Analysis Overview
SHA256
05437cb054d09a5b927c8ab699cf61ef90ef8e81395af8c74142184175e4a230
Threat Level: Known bad
The file 2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff was found to be: Known bad.
Malicious Activity Summary
Banload
Banload family
Renames multiple (219) files with added filename extension
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Renames multiple (174) files with added filename extension
Checks BIOS information in registry
Drops file in Program Files directory
System Location Discovery: System Language Discovery
Unsigned PE
Modifies registry class
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-12-03 15:55
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-12-03 15:54
Reported
2024-12-03 15:57
Platform
win7-20240903-en
Max time kernel
150s
Max time network
122s
Command Line
Signatures
Banload
Banload family
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
Renames multiple (174) files with added filename extension
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
Drops file in Program Files directory
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ThreadingModel = "Both" | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID\ = "Groove.IconOverlayLoader" | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ = "Groove Icon Overlay Loader" | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GROOVEEX.DLL" | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\ProgID | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Programmable | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\Programmable\ | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe
"C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe"
Network
Files
memory/2944-0-0x0000000000400000-0x0000000000616000-memory.dmp
memory/2944-1-0x0000000003140000-0x000000000334C000-memory.dmp
memory/2944-8-0x0000000003140000-0x000000000334C000-memory.dmp
memory/2944-11-0x0000000000400000-0x0000000000616000-memory.dmp
memory/2944-12-0x0000000000400000-0x0000000000616000-memory.dmp
memory/2944-13-0x0000000003140000-0x000000000334C000-memory.dmp
C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp
| MD5 | 5496bc6ba8f62d48cdd3c6bfc8488f42 |
| SHA1 | 80938685f606e59a4966dff264bd6b3017492d6b |
| SHA256 | f899e69c0f894337de7a9df6e0c38994fa7ac3ba51274e2933edf4420988fe86 |
| SHA512 | f4edf18cf25c59484851b12e975eb1b9ba05e80133162e24b6a3caa22ce84a737eac1cfd4e6cd840654dd1d4b41a38775a5d0abde5dfd71689a18035522eef09 |
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
| MD5 | 3aa86972a70e6f1bfc25c82e3cabfbc8 |
| SHA1 | ead72169acacc4587f29c53d3f622c2872da8960 |
| SHA256 | d9ea5b8f52049ecf93ef5ada1cbb48c9ecae765d38d83f7fe29627e3ef68222a |
| SHA512 | 0e94901f6bbfd819f48a73b79a16e362459d734101aee9dc993bd599db562b5ce00fa85641d6e6caa97b3fcbb5a3eb15e67b81f4fc2cd7d9a92ac2dda25a7495 |
memory/2944-21-0x0000000003140000-0x000000000334C000-memory.dmp
memory/2944-22-0x0000000003140000-0x000000000334C000-memory.dmp
memory/2944-31-0x0000000000400000-0x0000000000616000-memory.dmp
memory/2944-35-0x0000000003140000-0x000000000334C000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-12-03 15:54
Reported
2024-12-03 15:57
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
147s
Command Line
Signatures
Banload
Banload family
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
Renames multiple (219) files with added filename extension
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
Drops file in Program Files directory
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2} | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\Assembly = "Microsoft.Vbe.Interop, Version=15.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\15.0.0.0 | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\15.0.0.0\Assembly = "Microsoft.Vbe.Interop, Version=15.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\15.0.0.0\Class = "Microsoft.Vbe.Interop.CommandBarEventsClass" | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32 | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\Class = "Microsoft.Vbe.Interop.CommandBarEventsClass" | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\RuntimeVersion = "v2.0.50727" | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5ADD62E2-4A23-86F4-8704-0C62BF6886E2}\InprocServer32\15.0.0.0\RuntimeVersion = "v2.0.50727" | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe
"C:\Users\Admin\AppData\Local\Temp\2024-12-03_f63cbffe3b598cdcdb705450a5b25ec2_hawkeye_hijackloader_jaff.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 23.236.111.52.in-addr.arpa | udp |
Files
memory/2472-0-0x0000000000400000-0x0000000000616000-memory.dmp
memory/2472-2-0x00000000048E0000-0x0000000004AEC000-memory.dmp
memory/2472-9-0x00000000048E0000-0x0000000004AEC000-memory.dmp
memory/2472-12-0x0000000000400000-0x0000000000616000-memory.dmp
memory/2472-13-0x0000000000400000-0x0000000000616000-memory.dmp
memory/2472-14-0x00000000048E0000-0x0000000004AEC000-memory.dmp
C:\$Recycle.Bin\S-1-5-21-3227495264-2217614367-4027411560-1000\desktop.ini.tmp
| MD5 | 6e9a91d7c22475616b2aadd8a80dcc62 |
| SHA1 | 74d81ff5a318bedc5cb2e95f2a3f4081f42dc961 |
| SHA256 | 0a2f37629ea76096f1d5a90541bc9e1b2f31ecd7ae676e8a4c26d51a64e9d2c2 |
| SHA512 | 631f8b97527280680f4105795eefe238c797ae2f39c2f7a1f0a20d10977ce58fe9f20a84970534857e82d0246fc9ce7208b157bcfccec12243d46250b5e22e72 |
C:\Program Files\7-Zip\7-zip.dll.tmp
| MD5 | e0f8267b386b690bdc8db8a2451632ca |
| SHA1 | 9ef09e66f6ae6a57cba69db06bcbad5dded3260e |
| SHA256 | ea94fadf5ea9cd87b066fd2de1b27eda6d44cef141313042cdf5feffc785b338 |
| SHA512 | 16271538b31a55b591c07e20d04345c7ca7a3263dc00dd552ad2c5aa3dfe6f34cf44956c7f54b69a97bf38a964911c00830c0f15911f97743b67fc635db93f68 |
memory/2472-23-0x00000000048E0000-0x0000000004AEC000-memory.dmp
memory/2472-22-0x00000000048E0000-0x0000000004AEC000-memory.dmp
memory/2472-44-0x0000000000400000-0x0000000000616000-memory.dmp
memory/2472-50-0x00000000048E0000-0x0000000004AEC000-memory.dmp