Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2024 19:27

General

  • Target

    a1faabdb9d3e74056d07adc087bee51e_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    a1faabdb9d3e74056d07adc087bee51e

  • SHA1

    97d911e6e669c05957596a8a4150d390599c3461

  • SHA256

    4e29c6cbe3d4dfff1aff2e204b94979a45fa937e62748a326b0dfc686e093c10

  • SHA512

    9948eddecd462bb07f0fc3f16e92da0ffbd757124e6f807bd3052357ec397698482bedc777d11ad1594b5bbc9275a0a3cfe8401847d88438736c4dd35fc6c0b7

  • SSDEEP

    24576:9AHnh+eWsN3skA4RV1Hom2KXMmHaoW5ozvxKL8meG4twxefQMa+LdzO4axRLlmOH:ch+ZkldoPK8YaoW5UxKDLskZMLRQ3uS

Malware Config

Extracted

Family

hawkeye_reborn

Version

10.1.2.2

Credentials

  • Protocol:
    smtp
  • Host:
    mail.nsmelectronics.com
  • Port:
    587
  • Username:
    remii@nsmelectronics.com
  • Password:
    Ub#a0v93
Mutex

cc3e46bd-fbd7-493b-bb05-9e06a9eef854

Attributes
  • fields

    map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:Ub#a0v93 _EmailPort:587 _EmailSSL:false _EmailServer:mail.nsmelectronics.com _EmailUsername:remii@nsmelectronics.com _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:cc3e46bd-fbd7-493b-bb05-9e06a9eef854 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:10.1.2.2 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]

  • name

    HawkEye Keylogger - RebornX, Version=10.1.2.2, Culture=neutral, PublicKeyToken=null

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • M00nD3v Logger payload 1 IoCs

    Detects M00nD3v Logger payload in memory.

  • Drops startup file 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1faabdb9d3e74056d07adc087bee51e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a1faabdb9d3e74056d07adc087bee51e_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
      "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\MSBuild.exe"
      2⤵
        PID:2488
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
        "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\MSBuild.exe"
        2⤵
          PID:2060
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
          "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\MSBuild.exe"
          2⤵
            PID:1184
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
            "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\MSBuild.exe"
            2⤵
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • outlook_office_path
            • outlook_win_path
            PID:2904

        Network

        • flag-us
          DNS
          bot.whatismyipaddress.com
          MSBuild.exe
          Remote address:
          8.8.8.8:53
          Request
          bot.whatismyipaddress.com
          IN A
        • flag-us
          DNS
          bot.whatismyipaddress.com
          MSBuild.exe
          Remote address:
          8.8.8.8:53
          Request
          bot.whatismyipaddress.com
          IN A
        • flag-us
          DNS
          bot.whatismyipaddress.com
          MSBuild.exe
          Remote address:
          8.8.8.8:53
          Request
          bot.whatismyipaddress.com
          IN A
        • flag-us
          DNS
          bot.whatismyipaddress.com
          MSBuild.exe
          Remote address:
          8.8.8.8:53
          Request
          bot.whatismyipaddress.com
          IN A
        • flag-us
          DNS
          bot.whatismyipaddress.com
          MSBuild.exe
          Remote address:
          8.8.8.8:53
          Request
          bot.whatismyipaddress.com
          IN A
        • 23.53.113.159:80
          260 B
          5
        • 8.8.8.8:53
          bot.whatismyipaddress.com
          dns
          MSBuild.exe
          355 B
          5

          DNS Request

          bot.whatismyipaddress.com

          DNS Request

          bot.whatismyipaddress.com

          DNS Request

          bot.whatismyipaddress.com

          DNS Request

          bot.whatismyipaddress.com

          DNS Request

          bot.whatismyipaddress.com

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2620-3-0x0000000003060000-0x0000000003173000-memory.dmp

          Filesize

          1.1MB

        • memory/2620-5-0x0000000003FC0000-0x00000000040D3000-memory.dmp

          Filesize

          1.1MB

        • memory/2904-4-0x0000000000400000-0x0000000000490000-memory.dmp

          Filesize

          576KB

        • memory/2904-6-0x0000000074342000-0x0000000074343000-memory.dmp

          Filesize

          4KB

        • memory/2904-7-0x0000000074340000-0x00000000748F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2904-8-0x0000000074340000-0x00000000748F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2904-10-0x0000000074340000-0x00000000748F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2904-11-0x0000000074340000-0x00000000748F1000-memory.dmp

          Filesize

          5.7MB

        • memory/2904-12-0x0000000074342000-0x0000000074343000-memory.dmp

          Filesize

          4KB

        • memory/2904-13-0x0000000074340000-0x00000000748F1000-memory.dmp

          Filesize

          5.7MB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.