Analysis

  • max time kernel
    150s
  • max time network
    75s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-04-2022 09:36

General

  • Target

    93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe

  • Size

    333KB

  • MD5

    c9fbb0b249181bda2fd97576a58e9292

  • SHA1

    e0e64d6903b514ac554b59d2b082b04d8f1df46b

  • SHA256

    93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd

  • SHA512

    1750c75df8b99ddd88f998a8136fb151af8804ea2f29cba2af5651948788a0e20a0623bbc0e313b281b0f11aefafb14c34cb09c11b8b5e24ed0230260bf9eca9

Score
10/10

Malware Config

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • Beds Protector Packer 1 IoCs

    Detects Beds Protector packer used to load .NET malware.

  • HiveRAT Payload 15 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe
    "C:\Users\Admin\AppData\Local\Temp\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c timeout 5 & powershell -command Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Local\Temp\\89574.js'; Start-Sleep -s 5; Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe'
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\SysWOW64\timeout.exe
        timeout 5
        3⤵
        • Delays execution with timeout.exe
        PID:2024
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -command Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Local\Temp\\89574.js'; Start-Sleep -s 5; Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\89574.js"
          4⤵
          • Suspicious behavior: RenamesItself
          PID:664
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe"
          4⤵
          • Drops startup file
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1532
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe"
            5⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:1196

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\89574.js

    Filesize

    346B

    MD5

    60c472e8bf90cafd98f3d298652cdd50

    SHA1

    371bd260da522a1b4f893965cce08fa5d69618fa

    SHA256

    b4f1fb692ecf9f619a45c28459c38a66f2b9ce923a181d7892c13f040806b634

    SHA512

    d5733e56ac0011bda134c7c61d0090a031f778805c539b89930d5a97673bfc52e3424fc4c6b374625a2a43c7ea7cc751e968aff84b3cde0015e117eaffe20b92

  • memory/664-61-0x0000000000000000-mapping.dmp

  • memory/892-55-0x0000000001F30000-0x0000000001F80000-memory.dmp

    Filesize

    320KB

  • memory/892-54-0x00000000002D0000-0x0000000000328000-memory.dmp

    Filesize

    352KB

  • memory/1196-70-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-82-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-92-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-91-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-90-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-87-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-83-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-81-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-67-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-68-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-80-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-71-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-72-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-73-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-74-0x000000000044C8DE-mapping.dmp

  • memory/1196-76-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1196-78-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1532-66-0x0000000000E40000-0x0000000000E98000-memory.dmp

    Filesize

    352KB

  • memory/1532-65-0x0000000000000000-mapping.dmp

  • memory/1712-56-0x0000000000000000-mapping.dmp

  • memory/2024-57-0x0000000000000000-mapping.dmp

  • memory/2036-59-0x00000000755C1000-0x00000000755C3000-memory.dmp

    Filesize

    8KB

  • memory/2036-64-0x00000000023F0000-0x000000000303A000-memory.dmp

    Filesize

    12.3MB

  • memory/2036-63-0x0000000073D00000-0x00000000742AB000-memory.dmp

    Filesize

    5.7MB

  • memory/2036-58-0x0000000000000000-mapping.dmp