Analysis
-
max time kernel
164s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
26-03-2022 14:40
Static task
static1
Behavioral task
behavioral1
Sample
04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe
Resource
win10v2004-en-20220113
General
-
Target
04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe
-
Size
334KB
-
MD5
d0dc4b79447268d2d938a31447918a0e
-
SHA1
a572d0f1d50245baa8f3da4ee8bd3865b8f6d0eb
-
SHA256
04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d
-
SHA512
17751c11420f789addcbedbf9fefd140c7b87ac0aa33cf883fa489638f4307bff06e26582601797132c26489d6b453f081e7cff60b761c38097bae3e594f9ae3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\IJilC1YVc20K6oY2\\OoDz1K5mRMBQ.exe\",explorer.exe" 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe -
HiveRAT Payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/4316-136-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4316-138-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4316-141-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4316-142-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4316-143-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4316-140-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4316-147-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4316-150-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4316-151-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4316-152-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat -
Suspicious use of SetThreadContext 1 IoCs
Processes:
04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exedescription pid Process procid_target PID 4936 set thread context of 4316 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe 89 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1824 4316 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exepid Process 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exedescription pid Process Token: SeDebugPrivilege 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe Token: SeDebugPrivilege 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe Token: SeDebugPrivilege 4316 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exedescription pid Process procid_target PID 4936 wrote to memory of 4316 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe 89 PID 4936 wrote to memory of 4316 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe 89 PID 4936 wrote to memory of 4316 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe 89 PID 4936 wrote to memory of 4316 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe 89 PID 4936 wrote to memory of 4316 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe 89 PID 4936 wrote to memory of 4316 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe 89 PID 4936 wrote to memory of 4316 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe 89 PID 4936 wrote to memory of 4316 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe 89 PID 4936 wrote to memory of 4316 4936 04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe"C:\Users\Admin\AppData\Local\Temp\04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe"C:\Users\Admin\AppData\Local\Temp\04d5963e859229bb3c0bb76c311867a0fb150029bd580cdc22118eaabf17516d.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 8043⤵
- Program crash
PID:1824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4316 -ip 43161⤵PID:3272