Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 07:37
Static task
static1
Behavioral task
behavioral1
Sample
a57c8822899013c8d0bbd87b4c36821a.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
a57c8822899013c8d0bbd87b4c36821a.exe
-
Size
341KB
-
MD5
a57c8822899013c8d0bbd87b4c36821a
-
SHA1
54da561ef6e0d2c368aca185ee828d67543fbf9e
-
SHA256
ddb95e81345469771c505272274d21eb2e317ed8c46e0b679362df7cbf52ba6c
-
SHA512
e070796a826d125787f875a587ada069799507f6fe842f05c5963d9080ee255b5a2d7097f996cfb19f9b08120beb6b47f722e17d3818ee09accdc5ae3354d247
Malware Config
Signatures
-
HiveRAT Payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/4824-138-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4824-140-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4824-142-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4824-143-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4824-144-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4824-145-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4824-149-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4824-152-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4824-153-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat behavioral2/memory/4824-154-0x0000000000400000-0x0000000000454000-memory.dmp family_hiverat -
Drops startup file 2 IoCs
Processes:
a57c8822899013c8d0bbd87b4c36821a.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a57c8822899013c8d0bbd87b4c36821a.exe a57c8822899013c8d0bbd87b4c36821a.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a57c8822899013c8d0bbd87b4c36821a.exe a57c8822899013c8d0bbd87b4c36821a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a57c8822899013c8d0bbd87b4c36821a.exedescription pid process target process PID 4912 set thread context of 4824 4912 a57c8822899013c8d0bbd87b4c36821a.exe a57c8822899013c8d0bbd87b4c36821a.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
a57c8822899013c8d0bbd87b4c36821a.exepid process 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe 4912 a57c8822899013c8d0bbd87b4c36821a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a57c8822899013c8d0bbd87b4c36821a.exea57c8822899013c8d0bbd87b4c36821a.exedescription pid process Token: SeDebugPrivilege 4912 a57c8822899013c8d0bbd87b4c36821a.exe Token: SeDebugPrivilege 4824 a57c8822899013c8d0bbd87b4c36821a.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a57c8822899013c8d0bbd87b4c36821a.exedescription pid process target process PID 4912 wrote to memory of 4824 4912 a57c8822899013c8d0bbd87b4c36821a.exe a57c8822899013c8d0bbd87b4c36821a.exe PID 4912 wrote to memory of 4824 4912 a57c8822899013c8d0bbd87b4c36821a.exe a57c8822899013c8d0bbd87b4c36821a.exe PID 4912 wrote to memory of 4824 4912 a57c8822899013c8d0bbd87b4c36821a.exe a57c8822899013c8d0bbd87b4c36821a.exe PID 4912 wrote to memory of 4824 4912 a57c8822899013c8d0bbd87b4c36821a.exe a57c8822899013c8d0bbd87b4c36821a.exe PID 4912 wrote to memory of 4824 4912 a57c8822899013c8d0bbd87b4c36821a.exe a57c8822899013c8d0bbd87b4c36821a.exe PID 4912 wrote to memory of 4824 4912 a57c8822899013c8d0bbd87b4c36821a.exe a57c8822899013c8d0bbd87b4c36821a.exe PID 4912 wrote to memory of 4824 4912 a57c8822899013c8d0bbd87b4c36821a.exe a57c8822899013c8d0bbd87b4c36821a.exe PID 4912 wrote to memory of 4824 4912 a57c8822899013c8d0bbd87b4c36821a.exe a57c8822899013c8d0bbd87b4c36821a.exe PID 4912 wrote to memory of 4824 4912 a57c8822899013c8d0bbd87b4c36821a.exe a57c8822899013c8d0bbd87b4c36821a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe"C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe"C:\Users\Admin\AppData\Local\Temp\a57c8822899013c8d0bbd87b4c36821a.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4824
-