Analysis
-
max time kernel
153s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 04:22
Static task
static1
Behavioral task
behavioral1
Sample
9ab39cb3460b7680fcceb6481c12674dd3950466224f3163b74c38acad37fced.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9ab39cb3460b7680fcceb6481c12674dd3950466224f3163b74c38acad37fced.exe
Resource
win10v2004-20220414-en
General
-
Target
9ab39cb3460b7680fcceb6481c12674dd3950466224f3163b74c38acad37fced.exe
-
Size
300KB
-
MD5
1f8ef85018585c48b2abe7876f0d6e7e
-
SHA1
ddcc9c01e06187bed5c6c8b0ab7ca127428cf02c
-
SHA256
9ab39cb3460b7680fcceb6481c12674dd3950466224f3163b74c38acad37fced
-
SHA512
d3a118b0fe2266b943f84aa6809565abbf12a1b2c326760f97233ed9ca9af1bf7a494c7a5d4c1495237c75d859123a1bb1b4b419dc3f9e6a43525849e5ad43ef
Malware Config
Signatures
-
HiveRAT Payload 1 IoCs
resource yara_rule behavioral1/memory/1956-54-0x00000000002A0000-0x00000000002F2000-memory.dmp family_hiverat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Avast Essentials = "C:\\Users\\Admin\\AppData\\Roaming\\Avast.exe" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1956 9ab39cb3460b7680fcceb6481c12674dd3950466224f3163b74c38acad37fced.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1956 9ab39cb3460b7680fcceb6481c12674dd3950466224f3163b74c38acad37fced.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1176 1956 9ab39cb3460b7680fcceb6481c12674dd3950466224f3163b74c38acad37fced.exe 28 PID 1956 wrote to memory of 1176 1956 9ab39cb3460b7680fcceb6481c12674dd3950466224f3163b74c38acad37fced.exe 28 PID 1956 wrote to memory of 1176 1956 9ab39cb3460b7680fcceb6481c12674dd3950466224f3163b74c38acad37fced.exe 28 PID 1956 wrote to memory of 1176 1956 9ab39cb3460b7680fcceb6481c12674dd3950466224f3163b74c38acad37fced.exe 28 PID 1832 wrote to memory of 332 1832 explorer.exe 30 PID 1832 wrote to memory of 332 1832 explorer.exe 30 PID 1832 wrote to memory of 332 1832 explorer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ab39cb3460b7680fcceb6481c12674dd3950466224f3163b74c38acad37fced.exe"C:\Users\Admin\AppData\Local\Temp\9ab39cb3460b7680fcceb6481c12674dd3950466224f3163b74c38acad37fced.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Execution.vbs2⤵PID:1176
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Execution.vbs"2⤵
- Adds Run key to start application
PID:332
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
559B
MD552b7140d35a38f6ae6e910a3c041cae2
SHA1a398398aa69e4ba435ed318dc40f8a5397ccae03
SHA256cc649cd28307555d7454e37e7ba4fa3d48041fd2650469a10f7f6cb415ed44cb
SHA5129a25cd0c01557a7e7eb498b74c5cf327a52a9efa86ba98afe09cb37b410722c1b9dab1f999074c46bc70e066ed0442c38181cf48893bdd1ead1a007edd09a89a