Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- * MalFamily: "HawkEye"
- * MalScore: 10.0
- * File Name: "HawkEye_8dcc36068122df31230a5141fef44bad.exe"
- * File Size: 1174528
- * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
- * SHA256: "f1af8185cfeb224f0b00cf3b8d584d8db57de9f86f2c765b28949dd21dd85a93"
- * MD5: "8dcc36068122df31230a5141fef44bad"
- * SHA1: "bb2eb27b53f4097a7def93fb7c0aae907ad05589"
- * SHA512: "40e5852e4d5a38f50dc733e9f7f73054ae6be9a4e814eb841624ff8b6ad400fb9d78aa25cd5b215e986f8d84dc981ba139ae2538d08bcbea020eb515cd831bdf"
- * CRC32: "0EAFAEDD"
- * SSDEEP: "24576:7Vxn/1angh+SYVGBUJmi7JTns2M644pLylR1D9UuJjs:7EnRPOUJ71LyliQs"
- * Process Execution:
- "HawkEye_8dcc36068122df31230a5141fef44bad.exe",
- "bobyelo.exe",
- "bobyelo.exe",
- "vbc.exe",
- "vbc.exe",
- "services.exe",
- "svchost.exe",
- "WmiPrvSE.exe",
- "lsass.exe",
- "taskhost.exe"
- * Executed Commands:
- "\"C:\\Users\\user\\AppData\\Roaming\\bobyeloi\\bobyelo.exe\"",
- "\"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\vbc.exe\" /stext \"C:\\Users\\user\\AppData\\Local\\Temp\\tmp4785.tmp\"",
- "\"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\vbc.exe\" /stext \"C:\\Users\\user\\AppData\\Local\\Temp\\tmp6F4D.tmp\"",
- "\"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\vbc.exe\" /stext \"C:\\Users\\user\\AppData\\Local\\Temp\\tmp448B.tmp\"",
- "C:\\Windows\\system32\\lsass.exe"
- * Signatures Detected:
- "Description": "Creates RWX memory",
- "Details":
- "Description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
- "Details":
- "get_no_useragent": "HTTP traffic contains a GET request with no user-agent header"
- "suspicious_request": "http://bot.whatismyipaddress.com/"
- "Description": "Performs some HTTP requests",
- "Details":
- "url": "http://bot.whatismyipaddress.com/"
- "Description": "The binary likely contains encrypted or compressed data.",
- "Details":
- "section": "name: .rsrc, entropy: 7.36, characteristics: IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ, raw_size: 0x00079e00, virtual_size: 0x00079c10"
- "Description": "Looks up the external IP address",
- "Details":
- "domain": "bot.whatismyipaddress.com"
- "Description": "Executed a process and injected code into it, probably while unpacking",
- "Details":
- "Injection": "bobyelo.exe(2164) -> bobyelo.exe(2360)"
- "Description": "Sniffs keystrokes",
- "Details":
- "SetWindowsHookExA": "Process: bobyelo.exe(2360)"
- "Description": "A process attempted to delay the analysis task by a long amount of time.",
- "Details":
- "Process": "bobyelo.exe tried to sleep 3915 seconds, actually delayed analysis time by 0 seconds"
- "Description": "Tries to unhook or modify Windows functions monitored by Cuckoo",
- "Details":
- "unhook": "function_name: NtCreateSection, type: modification"
- "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
- "Details":
- "Spam": "services.exe (504) called API GetSystemTimeAsFileTime 9142258 times"
- "Description": "Steals private information from local Internet browsers",
- "Details":
- "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Data"
- "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data"
- "file": "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows\\History\\History.IE5\\index.dat"
- "Description": "Exhibits behavior characteristic of iSpy Keylogger",
- "Details":
- "Description": "File has been identified by 18 Antiviruses on VirusTotal as malicious",
- "Details":
- "McAfee": "Fareit-FPQ!8DCC36068122"
- "Cylance": "Unsafe"
- "Cybereason": "malicious.b53f40"
- "APEX": "Malicious"
- "Paloalto": "generic.ml"
- "Rising": "Trojan.Injector!1.AFE3 (CLASSIC)"
- "Endgame": "malicious (high confidence)"
- "Invincea": "heuristic"
- "McAfee-GW-Edition": "BehavesLike.Win32.Fareit.tc"
- "Trapmine": "malicious.high.ml.score"
- "FireEye": "Generic.mg.8dcc36068122df31"
- "Microsoft": "Trojan:Win32/Wacatac.B!ml"
- "AhnLab-V3": "Win-Trojan/Delphiless.Exp"
- "SentinelOne": "DFI - Suspicious PE"
- "MaxSecure": "Trojan.Malware.300983.susgen"
- "Fortinet": "W32/Injector.EGXE!tr"
- "CrowdStrike": "win/malicious_confidence_90% (D)"
- "Qihoo-360": "HEUR/QVM05.1.334D.Malware.Gen"
- "Description": "Checks the CPU name from registry, possibly for anti-virtualization",
- "Details":
- "Description": "Harvests information related to installed instant messenger clients",
- "Details":
- "key": "HKEY_CURRENT_USER\\Software\\Google\\Google Talk\\Accounts"
- "Description": "Harvests information related to installed mail clients",
- "Details":
- "file": "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows Live Mail\\*.oeaccount"
- "file": "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows Live Mail\\*.*"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\0a0d020000000000c000000000000046"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9234ed9445f8fa418a542f350f18f326"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\IMAP User"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\cb23f8734d88734ca66c47c4527fd259"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\SMTP User"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8408552e6dae7d45a0ba01520b6221ff"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9207f3e0a3b11019908b08002b2a56c2"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\240a97d961ed46428e29a3f1f1c23670"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\c02ebc5353d9cd11975200aa004ae40e"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\IMAP User"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8503020000000000c000000000000046"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\b22783abb139fe46b0aad551d64b60e7"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\HTTP User"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\f86ed2903a4a11cfb57e524153480001"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\SMTP User"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\POP3 User"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\POP3 User"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\3517490d76624c419a828607e2a54604"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8f92b60606058348930a96946cf329e1"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\13dbb0c8aa05101a9bb000aa002fc45a"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\HTTP User"
- "key": "HKEY_CURRENT_USER\\Identities\\0A258175-2D14-4D69-9955-E200F247250F\\Software\\Microsoft\\Office\\Outlook\\OMI Account Manager\\Accounts"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\Outlook\\OMI Account Manager\\Accounts"
- "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Account Manager\\Accounts"
- "key": "HKEY_CURRENT_USER\\Identities\\0A258175-2D14-4D69-9955-E200F247250F\\Software\\Microsoft\\Internet Account Manager\\Accounts"
- "Description": "Attempts to interact with an Alternate Data Stream (ADS)",
- "Details":
- "file": "C:\\Users\\user\\AppData\\Roaming\\bobyeloi\\bobyelo.exe:ZoneIdentifier"
- "Description": "Anomalous binary characteristics",
- "Details":
- "anomaly": "Timestamp on binary predates the release date of the OS version it requires by at least a year"
- * Started Service:
- "VaultSvc"
- * Mutexes:
- "Global\\CLR_CASOFF_MUTEX",
- "4f444b86-60f0-4ef5-ac81-fd992cbc807c",
- "Global\\.net clr networking"
- * Modified Files:
- "C:\\Users\\user\\AppData\\Roaming\\bobyeloi\\bobyelo.exe",
- "C:\\Users\\user\\AppData\\Roaming\\bobyeloi\\bobyelo.exe:ZoneIdentifier",
- "C:\\Users\\user\\AppData\\Local\\Temp\\a2c1cb25-e2e0-b0c5-f1ad-c171d0015b54",
- "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2PROVIDERSUBSYSTEM",
- "\\??\\WMIDataDevice",
- "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Data",
- "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data",
- "C:\\Users\\user\\AppData\\Local\\Temp\\tmp4785.tmp",
- "C:\\Windows\\sysnative\\LogFiles\\Scm\\5869f1c1-01d7-41f7-84b7-715672259fa8",
- "C:\\Users\\user\\AppData\\Local\\Temp\\tmp6F4D.tmp"
- * Deleted Files:
- "C:\\Users\\user\\AppData\\Roaming\\bobyeloi\\bobyelo.exe",
- "C:\\Users\\user\\AppData\\Local\\Temp\\tmp4785.tmp",
- "C:\\Users\\user\\AppData\\Local\\Temp\\tmp6F4D.tmp",
- "C:\\Users\\user\\AppData\\Local\\Temp\\tmp448B.tmp"
- * Modified Registry Keys:
- "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Tracing\\bobyelo_RASAPI32",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\bobyelo_RASAPI32\\EnableFileTracing",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\bobyelo_RASAPI32\\EnableConsoleTracing",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\bobyelo_RASAPI32\\FileTracingMask",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\bobyelo_RASAPI32\\ConsoleTracingMask",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\bobyelo_RASAPI32\\MaxFileSize",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Tracing\\bobyelo_RASAPI32\\FileDirectory"
- * Deleted Registry Keys:
- * DNS Communications:
- "type": "A",
- "request": "bot.whatismyipaddress.com",
- "answers":
- "data": "66.171.248.178",
- "type": "A"
- * Domains:
- "ip": "66.171.248.178",
- "domain": "bot.whatismyipaddress.com"
- * Network Communication - ICMP:
- * Network Communication - HTTP:
- "count": 1,
- "body": "",
- "uri": "http://bot.whatismyipaddress.com/",
- "user-agent": "",
- "method": "GET",
- "host": "bot.whatismyipaddress.com",
- "version": "1.1",
- "path": "/",
- "data": "GET / HTTP/1.1\r\nHost: bot.whatismyipaddress.com\r\nConnection: Keep-Alive\r\n\r\n",
- "port": 80
- * Network Communication - SMTP:
- * Network Communication - Hosts:
- * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement