| File name: | 33986-TQP-69324-DOB-2019.doc |
| Full analysis: | https://app.any.run/tasks/5729de00-44c4-4672-ba31-2a1dc8f0c152 |
| Verdict: | Malicious activity |
| Threats: | Hawkeye often gets installed in a bundle with other malware. This is a Trojan and keylogger that is used to retrieve private information such as passwords and login credentials. This is an advanced malware that features strong anti-evasion functions. |
| Analysis date: | December 06, 2019, 14:12:49 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/rtf |
| File info: | Rich Text Format data, unknown version |
| MD5: | 447F2F4430E7EFA9E165DA6CE6FAE601 |
| SHA1: | 5B352D12E3AF7C10CB3C741A2E416E614C0502A4 |
| SHA256: | DEF4E0EE3F787D867DAFE6FEBB68E9BA356AF66332FEFA18F0730B6F836749DD |
| SSDEEP: | 24576:kff+8U1/WoJtMOz5oi9r5kvZR0BdetJpe3mWi1n+OBoTk30/2OhJRnHsLVmDTqn4:L |
| .rtf | | | Rich Text Format (100) |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 236 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES1989.tmp" "c:\Users\admin\AppData\Local\Temp\CSCACC9498ECBC342EA8D52FED567765A94.TMP" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 12.00.52519.0 built by: VSWINSERVICING Modules
| |||||||||||||||
| 332 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | KUQJUC.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Exit code: 0 Version: 4.7.3062.0 built by: NET472REL1 Modules
| |||||||||||||||
| 392 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | pop.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Exit code: 0 Version: 4.7.3062.0 built by: NET472REL1 Modules
| |||||||||||||||
| 520 | "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\WININET.dll",DispatchAPICall 1 | C:\Windows\system32\rundll32.exe | — | RegAsm.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Windows host process (Rundll32) Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 776 | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\admin\AppData\Local\Temp\tmp529A.tmp" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe | RegAsm.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual Basic Command Line Compiler Exit code: 0 Version: 8.0.50727.5420 Modules
| |||||||||||||||
| 884 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | OJOHPW.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Exit code: 0 Version: 4.7.3062.0 built by: NET472REL1 Modules
| |||||||||||||||
| 944 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe | TFIMUM.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Exit code: 0 Version: 4.7.3062.0 built by: NET472REL1 Modules
| |||||||||||||||
| 1044 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESDB1.tmp" "c:\Users\admin\AppData\Local\Temp\CSC9BC112F9660B44248080D4CC79B8CD61.TMP" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 12.00.52519.0 built by: VSWINSERVICING Modules
| |||||||||||||||
| 1516 | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\admin\AppData\Local\Temp\tmp4D6A.tmp" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe | RegAsm.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Visual Basic Command Line Compiler Exit code: 0 Version: 8.0.50727.5420 Modules
| |||||||||||||||
| 1724 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES1D42.tmp" "c:\Users\admin\AppData\Local\Temp\CSC92006EE63854855A2E97A25101F2D21.TMP" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 12.00.52519.0 built by: VSWINSERVICING Modules
| |||||||||||||||
| (PID) Process: | (2796) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItems |
| Operation: | write | Name: | w"e |
Value: 77226500EC0A0000010000000000000000000000 | |||
| (PID) Process: | (2796) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: Off | |||
| (PID) Process: | (2796) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1041 |
Value: Off | |||
| (PID) Process: | (2796) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1046 |
Value: Off | |||
| (PID) Process: | (2796) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1036 |
Value: Off | |||
| (PID) Process: | (2796) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1031 |
Value: Off | |||
| (PID) Process: | (2796) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1040 |
Value: Off | |||
| (PID) Process: | (2796) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1049 |
Value: Off | |||
| (PID) Process: | (2796) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 3082 |
Value: Off | |||
| (PID) Process: | (2796) WINWORD.EXE | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000000000000F01FEC\Usage |
| Operation: | write | Name: | WORDFiles |
Value: 1334181950 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2796 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRB6A8.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 2880 | pop.exe | C:\Users\admin\DocumentsBinaryObjectWithMapTyped | — | |
MD5:— | SHA256:— | |||
| 2880 | pop.exe | C:\Users\admin\AppData\Local\Temp\h0y0c5b5.0.cs | — | |
MD5:— | SHA256:— | |||
| 1044 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RESDB1.tmp | — | |
MD5:— | SHA256:— | |||
| 2572 | csc.exe | C:\Users\admin\AppData\Local\Temp\h0y0c5b5.dll | — | |
MD5:— | SHA256:— | |||
| 2572 | csc.exe | C:\Users\admin\AppData\Local\Temp\h0y0c5b5.out | — | |
MD5:— | SHA256:— | |||
| 392 | RegAsm.exe | C:\Users\admin\AppData\Local\Temp\aut1310.tmp | — | |
MD5:— | SHA256:— | |||
| 392 | RegAsm.exe | C:\Users\admin\AppData\Local\Temp\aut16F9.tmp | — | |
MD5:— | SHA256:— | |||
| 392 | RegAsm.exe | C:\Users\admin\AppData\Local\Temp\aut17B6.tmp | — | |
MD5:— | SHA256:— | |||
| 236 | cvtres.exe | C:\Users\admin\AppData\Local\Temp\RES1989.tmp | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
332 | RegAsm.exe | GET | 200 | 66.171.248.178:80 | http://bot.whatismyipaddress.com/ | US | text | 13 b | shared |
332 | RegAsm.exe | GET | 200 | 66.171.248.178:80 | http://bot.whatismyipaddress.com/ | US | text | 13 b | shared |
332 | RegAsm.exe | GET | 200 | 66.171.248.178:80 | http://bot.whatismyipaddress.com/ | US | text | 13 b | shared |
884 | RegAsm.exe | GET | 200 | 66.171.248.178:80 | http://bot.whatismyipaddress.com/ | US | text | 13 b | shared |
2212 | EQNEDT32.EXE | GET | 200 | 52.47.207.162:82 | http://52.47.207.162:82/po.exe | FR | executable | 5.96 Mb | suspicious |
944 | RegAsm.exe | GET | 200 | 131.186.113.70:80 | http://checkip.dyndns.org/ | US | html | 105 b | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2212 | EQNEDT32.EXE | 52.47.207.162:82 | — | Amazon.com, Inc. | FR | suspicious |
944 | RegAsm.exe | 131.186.113.70:80 | checkip.dyndns.org | — | US | malicious |
392 | RegAsm.exe | 104.26.8.44:443 | ipapi.co | Cloudflare Inc | US | malicious |
332 | RegAsm.exe | 66.171.248.178:80 | bot.whatismyipaddress.com | Alchemy Communications, Inc. | US | malicious |
944 | RegAsm.exe | 185.61.137.171:587 | mail.bandaichemical.com | Dotsi, Unipessoal Lda. | NL | suspicious |
332 | RegAsm.exe | 185.61.137.171:587 | mail.bandaichemical.com | Dotsi, Unipessoal Lda. | NL | suspicious |
884 | RegAsm.exe | 66.171.248.178:80 | bot.whatismyipaddress.com | Alchemy Communications, Inc. | US | malicious |
884 | RegAsm.exe | 185.61.137.171:587 | mail.bandaichemical.com | Dotsi, Unipessoal Lda. | NL | suspicious |
Domain | IP | Reputation |
|---|---|---|
ipapi.co |
| shared |
checkip.dyndns.org |
| shared |
mail.bandaichemical.com |
| unknown |
maxcoop1.ddns.net |
| malicious |
bot.whatismyipaddress.com |
| shared |
PID | Process | Class | Message |
|---|---|---|---|
2212 | EQNEDT32.EXE | A Network Trojan was detected | ET INFO Executable Download from dotted-quad Host |
2212 | EQNEDT32.EXE | Potentially Bad Traffic | ET CURRENT_EVENTS Terse alphanumeric executable downloader high likelihood of being hostile |
2212 | EQNEDT32.EXE | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2212 | EQNEDT32.EXE | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
1080 | svchost.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup Domain (ipapi .co in DNS lookup) |
1080 | svchost.exe | Misc activity | ET INFO DYNAMIC_DNS Query to *.dyndns. Domain |
1080 | svchost.exe | Misc activity | AV INFO Query to checkip.dyndns. Domain |
944 | RegAsm.exe | Potential Corporate Privacy Violation | ET POLICY External IP Lookup - checkip.dyndns.org |
944 | RegAsm.exe | Potentially Bad Traffic | ET POLICY DynDNS CheckIp External IP Address Server Response |
944 | RegAsm.exe | Generic Protocol Command Decode | SURICATA Applayer Detect protocol only one direction |