Analysis
-
max time kernel
122s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 02:40
Static task
static1
Behavioral task
behavioral1
Sample
15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe
Resource
win7-20220414-en
General
-
Target
15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe
-
Size
584KB
-
MD5
d21695b6d9bdd7ed0e35a0c70ce38205
-
SHA1
33522e95507f48e68a981b1097bcbe0354e31c1a
-
SHA256
15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c
-
SHA512
0550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f
Malware Config
Signatures
-
HiveRAT Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4964-136-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4964-139-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat -
Executes dropped EXE 1 IoCs
Processes:
15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exepid process 4964 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe -
Drops startup file 2 IoCs
Processes:
15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DesktopExplorer.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DesktopExplorer.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exedescription pid process target process PID 5020 set thread context of 4964 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4876 4964 WerFault.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exepid process 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exedescription pid process Token: SeDebugPrivilege 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exedescription pid process target process PID 5020 wrote to memory of 4964 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe PID 5020 wrote to memory of 4964 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe PID 5020 wrote to memory of 4964 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe PID 5020 wrote to memory of 4964 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe PID 5020 wrote to memory of 4964 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe PID 5020 wrote to memory of 4964 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe PID 5020 wrote to memory of 4964 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe PID 5020 wrote to memory of 4964 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe PID 5020 wrote to memory of 4964 5020 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe 15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe"C:\Users\Admin\AppData\Local\Temp\15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe"C:\Users\Admin\AppData\Local\Temp\15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe"2⤵
- Executes dropped EXE
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 7643⤵
- Program crash
PID:4876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4964 -ip 49641⤵PID:3584
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
C:\Users\Admin\AppData\Local\Temp\15a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c.exe
Filesize584KB
MD5d21695b6d9bdd7ed0e35a0c70ce38205
SHA133522e95507f48e68a981b1097bcbe0354e31c1a
SHA25615a91a73d34c70be3ae427e2f296d79848ac15326f4d32e1e08831db651aa64c
SHA5120550e12024173c5a369ca28f20042756d2a5a83025e8fe22e89d5f5712232741ba5c090ea53406a20372b6666a98aa23eb896e3cfb61797401b7591b9c587a5f