Analysis
-
max time kernel
4294184s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
29-03-2022 18:19
Static task
static1
Behavioral task
behavioral1
Sample
983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe
Resource
win7-20220311-en
0 signatures
0 seconds
General
-
Target
983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe
-
Size
355KB
-
MD5
2f0e24e82f7c70b3c698af44d4e1985d
-
SHA1
d82af75bed79db528eed3520af0b79bb9476deec
-
SHA256
983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c
-
SHA512
d1e17b54773b8abbd6a1c713f25c96436643b7059c2fc1f3bd2976daffbaca719df066279659e7340bedf57fa29a626da753f937bf3022c7f9380547396bc1cb
Malware Config
Signatures
-
HiveRAT Payload 15 IoCs
resource yara_rule behavioral1/memory/1496-61-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-62-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-63-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-64-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-65-0x000000000044CCFE-mapping.dmp family_hiverat behavioral1/memory/1496-67-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-69-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-71-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-72-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-73-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-74-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-78-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-81-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-82-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral1/memory/1496-83-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1800 set thread context of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 -
Program crash 1 IoCs
pid pid_target Process procid_target 1924 1496 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe Token: SeDebugPrivilege 1496 InstallUtil.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1800 wrote to memory of 1496 1800 983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe 27 PID 1496 wrote to memory of 1924 1496 InstallUtil.exe 28 PID 1496 wrote to memory of 1924 1496 InstallUtil.exe 28 PID 1496 wrote to memory of 1924 1496 InstallUtil.exe 28 PID 1496 wrote to memory of 1924 1496 InstallUtil.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe"C:\Users\Admin\AppData\Local\Temp\983307d0b15ee7e2bf5551873f5dc7dd486951263de813c7beed55ab726ef91c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 5363⤵
- Program crash
PID:1924
-
-