Analysis
-
max time kernel
119s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-10-2024 23:53
Static task
static1
Behavioral task
behavioral1
Sample
f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exe
Resource
win7-20241010-en
General
-
Target
f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exe
-
Size
23KB
-
MD5
3d25d84500c967ecef3a0026dbfed410
-
SHA1
3515bef2e70722e9718edb51b4e1e9a2f80a1f0a
-
SHA256
f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489a
-
SHA512
349c3561f4e6961bbbd88c17f961ee6fcd34117b8a5664a173f8ebef0546d0b5cc05d113102730ef82907cc66b803849bf6dfd68692fc37d16a0575e4ac17d99
-
SSDEEP
384:o3Eh9xqX7jumTaNb6SxZLIXYQPhMVDrgHa/Dw1I0Q1abpyq5abpy6J6:7hjgumONblmOKwk1IXatyq5aty6J6
Malware Config
Signatures
-
Hawkeye family
-
Drops file in Drivers directory 1 IoCs
Processes:
f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ipconfig.exeNETSTAT.EXEf75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exepowershell.execmd.exewhoami.exesysteminfo.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whoami.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeNETSTAT.EXEpid Process 528 ipconfig.exe 828 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 1132 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exewhoami.exeNETSTAT.EXEdescription pid Process Token: SeDebugPrivilege 1132 powershell.exe Token: SeDebugPrivilege 2056 whoami.exe Token: SeDebugPrivilege 828 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exepowershell.execmd.exedescription pid Process procid_target PID 2828 wrote to memory of 1132 2828 f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exe 30 PID 2828 wrote to memory of 1132 2828 f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exe 30 PID 2828 wrote to memory of 1132 2828 f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exe 30 PID 2828 wrote to memory of 1132 2828 f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exe 30 PID 1132 wrote to memory of 1928 1132 powershell.exe 33 PID 1132 wrote to memory of 1928 1132 powershell.exe 33 PID 1132 wrote to memory of 1928 1132 powershell.exe 33 PID 1132 wrote to memory of 1928 1132 powershell.exe 33 PID 1928 wrote to memory of 2056 1928 cmd.exe 34 PID 1928 wrote to memory of 2056 1928 cmd.exe 34 PID 1928 wrote to memory of 2056 1928 cmd.exe 34 PID 1928 wrote to memory of 2056 1928 cmd.exe 34 PID 1928 wrote to memory of 2848 1928 cmd.exe 35 PID 1928 wrote to memory of 2848 1928 cmd.exe 35 PID 1928 wrote to memory of 2848 1928 cmd.exe 35 PID 1928 wrote to memory of 2848 1928 cmd.exe 35 PID 1928 wrote to memory of 528 1928 cmd.exe 37 PID 1928 wrote to memory of 528 1928 cmd.exe 37 PID 1928 wrote to memory of 528 1928 cmd.exe 37 PID 1928 wrote to memory of 528 1928 cmd.exe 37 PID 1928 wrote to memory of 828 1928 cmd.exe 38 PID 1928 wrote to memory of 828 1928 cmd.exe 38 PID 1928 wrote to memory of 828 1928 cmd.exe 38 PID 1928 wrote to memory of 828 1928 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exe"C:\Users\Admin\AppData\Local\Temp\f75b89f64035020942c29ae2ff37d0f5789fa73310632e5ad951686cc9cd489aN.exe"1⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -executionpolicy bypass -command .\racoon.ps12⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "whoami.exe && systeminfo.exe && ipconfig.exe && netstat.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\whoami.exewhoami.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo.exe4⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:2848
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig.exe4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:528
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat.exe4⤵
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5500d58ef9f6a679f856d0f756380d7d5
SHA15b51e885134ca5dbf78bdd3a81762196d504ae1a
SHA25615482161e2cd82078399b115a541aec70c2c269089f9ab2761a1a6197d08f2b3
SHA5128a4d73bd4d20f9fdb5389de777fe6d45d22f466ed4e635a6853cda0e507e6b07afd697c25d7f6960eb63bf880f2be301a7e1818d850bbf22889d6734e61219e7