Analysis
-
max time kernel
190s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-05-2022 06:15
Static task
static1
Behavioral task
behavioral1
Sample
87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe
-
Size
289KB
-
MD5
77b680976090d7a835d4b8fe78261bac
-
SHA1
a9362e3123fe9dd18bc252ba9c2620265227a63b
-
SHA256
87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d
-
SHA512
51850a8e64e2133caf4f558ac9bbaef62ef7b2291f8d7d7b0dc4fa0bf8cc309caf48d898e0bbc9e31dbd90d7c46616242c7f4fb88f6422fe918e30cdcc8cfa3e
Malware Config
Signatures
-
HiveRAT Payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/5092-135-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/5092-137-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/5092-139-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/5092-140-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/5092-141-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/5092-143-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/5092-147-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/5092-150-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/5092-152-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/5092-151-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat -
Drops startup file 2 IoCs
Processes:
87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft.exe 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exedescription pid process target process PID 3172 set thread context of 5092 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
Processes:
87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exepid process 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exepid process 5092 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exedescription pid process Token: SeDebugPrivilege 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe Token: SeDebugPrivilege 5092 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exedescription pid process target process PID 3172 wrote to memory of 5092 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe PID 3172 wrote to memory of 5092 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe PID 3172 wrote to memory of 5092 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe PID 3172 wrote to memory of 5092 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe PID 3172 wrote to memory of 5092 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe PID 3172 wrote to memory of 5092 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe PID 3172 wrote to memory of 5092 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe PID 3172 wrote to memory of 5092 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe PID 3172 wrote to memory of 5092 3172 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe 87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe"C:\Users\Admin\AppData\Local\Temp\87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe"C:\Users\Admin\AppData\Local\Temp\87f368326e3250f12dd518b3b0dfe773a67f47f9bf3347678eec99bf2045ee1d.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:5092
-