Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    15-04-2022 09:36

General

  • Target

    93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe

  • Size

    333KB

  • MD5

    c9fbb0b249181bda2fd97576a58e9292

  • SHA1

    e0e64d6903b514ac554b59d2b082b04d8f1df46b

  • SHA256

    93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd

  • SHA512

    1750c75df8b99ddd88f998a8136fb151af8804ea2f29cba2af5651948788a0e20a0623bbc0e313b281b0f11aefafb14c34cb09c11b8b5e24ed0230260bf9eca9

Score
10/10

Malware Config

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • HiveRAT Payload 10 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe
    "C:\Users\Admin\AppData\Local\Temp\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c timeout 5 & powershell -command Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Local\Temp\\429731.js'; Start-Sleep -s 5; Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe'
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3956
      • C:\Windows\SysWOW64\timeout.exe
        timeout 5
        3⤵
        • Delays execution with timeout.exe
        PID:3128
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -command Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Local\Temp\\429731.js'; Start-Sleep -s 5; Start-Process -WindowStyle hidden -FilePath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe'
        3⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3864
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\429731.js"
          4⤵
          • Suspicious behavior: RenamesItself
          PID:2136
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe"
          4⤵
          • Drops startup file
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4312
          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe"
            5⤵
              PID:2076
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\93976f0e20d71604b9d3cb4de0046d874f763aa9ef701ef65feaa5d4a8152bdd.exe"
              5⤵
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of AdjustPrivilegeToken
              PID:3964

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\429731.js

      Filesize

      346B

      MD5

      60c472e8bf90cafd98f3d298652cdd50

      SHA1

      371bd260da522a1b4f893965cce08fa5d69618fa

      SHA256

      b4f1fb692ecf9f619a45c28459c38a66f2b9ce923a181d7892c13f040806b634

      SHA512

      d5733e56ac0011bda134c7c61d0090a031f778805c539b89930d5a97673bfc52e3424fc4c6b374625a2a43c7ea7cc751e968aff84b3cde0015e117eaffe20b92

    • memory/2076-153-0x0000000000000000-mapping.dmp

    • memory/2136-150-0x0000000000000000-mapping.dmp

    • memory/2540-130-0x0000000000440000-0x0000000000498000-memory.dmp

      Filesize

      352KB

    • memory/2540-131-0x0000000005400000-0x00000000059A4000-memory.dmp

      Filesize

      5.6MB

    • memory/2540-132-0x0000000004E50000-0x0000000004EE2000-memory.dmp

      Filesize

      584KB

    • memory/2540-133-0x0000000004F70000-0x0000000004FE6000-memory.dmp

      Filesize

      472KB

    • memory/2540-134-0x0000000004F30000-0x0000000004F4E000-memory.dmp

      Filesize

      120KB

    • memory/2540-135-0x0000000005260000-0x00000000052FC000-memory.dmp

      Filesize

      624KB

    • memory/2540-136-0x0000000005BB0000-0x0000000005C16000-memory.dmp

      Filesize

      408KB

    • memory/3128-138-0x0000000000000000-mapping.dmp

    • memory/3864-148-0x0000000006840000-0x0000000006862000-memory.dmp

      Filesize

      136KB

    • memory/3864-143-0x0000000005C50000-0x0000000005CB6000-memory.dmp

      Filesize

      408KB

    • memory/3864-144-0x0000000006310000-0x000000000632E000-memory.dmp

      Filesize

      120KB

    • memory/3864-145-0x0000000002E95000-0x0000000002E97000-memory.dmp

      Filesize

      8KB

    • memory/3864-146-0x0000000006870000-0x0000000006906000-memory.dmp

      Filesize

      600KB

    • memory/3864-147-0x00000000067F0000-0x000000000680A000-memory.dmp

      Filesize

      104KB

    • memory/3864-141-0x0000000005530000-0x0000000005B58000-memory.dmp

      Filesize

      6.2MB

    • memory/3864-140-0x0000000002D40000-0x0000000002D76000-memory.dmp

      Filesize

      216KB

    • memory/3864-139-0x0000000000000000-mapping.dmp

    • memory/3864-151-0x00000000086E0000-0x0000000008D5A000-memory.dmp

      Filesize

      6.5MB

    • memory/3864-142-0x0000000005460000-0x0000000005482000-memory.dmp

      Filesize

      136KB

    • memory/3956-137-0x0000000000000000-mapping.dmp

    • memory/3964-154-0x0000000000000000-mapping.dmp

    • memory/3964-155-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3964-157-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3964-160-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3964-161-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3964-162-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3964-159-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3964-166-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3964-169-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3964-170-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/3964-171-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4312-152-0x0000000000000000-mapping.dmp

    • memory/4312-174-0x0000000006A70000-0x0000000006A7A000-memory.dmp

      Filesize

      40KB