Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    18-04-2022 11:54

General

  • Target

    f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa.exe

  • Size

    658KB

  • MD5

    640951b3332d0b24cd9891c936f92de5

  • SHA1

    2acf005cada97d7fe4aded561c69e631b3afb5b8

  • SHA256

    f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa

  • SHA512

    09f339ebbc6f2505550f43fa9d12fc5329c69a52ae343c78d629f864389787c9a35b3b6a81eee375d4f2fce0b76903cfa1b3fed98b9e88588720e38a1ae3e15b

Score
10/10

Malware Config

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • HiveRAT Payload 10 IoCs
  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa.exe
    "C:\Users\Admin\AppData\Local\Temp\f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4060
    • C:\Users\Admin\AppData\Local\Temp\f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa.exe
      "C:\Users\Admin\AppData\Local\Temp\f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa.exe"
      2⤵
        PID:4348
      • C:\Users\Admin\AppData\Local\Temp\f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa.exe
        "C:\Users\Admin\AppData\Local\Temp\f600e89eba0e7cedaa8637126cf7e900b28e7e2462ad84d4b0ff832c9ec173aa.exe"
        2⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:920

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/920-147-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/920-150-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/920-141-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/920-143-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/920-140-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/920-135-0x0000000000000000-mapping.dmp

    • memory/920-136-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/920-138-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/920-159-0x0000000005580000-0x00000000055E6000-memory.dmp

      Filesize

      408KB

    • memory/920-152-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/920-151-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/920-142-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4060-130-0x00000000003A0000-0x000000000044A000-memory.dmp

      Filesize

      680KB

    • memory/4060-131-0x0000000005450000-0x00000000059F4000-memory.dmp

      Filesize

      5.6MB

    • memory/4060-133-0x0000000005080000-0x000000000511C000-memory.dmp

      Filesize

      624KB

    • memory/4060-132-0x0000000004EA0000-0x0000000004F32000-memory.dmp

      Filesize

      584KB

    • memory/4060-158-0x0000000005060000-0x000000000506A000-memory.dmp

      Filesize

      40KB

    • memory/4348-134-0x0000000000000000-mapping.dmp