Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-05-2022 23:25
Static task
static1
Behavioral task
behavioral1
Sample
a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe
-
Size
328KB
-
MD5
e8068367588a8265d548f30a1f44e8a6
-
SHA1
29db35a706c1be8dd53569697ae8df40d824c56f
-
SHA256
a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e
-
SHA512
27c1bc885c17a5ed7cb9d7634172abf61256a44af90759a403fe16d4eb4d0f4a24269682cffacbedf0cf2e3efabbff03ff2757d0f40adf948b6c691702626de9
Malware Config
Signatures
-
HiveRAT Payload 10 IoCs
resource yara_rule behavioral2/memory/1772-135-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/1772-137-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/1772-139-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/1772-140-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/1772-142-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/1772-143-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/1772-147-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/1772-150-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/1772-151-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/1772-152-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SYS.exe a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SYS.exe a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2300 set thread context of 1772 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 89 -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1772 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe Token: SeDebugPrivilege 1772 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1772 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 89 PID 2300 wrote to memory of 1772 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 89 PID 2300 wrote to memory of 1772 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 89 PID 2300 wrote to memory of 1772 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 89 PID 2300 wrote to memory of 1772 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 89 PID 2300 wrote to memory of 1772 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 89 PID 2300 wrote to memory of 1772 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 89 PID 2300 wrote to memory of 1772 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 89 PID 2300 wrote to memory of 1772 2300 a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe"C:\Users\Admin\AppData\Local\Temp\a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe"C:\Users\Admin\AppData\Local\Temp\a89f8ac927cabea259a47a4c7788e3daf95056913070fca186cbd80f35b9ba1e.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1772
-