Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 03:08
Static task
static1
Behavioral task
behavioral1
Sample
GAMESPOR.exe
Resource
win7-20220414-en
General
-
Target
GAMESPOR.exe
-
Size
719KB
-
MD5
5d6b01b87783fd49b95ee6570c69ad19
-
SHA1
de96bc61f52d5d7f790d84ab6ad54ae178211c2d
-
SHA256
a25220d36761cb66dd0802e6bc007a963f4d6caea2f1cba85b078171766d6311
-
SHA512
afb9a8b288f5e4775949968d531358bf507e0a94a74aa29262cee2b6cee25af13453131b1236e96d55a2387d44aefb8bf1686344d4ae336bea55aa906a62c720
Malware Config
Signatures
-
HiveRAT Payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/4796-138-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4796-140-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4796-142-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4796-143-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4796-144-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4796-145-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4796-149-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4796-152-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4796-153-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4796-154-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
GAMESPOR.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation GAMESPOR.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
GAMESPOR.exedescription pid process target process PID 2164 set thread context of 4796 2164 GAMESPOR.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegSvcs.exepid process 4796 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 4796 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
GAMESPOR.exedescription pid process target process PID 2164 wrote to memory of 3540 2164 GAMESPOR.exe schtasks.exe PID 2164 wrote to memory of 3540 2164 GAMESPOR.exe schtasks.exe PID 2164 wrote to memory of 3540 2164 GAMESPOR.exe schtasks.exe PID 2164 wrote to memory of 4796 2164 GAMESPOR.exe RegSvcs.exe PID 2164 wrote to memory of 4796 2164 GAMESPOR.exe RegSvcs.exe PID 2164 wrote to memory of 4796 2164 GAMESPOR.exe RegSvcs.exe PID 2164 wrote to memory of 4796 2164 GAMESPOR.exe RegSvcs.exe PID 2164 wrote to memory of 4796 2164 GAMESPOR.exe RegSvcs.exe PID 2164 wrote to memory of 4796 2164 GAMESPOR.exe RegSvcs.exe PID 2164 wrote to memory of 4796 2164 GAMESPOR.exe RegSvcs.exe PID 2164 wrote to memory of 4796 2164 GAMESPOR.exe RegSvcs.exe PID 2164 wrote to memory of 4796 2164 GAMESPOR.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\GAMESPOR.exe"C:\Users\Admin\AppData\Local\Temp\GAMESPOR.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nEtYUAOy" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE445.tmp"2⤵
- Creates scheduled task(s)
PID:3540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b6be71d588bd575d3ec86c2f45729737
SHA120c7335c503eeeea219b672af760e57efa8cee77
SHA256ef267da04f3c82838937120f127b4555aac1c118d73f851c24fbbf86b5a4d94f
SHA5124f5a1722abf89ad1442490731eaaa63a35988f2c96054e819a86593a6352991065e3e97dd6708d08443ee1f9aeef2e66516040c222eb05003c18ad5af0134efe