{"id":87019,"date":"2018-11-01T11:47:45","date_gmt":"2018-11-01T06:17:45","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=87019"},"modified":"2018-11-01T12:06:13","modified_gmt":"2018-11-01T06:36:13","slug":"obfuscated-equation-editor-exploit-cve-2017-11882-spreading-hawkeye-keylogger","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/obfuscated-equation-editor-exploit-cve-2017-11882-spreading-hawkeye-keylogger\/","title":{"rendered":"Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger"},"content":{"rendered":"<p>Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim&#8217;s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft&#8217;s equation editor exploit to spread Hawkeye keylogger.<\/p>\n<p>Cybercriminals use different techniques to steal confidential data. Now they are offering advanced forms of malware to fulfill their purpose. That&#8217;s why we are still observing actively evolving new threats. Hawkeye belongs to a family of keylogger. The latest Hawkeye v8 reborn uses Microsoft Office Equation Editor Vulnerability CVE-2017-11882 to infiltrate. We also published a detailed blog post on this exploit which can be read <a href=\"https:\/\/blogs.quickheal.com\/malspam-campaigns-exploiting-recent-ms-office-vulnerability-cve-2017-11882\/\">here<\/a>. This exploit uses new techniques to evade detection of AV product. It compiles its code while executing and loads payload in memory without writing it on the disk.<\/p>\n<p><strong>Flow\u00a0of Execution:<\/strong><\/p>\n<figure id=\"attachment_87021\" aria-describedby=\"caption-attachment-87021\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87021\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/11\/1-650x249.png\" alt=\"Fig1.Flow of execution\" width=\"650\" height=\"249\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/1-650x249.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/1-300x115.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/1-768x295.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/1-789x303.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/1.png 878w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87021\" class=\"wp-caption-text\">Fig1.Flow of execution<\/figcaption><\/figure>\n<p><strong>Exploit Analysis:<\/strong><\/p>\n<p>The buffer overflow vulnerability is present in the \u201cFONT\u201d record in equation native object. To exploit this vulnerability, OLE object must invoke equation native object and to do so it needs to include Equation Native stream in OLE file.<\/p>\n<p>It can be done by using two types:<\/p>\n<ol>\n<li>Use of \u201cEquation Native\u201d stream.<\/li>\n<li>Use of <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/com\/clsid-key-hklm\">CLSID<\/a> of \u201cEquation Native\u201d stream.<\/li>\n<\/ol>\n<p>In this case, it uses <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/com\/clsid-key-hklm\">CLSID<\/a>\u00a0instead of \u201cEquation Native\u201d stream.<\/p>\n<figure id=\"attachment_87022\" aria-describedby=\"caption-attachment-87022\" style=\"width: 609px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87022\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/11\/2.png\" alt=\"Fig. 2: {0002CE02-0000-0000-C000-000000000046} of Equation Editor present in OLE file.\" width=\"609\" height=\"178\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/2.png 609w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/2-300x88.png 300w\" sizes=\"(max-width: 609px) 100vw, 609px\" \/><figcaption id=\"caption-attachment-87022\" class=\"wp-caption-text\">Fig. 2: {0002CE02-0000-0000-C000-000000000046} of Equation Editor present in OLE file.<\/figcaption><\/figure>\n<p>It uses \u201cOLE10native\u201d stream to parse the OLE objects to \u201cEquation Native\u201d stream.<\/p>\n<p>Following is the minimal header of \u201cOLE10native\u201d stream:<\/p>\n<table width=\"0\">\n<tbody>\n<tr>\n<td width=\"158\">DWORD<\/td>\n<td width=\"379\">Size of equation object (MTEF header + MTEF data)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>After execution of OLE, file equation editor is invoked and starts parsing the record. First, it parses MTEF header and TYPESIZE header and next starts to parse FONT record. In this case, it is overflowed by the buffer of FONT record content.<\/p>\n<p>The following figure shows the structure of OLE10Native stream which goes to parse by Equation Native object.<\/p>\n<figure id=\"attachment_87023\" aria-describedby=\"caption-attachment-87023\" style=\"width: 627px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-87023\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/11\/3.png\" alt=\"Fig. 3: Structure of header of OLE object.\" width=\"627\" height=\"325\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/3.png 627w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/3-300x156.png 300w\" sizes=\"(max-width: 627px) 100vw, 627px\" \/><figcaption id=\"caption-attachment-87023\" class=\"wp-caption-text\">Fig. 3: Structure of header of OLE object.<\/figcaption><\/figure>\n<p>Exploiting this vulnerability results in executing shellcode and finally content malicious payload download from CNC server.<\/p>\n<figure id=\"attachment_87024\" aria-describedby=\"caption-attachment-87024\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87024 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/11\/4-650x371.png\" alt=\"Fig. 4: Malicious URL present in the Shellcode.\" width=\"650\" height=\"371\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/4-650x371.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/4-300x171.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/4-768x438.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/4-789x450.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/4.png 819w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87024\" class=\"wp-caption-text\">Fig. 4: Malicious URL present in the Shellcode.<\/figcaption><\/figure>\n<p>Shellcode connects to URL to download malware by using \u201cURLDownloadToFileW\u201d API present in Urlmon.dll and executes it to do some malicious activity. In our case, we found malware as Hawkeye keylogger which performs keylogging activity and sends data using SMTP server.<\/p>\n<p><strong>Payload Analysis:<\/strong><\/p>\n<p>The Latest Hawkeye keylogger uses 3 step execution. It starts with container it executes loader which Injects Hawkeye payload into <a href=\"https:\/\/docs.microsoft.com\/en-us\/dotnet\/framework\/tools\/regasm-exe-assembly-registration-tool\">Regasm.exe<\/a> then it captures keystroke and credentials stored in the browser, outlook as well as some FTP file manager and sends them using SMTP protocol.<\/p>\n<p>In the first stage, Encrypted C# code which is present in the text format in malware file is decrypted and then compiled in memory. After that Compiled code present in memory is executed by malware. Following code is used for compilation of code and in memory execution using .NET\u00a0framework utilities. As the code is in text form and compiled at runtime. It reduces payload size and helps them to hide from antivirus programs.<\/p>\n<figure id=\"attachment_87025\" aria-describedby=\"caption-attachment-87025\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87025\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/11\/5-650x191.png\" alt=\"Fig5. Compilation and In-Memory Execution of malware\" width=\"650\" height=\"191\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/5-650x191.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/5-300x88.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/5-768x226.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/5-789x232.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/5.png 858w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87025\" class=\"wp-caption-text\">Fig.\u00a0 5: Compilation and In-Memory Execution of malware<\/figcaption><\/figure>\n<p>CSharpCodeProvider\u00a0is used to access utility of .NET\u00a0compiler i.e.\u00a0<a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/ms379563(v=vs.80).aspx\">csc.exe<\/a> used to compile code dynamically. To execute such a code in memory without its physical copy it provides compiler option (as shown in Fig. 5). When we provide \u201cGenerateExecutable\u201d as false then it creates a class library. If we provide the value as \u201ctrue\u201d then it creates an executable file. For \u201cGenerateInMemory\u201d if we provide \u201cfalse\u201d as the value then it saves a physical copy of assembly at %temp%\/randomname.exe. If \u201cGenerateInMemory\u201d is true then it doesn\u2019t save a physical copy of assembly on secondary disk. Then by using compilerResults.CompiledAssembly.EntryPoint.Invoke(null, null); it will execute code from the entry point.<\/p>\n<p>In the second stage, loader decrypts Hawkeye reborn stub from resource and injects it into\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/dotnet\/framework\/tools\/regasm-exe-assembly-registration-tool\">RegAsm.exe<\/a><strong><a href=\"https:\/\/docs.microsoft.com\/en-us\/dotnet\/framework\/tools\/regasm-exe-assembly-registration-tool\"><\/a><\/strong>.\u00a0Regasm.exe is assembly registration tool of .NET used to register or unregister assembly. In this malware, by using reflection (i.e <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/aa332512(v=vs.71).aspx\">invokeMember<\/a> method) regasm.exe is executed, and hawkeye payload is passed as a parameter to regasm.exe. Then this payload is executed as child process under Regasm.exe. In Fig. 6 Text4 is the path of regasm.exe and hXYyylN6() returns decrypted byte array of payload.<\/p>\n<figure id=\"attachment_87026\" aria-describedby=\"caption-attachment-87026\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87026\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/11\/6-650x325.png\" alt=\"Fig. 6: Injecting Hawkeye stub into Regasm.exe\" width=\"650\" height=\"325\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/6-650x325.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/6-300x150.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/6.png 709w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87026\" class=\"wp-caption-text\">Fig. 6: Injecting Hawkeye stub into Regasm.exe<\/figcaption><\/figure>\n<p>In the last stage, the final payload is executed by loader under <a href=\"https:\/\/docs.microsoft.com\/en-us\/dotnet\/framework\/tools\/regasm-exe-assembly-registration-tool\">RegAsm.exe<\/a>(which is a legitimate utility of Microsoft .NET\u00a0framework).\u00a0 It looks like a genuine\u00a0Microsoft application\u00a0but\u00a0actually,\u00a0it\u00a0is\u00a0Hawkeye keylogger.\u00a0The payload is obfuscated by using\u00a0ConfuserEx\u00a01.0 and\u00a0<a href=\"https:\/\/blogs.msdn.microsoft.com\/amb\/2011\/05\/27\/how-to-prevent-ildasm-from-disassembling-my-net-code\/\">SuppressIldasm<\/a>.\u00a0To execute malware after\u00a0rebooting,\u00a0it creates run entry.<\/p>\n<p>The latest version of Hawkeye contains many\u00a0functionalities\u00a0as following.<\/p>\n<ul>\n<li>Captures user keystrokes,\u00a0clipboard content.<\/li>\n<li>Copies FTP,\u00a0mail credentials.<\/li>\n<li>For anti-debugging, it uses\u00a0<a href=\"https:\/\/blogs.msdn.microsoft.com\/amb\/2011\/05\/27\/how-to-prevent-ildasm-from-disassembling-my-net-code\/\">SuppressIldasm\u00a0<\/a>and\u00a0ConfuserEx\u00a01.0.<\/li>\n<li>To disable antivirus and tools like\u00a0Wireshark it adds key debugger and value rundll32 in Image File Execution for those applications.<\/li>\n<li>Use genuine tools like\u00a0\u201c<a href=\"https:\/\/www.nirsoft.net\/utils\/mailpv.html\">MailPassView<\/a>\u201d\u00a0and\u00a0\u201c<a href=\"https:\/\/www.nirsoft.net\/utils\/web_browser_password.html\">BrowserPassView<\/a>\u201d\u00a0for password theft.<\/li>\n<li>Also, disable rstrui.exe which is used to restore files.<\/li>\n<li>Use anti-sandbox techniques like\u00a0Thread.sleep() for delay in execution.<\/li>\n<li>Use base64 encryption to send data to\u00a0the CNC server.<\/li>\n<li>The code is compiled at the user end using\u00a0csc.exe (<em>C Sharp Compiler<\/em>)<\/li>\n<li>Search for \u201c.Oeaccount\u201d extension file in all Directories.<\/li>\n<li>Disables task manager, command Prompt\u00a0and registry by adding registry under CurrentVersion\\\\Policies\\\\System.<\/li>\n<li>Kills cmd.exe and Wscript.exe<\/li>\n<li>Detects antivirus and firewall product details using <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/wmisdk\/querying-wmi\">WMI<\/a>\u00a0query.<\/li>\n<\/ul>\n<figure id=\"attachment_87027\" aria-describedby=\"caption-attachment-87027\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87027\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/11\/7-650x170.png\" alt=\"Fig. 7: Hawkeye Modules\" width=\"650\" height=\"170\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/7-650x170.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/7-300x79.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/7.png 725w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87027\" class=\"wp-caption-text\">Fig. 7: Hawkeye Modules<\/figcaption><\/figure>\n<p><strong>Working\u00a0of Hawkeye Keylogger:<\/strong><\/p>\n<p>When Keylogger is executed it first checks user type, then collects information like hostname, BIOS, antivirus, firewall product details and sends all the information to \u201c<strong>SUNDA[@]doctorework[.]com\u201d<\/strong>. To detect antivirus product details,\u00a0it uses <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/desktop\/wmisdk\/querying-wmi\">WMI<\/a> query by using\u00a0ManagermentObjectSearcher\u00a0Class of C#.<\/p>\n<p>It creates SMTP connection for data transfer with server\u00a0<strong>us2[.]outbound[.]mailhostbox[.]com, <\/strong>where it sends all keyboard inputs, clipboard and system information in base64 encrypted format.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-87028\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/11\/8_1-650x46.png\" alt=\"\" width=\"650\" height=\"46\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/8_1-650x46.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/8_1-300x21.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/8_1-768x55.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/8_1-789x56.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/8_1.png 1096w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<figure id=\"attachment_87029\" aria-describedby=\"caption-attachment-87029\" style=\"width: 622px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-87029\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/11\/8_2-622x390.png\" alt=\"Fig 8: Base64 encrypted SMTP Traffic of Hawkeye\" width=\"622\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/8_2-622x390.png 622w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/8_2-300x188.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/8_2-768x482.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/8_2-789x495.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/8_2.png 805w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><figcaption id=\"caption-attachment-87029\" class=\"wp-caption-text\">Fig 8: Base64 encrypted SMTP Traffic of Hawkeye<\/figcaption><\/figure>\n<p>Also,\u00a0it uses\u00a0<em>pomf[.]cat<\/em> website to store screen-shots by using HTTP POST request. It contains\u00a0Nirsoft\u2019s\u00a0<a href=\"https:\/\/www.nirsoft.net\/utils\/mailpv.html\">MailPassView<\/a> and <a href=\"https:\/\/www.nirsoft.net\/utils\/web_browser_password.html\">BrowserPassView<\/a> in the resource directory. By using <a href=\"https:\/\/www.nirsoft.net\/utils\/mailpv.html\">MailPassView<\/a> it gets stored credential from outlook and by using <a href=\"https:\/\/www.nirsoft.net\/utils\/web_browser_password.html\">BrowserPassview<\/a> it copies stored credentials from browsers and then sends the user\u2019s credential through SMTP connection.<\/p>\n<figure id=\"attachment_87030\" aria-describedby=\"caption-attachment-87030\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87030 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/11\/9-650x122.png\" alt=\"Fig. 9: File Upload request\" width=\"650\" height=\"122\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/9-650x122.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/9-300x56.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/9-768x144.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/9-789x148.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/9.png 1079w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87030\" class=\"wp-caption-text\">Fig. 9: File Upload request<\/figcaption><\/figure>\n<p>It contains a list of antivirus and programs like windows defender, Wireshark, and rstrui.exe.\u00a0This program is prevented from execution, to achieve this it adds registry into<\/p>\n<p><em>\u201cHKLM\\\\SOFTWARE\\\\MICROSOFT\\\\WINDOWS NT\\\\CurrentVersion\\\\Image File Execution Options\\\\Program_name.exe\\\\\u201d\u00a0<\/em><\/p>\n<p><em>Key name:\u00a0Debugger value:\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/administration\/windows-commands\/rundll32\">rundll32.exe<\/a>\u00a0<\/em><\/p>\n<p>Also,\u00a0it kills cmd.exe,\u00a0wscript.exe and modifies Hosts file.<\/p>\n<p>Rstrui.exe is the utility for file restoration by disabling such utilities it is preventing a victim from restoring to restore point.<\/p>\n<figure id=\"attachment_87031\" aria-describedby=\"caption-attachment-87031\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-87031 size-large\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/11\/10-650x126.png\" alt=\"Fig. 10: Registry to Disable Antivirus\" width=\"650\" height=\"126\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/10-650x126.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/10-300x58.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/10-768x149.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/10-789x153.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/11\/10.png 836w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-87031\" class=\"wp-caption-text\">Fig. 10: Registry to Disable Antivirus<\/figcaption><\/figure>\n<p>It checks for running application names if it contains &#8220;WPE PRO&#8221;,\u00a0&#8220;The Wireshark Network Analyzer&#8221;\u00a0and\u00a0it checks &#8220;SbieDll.dll&#8221; if it is executing then it terminates execution. For anti-sandbox techniques, it uses sleep instructions.<\/p>\n<p>As\u00a0Hawkeye keylogger logs every key pressed it is harmful to confidential data security.<\/p>\n<p><strong>Conclusion:<\/strong><\/p>\n<p>With emerging digital trends data is becoming more important so for stealing it attacker uses keylogger malware. To hide from anti-virus products, keyloggers are getting evolved from simple code to managed MSIL code with advance evading techniques. Malware authors use social engineering tweaks and using some exploit code to infiltrate in victim\u2019s machine. To protect from these types of attacks, the user should update their Microsoft applications and anti-virus product. Quick Heal blocks this attack in multiple stages with its advanced detection mechanism.<\/p>\n<p><strong>Detection<\/strong>:<\/p>\n<p>Quick Heal Provides multi-level protection for hawkeye keylogger.<\/p>\n<p>PDF file is detected by detection: <strong>PDF.Downloader.31377<br \/>\n<\/strong>Hawkeye is detected by detection: <strong>Trojan.Ransom<\/strong>, <strong>Pwstool.Netpass<\/strong> and <strong>Trojan.IGENERIC<\/strong><\/p>\n<p><strong>IOC:<\/strong><\/p>\n<p>PDF: 5F9227210036BB64F71E9A5E25115A39<br \/>\nDOC: 5191234DBE697D3A79400FD89DEE3BBD<br \/>\nSUND: 78787470C46A45BE5AF5AE5DC2BF6EB9<br \/>\nDomain:\u00a0hxxp[:]\/\/fbsleads[.]com\/assets\/SSUUNDS[.]exe<br \/>\nMail id:\u00a0<a href=\"mailto:sunda[@]doctorework.com\">sunda[@]doctorework.com<\/a><br \/>\nMail\u00a0Server:\u00a0us2[.]outbound[.]mailhostbox[.]com<\/p>\n<p><strong>Subject Matter Experts:<br \/>\n<\/strong>Aniruddha Dolas, Vallabh Chole, Pradeep Kulkarni<strong>\u00a0<\/strong>| Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim&#8217;s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft&#8217;s equation editor exploit to spread Hawkeye keylogger. Cybercriminals use different techniques to steal confidential data. Now they are offering advanced forms of malware to [&hellip;]<\/p>\n","protected":false},"author":31,"featured_media":85508,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,303,5],"tags":[1173,207,49,1626,38],"class_list":["post-87019","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","category-phishing","category-security","tag-exploit","tag-keylogger","tag-malware","tag-shellcode","tag-vulnerability"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87019"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=87019"}],"version-history":[{"count":5,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87019\/revisions"}],"predecessor-version":[{"id":87038,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/87019\/revisions\/87038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/85508"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=87019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=87019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=87019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}