Analysis
-
max time kernel
30s -
max time network
21s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
17-09-2024 02:21
Behavioral task
behavioral1
Sample
Hive Ransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Hive Ransomware.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
Hive Ransomware.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Hive Ransomware.exe
Resource
win11-20240802-en
General
-
Target
Hive Ransomware.exe
-
Size
764KB
-
MD5
2f9fc82898d718f2abe99c4a6fa79e69
-
SHA1
9d336b8911c8ffd7cc809e31d5b53796bb0cc7bb
-
SHA256
88f7544a29a2ceb175a135d9fa221cbfd3e8c71f32dd6b09399717f85ea9afd1
-
SHA512
19f0879b1c54d305ab7a97a0d46ab79c103d4687fe37d5f9ef1934904eea48a1c66b1ac2de3dace6dc0d91623309287044c198cb0b3fc9f8453fbc9d1c0cae8b
-
SSDEEP
12288:CinNFNkY/yU97ppM4NSBG81Np2C9H4S3iDjlLtc4wCIITIQaOI6NrwacVYV+4MsT:CinN3n/y67jM4v4kCSPDjlLtbwt8IQLH
Malware Config
Extracted
C:\$Recycle.Bin\HOW_TO_DECRYPT.txt
hive
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
Signatures
-
Detects Go variant of Hive Ransomware 3 IoCs
resource yara_rule behavioral2/memory/1468-1-0x0000000000DB0000-0x0000000001013000-memory.dmp hive_go behavioral2/memory/1468-2-0x0000000000DB0000-0x0000000001013000-memory.dmp hive_go behavioral2/memory/1468-3-0x0000000000DB0000-0x0000000001013000-memory.dmp hive_go -
Hive
A ransomware written in Golang first seen in June 2021.
-
resource yara_rule behavioral2/memory/1468-0-0x0000000000DB0000-0x0000000001013000-memory.dmp upx behavioral2/memory/1468-1-0x0000000000DB0000-0x0000000001013000-memory.dmp upx behavioral2/memory/1468-2-0x0000000000DB0000-0x0000000001013000-memory.dmp upx behavioral2/memory/1468-3-0x0000000000DB0000-0x0000000001013000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hive Ransomware.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4532 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1468 Hive Ransomware.exe 1468 Hive Ransomware.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4960 OpenWith.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1468 wrote to memory of 3864 1468 Hive Ransomware.exe 72 PID 1468 wrote to memory of 3864 1468 Hive Ransomware.exe 72 PID 1468 wrote to memory of 3864 1468 Hive Ransomware.exe 72 PID 1468 wrote to memory of 376 1468 Hive Ransomware.exe 73 PID 1468 wrote to memory of 376 1468 Hive Ransomware.exe 73 PID 1468 wrote to memory of 376 1468 Hive Ransomware.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hive Ransomware.exe"C:\Users\Admin\AppData\Local\Temp\Hive Ransomware.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c hive.bat >NUL 2>NUL2⤵PID:3864
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shadow.bat >NUL 2>NUL2⤵PID:376
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4960
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\UndoConfirm.css1⤵
- Opens file in notepad (likely ransom note)
PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD580207d0f8ea42bdfeaf9f5c586230aca
SHA1747481fe2b0b6d81c3b19ba62d1e49eab6a5461f
SHA25625edefb3b0678dfe0d927ff48ce67254359ba379df9468f634d02c026f0e7131
SHA51273f68ce9e98d2346be1762bd54bb06ef83ae939dfbcf9b786d9b773fa454352613387d264b7a87a1c08950226553817bf01f5aa4107bc12de36a1689e2137304