579345215f6b1f147881f3d1e78f335c45d78ebf

          • C:\Users\Admin\AppData\Local\Temp\holderprodkey.txt

            Filesize

            727B

            MD5

            140b3cdbeaf7af88048fc4c13a89f0e0

            SHA1

            e306868cae76d2ccaeb095fd6a46ea096311bf53

            SHA256

            dcd20e950f5dac63cdca03da758be46268132c92f5942620d920998c96c7ac36

            SHA512

            d781744ad0f04ee1cdbe54e10a9c26e5e551067d9719d2ce7acfb8fd7b47fd8e7a023b68acc9c9101cfdc18a4a356dbd69cfe4e6c2eac2e66fb1621678e42a1a

          • C:\Users\Admin\AppData\Local\Temp\holderskypeview.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\holderwb.txt

            Filesize

            3KB

            MD5

            f94dc819ca773f1e3cb27abbc9e7fa27

            SHA1

            9a7700efadc5ea09ab288544ef1e3cd876255086

            SHA256

            a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92

            SHA512

            72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

          • C:\Users\Admin\AppData\Roaming\Microsoft\LookupSvi.exe

            Filesize

            7KB

            MD5

            c283efa34a736e2e98e64da9b1f927ae

            SHA1

            53c991156979b3a7ecdcdb799fb33440cb73ed55

            SHA256

            2a11fd8fdb1108cdac9c38d9b3fee701ece885e9de4766ab26779c4a994aabfa

            SHA512

            9b7c433a2f0362d82af4d31000b108962ca2d6090f5d3aaaae4dd4be41c9cde3c27cf2869193755da8bd0880732f815b9875cbbb2d44f30b64d55659a38c90ec

          • C:\Users\Admin\AppData\Roaming\Microsoft\secdrv.exe

            Filesize

            998KB

            MD5

            88d19703623192e4ddf73cec4aa24a89

            SHA1

            c23025a02259e6da9a7db46ce7a12274a3cd4b18

            SHA256

            dcae346b4fd3da14ef50ccfb5b5e06fd73fb17918c2ac00b324d89ed7b104fd7

            SHA512

            83e366948e5a8e80fc31e98771029add13293387fa876a2ba8a420032db9b23c043e2ee228eaafce8c7224d1d3b5081a1c9de26b003b7877657d44741abc03e6

          • memory/392-133-0x0000000001650000-0x0000000001660000-memory.dmp

            Filesize

            64KB

          • memory/392-123-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/392-135-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/392-132-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/392-122-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/880-89-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/880-87-0x0000000001870000-0x0000000001880000-memory.dmp

            Filesize

            64KB

          • memory/880-86-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/880-103-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/2136-38-0x0000000000400000-0x000000000041B000-memory.dmp

            Filesize

            108KB

          • memory/2136-32-0x0000000000400000-0x000000000041B000-memory.dmp

            Filesize

            108KB

          • memory/2136-35-0x0000000000400000-0x000000000041B000-memory.dmp

            Filesize

            108KB

          • memory/2224-143-0x0000000001810000-0x0000000001820000-memory.dmp

            Filesize

            64KB

          • memory/2224-144-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/2224-142-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/2344-66-0x0000000000420000-0x00000000004E9000-memory.dmp

            Filesize

            804KB

          • memory/2344-67-0x0000000000400000-0x0000000000415000-memory.dmp

            Filesize

            84KB

          • memory/2344-63-0x0000000000400000-0x0000000000415000-memory.dmp

            Filesize

            84KB

          • memory/2344-62-0x0000000000400000-0x0000000000415000-memory.dmp

            Filesize

            84KB

          • memory/2344-60-0x0000000000400000-0x0000000000415000-memory.dmp

            Filesize

            84KB

          • memory/3432-128-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/3432-129-0x0000000001880000-0x0000000001890000-memory.dmp

            Filesize

            64KB

          • memory/3432-137-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/3432-130-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/3432-139-0x0000000001880000-0x0000000001890000-memory.dmp

            Filesize

            64KB

          • memory/3448-93-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/3448-99-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/3448-91-0x0000000000400000-0x000000000044F000-memory.dmp

            Filesize

            316KB

          • memory/3540-50-0x0000000000400000-0x0000000000459000-memory.dmp

            Filesize

            356KB

          • memory/3540-43-0x0000000000400000-0x0000000000459000-memory.dmp

            Filesize

            356KB

          • memory/3540-42-0x0000000000400000-0x0000000000459000-memory.dmp

            Filesize

            356KB

          • memory/3540-40-0x0000000000400000-0x0000000000459000-memory.dmp

            Filesize

            356KB

          • memory/3640-107-0x0000000000400000-0x00000000004F0000-memory.dmp

            Filesize

            960KB

          • memory/3640-109-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/3640-110-0x0000000001B50000-0x0000000001B60000-memory.dmp

            Filesize

            64KB

          • memory/3640-118-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/3640-125-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4104-36-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4104-22-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4104-39-0x0000000001300000-0x0000000001310000-memory.dmp

            Filesize

            64KB

          • memory/4104-59-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4104-23-0x0000000001300000-0x0000000001310000-memory.dmp

            Filesize

            64KB

          • memory/4436-155-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4436-156-0x0000000000B30000-0x0000000000B40000-memory.dmp

            Filesize

            64KB

          • memory/4660-73-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4660-72-0x0000000001000000-0x0000000001010000-memory.dmp

            Filesize

            64KB

          • memory/4660-71-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4660-88-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4712-5-0x0000000001B20000-0x0000000001B30000-memory.dmp

            Filesize

            64KB

          • memory/4712-2-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4712-28-0x0000000001B20000-0x0000000001B30000-memory.dmp

            Filesize

            64KB

          • memory/4712-54-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4712-3-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4712-0-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4712-4-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4712-1-0x0000000001B20000-0x0000000001B30000-memory.dmp

            Filesize

            64KB

          • memory/4736-102-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4736-51-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4736-52-0x0000000001690000-0x00000000016A0000-memory.dmp

            Filesize

            64KB

          • memory/4736-68-0x0000000001690000-0x00000000016A0000-memory.dmp

            Filesize

            64KB

          • memory/4736-31-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4736-30-0x0000000001690000-0x00000000016A0000-memory.dmp

            Filesize

            64KB

          • memory/4736-29-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4736-100-0x0000000001690000-0x00000000016A0000-memory.dmp

            Filesize

            64KB

          • memory/4944-98-0x0000000001C40000-0x0000000001C50000-memory.dmp

            Filesize

            64KB

          • memory/4944-104-0x0000000001C40000-0x0000000001C50000-memory.dmp

            Filesize

            64KB

          • memory/4944-131-0x0000000001C40000-0x0000000001C50000-memory.dmp

            Filesize

            64KB

          • memory/4944-57-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4944-56-0x0000000001C40000-0x0000000001C50000-memory.dmp

            Filesize

            64KB

          • memory/4944-96-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4944-136-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/4944-55-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/5088-10-0x0000000000C40000-0x0000000000C50000-memory.dmp

            Filesize

            64KB

          • memory/5088-108-0x0000000000C40000-0x0000000000C50000-memory.dmp

            Filesize

            64KB

          • memory/5088-9-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/5088-33-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/5088-11-0x0000000075350000-0x0000000075901000-memory.dmp

            Filesize

            5.7MB

          • memory/5088-90-0x0000000000C40000-0x0000000000C50000-memory.dmp

            Filesize

            64KB