Analysis Overview
SHA256
6824e12dda2bf9212cb51e30c03d7ea1ac49c6e39bac81f7782811bd9c831c86
Threat Level: Known bad
The file 0a30c895bad0069f233ff2fe4c57e3dffaf233e892fb25fdb21cf312d9c8f8b4.zip was found to be: Known bad.
Malicious Activity Summary
Detects Rust x86 variant of Hive Ransomware
Hive family
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-05-15 07:38
Signatures
Detects Rust x86 variant of Hive Ransomware
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Hive family
Analysis: behavioral2
Detonation Overview
Submitted
2022-05-15 07:38
Reported
2022-05-15 07:41
Platform
win10v2004-20220414-en
Max time kernel
90s
Max time network
153s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\0a30c895bad0069f233ff2fe4c57e3dffaf233e892fb25fdb21cf312d9c8f8b4.exe
"C:\Users\Admin\AppData\Local\Temp\0a30c895bad0069f233ff2fe4c57e3dffaf233e892fb25fdb21cf312d9c8f8b4.exe"
Network
| Country | Destination | Domain | Proto |
| US | 20.42.73.26:443 | tcp | |
| IE | 20.54.110.249:443 | tcp | |
| NL | 87.248.202.1:80 | tcp | |
| NL | 87.248.202.1:80 | tcp | |
| US | 8.8.8.8:53 | storesdk.dsx.mp.microsoft.com | udp |
| FR | 2.18.109.224:443 | storesdk.dsx.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | store-images.s-microsoft.com | udp |
| NL | 104.123.41.133:80 | store-images.s-microsoft.com | tcp |
| NL | 104.123.41.133:80 | store-images.s-microsoft.com | tcp |
| NL | 104.123.41.133:80 | store-images.s-microsoft.com | tcp |
| NL | 104.123.41.133:80 | store-images.s-microsoft.com | tcp |
| NL | 104.123.41.133:80 | store-images.s-microsoft.com | tcp |
| US | 8.8.8.8:53 | tsfe.trafficshaping.dsp.mp.microsoft.com | udp |
| NL | 104.123.41.133:80 | store-images.s-microsoft.com | tcp |
| IE | 20.54.110.119:443 | tsfe.trafficshaping.dsp.mp.microsoft.com | tcp |
| IE | 20.54.110.119:443 | tsfe.trafficshaping.dsp.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | dl.delivery.mp.microsoft.com | udp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | tlu.dl.delivery.mp.microsoft.com | udp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | 11.tlu.dl.delivery.mp.microsoft.com | udp |
| US | 93.184.221.240:80 | 11.tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 8.8.8.8:53 | 2.tlu.dl.delivery.mp.microsoft.com | udp |
| FR | 2.22.147.96:80 | 2.tlu.dl.delivery.mp.microsoft.com | tcp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 93.184.221.240:80 | 11.tlu.dl.delivery.mp.microsoft.com | tcp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 93.184.221.240:80 | 11.tlu.dl.delivery.mp.microsoft.com | tcp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| FR | 2.22.147.96:80 | 2.tlu.dl.delivery.mp.microsoft.com | tcp |
| FR | 2.22.147.96:80 | 2.tlu.dl.delivery.mp.microsoft.com | tcp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| NL | 178.79.208.1:80 | dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
| US | 209.197.3.8:80 | tlu.dl.delivery.mp.microsoft.com | tcp |
Files
Analysis: behavioral1
Detonation Overview
Submitted
2022-05-15 07:38
Reported
2022-05-15 07:41
Platform
win7-20220414-en
Max time kernel
38s
Max time network
42s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\0a30c895bad0069f233ff2fe4c57e3dffaf233e892fb25fdb21cf312d9c8f8b4.exe
"C:\Users\Admin\AppData\Local\Temp\0a30c895bad0069f233ff2fe4c57e3dffaf233e892fb25fdb21cf312d9c8f8b4.exe"