Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 19:33
Static task
static1
Behavioral task
behavioral1
Sample
bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe
Resource
win10v2004-20220414-en
General
-
Target
bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe
-
Size
444KB
-
MD5
3345d81272159ef8f2e837c836da04e3
-
SHA1
c073b1f55f53472efa4b3e0afc2399d0ec73eead
-
SHA256
bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7
-
SHA512
2de3e07219c4f4f7fd2f0787ca626a9a33f56e01e936f7a44275984c3021e73634d5cf30e250c7a632059bbfecdc8049316b959898a372ae3c598e5252fdcef4
Malware Config
Signatures
-
HiveRAT Payload 1 IoCs
resource yara_rule behavioral2/memory/1168-133-0x0000000000740000-0x00000000007BA000-memory.dmp family_hiverat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\antvirus = "C:\\Users\\Admin\\AppData\\Roaming\\windefender.exe" WScript.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\antvirus = "C:\\Users\\Admin\\AppData\\Roaming \\ windefender.exe" WScript.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1168 bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1168 bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4360 1168 bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe 79 PID 1168 wrote to memory of 4360 1168 bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe 79 PID 1168 wrote to memory of 4360 1168 bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe 79 PID 1168 wrote to memory of 768 1168 bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe 80 PID 1168 wrote to memory of 768 1168 bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe 80 PID 1168 wrote to memory of 768 1168 bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe 80 PID 1168 wrote to memory of 4852 1168 bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe 81 PID 1168 wrote to memory of 4852 1168 bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe 81 PID 1168 wrote to memory of 4852 1168 bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe 81 PID 2520 wrote to memory of 8 2520 explorer.exe 86 PID 2520 wrote to memory of 8 2520 explorer.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe"C:\Users\Admin\AppData\Local\Temp\bb46e6aad59864e3e4826189809c7fdb8a449f69817723ff2039147e3ec020d7.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Execution5.vbs"2⤵PID:4360
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Execution2.vbs"2⤵
- Adds Run key to start application
PID:768
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\Users\Admin\AppData\Local\Execution.vbs2⤵PID:4852
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Execution.vbs"2⤵
- Adds Run key to start application
PID:8
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
569B
MD5743df8248e54fd91856951188e3094f2
SHA1eeb2d9900d684128a8f38cb5256ec30879a8058d
SHA2567e6a03abee4ed68604a0b5f0c5c2efe86c3c8106068a5b4bdc0ab9457658538f
SHA5128900228c38fde6567998aa954b38e00e531f5ccd33f1471060bc4426aa8258dff9aaf89105a1aa461a26a73c8d22950050be214fe5718fa84c25c631e5700196
-
Filesize
813B
MD59089c318822d5236ea57a1ab1cd2423c
SHA1fd2f802809486520005e24550bfd0a0d185b9aa6
SHA256639a20cc23d9dd274487728eeda789b5ee0d49e07c94cc064cf1d76463a2cbb6
SHA512e18a2d0660d3973c8e9e308853b1fceeea4e487f6e2d8c250d9c70251de411e1e4fbb6bd13c8d1d4c6a1264cc39f7ed8dda80c35f950c1f7b8a6b8ad05ab02b3
-
Filesize
563B
MD51b57fa3c2ec8c0ce0e028d2d01d87b89
SHA1774e510ef3d0e2dece8b89a4bb6b004cc0b03801
SHA256d773b3ee5ea9a54e07a2e8fc0da33106f6db47adaf1845d95ef6ca663ef2048b
SHA512bec393fb41c435f60da417356472468678aa1a46d0fe251fb1cf7a9687bc0fa0453847b20d7814fa3a434ef85b0a191a04032b0481469771794cd51becb4a14c