File name:

Invoice #T825368RC.exe

Full analysis: https://app.any.run/tasks/6d27ea4b-a1dc-4f9e-b0c5-8947edb0773c
Verdict: Malicious activity
Threats:

Hawkeye often gets installed in a bundle with other malware. This is a Trojan and keylogger that is used to retrieve private information such as passwords and login credentials. This is an advanced malware that features strong anti-evasion functions.

Analysis date: November 15, 2018, 16:17:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
keylogger
hawkeye
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

865D71E2F3CCE8297BAFFF9CB9E3F313

SHA1:

ADED3B418C40EF573A0563E9D7B5D8FCF352F946

SHA256:

DC1D57AFC59CACAE2D815B9B39F44A6C6773967F94AEFD0B54E66197AE18E26C

SSDEEP:

24576:Xxmi6WbLjfOc1y/C0b6mmgXuhoDbBXWl09wV8dRACN3xDGNOLEDEpV1yqtjianjt:X0Y3aJJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Writes to a start menu file

      • Invoice #T825368RC.exe (PID: 3232)
    • Detected Hawkeye Keylogger

      • RegAsm.exe (PID: 2704)
    • Actions looks like stealing of personal data

      • vbc.exe (PID: 3724)
      • vbc.exe (PID: 3084)
    • Stealing of credential data

      • vbc.exe (PID: 3724)
      • vbc.exe (PID: 3084)
  • SUSPICIOUS

    • Creates files in the user directory

      • Invoice #T825368RC.exe (PID: 3232)
    • Executable content was dropped or overwritten

      • Invoice #T825368RC.exe (PID: 3232)
    • Loads DLL from Mozilla Firefox

      • vbc.exe (PID: 3724)
    • Executes scripts

      • RegAsm.exe (PID: 2704)
    • Connects to SMTP port

      • RegAsm.exe (PID: 2704)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:11:15 08:22:00+01:00
PEType: PE32
LinkerVersion: 11
CodeSize: 1629696
InitializedDataSize: 3584
UninitializedDataSize: -
EntryPoint: 0x18fdde
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Spotify
LegalCopyright: Copyright (c) 2018, Spotify Ltd
ProductName: Spotify
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
4
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start invoice #t825368rc.exe #HAWKEYE regasm.exe vbc.exe vbc.exe

Process information

PID
CMD
Path
Indicators
Parent process
2704"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
Invoice #T825368RC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
2.0.50727.5420 (Win7SP1.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\regasm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
3084"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\admin\AppData\Local\Temp\tmpEB8C.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
RegAsm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
0
Version:
8.0.50727.5420
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\vbc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
3232"C:\Users\admin\AppData\Local\Temp\Invoice #T825368RC.exe" C:\Users\admin\AppData\Local\Temp\Invoice #T825368RC.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Spotify
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\invoice #t825368rc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3724"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\admin\AppData\Local\Temp\tmpBECD.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
RegAsm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual Basic Command Line Compiler
Exit code:
0
Version:
8.0.50727.5420
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\vbc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
Total events
66
Read events
56
Write events
10
Delete events
0

Modification events

(PID) Process:(2704) RegAsm.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
1
Suspicious files
0
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
3232Invoice #T825368RC.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RegAsm.urltext
MD5:
SHA256:
3232Invoice #T825368RC.exeC:\Users\admin\AppData\Roaming\templates\app.exeexecutable
MD5:
SHA256:
3724vbc.exeC:\Users\admin\AppData\Local\Temp\tmpBECD.tmptext
MD5:
SHA256:
2704RegAsm.exeC:\Users\admin\AppData\Local\Temp\5c3f14c3-35ed-56cf-c498-6edeaf57da4dtext
MD5:CC31A51EBE8F2F7B120C0731335A04A9
SHA256:BBBFD2DBB09BA2B61BA9CE2846F2BC9604A87F3717F63ECB92831B6D80A9D443
3084vbc.exeC:\Users\admin\AppData\Local\Temp\tmpEB8C.tmptext
MD5:7FB9A9AD0FD9B1E0108ED71FBB276048
SHA256:7D63C301317E144B0133A72250AE2D8E09AF65A92E6A807EC58A71939FE530A9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
1
DNS requests
1
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2704
RegAsm.exe
213.180.193.38:587
smtp.yandex.com
YANDEX LLC
RU
whitelisted

DNS requests

Domain
IP
Reputation
smtp.yandex.com
  • 213.180.193.38
  • 77.88.21.38
  • 213.180.204.38
  • 87.250.250.38
  • 93.158.134.38
malicious

Threats

PID
Process
Class
Message
2704
RegAsm.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
No debug info