Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 17:11

General

  • Target

    PAYMENT-PDF.exe

  • Size

    518KB

  • MD5

    d8b7335d7669b24ddb9b239953f0d7a7

  • SHA1

    f119bea19f892adc161a0ebb15ffbcc8150cc3c5

  • SHA256

    39a4ec5ad4a36ea2d1be630d203942fc63badf94dcdb1384fb8a9e88431c92d9

  • SHA512

    96c2ef1da4c5c1f55c17cadd46959a0ec8c0d9ddc947ac2c5c85fb9a3910d76436079ce2ed739c4f27f5d54cd8d1776670aeea305061fc43a046c92ebfbe515e

  • SSDEEP

    12288:mEtjkdhUeFE6ySHS+aoISuYZ0kaJWIkkQNvnr5de:mDZE6hSDoISnqkAvQNvnr5g

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger payload 6 IoCs

    Detects M00nD3v Logger payload in memory.

  • Drops startup file 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PAYMENT-PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\PAYMENT-PDF.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ytxlzlf3\ytxlzlf3.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1989.tmp" "c:\Users\Admin\AppData\Local\Temp\ytxlzlf3\CSCE5338EB7B032412BB8607D5F2F2556A0.TMP"
        3⤵
          PID:2588
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
        2⤵
          PID:2704

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RES1989.tmp

        Filesize

        1KB

        MD5

        1f2b74ce792469557afcb4752710ac95

        SHA1

        e2b71b88d0d780d0dcbdc2b1934d0461aa136dbb

        SHA256

        bffccc117db9cfc9209faf3063f81b8c00f847c61e81345b57602e7452bde4f5

        SHA512

        ecd8b63dc05ba9ca1da3a2e3b67597ce526088e996727723933a49ddcb68d1736206b8a8ff398b74cb3bc41372a8074d3e66cef9d280d634a492f56d58dc7556

      • C:\Users\Admin\AppData\Local\Temp\ytxlzlf3\ytxlzlf3.dll

        Filesize

        6KB

        MD5

        e6f2af6754112273824ff2fe5f909821

        SHA1

        3e4e41d76981fe3e754ecd0a6cd8fa79a7d6f031

        SHA256

        b5fb6dd4599227a830bebb1e715d92c39abb1e0a61a988870d6b875ddd3045d6

        SHA512

        09aa97b916e1dd58828f6abb15e47db54d448a42fa510f5a8aac9bc7d723769671843307692a26e34bfe1f9a876bb55c5de8985eaaa587b0db351a5ca7cebe35

      • C:\Users\Admin\AppData\Local\Temp\ytxlzlf3\ytxlzlf3.pdb

        Filesize

        17KB

        MD5

        d7ea8e57223a5e79f804f1bc5e12cfc8

        SHA1

        b9c6bacbf585fb84b36368ca31ffde497c8558be

        SHA256

        a9a23d19dd1a109f9ab1f86c2c8076c15be6137529aeadbe34c4aa7bd597c57e

        SHA512

        3695df7275162743eb98f499a4800a830496a8e38b610a774f827b83dbc3762bd7b36e0be84df803a76caeefb6be041eee9a169a776dfb9aabeab7c989cda2cc

      • \??\c:\Users\Admin\AppData\Local\Temp\ytxlzlf3\CSCE5338EB7B032412BB8607D5F2F2556A0.TMP

        Filesize

        1KB

        MD5

        6a3ff8fa0834df00563761aa6423273b

        SHA1

        37fe69aa63094e2ed281697dd4ad01109b68fea9

        SHA256

        7d6fcea81c1f8d0e09aa1bc12ad72d3cd1428182559a3cd105b172303474fb8e

        SHA512

        16059b7e6bcb30a3ce80ca0bca262d0fc9e53e3c1ef2ff9b28d56ac2ad689d820b8a332668cf2365c714c029aa553033371e3a1af086e20979450ea4b210c1ea

      • \??\c:\Users\Admin\AppData\Local\Temp\ytxlzlf3\ytxlzlf3.0.cs

        Filesize

        3KB

        MD5

        b6823d54afabf958afeefb18571df6e2

        SHA1

        9565aaf3eb244d657951d7a4f6bcdecf2b5bd2b4

        SHA256

        215489b46857eb0ffa39c0bc87f61944b6fb14d4fecc628db6e57d9e0eb27a10

        SHA512

        9b111ff86b7e36cc52750aad546e6c2c71e8ac90ae327880dc8666a749370312d1d2be34da3d24c5161a569c6452754248e3b8fbfecb2a25b9063237ac08c318

      • \??\c:\Users\Admin\AppData\Local\Temp\ytxlzlf3\ytxlzlf3.cmdline

        Filesize

        312B

        MD5

        d96e701077a9f6569251fdbf64e6cb15

        SHA1

        a2bae36aad79646911a068bb83ce4115b4bcfa01

        SHA256

        ba216704d3d5a5e8262d5533cb8d2b06ba20452ea632c8592af65f1c07896464

        SHA512

        ea2a993fbed447f4909f70e0fd092f4d95b4515f3d820f63adeeb90ed72b59058e39d5df5275d342b1786d91b95858c99374465763c8c55373bf4c362d0cd5d2

      • memory/2704-24-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2704-32-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2704-36-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2704-26-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2704-28-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2704-34-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2704-29-0x0000000000400000-0x0000000000490000-memory.dmp

        Filesize

        576KB

      • memory/2704-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2760-23-0x00000000050E0000-0x0000000005170000-memory.dmp

        Filesize

        576KB

      • memory/2760-0-0x000000007443E000-0x000000007443F000-memory.dmp

        Filesize

        4KB

      • memory/2760-5-0x0000000074430000-0x0000000074B1E000-memory.dmp

        Filesize

        6.9MB

      • memory/2760-37-0x0000000074430000-0x0000000074B1E000-memory.dmp

        Filesize

        6.9MB

      • memory/2760-20-0x0000000000410000-0x000000000041C000-memory.dmp

        Filesize

        48KB

      • memory/2760-19-0x0000000005040000-0x00000000050DA000-memory.dmp

        Filesize

        616KB

      • memory/2760-17-0x00000000003E0000-0x00000000003E8000-memory.dmp

        Filesize

        32KB

      • memory/2760-1-0x0000000000F40000-0x0000000000FC8000-memory.dmp

        Filesize

        544KB