Malware Analysis Report

2025-01-02 13:37

Sample ID 241123-rttlpssqbp
Target 27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe
SHA256 27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722
Tags
hawkeye collection discovery keylogger persistence spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722

Threat Level: Known bad

The file 27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe was found to be: Known bad.

Malicious Activity Summary

hawkeye collection discovery keylogger persistence spyware stealer trojan

HawkEye

Hawkeye family

NirSoft WebBrowserPassView

NirSoft MailPassView

Detected Nirsoft tools

Checks computer location settings

Executes dropped EXE

Uses the VBS compiler for execution

Loads dropped DLL

Looks up external IP address via web service

Adds Run key to start application

Accesses Microsoft Outlook accounts

Suspicious use of SetThreadContext

System Location Discovery: System Language Discovery

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-23 14:29

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-23 14:29

Reported

2024-11-23 14:31

Platform

win7-20241010-en

Max time kernel

101s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe"

Signatures

HawkEye

keylogger trojan stealer spyware hawkeye

Hawkeye family

hawkeye

Detected Nirsoft tools

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft MailPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Music\magert.exe N/A
N/A N/A C:\Users\Admin\Music\magert.exe N/A

Uses the VBS compiler for execution

Accesses Microsoft Outlook accounts

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\Music\\magert.exe" C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A whatismyipaddress.com N/A N/A
N/A whatismyipaddress.com N/A N/A
N/A whatismyipaddress.com N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2136 set thread context of 936 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 936 set thread context of 2060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 set thread context of 3004 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\Music\magert.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\Music\magert.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Music\magert.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Music\magert.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Music\magert.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1492 wrote to memory of 2136 N/A C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe C:\Users\Admin\Music\magert.exe
PID 1492 wrote to memory of 2136 N/A C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe C:\Users\Admin\Music\magert.exe
PID 1492 wrote to memory of 2136 N/A C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe C:\Users\Admin\Music\magert.exe
PID 1492 wrote to memory of 2136 N/A C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe C:\Users\Admin\Music\magert.exe
PID 2136 wrote to memory of 936 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2136 wrote to memory of 936 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2136 wrote to memory of 936 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2136 wrote to memory of 936 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2136 wrote to memory of 936 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2136 wrote to memory of 936 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2136 wrote to memory of 936 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2136 wrote to memory of 936 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2136 wrote to memory of 936 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 936 wrote to memory of 2060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 2060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 2060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 2060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 2060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 2060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 2060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 2060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 2060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 2060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 3004 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 3004 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 3004 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 3004 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 3004 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 3004 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 3004 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 3004 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 3004 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 936 wrote to memory of 3004 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe

"C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe"

C:\Users\Admin\Music\magert.exe

"C:\Users\Admin\Music\magert.exe"

C:\Users\Admin\Music\magert.exe

"C:\Users\Admin\Music\magert.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.microsoft.com udp
RO 2.20.118.102:80 www.microsoft.com tcp
US 8.8.8.8:53 whatismyipaddress.com udp
US 104.19.222.79:80 whatismyipaddress.com tcp
US 104.19.222.79:443 whatismyipaddress.com tcp
US 104.19.222.79:443 whatismyipaddress.com tcp
US 8.8.8.8:53 smtp.zoho.com udp
US 204.141.32.56:587 smtp.zoho.com tcp
US 8.8.8.8:53 www.microsoft.com udp
US 204.141.32.56:587 smtp.zoho.com tcp

Files

memory/1492-0-0x0000000074AB1000-0x0000000074AB2000-memory.dmp

memory/1492-1-0x0000000074AB0000-0x000000007505B000-memory.dmp

memory/1492-2-0x0000000074AB0000-0x000000007505B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabEFFC.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarF00F.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8d50c53006b3fa99b209b7695ec66796
SHA1 630f0d54baad5b9c69a505c3941e19f397736116
SHA256 b574ef77960b88df7b6175b5e78ca6767291b7d66ba8df1d2750c2f0017bb8bc
SHA512 f88df4b66bc6289f695dee36592d68246d792bd58d66496df0ea37231de03a4dd715c85b0726f5da0886b3650676080078d53a5a399ead837083f60940bdddfc

memory/1492-164-0x0000000074AB0000-0x000000007505B000-memory.dmp

memory/1492-165-0x0000000074AB0000-0x000000007505B000-memory.dmp

memory/1492-166-0x0000000074AB0000-0x000000007505B000-memory.dmp

\Users\Admin\Music\magert.exe

MD5 31fa90986bb04afe9e10c199ab9cff4d
SHA1 561f932bf241068f29e70b688d8f1f70c6505f87
SHA256 dbdeeceee9a9328080a5d70262a0b396210a8f62138d5f2c492b2d112f1d6bdb
SHA512 87231b7de2cbbc982f3746c6e95aaa5a042c0535feeeaf08a769df5e5ae37de5ea085cad7c4daa3dc08330a5f897c4901adbf324c5246ff34ce9372ec4ca3fd7

memory/2136-185-0x0000000074AB0000-0x000000007505B000-memory.dmp

memory/1492-184-0x0000000074AB0000-0x000000007505B000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cdeaa4676f88a6a2dbc2225b6b2f2110
SHA1 00237b78b3492bb6c7d5b3542ecea3fa993c0c52
SHA256 b1167261347ccc8973ed117033efd3b574d2188db19228057c3c5f840d51bbdd
SHA512 dbd87e7171731fdcb0e9341fb84256700586fceaaf8a9535322aff0a548ac09e07e0876d7a0b45a33c502221f120e116638be4a6aaa6272798b7fd7c5be87e62

memory/2136-196-0x0000000074AB0000-0x000000007505B000-memory.dmp

memory/936-200-0x0000000000400000-0x0000000000484000-memory.dmp

memory/936-198-0x0000000000400000-0x0000000000484000-memory.dmp

memory/936-199-0x0000000000400000-0x0000000000484000-memory.dmp

memory/936-204-0x0000000000400000-0x0000000000484000-memory.dmp

memory/936-203-0x0000000000400000-0x0000000000484000-memory.dmp

memory/2136-205-0x0000000074AB0000-0x000000007505B000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 1a7151d37d2335c80ed1b9b1001d628b
SHA1 af5fb2a0ac2f75883ea236553d39ba78faa10597
SHA256 c5fdecea7dd66db10c9b5186d11ce3c914807411660a06015c4175bf0437496e
SHA512 aaba728df1bc4d88431d77e0e121c6edf5db5122401912c37859b742845b5ddb18011c89ce2683d9376a50b44d139bbfbb63314f21538c542bf22ab87f258574

memory/2060-251-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2060-252-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2060-254-0x0000000000400000-0x000000000041B000-memory.dmp

memory/3004-255-0x0000000000400000-0x0000000000458000-memory.dmp

memory/3004-256-0x0000000000400000-0x0000000000458000-memory.dmp

memory/3004-257-0x0000000000400000-0x0000000000458000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\holderwb.txt

MD5 f3b25701fe362ec84616a93a45ce9998
SHA1 d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256 b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA512 98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

memory/3004-264-0x0000000000400000-0x0000000000458000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 a266bb7dcc38a562631361bbf61dd11b
SHA1 3b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256 df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA512 0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

MD5 86f44b2ef6a8de61dd9c4dcdbe43f4d9
SHA1 380b1d90d91f41fbc35314fe23a8c48c3d1f47fd
SHA256 a12f8912d85d89f3fb0d4f69c7b0c719f844db2a37978431dc2ad7c4bb36d679
SHA512 5bd873d97ceaa37d5897a207061874b804792efc200130c44da90f16fb3761a164c0d498af45973b2a6196d3a7c55dcf8368b695a9ac9aee6d098fe6195690e2

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-23 14:29

Reported

2024-11-23 14:31

Platform

win10v2004-20241007-en

Max time kernel

94s

Max time network

99s

Command Line

"C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe"

Signatures

HawkEye

keylogger trojan stealer spyware hawkeye

Hawkeye family

hawkeye

Detected Nirsoft tools

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft MailPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NirSoft WebBrowserPassView

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Music\magert.exe N/A
N/A N/A C:\Users\Admin\Music\magert.exe N/A

Uses the VBS compiler for execution

Accesses Microsoft Outlook accounts

collection
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Application = "C:\\Users\\Admin\\Music\\magert.exe" C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A whatismyipaddress.com N/A N/A
N/A whatismyipaddress.com N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2000 set thread context of 1132 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 1132 set thread context of 2584 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 set thread context of 3060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\Music\magert.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\Music\magert.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Music\magert.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Music\magert.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Music\magert.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 844 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe C:\Users\Admin\Music\magert.exe
PID 844 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe C:\Users\Admin\Music\magert.exe
PID 844 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe C:\Users\Admin\Music\magert.exe
PID 2000 wrote to memory of 1132 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2000 wrote to memory of 1132 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2000 wrote to memory of 1132 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2000 wrote to memory of 1132 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2000 wrote to memory of 1132 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2000 wrote to memory of 1132 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2000 wrote to memory of 1132 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 2000 wrote to memory of 1132 N/A C:\Users\Admin\Music\magert.exe C:\Users\Admin\Music\magert.exe
PID 1132 wrote to memory of 2584 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 2584 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 2584 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 2584 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 2584 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 2584 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 2584 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 2584 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 2584 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 3060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 3060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 3060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 3060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 3060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 3060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 3060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 3060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
PID 1132 wrote to memory of 3060 N/A C:\Users\Admin\Music\magert.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

Processes

C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe

"C:\Users\Admin\AppData\Local\Temp\27768ff0f6ed892c4a7fb79f83ac3a343067d496e254ee642acf3a26ef084722.exe"

C:\Users\Admin\Music\magert.exe

"C:\Users\Admin\Music\magert.exe"

C:\Users\Admin\Music\magert.exe

"C:\Users\Admin\Music\magert.exe"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe

C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"

Network

Country Destination Domain Proto
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 67.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 145.197.77.23.in-addr.arpa udp
US 8.8.8.8:53 whatismyipaddress.com udp
US 104.19.223.79:80 whatismyipaddress.com tcp
US 104.19.223.79:443 whatismyipaddress.com tcp
US 8.8.8.8:53 79.223.19.104.in-addr.arpa udp
US 8.8.8.8:53 smtp.zoho.com udp
US 204.141.32.56:587 smtp.zoho.com tcp
US 8.8.8.8:53 56.32.141.204.in-addr.arpa udp
US 204.141.32.56:587 smtp.zoho.com tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

memory/844-0-0x0000000075592000-0x0000000075593000-memory.dmp

memory/844-1-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/844-2-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/844-3-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/844-4-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/844-5-0x0000000075592000-0x0000000075593000-memory.dmp

memory/844-6-0x0000000075590000-0x0000000075B41000-memory.dmp

C:\Users\Admin\Music\magert.exe

MD5 1bf4f91d1c2cf827c24b9ffe09391b0f
SHA1 b2afbc37f1cf0673881fac316908e2ca03ce70c7
SHA256 de04f2c328f5d796beb9eccf54e52aaff93f8032390ec5e09edaebbbec3d05cd
SHA512 e99dc910c5ea350f8b6024a8555506527460a48025e90ca0b0b20385327c3e83028c98cca2d1e80448c796b073ffec60677bd8f1561154b6a6831b6e2be2f05a

memory/2000-28-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/2000-30-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/844-29-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/2000-31-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/2000-32-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/2000-33-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/1132-36-0x0000000000560000-0x00000000005E4000-memory.dmp

memory/1132-37-0x0000000000560000-0x00000000005E4000-memory.dmp

memory/1132-35-0x0000000000560000-0x00000000005E4000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\magert.exe.log

MD5 0b25f9f358a722369479cecdb0bfdfd4
SHA1 0e5e586dc2387f8492dc7bb8b9ba17cce90ba6fb
SHA256 97e51099c3c8b24d92ae0f8c0241b3477e52127f0da5f89175c56abc202196c7
SHA512 5f91fcd8822aa8e74566dc4b89af55e9f539aab19dc11cb450c13baa846e494b9f27954cce8626c867177b43e76be03a631c58e29be41b7bdad61576f5b8378b

memory/2000-42-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/1132-44-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/1132-43-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/1132-45-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/2584-48-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2584-49-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2584-50-0x0000000000420000-0x00000000004E9000-memory.dmp

memory/2584-51-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1132-52-0x0000000075590000-0x0000000075B41000-memory.dmp

memory/3060-53-0x0000000000400000-0x0000000000458000-memory.dmp

memory/3060-54-0x0000000000400000-0x0000000000458000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\holderwb.txt

MD5 f94dc819ca773f1e3cb27abbc9e7fa27
SHA1 9a7700efadc5ea09ab288544ef1e3cd876255086
SHA256 a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA512 72a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196

memory/3060-61-0x0000000000400000-0x0000000000458000-memory.dmp