Analysis
-
max time kernel
132s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
client.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
client.exe
Resource
win10v2004-20241007-en
General
-
Target
client.exe
-
Size
521KB
-
MD5
2578480b80b3aa3ddbec90695c375eae
-
SHA1
022e141419de6a895b75e3cd4bc549a049f661ee
-
SHA256
e8107c2899dbe1bda257098d3ec2a561babb52d7d201a43fd3f3a8580cab728f
-
SHA512
7040fba6260b3ef7b132d596c954be19f8c15a60c90f7ab8fddf0d7b4a07a29874b81d92f7fcc23c6364c37bf27d71d650b331db5b2a06daf7e5c9acff4cda85
-
SSDEEP
6144:7utqVhunhbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnxH:7unhQtqB5urTIoYWBQk1E+VF9mOx9ki
Malware Config
Signatures
-
Hawkeye family
-
Detected Nirsoft tools 8 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/files/0x0007000000016d36-9.dat Nirsoft behavioral1/memory/376-21-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/376-23-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/376-25-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/376-28-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/2660-30-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/2660-31-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/2660-37-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
NirSoft MailPassView 5 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/files/0x0007000000016d36-9.dat MailPassView behavioral1/memory/376-21-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/376-23-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/376-25-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/376-28-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 4 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/files/0x0007000000016d36-9.dat WebBrowserPassView behavioral1/memory/2660-30-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/2660-31-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/2660-37-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Deletes itself 1 IoCs
pid Process 3028 Windows Update.exe -
Executes dropped EXE 1 IoCs
pid Process 3028 Windows Update.exe -
Loads dropped DLL 2 IoCs
pid Process 2672 client.exe 2984 dw20.exe -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" Windows Update.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 whatismyipaddress.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3028 set thread context of 376 3028 Windows Update.exe 32 PID 3028 set thread context of 2660 3028 Windows Update.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe 3028 Windows Update.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3028 Windows Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3028 Windows Update.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2672 wrote to memory of 3028 2672 client.exe 30 PID 2672 wrote to memory of 3028 2672 client.exe 30 PID 2672 wrote to memory of 3028 2672 client.exe 30 PID 2672 wrote to memory of 3028 2672 client.exe 30 PID 2672 wrote to memory of 3028 2672 client.exe 30 PID 2672 wrote to memory of 3028 2672 client.exe 30 PID 2672 wrote to memory of 3028 2672 client.exe 30 PID 3028 wrote to memory of 376 3028 Windows Update.exe 32 PID 3028 wrote to memory of 376 3028 Windows Update.exe 32 PID 3028 wrote to memory of 376 3028 Windows Update.exe 32 PID 3028 wrote to memory of 376 3028 Windows Update.exe 32 PID 3028 wrote to memory of 376 3028 Windows Update.exe 32 PID 3028 wrote to memory of 376 3028 Windows Update.exe 32 PID 3028 wrote to memory of 376 3028 Windows Update.exe 32 PID 3028 wrote to memory of 376 3028 Windows Update.exe 32 PID 3028 wrote to memory of 376 3028 Windows Update.exe 32 PID 3028 wrote to memory of 376 3028 Windows Update.exe 32 PID 3028 wrote to memory of 2660 3028 Windows Update.exe 33 PID 3028 wrote to memory of 2660 3028 Windows Update.exe 33 PID 3028 wrote to memory of 2660 3028 Windows Update.exe 33 PID 3028 wrote to memory of 2660 3028 Windows Update.exe 33 PID 3028 wrote to memory of 2660 3028 Windows Update.exe 33 PID 3028 wrote to memory of 2660 3028 Windows Update.exe 33 PID 3028 wrote to memory of 2660 3028 Windows Update.exe 33 PID 3028 wrote to memory of 2660 3028 Windows Update.exe 33 PID 3028 wrote to memory of 2660 3028 Windows Update.exe 33 PID 3028 wrote to memory of 2660 3028 Windows Update.exe 33 PID 3028 wrote to memory of 2984 3028 Windows Update.exe 34 PID 3028 wrote to memory of 2984 3028 Windows Update.exe 34 PID 3028 wrote to memory of 2984 3028 Windows Update.exe 34 PID 3028 wrote to memory of 2984 3028 Windows Update.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\client.exe"C:\Users\Admin\AppData\Local\Temp\client.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:376
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"3⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 10723⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44B
MD5742160e4a4a1d12b2e9682bc6116fc9c
SHA1bc3f16b140dfdbf5b4de6ee73659162d4f3ca2f4
SHA25623c1afadb9dd7c91730ca7f9b483f2b4b2b5c9ff2fc6b095ee071e2c99f03a77
SHA5122b49f5b5030298f3aa171d190afdfe61ed1e5bc409ddba64fb36c72656b8205afca9e325e4e4577acb9f66aafbb2bb5693255b313a2e293f2c7bdc7a8ab55875
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
521KB
MD52578480b80b3aa3ddbec90695c375eae
SHA1022e141419de6a895b75e3cd4bc549a049f661ee
SHA256e8107c2899dbe1bda257098d3ec2a561babb52d7d201a43fd3f3a8580cab728f
SHA5127040fba6260b3ef7b132d596c954be19f8c15a60c90f7ab8fddf0d7b4a07a29874b81d92f7fcc23c6364c37bf27d71d650b331db5b2a06daf7e5c9acff4cda85