Analysis

  • max time kernel
    138s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    09-03-2022 13:51

General

  • Target

    247224c99fceb82691532d78441f3f419b3ed2d64559c09ab29dc71d1841affa.exe

  • Size

    516KB

  • MD5

    a017058b040b5a38add4f95861a11f67

  • SHA1

    f5fd43a5f9c48b21b83b778ae1ffe1f7ede0283b

  • SHA256

    247224c99fceb82691532d78441f3f419b3ed2d64559c09ab29dc71d1841affa

  • SHA512

    64f6c8b098c136f7ce375e76d8c53f7797a2e7fb1ea45192947a563eef8b8b45dc1ff7d3b923b23ab84ae8fece04def040f3f0098eae175980319a7207f9d692

Score
10/10

Malware Config

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • HiveRAT Payload 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\247224c99fceb82691532d78441f3f419b3ed2d64559c09ab29dc71d1841affa.exe
    "C:\Users\Admin\AppData\Local\Temp\247224c99fceb82691532d78441f3f419b3ed2d64559c09ab29dc71d1841affa.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1384
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 776
        3⤵
        • Program crash
        PID:2904
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1384 -ip 1384
    1⤵
      PID:1680

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1384-147-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1384-145-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1384-141-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1384-143-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1384-139-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1384-164-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1384-162-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1384-137-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1384-166-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1384-156-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/1384-151-0x0000000075250000-0x0000000075A00000-memory.dmp

      Filesize

      7.7MB

    • memory/1928-135-0x0000000005C20000-0x0000000005C21000-memory.dmp

      Filesize

      4KB

    • memory/1928-130-0x0000000000FF0000-0x0000000001078000-memory.dmp

      Filesize

      544KB

    • memory/1928-133-0x00000000086B0000-0x0000000008C54000-memory.dmp

      Filesize

      5.6MB

    • memory/1928-132-0x0000000005A60000-0x0000000005AFC000-memory.dmp

      Filesize

      624KB

    • memory/1928-136-0x0000000008560000-0x0000000008582000-memory.dmp

      Filesize

      136KB

    • memory/1928-131-0x0000000075250000-0x0000000075A00000-memory.dmp

      Filesize

      7.7MB

    • memory/1928-134-0x0000000008330000-0x00000000083C2000-memory.dmp

      Filesize

      584KB