Analysis

  • max time kernel
    153s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 01:34

General

  • Target

    IMG_INTE.exe

  • Size

    713KB

  • MD5

    af83e45292be69defcde71a4ff87ed5e

  • SHA1

    d6fd4bd24923e2ba57d86117fd27d7248e84d3e1

  • SHA256

    bf0d1bf23351a82eddca116c85801b4d1bbe328933e729c735226f9563432544

  • SHA512

    08304dbe701ba59acf10f90ad5f3bfa9e0123c7caf9596659de139302c185d3fa2238b26bac6bd7fa64f92de8d57bf07766b2ba599b2137a88e4e42c5a4f6c03

Malware Config

Signatures

  • HiveRAT

    HiveRAT is an improved version of FirebirdRAT with various capabilities.

  • HiveRAT Payload 10 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IMG_INTE.exe
    "C:\Users\Admin\AppData\Local\Temp\IMG_INTE.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4632
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Execution.vbs
        3⤵
          PID:3204
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Execution.vbs"
        2⤵
        • Adds Run key to start application
        PID:2100
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p
      1⤵
      • Drops file in System32 directory
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:4940

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Execution.vbs

      Filesize

      509B

      MD5

      73c013c71f6b5f05f01a26e44b9d3e31

      SHA1

      511765ccfbdbc8b669823d6b20968a1f5bb5efbb

      SHA256

      0446ec30e03d2647e5d65b9c227bf5d5d4b6687e7837f86566d77a8d81470d61

      SHA512

      dffc14db911cc1182089e17b102cb18e9826661af89fd9086285b75d0e7fc568cd5503b2b0d5857c590e931e7076ac34552273e266aa98345aa5007f22170f86

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe

      Filesize

      42KB

      MD5

      9827ff3cdf4b83f9c86354606736ca9c

      SHA1

      e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723

      SHA256

      c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a

      SHA512

      8261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe

      Filesize

      42KB

      MD5

      9827ff3cdf4b83f9c86354606736ca9c

      SHA1

      e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723

      SHA256

      c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a

      SHA512

      8261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579

    • memory/2100-163-0x0000000000000000-mapping.dmp

    • memory/3204-161-0x0000000000000000-mapping.dmp

    • memory/4076-130-0x0000000000370000-0x0000000000426000-memory.dmp

      Filesize

      728KB

    • memory/4076-131-0x0000000005B80000-0x0000000006124000-memory.dmp

      Filesize

      5.6MB

    • memory/4076-132-0x00000000056D0000-0x0000000005762000-memory.dmp

      Filesize

      584KB

    • memory/4632-142-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4632-152-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4632-140-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4632-143-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4632-147-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4632-150-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4632-151-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4632-141-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4632-158-0x0000000005650000-0x00000000056B6000-memory.dmp

      Filesize

      408KB

    • memory/4632-159-0x0000000005860000-0x00000000058FC000-memory.dmp

      Filesize

      624KB

    • memory/4632-160-0x00000000064C0000-0x00000000064CA000-memory.dmp

      Filesize

      40KB

    • memory/4632-137-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4632-134-0x0000000000400000-0x0000000000454000-memory.dmp

      Filesize

      336KB

    • memory/4632-133-0x0000000000000000-mapping.dmp