Analysis

  • max time kernel
    132s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    04/03/2025, 03:16

General

  • Target

    New folder/HawkEye.exe

  • Size

    232KB

  • MD5

    60fabd1a2509b59831876d5e2aa71a6b

  • SHA1

    8b91f3c4f721cb04cc4974fc91056f397ae78faa

  • SHA256

    1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838

  • SHA512

    3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a

  • SSDEEP

    3072:BMhIBKH7j7DzQi7y5bvl4YAbdY9KWvwn7XHMzqEOf64CEEl64HBVdGXPKD:BMh5H7j5g54YZKXoxOuEEl64HZAi

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera Ransomware Loader DLL 1 IoCs

    Drops/unpacks executable file which resembles Chimera's Loader.dll.

  • Chimera family
  • Renames multiple (1992) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 37 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New folder\HawkEye.exe
    "C:\Users\Admin\AppData\Local\Temp\New folder\HawkEye.exe"
    1⤵
    • Chimera
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\YOUR_FILES_ARE_ENCRYPTED.HTML

    Filesize

    4KB

    MD5

    1168225f07ff015cb72e2b58315f5939

    SHA1

    2d4c28f2168017ccd5295baf63ab224d717d2665

    SHA256

    c944c391d47dc58b319230cac13d5d0f22c121b49e97648affecbdb234376389

    SHA512

    7ed2659d31204c41915993d886aba2e4729b2e350223194586864700e20bc097e1712419d325bbac3a842003632d7fa31c0e85fd024b47e3a7fe77f7e4128233

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    712f54b0d5b3e39687f0927ba059707d

    SHA1

    4efb8c194f9bc37c37f933e37ab8295df3d9aaf9

    SHA256

    b40af61f3886bb94d3c5023a3d43cf16244b10567b3a629181911ca784eb7b4b

    SHA512

    515a6052abc17eca4b24a7e5eb3f1ac9119ce69abea20eacbd3de95fe88d1ec6396503eb46e67c1b3c47258533e66c13d00ac8a518a245bae9618cb91b0c87c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5febbbae3383d492e29bbeb122280af6

    SHA1

    e6fe37c7a15b07e2a4ad0d633bc36629a58257e0

    SHA256

    4640deca0807ff2af36a974c2856d63cf97c136938f9da55d821f8cc54959d9c

    SHA512

    70f99152269ccf87ac59bbf7e2348f17dfac40e901e61627c23f8ac5483a17610f96c9c72500b5746551e4945f004c43d979888f037fad77704bd31b7c474906

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f40d1d6ca54b7c4519396a1633cdb214

    SHA1

    28b70942935c1b7e28f3e256d9a1e2294612a957

    SHA256

    450567a0bbe14d0ac45f779ef63825e0acd68577ce47fa2f27e0aa1dd5c6752b

    SHA512

    4cc5bf7f940dea884977199869aa8a19764e365d9b68b743a3a415a1a612621b2982467ea912480d73a6525d34dfeed721a84e5cde58238f71e0fa4d91cf045c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0ec09863db5971411f7b3792785a51fc

    SHA1

    07f6319bc07defb877d2a0cbb6daff95935f624f

    SHA256

    6cc8072e64889d80da698ad7a6b4f214d1fb3a6a254750b8d2c326de59a1a0b5

    SHA512

    9786d6027224aa78cb8f5f53974c3508b8c1f42e76bd0b6a64f65ce4d70b1aff9e81211fc1a58b0448c007a9d983e4d54954b531971999e6893f988b3815d9b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1da42436ed8a0563bdfdecbb35d72e58

    SHA1

    3c15c190783391617b41ededfa95d8c04111c778

    SHA256

    20c30f03a80c26b0c833ca2c0ecaf20d54677d3e6cbd072901301f187229dd14

    SHA512

    6c2e8db72a0bcde523a5b7fb0d7f7a985f37aab3cadac493a4f3fff2ddea4f1c18110190fe27c8bc64dd6d9d61184030bdd0bf6985169535cea19830d036ffd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    77ff2a31a6628b0eb5742617ad83aff8

    SHA1

    b6123f6a42dc72cc10fbe3a791be75bb7e3f0258

    SHA256

    9df4034e603ce266e2022fcfbf71e81eb0e4035c0a79ccfa1e0eaa793c6c28e0

    SHA512

    6e415b25b66f38b33338636788ef2a1b98a1179aafcc37cb0356d666c7e30f85ca9bccc48b239fc047af40c9dae636c92fbe52acb903d9fc3244a5b447474711

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    005dc416e1a83c221a6aa4b4b94272c9

    SHA1

    6e6e8d896548560be102db40d8dc70d5433784bb

    SHA256

    08a0c50a56248eb181063b08f9e815f72666144ae3e8bb5e7ef0fbc37cbe059d

    SHA512

    44142bd926b729f9788f6ffc05240bd5c738eb4bde7dc197db4fb9cce416f740f34398bd2a8ee799e0a51250628e09a1ab4813ec646af752b4b2ae0348cb5b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c2674eea15163a84a041b644a1054f7

    SHA1

    7e8dbe2fc1fc5109127377a21109cf39343b9adf

    SHA256

    e6648520854034338b84787350ce45a2da52061afeebfa0b442714638eb98ff0

    SHA512

    6df34631b8e5ec48bbcf2ea3d0e0f4ac91714bb016206229a51404f9233de240c75d3766dec482de42ba9cf21fc75f449d0adcce5d08586f292e2b4957fb1465

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1da826ea3f3bd5231453ab324c9a1f77

    SHA1

    4f6f41e4e9629e53bf865e9420f86ffb2eec07e1

    SHA256

    60d18af8fa8fa6aab47acc3d1f96916df6a5edc9b67f7a4077febb96374dfd2c

    SHA512

    64217f59501c7b7060eede6e0a192a21e7126d0705e0aa70367d92972264650c2fa8f81a48c75cf865b66939a1fe39f2674feffcd599f96cf725e5583c4b637b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4cb0ebf03073abb42919a2ec4f937d8b

    SHA1

    5e853bf42b3deddc54a85177428dc78c9119d3af

    SHA256

    4e18b47f8b52ac062aaab81793e53b6b6d3adce26b861ad572f13d20e2da7be3

    SHA512

    f3a7ab8e98b9eba36cd14cf9fa7a58701053007fe281d2ec756bf3d7c062bfbdcdcf6f8360146531a29780b2fe6eb57d2113dfcec68494f831926ffebe1caf50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7328fd09ce5dfa7939056490ffdf9e70

    SHA1

    821f1c3ce65dc99a976068f3a060dfcaa258f94b

    SHA256

    b7ad69559e39502ae30ea1e5d0b63dc04d0b0305e4485fde4407db526db04fd6

    SHA512

    1bc8d105f1e2b2b1cd8c85c411df7f8e34984ee65b22fafd5b0a7186af620a7e841481e3b39f3ded484ffe6bc33aa3919805e52bf0d40525b8466fcc478a0438

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3649ddfaaede07c9e6481365345d28f7

    SHA1

    5b393b13963773d72b5833730f44927cf7b51f6a

    SHA256

    68d5dee28046ed073bf7b2091ffc71e3a0c870ef0bc6e069b213905c81a0a8cf

    SHA512

    4b68f167f305200451c2fdccdfe8da072ef4e627d7ea0bf10e3eef58590c470cefce8047d600e1fe0e92bd53e7954cb334a3a17e7e81713b48633f1767809a07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be14e6a6a393455e3b9d15c3d09896f7

    SHA1

    97b8f83af9120824ffae609cde82ed45a29c5b40

    SHA256

    1567c74eaa4aeb8cd733e0eaf43845ad76cc39a86fec62998d59e766d7c2e4e9

    SHA512

    e55e63b577d31df77b2ad2a8de95f84d852a8ce9cde5c1bf979d62cbab3daaeb7fdb2e603fe2200f76cf2db796265e13b2ef3a6ad702206076928d43a38da612

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2a26e42d1393cb8a2207db719a618334

    SHA1

    3e95fb7116905aa1a27d98b32fff963ebb480aa6

    SHA256

    561f97c88eca0f3cfc9fcd403a95e32f8735465263c04860e2702a774ad0ac34

    SHA512

    88443b60fb62df0706bf50897fec199558d5163e1178eb2f6e60726952be34d27445f14ad14d6d38258282c13531846334f29b06de2be5a1d7abd096a64f22ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    93e03eb6e67fae9c56b5d8a67b493b1d

    SHA1

    19681566d131eb381eb79ad04b5dfa0f79b96fca

    SHA256

    ea06b284c7b9894b1c7da7274c1d5b930ac38988f54515bb109f82a0456ea992

    SHA512

    2586bcd25c6814d098f0146505e956459380add7e4e42c80f742769a5e11d36b09f6f00506b626158397402bec6edad3152e2e13c411567121a080bb10f9707e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9a718aba276aa3a9520a389539eb6cb

    SHA1

    473670c125db5a0cf7ac230f34a97e38e0fe499e

    SHA256

    aa9a5dce83cdd42070c352cfaccdab36d15b5d5bcfba66451cbe9b831acdc664

    SHA512

    eda229c4f793cea6df7ddc53af36b6b2599aadd2dd055d130602a66b54fa34261943852c37113509b007a02f6585679f1bed0e34e6f1929a6c3269ae33aae785

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2aef804094a6b2a8059ea167d20d9747

    SHA1

    ccb7cba40f9bcb464f1387e899eec352a8616647

    SHA256

    e4ad5677bbcf1e30bf5468859fc738c6e6cb7d266ee1227ea87d0762c2d1f0fa

    SHA512

    b8b1b7724e864195bafb04d346112c813075f7a59a2c25858530a445265f7567acd8a191175e59f25573c5f7ac8b4f9fec4db24e67a6d0ad9e70f82f02b4404b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3d265c91707df74dc6be27542f1ab094

    SHA1

    d1fe25cb25e814fb5f57e44879aec8cabf5fff68

    SHA256

    c0fa3710dc83c02026fabf19c4fa6609f86a2c46a09d3239112026bee6837c81

    SHA512

    eb53b209821f27dab7359608f53ecc2dc83dbe100052d7c59a58119ce2ad5eaf8a691e2916a97980f13c2217909c7788511cdad0537cda4560752536606e612b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7dfacc0bc8e4236abfdf70b68138697a

    SHA1

    0f7e249d12e1ac944e31a6b4328b98bf9f9c906e

    SHA256

    feed614233085e2c142022202c1d1af16f20c45655a000440e6c9bafd70d7995

    SHA512

    452b985902f3c699215136b1febaa956a900d5b6aeaeac5037f1510b054e5696c4ede8bc8a3cb28393f40e408772e8631cbfbdd5289f0e64615bd4ec5e882ea8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ea4d319f916902f8b5607fed0bd751a

    SHA1

    4cc81a279799650c154e6173722088cc2ce60a4d

    SHA256

    7be4f18396108702075bf1cb2b5cafbfad3d4ca47fcbf5682411ab00c7333d75

    SHA512

    bdd020d164ea443939519330716e4e4b023f5774b50652e1b920996c0c3c4793c0d9b82087de6fb114e25f56d1eef5fa5e1701797cc761cf1cc5c4a096d4c0ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    8cd94b8167c4172f4242490631791bff

    SHA1

    c977b63247e1bd63542a5f795a6e5175d2a8b627

    SHA256

    2405714fbe2d9852fae4d63b4b688537c8f0da4c10b9cd3b41729f19b1194a70

    SHA512

    1d29debf2e16e77de06c700ae94a6137e1fca823204dd71c337aa4a30729a4b256e3f662726b8794ffe7e2c0776fe18860761987eeadc42a3d6ab25283c25898

  • C:\Users\Admin\AppData\Local\Temp\CabF7D8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF994.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • memory/3036-3-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/3036-1012-0x0000000074540000-0x0000000074AEB000-memory.dmp

    Filesize

    5.7MB

  • memory/3036-1-0x0000000074540000-0x0000000074AEB000-memory.dmp

    Filesize

    5.7MB

  • memory/3036-2-0x0000000074540000-0x0000000074AEB000-memory.dmp

    Filesize

    5.7MB

  • memory/3036-0-0x0000000074541000-0x0000000074542000-memory.dmp

    Filesize

    4KB

  • memory/3036-9-0x00000000002C0000-0x00000000002DA000-memory.dmp

    Filesize

    104KB

  • memory/3036-8-0x0000000074540000-0x0000000074AEB000-memory.dmp

    Filesize

    5.7MB