Analysis

  • max time kernel
    130s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    18-04-2022 11:54

General

  • Target

    f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa.exe

  • Size

    658KB

  • MD5

    640951b3332d0b24cd9891c936f92de5

  • SHA1

    2acf005cada97d7fe4aded561c69e631b3afb5b8

  • SHA256

    f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa

  • SHA512

    09f339ebbc6f2505550f43fa9d12fc5329c69a52ae343c78d629f864389787c9a35b3b6a81eee375d4f2fce0b76903cfa1b3fed98b9e88588720e38a1ae3e15b

Score
10/10

Malware Config

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • HiveRAT Payload 15 IoCs
  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa.exe
    "C:\Users\Admin\AppData\Local\Temp\f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Users\Admin\AppData\Local\Temp\f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa.exe
      "C:\Users\Admin\AppData\Local\Temp\f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa.exe"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2024

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1092-54-0x0000000001300000-0x00000000013AA000-memory.dmp

    Filesize

    680KB

  • memory/1092-55-0x0000000000B40000-0x0000000000BB4000-memory.dmp

    Filesize

    464KB

  • memory/2024-56-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-57-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-59-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-60-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-61-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-62-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-65-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-67-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-69-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-70-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-71-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-72-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-76-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-79-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-80-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/2024-81-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB