Analysis

  • max time kernel
    147s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 18:02

General

  • Target

    HawkEye.exe

  • Size

    232KB

  • MD5

    60fabd1a2509b59831876d5e2aa71a6b

  • SHA1

    8b91f3c4f721cb04cc4974fc91056f397ae78faa

  • SHA256

    1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

  • SHA512

    3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

  • SSDEEP

    3072:BMhIBKH7j7DzQi7y5bvl4YAbdY9KWvwn7XHMzqEOf64CEEl64HBVdGXPKD:BMh5H7j5g54YZKXoxOuEEl64HZAi

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Renames multiple (2005) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 37 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HawkEye.exe
    "C:\Users\Admin\AppData\Local\Temp\HawkEye.exe"
    1⤵
    • Chimera
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Music\YOUR_FILES_ARE_ENCRYPTED.HTML"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\YOUR_FILES_ARE_ENCRYPTED.HTML

    Filesize

    4KB

    MD5

    b3728a50858e841e0f4319d6706263c9

    SHA1

    bb31d300678c2f12a83803e489acbb5a80577c73

    SHA256

    c8c8f243d111a7c8c9f003ee704669e2939a159b93c03a7db2972dc712b830ca

    SHA512

    394f5d6cec7cf8234665b1a9f0afc6529399c1186baadb72975353f2a8070fb6c1aa9a9cb06d05f8181fd43249474b875292b094327535b3c0bb6bff245868db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    3fcd22b6d11adff54c4377d127738472

    SHA1

    f838e9f6724cb85eeceea752bbd7338660c53568

    SHA256

    02115d2e998bc4c5ca96f692d78802ec315137dc07cfbc9be73a135bd9f2bb06

    SHA512

    6a68397c3d423ef87c178656ab9a7ac7486e43316a513b6e41b20579149bf2034c4ee5cb7688ee4d28bb4e2ec8ccdf85a6826ad96c06e318c721f62bbc4c509f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31eb9db84252e4454d3da69be357fa44

    SHA1

    29a0c807d9169be6601f4a1c05968ef863ca859c

    SHA256

    6cd14128dd6769b3e651cf642a57e1f67b603bbcd83b3fbd8c5bcbb27fe81237

    SHA512

    2db2d185cad59e1ef25d00a282015dda02ee4997601095f81de8f3ae1e8831504e643514bc32c3b60035260758ac7ffefa15b5bae53108a4fcabfe9ce1297c75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbd583e13d3295043b6e115cf60966a2

    SHA1

    dea855141a3910db8a84a721d41bf3509d553fe8

    SHA256

    5c8a172994a3389d90aeb1b0fab70d8811b8ebdeeaf8306f316ac733adf99271

    SHA512

    e71c0e0fab5f0cef16daadbed9543890e0c6f52ceaeb7ecd48f81d4a4db62d5fb16e1deb3e9310ba2094c4af2a22ffdf29eeefe8230828cd48c11ed7499be369

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7b635d284827d5163556b6b27940ac7

    SHA1

    e12aad68a4012e3e8c539b5ac8039e93ece6172b

    SHA256

    fa4aadb22e23ed5d58f3e09ce68f33cb4462a7e7efc6520760555ad8b47bb9f4

    SHA512

    aee8d96c61189444ae7b6d904f4f87bfdb92dd36b6f5bf7e8042633514620b4695ed1b5b7c858aca6181b2301748c680de199eb6405f65daa6ed0fcbd1b56abb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dee12167cd34f391c8ecef94951b8294

    SHA1

    6fc6dd69d63a39b7db8d3d45248a00f17b91940f

    SHA256

    e191d655be3898585dd9da0fe03da711d6a2ea6d8332f168bbb6447863cce8c4

    SHA512

    08bca7e3c5b970a03815a608664dc9a24734ddcfc18f6700b1bd42996158442c65a08831b18590c4e4850f56d51bd28987e4ef06f06ad2085e4e26f24b816d63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    100ac6b63342b5df918a6f1aaf146dc8

    SHA1

    d4a8a423fa87828977d3f1df13442bd608837192

    SHA256

    fecfeedda925a42f75000819b3bf28e2da292f97819273d08772d25a0aafea95

    SHA512

    20d58ce0795e71dcf37cd12e62d02f01f398428c058c6c30e97109622217a1336e0d834a1f836ee5ae4d07e9fc943463d664da26041c35cadd530be6ccea729a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75e7024c2d08262097768b0bc6e5545e

    SHA1

    71b948078fee6cf297436101f5750302c3724b99

    SHA256

    a768f2c85dc3b6c923b0f6e9f2b7117dd0a56759fbd9aaf8cf5f3c83facf378a

    SHA512

    5bf9fcb7df220e84443b4ba9efa9dee91b751872226aa81b5bb7b528ca06c4969b2fa3f66ff45845c3933d69354129dee58c76e001d6f0d3a301cc0a86489629

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e41c9e90a0acad5f1b02f192705b8461

    SHA1

    93d7479c2a9a3d917b72fd3fb1761f6e083bbcba

    SHA256

    8bd4ef4cad376f80a04bfa72270afd638e7187fabda42f074acdbd5208c12b38

    SHA512

    40371c282c884331a6e0759b438fd822a4a7dad767eb1678bb737148abdec7d5c1a0fb4f17a8ee58e09e2acc48d197c0d50afe3d658b01a12c34478ea9a8aa7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19d86cd7022e5ed03daa6c372d793c76

    SHA1

    dcec06f4c4951ea4568c5f1a61867f090284f757

    SHA256

    93c71a9ce9a62af0023ccf78d1a1acc33c3eee4639ecbf40a9b282a49749872f

    SHA512

    17c2ad3ca7877c4d687c300087a0065e154559136cb4d4faa9964fe2723514a72638eba29eaf26019550773912a600319a7c1506bdf9b8af1adb9fc39d8df2f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc8fd9630b828168611d88fa29c2374e

    SHA1

    289a3b0f600fc971a7ce0ccfb004e31512de9a8e

    SHA256

    fbe2c40336105e1825d3d57a299f16c6b6ae66e5d3d6292ef2793823eb560f99

    SHA512

    0666b5216f3161f004eabb70fd6848886ce516758f96329d185ceac2c105fd36fd042b6410a24bc7a60bb0e7a73ab833142e728ac2bd70a31c5285f7001941ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f8a3e30575eb91776b65b15acdef3ba

    SHA1

    74337f8d96aa992c00117ee46ede10183b9e237c

    SHA256

    870846ac0cc6264920b61e3546c32207b6c7d1ce1c46d797b147cf7ba068daa4

    SHA512

    c7b22fe336523281638a9e6f78eb41a47825a17ca237ae8cd5fd3b5097bbcd557c05213df5b5d4dcbf7688a3fa7236d8bc1f7b1ed782d9c6265e1ae9a17692f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01d5526fe9366f18dfc87d628d716026

    SHA1

    0a2df1dc484c2f56667f54eb143305ce74613905

    SHA256

    7eb1ba90779ff305dded4f3418824ae2b59898742c762704bbda2db95695ac1c

    SHA512

    dcc278ee1924c92744ec821a893ce289d87c9b1e0a73b7f39815d3bc068cab6b88960aa664baaf2227f0a29cc8147de60a699ad2e83c2912a23890437ceb7134

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    743b8afcea5869a3b4c06e8f1264943f

    SHA1

    ade9e75b10751ffdd7bb4c60f73186859bd95580

    SHA256

    652731ad74377c72906ba37070e1876408dd286408f80a9ba0de05c95394970c

    SHA512

    401b359ab73d4c357a485615edcd8e84a6ece7897fa1a6af457f08d8026fea977b9e946957562ae000757346ef853ec642b983a524e69816eaa7206753fc6c05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70913e2c2a3245dbbba9fcc4f7ff4119

    SHA1

    ea03395af87e5f3924613800e87ea42ac3ca8999

    SHA256

    fd7aa07711c4be39616340a315c1a0fb687744b43811debc339184a23c341fea

    SHA512

    745d6eab2788a8a0a490869ca92471eb17d9c82e1b4f525661bec12d6aeed9f27d4cb1d14b9df8fb8c911fd93f81bdc73f2665f85d49bce60bdcec49f1232888

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe45170b220591f121f9c4ede39abd85

    SHA1

    a5b2dcaa7eeaa40b9fbfe2650f50c6ab09efcfed

    SHA256

    43dc51a7031ef8c84f65efec0869a12397e341ef56613da69eaa0194593a6d5b

    SHA512

    0a19da852d6e7355e814cf355d8857527f268697ce38ff73f65614f9e8b0e2ab6e7f0e89fdac2242b27c0a201650ec26a0e8bbe4975e649847b77dc0732be6ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5bce3197154c17d8f254cb0a1f6ce38

    SHA1

    4877238a345d2543178b23cc0a75acb1fa26511e

    SHA256

    3d600beac3ec166730fea0494e4f63648e49a8adc775bc740578ce1f0c0142ce

    SHA512

    b17b196dce3a1c0115ce46988a89b0ae3992767b6efa9a19d85401a3585042c337d4695037638bd39423c38d6982acdd99f81f9d5d23ed5668c819ae01c59f98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e71f8378c0d23ac65c7be5f70f13c2a3

    SHA1

    cde844f1c4f9f6e62a3a318395416ccd0d53e759

    SHA256

    82bae24e0586052f7aa3a1f2c82294c6c125549eb696653facb549463ecf8dc0

    SHA512

    a54b1af9d59dac4376aca4b715736823473377662bdbe4fe255f2e732fb079ea36a7f7c7764b8126c9b3190a336cbb8b05bd225fbfb49298f2ae92c02b32fa5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0702c370b5754d64ce6d4690e6bb9b33

    SHA1

    c726f2dba8556ac4a2e4d4cac183f1746e3a8cd8

    SHA256

    c3e389d52c168162ffd382e64604da66a55682e507689dad118c8be80f50f003

    SHA512

    f0a768e546e7a61be18e0ccce0acc6620cc7020e6b7e5ebfb368616f820539a091092179bdc0ec85a652cb8a1f68b1bf7f29c001a01e495b8ad37ca07e1d8146

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70b235665b68dadcafa928b119550621

    SHA1

    45f065b0f12cd1bb82f39d38bd3ba0a693f025e3

    SHA256

    653329323ea3b47a323f80b15f1640409df254d512485500a7c81d2ba83b9ecc

    SHA512

    de620e006c7a882e272da18fabd1057009935b5e08b7e557e0ad0c045ffc5a79fc14eb8bf1fd873055b49889d9d9d56451ab45311fccc75105afb449e8e13cde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    82794247aaa5f11af153c86585145e92

    SHA1

    e2a245cfc2cd5f27376d230753b7ca9a85c53297

    SHA256

    99512ed6bf9fb98c9bf6b383f7d513eec473b2cb4933cad29212fc08206a17bc

    SHA512

    188609d0f387d6b6cde271afc6b2460439b6459d2f8ec55ddfd3d551022388890743e4b89bd5e662adb05387cc24b122c925be1afacfd202e130637cd5f65f50

  • C:\Users\Admin\AppData\Local\Temp\Cab584F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5872.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2632-2-0x0000000074770000-0x0000000074D1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2632-8-0x0000000074770000-0x0000000074D1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2632-3-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2632-9-0x00000000003F0000-0x000000000040A000-memory.dmp

    Filesize

    104KB

  • memory/2632-4663-0x0000000074770000-0x0000000074D1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2632-1-0x0000000074770000-0x0000000074D1B000-memory.dmp

    Filesize

    5.7MB

  • memory/2632-0-0x0000000074771000-0x0000000074772000-memory.dmp

    Filesize

    4KB