Analysis

  • max time kernel
    189s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    30-01-2022 12:48

General

  • Target

    1a3c5e1a2a52a3796116eaf838e36a23bc6428b42bd1c5c5a17aa73ab8974e46.exe

  • Size

    440KB

  • MD5

    84749489341fb7f968fc940eb0751d23

  • SHA1

    89609f93cdd419af9fa82a9734b1bffc63563068

  • SHA256

    1a3c5e1a2a52a3796116eaf838e36a23bc6428b42bd1c5c5a17aa73ab8974e46

  • SHA512

    cabc5654113150b98f3a7fe3f9c79ed50dd90285d310cb4c60b6eb01ba48a1c411d773254d5dca4424c70a9e3487850e5e443d4fac422b4b99a95663655e68f3

Malware Config

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • HiveRAT Payload 1 IoCs
  • Sets service image path in registry 2 TTPs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a3c5e1a2a52a3796116eaf838e36a23bc6428b42bd1c5c5a17aa73ab8974e46.exe
    "C:\Users\Admin\AppData\Local\Temp\1a3c5e1a2a52a3796116eaf838e36a23bc6428b42bd1c5c5a17aa73ab8974e46.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:3764
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe ab7ac0d3a8b5ae1d9c3350c76ebea0ac C25sboTFCk+5gsrP8JQ7OQ.0.1.0.0.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:3068

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3764-130-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/3764-131-0x00000000050F0000-0x0000000005182000-memory.dmp

    Filesize

    584KB

  • memory/3764-132-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

    Filesize

    4KB

  • memory/3764-133-0x0000000005390000-0x000000000542C000-memory.dmp

    Filesize

    624KB

  • memory/3764-134-0x0000000006030000-0x00000000065D4000-memory.dmp

    Filesize

    5.6MB