Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2024 13:43

General

  • Target

    postalesmp4.exe

  • Size

    182KB

  • MD5

    0091d020743c4cbea4251fda7a9e1c2a

  • SHA1

    46b23cede43d4de1a4ea8b544821ca84d64266c8

  • SHA256

    d6a07c7c72f838bf598f6f80ed24bd9a84035abc58dc92dea2844786dcaea3c1

  • SHA512

    4a827fdca6e855aca9b380146284d4f74f073c0882fcf0dd36f9b23fd900490bf5da5c5d8d1c8c8c7f0ceac972d125ca1c419d9b075f37de296faf2f5773ac2c

  • SSDEEP

    3072:LcPGMaCGKc2iX7RlK7p0UG5nt526s9xB4Ln9fSKDcSCQ51Y4Uo7j9zc8ql+A1:wP1aXbX7Rip0ZCrB4Ln9GQDYxot4l

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\postalesmp4.exe
    "C:\Users\Admin\AppData\Local\Temp\postalesmp4.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
        3⤵
          PID:4404
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 504
            4⤵
            • Program crash
            PID:376
        • C:\Users\Admin\AppData\Local\Temp\System\ntvdmd.exe
          "C:\Users\Admin\AppData\Local\Temp\System\ntvdmd.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1712
          • C:\Users\Admin\AppData\Local\Temp\System\UccApi.exe
            "C:\Users\Admin\AppData\Local\Temp\System\UccApi.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5016
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
              C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
              5⤵
                PID:4688
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 504
                  6⤵
                  • Program crash
                  PID:4776
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4404 -ip 4404
        1⤵
          PID:4816
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4688 -ip 4688
          1⤵
            PID:5068

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt

            Filesize

            49B

            MD5

            40717b34e60426d24511a3e3fb2e4ef4

            SHA1

            2336370e49fda264db8c1d5ca2617a764a018db4

            SHA256

            4859d840b6a00fdf5b2797b7a01832adbe2075c64b28111114b1652660fea4ca

            SHA512

            6227f0827f9d78da764f5e8b149ec674cb605c6954b85743245b57b57688936a1e2948efd65bf93eb661dbbbd24a8536a26f6cc8e29e55efb8ac10c1c91eeba6

          • C:\Users\Admin\AppData\Local\Temp\System\ntvdmd.exe

            Filesize

            47KB

            MD5

            03c886af821f78c72b9f31a5ee9523bf

            SHA1

            00eb6757b298c1dbfd815672c4d66d88078f489f

            SHA256

            225e869ca14f2ce166871f218c9ff7161ebd25b8ea521a563194d40729318247

            SHA512

            d6d915b160019545ad77f62bf8aa25945fb142c105c2a0535c34139f83f2874412706d6be2e6d982a0a8f54caba2e4debf4446ede134c6c766510dbe942377f0

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe

            Filesize

            182KB

            MD5

            0091d020743c4cbea4251fda7a9e1c2a

            SHA1

            46b23cede43d4de1a4ea8b544821ca84d64266c8

            SHA256

            d6a07c7c72f838bf598f6f80ed24bd9a84035abc58dc92dea2844786dcaea3c1

            SHA512

            4a827fdca6e855aca9b380146284d4f74f073c0882fcf0dd36f9b23fd900490bf5da5c5d8d1c8c8c7f0ceac972d125ca1c419d9b075f37de296faf2f5773ac2c

          • memory/936-1-0x0000000075560000-0x0000000075B11000-memory.dmp

            Filesize

            5.7MB

          • memory/936-2-0x0000000075560000-0x0000000075B11000-memory.dmp

            Filesize

            5.7MB

          • memory/936-0-0x0000000075562000-0x0000000075563000-memory.dmp

            Filesize

            4KB

          • memory/936-14-0x0000000075560000-0x0000000075B11000-memory.dmp

            Filesize

            5.7MB

          • memory/1712-35-0x0000000075560000-0x0000000075B11000-memory.dmp

            Filesize

            5.7MB

          • memory/1712-44-0x0000000075560000-0x0000000075B11000-memory.dmp

            Filesize

            5.7MB

          • memory/2860-16-0x0000000075560000-0x0000000075B11000-memory.dmp

            Filesize

            5.7MB

          • memory/2860-13-0x0000000075560000-0x0000000075B11000-memory.dmp

            Filesize

            5.7MB

          • memory/2860-15-0x0000000075560000-0x0000000075B11000-memory.dmp

            Filesize

            5.7MB

          • memory/2860-42-0x0000000075560000-0x0000000075B11000-memory.dmp

            Filesize

            5.7MB

          • memory/2860-43-0x0000000075560000-0x0000000075B11000-memory.dmp

            Filesize

            5.7MB

          • memory/4404-22-0x0000000000400000-0x000000000044E000-memory.dmp

            Filesize

            312KB

          • memory/4404-24-0x0000000000400000-0x000000000044E000-memory.dmp

            Filesize

            312KB