Analysis
-
max time kernel
0s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03-03-2024 10:02
Behavioral task
behavioral1
Sample
211xahcou.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Hive.elf
Resource
win7-20240220-en
Behavioral task
behavioral3
Sample
hive.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
hive_linux_elf
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
linux_hive.elf
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
sjl8j6ap3.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win7-20240221-en
General
-
Target
Hive.elf
-
Size
246KB
-
MD5
22ae3e19ec54a9d314719158c00986e3
-
SHA1
84353fe08dd87eb2f1086dfd08c014311e7e4889
-
SHA256
822d89e7917d41a90f5f65bee75cad31fe13995e43f47ea9ea536862884efc25
-
SHA512
a72a3e8fb908c2ed946b9266cc742b1584709205f1911e381823ef7caac10d55ccec2f35c3e7ca4a3eda7e04e1b57ec2039054c087fdc39241554cd82b62570e
-
SSDEEP
3072:3Zp7gZzdfvjRCMj1Yk36ioyJ1zgjIlOhXYopNL+V7o0xvvkB/37Nt7xhew8A2Mzc:P7gDj8S1Hlx14+opNClvk977ew8A2M
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2060 wrote to memory of 2584 2060 cmd.exe rundll32.exe PID 2060 wrote to memory of 2584 2060 cmd.exe rundll32.exe PID 2060 wrote to memory of 2584 2060 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Hive.elf1⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Hive.elf2⤵
- Modifies registry class
PID:2584
-