Analysis

  • max time kernel
    128s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    09-03-2022 13:46

General

  • Target

    627d08aae07f05b8a597c9ad2d4d3513ba107f628a4a38727f5a623889b66aad.exe

  • Size

    412KB

  • MD5

    9f623866564f2db35e45d61a6dee76c8

  • SHA1

    408cf5d7bda367ea9f5db402824b5534f071b123

  • SHA256

    627d08aae07f05b8a597c9ad2d4d3513ba107f628a4a38727f5a623889b66aad

  • SHA512

    4b4fe3fab8a5ccd14923253cb319efe87260222d5f60a9f5b32f8fefca11306b27fbdefa7892b3f2828d150913a904408e338538e7b8f4e9fa0021b8ee8b3296

Score
10/10

Malware Config

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • HiveRAT Payload 10 IoCs
  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\627d08aae07f05b8a597c9ad2d4d3513ba107f628a4a38727f5a623889b66aad.exe
    "C:\Users\Admin\AppData\Local\Temp\627d08aae07f05b8a597c9ad2d4d3513ba107f628a4a38727f5a623889b66aad.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Users\Admin\AppData\Local\Temp\627d08aae07f05b8a597c9ad2d4d3513ba107f628a4a38727f5a623889b66aad.exe
      "C:\Users\Admin\AppData\Local\Temp\627d08aae07f05b8a597c9ad2d4d3513ba107f628a4a38727f5a623889b66aad.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4188
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4188 -s 784
        3⤵
        • Program crash
        PID:776
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4188 -ip 4188
    1⤵
      PID:1632

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4188-161-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4188-151-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4188-170-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4188-143-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4188-164-0x0000000075080000-0x0000000075830000-memory.dmp

      Filesize

      7.7MB

    • memory/4188-153-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4188-149-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4188-145-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4188-172-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4188-168-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4188-147-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/5040-141-0x0000000006770000-0x00000000067D6000-memory.dmp

      Filesize

      408KB

    • memory/5040-140-0x00000000066D0000-0x000000000676C000-memory.dmp

      Filesize

      624KB

    • memory/5040-135-0x0000000075080000-0x0000000075830000-memory.dmp

      Filesize

      7.7MB

    • memory/5040-139-0x0000000005770000-0x000000000577A000-memory.dmp

      Filesize

      40KB

    • memory/5040-134-0x0000000000CB0000-0x0000000000D1C000-memory.dmp

      Filesize

      432KB

    • memory/5040-138-0x0000000005610000-0x00000000056A2000-memory.dmp

      Filesize

      584KB

    • memory/5040-137-0x00000000056B0000-0x0000000005742000-memory.dmp

      Filesize

      584KB

    • memory/5040-136-0x0000000005D80000-0x0000000006324000-memory.dmp

      Filesize

      5.6MB

    • memory/5040-142-0x0000000006AE0000-0x0000000006AE1000-memory.dmp

      Filesize

      4KB