Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2022 14:36
Behavioral task
behavioral1
Sample
hive.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
hive.exe
Resource
win10v2004-20220901-en
General
-
Target
hive.exe
-
Size
764KB
-
MD5
2f9fc82898d718f2abe99c4a6fa79e69
-
SHA1
9d336b8911c8ffd7cc809e31d5b53796bb0cc7bb
-
SHA256
88f7544a29a2ceb175a135d9fa221cbfd3e8c71f32dd6b09399717f85ea9afd1
-
SHA512
19f0879b1c54d305ab7a97a0d46ab79c103d4687fe37d5f9ef1934904eea48a1c66b1ac2de3dace6dc0d91623309287044c198cb0b3fc9f8453fbc9d1c0cae8b
-
SSDEEP
12288:CinNFNkY/yU97ppM4NSBG81Np2C9H4S3iDjlLtc4wCIITIQaOI6NrwacVYV+4MsT:CinN3n/y67jM4v4kCSPDjlLtbwt8IQLH
Malware Config
Extracted
C:\HOW_TO_DECRYPT.txt
hive
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
Signatures
-
Detects Go variant of Hive Ransomware 2 IoCs
resource yara_rule behavioral2/memory/2236-132-0x0000000000540000-0x00000000007A3000-memory.dmp hive_go behavioral2/memory/2236-133-0x0000000000540000-0x00000000007A3000-memory.dmp hive_go -
Hive
A ransomware written in Golang first seen in June 2021.
-
Drops file in Drivers directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\HOW_TO_DECRYPT.txt hive.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\UnprotectConvertFrom.tiff hive.exe -
resource yara_rule behavioral2/memory/2236-132-0x0000000000540000-0x00000000007A3000-memory.dmp upx behavioral2/memory/2236-133-0x0000000000540000-0x00000000007A3000-memory.dmp upx -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW_TO_DECRYPT.txt hive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.3jD7JMBxjbc7AsOUtpq49_LxBt81pz5ZgwZ6H1sy3x4.hive hive.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\Contacts\desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini hive.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini hive.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini hive.exe File opened for modification C:\Users\Public\Downloads\desktop.ini hive.exe File opened for modification C:\Users\Public\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini hive.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini hive.exe File opened for modification C:\Users\Admin\Searches\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Public\Desktop\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini hive.exe File opened for modification C:\Users\Public\Music\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini hive.exe File opened for modification C:\Users\Admin\Documents\desktop.ini hive.exe File opened for modification C:\Users\Admin\Links\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini hive.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Public\Videos\desktop.ini hive.exe File opened for modification C:\Program Files\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini hive.exe File opened for modification C:\Users\Admin\Videos\desktop.ini hive.exe File opened for modification C:\Users\Public\Libraries\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini hive.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Public\Pictures\desktop.ini hive.exe File opened for modification C:\Program Files (x86)\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\InstallShield\setupdir\0816\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.Utility\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_ucm.inf_amd64_c30468a947db0fa8\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\microsoft_bluetooth_a2dp_snk.inf_amd64_213eeba98cc6f2f4\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\pnpxinternetgatewaydevices.inf_amd64_82b90e51473d48ea\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.ODataUtils\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\000b\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\downlevel\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\iscsi.inf_amd64_c089962740ea1f84\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmosi.inf_amd64_fce30a36dbc4596c\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netxex64.inf_amd64_ede00b448bfe8099\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\InstallShield\setupdir\001e\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\F12\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_unknown.inf_amd64_9f92c189b415c003\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netwtw08.inf_amd64_7c0c516fb22456cd\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\wmiacpi.inf_amd64_4ab67656039b026b\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\InstallShield\setupdir\000e\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_RoleResource\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmgl007.inf_amd64_41e31b5786c6884d\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmtdkj5.inf_amd64_6f327fe9ac4fdb28\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnms013.inf_amd64_2b1aa5c0f193f278\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_WaitForAll\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\AdvancedInstallers\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\networklist\icons\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_netservice.inf_amd64_9ab9cf10857f7349\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\flpydisk.inf_amd64_acb1691126c93472\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\hidbth.inf_amd64_76fb27776958e530\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Speech\Common\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_fsantivirus.inf_amd64_632d2ac0d68cf3ed\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdm3com.inf_amd64_7a75739c411a71d6\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\spp\tokens\skus\csvlk-pack\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netnvma.inf_amd64_7080f6b8ea1744fb\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\percsas3i.inf_amd64_c17a63dada1eaa02\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\vstxraid.inf_amd64_300cb04282659e6d\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\TroubleshootingPack\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\bg-BG\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\networklist\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\gameport.inf_amd64_edfd5301fe3972d5\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netl1c63x64.inf_amd64_4d6630ce07a4fb42\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netrass.inf_amd64_7f701cb29b5389d3\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.Archive\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Wdac\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\spp\tokens\legacy\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netr7364.inf_amd64_310ee0bc0af86ba3\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\IME\IMEKR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Licenses\neutral\_Default\Professional\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\uk-UA\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_apo.inf_amd64_a261b6effa32e5a2\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\net7500-x64-n650f.inf_amd64_cc87c915f33d1c27\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\nb-NO\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\restore\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\es-MX\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\ndiscap.inf_amd64_a009d240f9b4a192\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\pci.inf_amd64_66614bed5c0a20d8\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnms007.inf_amd64_8bbf44975c626ac5\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WCN\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\InstallShield\setupdir\0011\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.Utility\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\Configuration\JobLogs\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\iai2c.inf_amd64_a77c815b2999404d\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netax88772.inf_amd64_5d1c92f42d958529\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\spaceport.inf_amd64_6383331cfa0a32be\HOW_TO_DECRYPT.txt hive.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\nl-nl\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1251.TXT hive.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\tipresx.dll.mui hive.exe File created C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\xaml\onenote\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\msoshext.dll hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.HostIntegration.Connectors.dll.3jD7JMBxjbc7AsOUtpq4961cddW6WQxG31CrRfOSP2A.hive hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\pt-br\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\pt-br\ui-strings.js hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe.3jD7JMBxjbc7AsOUtpq4967IfoKZ_DkBESmJOJh8Oko.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsBadgeLogo.scale-100.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\pt-br\ui-strings.js hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\ind_prog.gif.3jD7JMBxjbc7AsOUtpq49zHBm7pe91RBNnzjvr7R1lw.hive hive.exe File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\as80.xsl hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\resources.pri hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-il\ui-strings.js hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsStoreLogo.scale-200.png hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\MS.PNG.3jD7JMBxjbc7AsOUtpq49w41QGl33NlXQeHnSu6CLSI.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_OEM_Perp-ul-oob.xrm-ms.3jD7JMBxjbc7AsOUtpq49wJdVu0qL5RAREM5ltkUZBg.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-36_contrast-black.png hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\STUDIO\PREVIEW.GIF.3jD7JMBxjbc7AsOUtpq49-QIO-WXjEIQ9DwX04wUEnc.hive hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\vi\LC_MESSAGES\vlc.mo.3jD7JMBxjbc7AsOUtpq494uSQM9dZcFhCx1enQ0EbVU.hive hive.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ro\msipc.dll.mui hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\vlc.mo hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\libclone_plugin.dll hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hr-HR\View3d\3DViewerProductDescription-universal.xml hive.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\vi.pak.3jD7JMBxjbc7AsOUtpq49zO9XI5fHAVVQxSQFkwffBA.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageAppList.targetsize-40_altform-unplated_contrast-black.png hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\nb-no\HOW_TO_DECRYPT.txt hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\en-gb\HOW_TO_DECRYPT.txt hive.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.update\HOW_TO_DECRYPT.txt hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\tinytile.targetsize-48_altform-unplated_contrast-black.png hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\cue.luac.3jD7JMBxjbc7AsOUtpq49wjas9SvL54Ij6ueQOoWai4.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Retail-ul-oob.xrm-ms hive.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\contrast-standard\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\XLINTL32.DLL.3jD7JMBxjbc7AsOUtpq498dz-jWFdXMqJc5nEavIIXc.hive hive.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\GamesXboxHubWideTile.scale-125_contrast-white.png hive.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailAppList.targetsize-80.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\css\tool-selector.css hive.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.frameworkadmin.nl_zh_4.4.0.v20140623020002.jar.3jD7JMBxjbc7AsOUtpq491fhdbjmR0kMjDQ4h3kSbw8.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PPINTL.DLL hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_OEM_Perp-pl.xrm-ms.3jD7JMBxjbc7AsOUtpq497VGLADKlCNNus_03Ao7sgc.hive hive.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_~_8wekyb3d8bbwe\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\HomeBanner.svg hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\FileExtension.targetsize-336.png hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\sqlpdw.xsl.3jD7JMBxjbc7AsOUtpq492IXssQJu99dD4LGpt9Yqn4.hive hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\it-it\ui-strings.js.3jD7JMBxjbc7AsOUtpq492PLse9uHFdevKohbkaPW0g.hive hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sk-sk\ui-strings.js.3jD7JMBxjbc7AsOUtpq496N7smWxPHZpkZR8pVY4cEM.hive hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ccme_ecc.dll.3jD7JMBxjbc7AsOUtpq498L-1eN4pTsdnyeWg8r8xFU.hive hive.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-host-remote.jar.3jD7JMBxjbc7AsOUtpq49-FyPOo2nJVxHSR5z8Av_SY.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\images\default\linkedin_logo.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\text.cur hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\nl-nl\ui-strings.js hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\S_IlluNoSearchResults_180x160.svg.3jD7JMBxjbc7AsOUtpq49yEnoCzLXwl_CZkHVlZtSCk.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\POWERMAPCLASSIFICATION.DLL.3jD7JMBxjbc7AsOUtpq49--sIO3ggugX2HpjTp1pL2A.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNotebookWideTile.scale-150.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteSectionWideTile.scale-200.png hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusVL_MAK-pl.xrm-ms.3jD7JMBxjbc7AsOUtpq49wVilyUUgtU9z7Qd5untNHk.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\Office.UI.Xaml.Osf.dll hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\SmallTile.scale-200.png hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\IACOM2.DLL.3jD7JMBxjbc7AsOUtpq49xvEGhAsJJhHYx9P-NxSEl0.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Dial\RotateHorizontallyOverlay.png hive.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost.Resources\v4.0_3.0.0.0_en_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ComponentModel.DataAnnotations\v4.0_4.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices.AccountManagement\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security.Cryptography.X509Certificates\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Speech_OneCore\Engines\SR\en-US-N\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\MSDTC Bridge 4.0.0.0\0000\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.ApplicationId.Framework.Resources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Policy.1.0.Microsoft.PowerShell.Commands.Utility\v4.0_1.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Diagnostics.TextWriterTraceListener\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.IsolatedStorage\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml.ReaderWriter\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Panther\setup.exe\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.Windows.OOBENetworkCaptivePortal_cw5n1h2txyewy\speech\1009\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.Appx.PackageManager.Commands.Resources\v4.0_10.0.0.0_en_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.Commands.UpdateDiagReport.Resources\v4.0_1.0.0.0_en_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemResources\Windows.Management.AutopilotResources\pris\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\InputApp\Assets\Fonts\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Mobile\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Office.Tools.Common\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Net.Http.Rtc\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\PrintDialog\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\WindowsApps\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemResources\Windows.SystemToast.Calling\Images\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NETFramework\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Reflection.Context\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Controls.Ribbon\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\WindowsFormsIntegration\v4.0_4.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\ServiceModelEndpoint 3.0.0.0\0000\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Media\Sonata\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Workflow.ServiceCore.Resources\v4.0_3.0.0.0_en_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\common\Formatter\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\ScreenClipping\ScreenClipping\Assets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\Windows\IndexStore\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\ComSvcConfig\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\WinX\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy\Assets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.Win32WebViewHost_cw5n1h2txyewy\pris\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v3.5\1033\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\LocalService\Videos\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Net.Sockets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Resources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Resources.Reader\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\js\common\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\lv-LV\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic.Compatibility\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Policy.1.0.System.Management.Automation\v4.0_1.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.DataSetExtensions\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Device\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Serialization.Primitives\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml.XDocument\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SKB\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\NativeImages\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.KeyDistributionService.Cmdlets.Resources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\common\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\common\ModelView\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveSspr\js\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemResources\Windows.UI.SettingsAdminFlowUIThreshold\SystemSettingsThresholdAdminFlowUI\Assets\Fonts\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Logs\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Policy.1.0.Microsoft.PowerShell.Security\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Collections.Concurrent\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.Windows.OOBENetworkConnectionFlow_cw5n1h2txyewy\speech\0804\HOW_TO_DECRYPT.txt hive.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2768 2440 WerFault.exe 43 4660 1464 WerFault.exe 206 -
Delays execution with timeout.exe 64 IoCs
pid Process 2832 timeout.exe 2460 timeout.exe 4104 timeout.exe 4928 timeout.exe 960 timeout.exe 1488 timeout.exe 480 timeout.exe 3680 timeout.exe 1392 timeout.exe 4664 timeout.exe 1968 timeout.exe 3404 timeout.exe 1764 timeout.exe 3948 timeout.exe 3772 timeout.exe 4284 timeout.exe 4496 timeout.exe 4204 timeout.exe 3748 timeout.exe 3008 timeout.exe 620 timeout.exe 3076 timeout.exe 3804 timeout.exe 4036 timeout.exe 2188 timeout.exe 4484 timeout.exe 1684 timeout.exe 3872 timeout.exe 4688 timeout.exe 2700 timeout.exe 1748 timeout.exe 624 timeout.exe 4636 timeout.exe 4696 timeout.exe 3172 timeout.exe 4224 timeout.exe 1588 timeout.exe 2868 timeout.exe 2176 timeout.exe 1084 timeout.exe 4472 timeout.exe 4532 timeout.exe 2608 timeout.exe 3924 timeout.exe 2312 timeout.exe 3176 timeout.exe 3696 timeout.exe 3144 timeout.exe 4292 timeout.exe 1472 timeout.exe 432 timeout.exe 5096 timeout.exe 3268 timeout.exe 4796 timeout.exe 3464 timeout.exe 2532 timeout.exe 4420 timeout.exe 896 timeout.exe 4056 timeout.exe 4776 timeout.exe 4224 timeout.exe 4444 timeout.exe 1628 timeout.exe 4192 timeout.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-929662420-1054238289-2961194603-1000\{E25B17BF-83A1-4B2C-A26C-2960EFC7935B} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2236 hive.exe 2236 hive.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1464 explorer.exe Token: SeCreatePagefilePrivilege 1464 explorer.exe Token: SeShutdownPrivilege 1464 explorer.exe Token: SeCreatePagefilePrivilege 1464 explorer.exe Token: SeShutdownPrivilege 1464 explorer.exe Token: SeCreatePagefilePrivilege 1464 explorer.exe Token: SeShutdownPrivilege 1464 explorer.exe Token: SeCreatePagefilePrivilege 1464 explorer.exe Token: SeShutdownPrivilege 1464 explorer.exe Token: SeCreatePagefilePrivilege 1464 explorer.exe Token: SeShutdownPrivilege 1464 explorer.exe Token: SeCreatePagefilePrivilege 1464 explorer.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1464 explorer.exe 1464 explorer.exe 1464 explorer.exe 1464 explorer.exe 1464 explorer.exe 1464 explorer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1464 explorer.exe 1464 explorer.exe 1464 explorer.exe 1464 explorer.exe 1464 explorer.exe 1464 explorer.exe 1464 explorer.exe 1464 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 4680 2236 hive.exe 88 PID 2236 wrote to memory of 4680 2236 hive.exe 88 PID 2236 wrote to memory of 4680 2236 hive.exe 88 PID 2236 wrote to memory of 3380 2236 hive.exe 89 PID 2236 wrote to memory of 3380 2236 hive.exe 89 PID 2236 wrote to memory of 3380 2236 hive.exe 89 PID 4680 wrote to memory of 3748 4680 cmd.exe 92 PID 4680 wrote to memory of 3748 4680 cmd.exe 92 PID 4680 wrote to memory of 3748 4680 cmd.exe 92 PID 4680 wrote to memory of 4496 4680 cmd.exe 93 PID 4680 wrote to memory of 4496 4680 cmd.exe 93 PID 4680 wrote to memory of 4496 4680 cmd.exe 93 PID 4680 wrote to memory of 1860 4680 cmd.exe 94 PID 4680 wrote to memory of 1860 4680 cmd.exe 94 PID 4680 wrote to memory of 1860 4680 cmd.exe 94 PID 4680 wrote to memory of 1400 4680 cmd.exe 95 PID 4680 wrote to memory of 1400 4680 cmd.exe 95 PID 4680 wrote to memory of 1400 4680 cmd.exe 95 PID 4680 wrote to memory of 1512 4680 cmd.exe 97 PID 4680 wrote to memory of 1512 4680 cmd.exe 97 PID 4680 wrote to memory of 1512 4680 cmd.exe 97 PID 4680 wrote to memory of 2832 4680 cmd.exe 98 PID 4680 wrote to memory of 2832 4680 cmd.exe 98 PID 4680 wrote to memory of 2832 4680 cmd.exe 98 PID 4680 wrote to memory of 2684 4680 cmd.exe 99 PID 4680 wrote to memory of 2684 4680 cmd.exe 99 PID 4680 wrote to memory of 2684 4680 cmd.exe 99 PID 4680 wrote to memory of 2872 4680 cmd.exe 100 PID 4680 wrote to memory of 2872 4680 cmd.exe 100 PID 4680 wrote to memory of 2872 4680 cmd.exe 100 PID 4680 wrote to memory of 2260 4680 cmd.exe 101 PID 4680 wrote to memory of 2260 4680 cmd.exe 101 PID 4680 wrote to memory of 2260 4680 cmd.exe 101 PID 4680 wrote to memory of 2700 4680 cmd.exe 102 PID 4680 wrote to memory of 2700 4680 cmd.exe 102 PID 4680 wrote to memory of 2700 4680 cmd.exe 102 PID 4680 wrote to memory of 3888 4680 cmd.exe 103 PID 4680 wrote to memory of 3888 4680 cmd.exe 103 PID 4680 wrote to memory of 3888 4680 cmd.exe 103 PID 4680 wrote to memory of 5004 4680 cmd.exe 104 PID 4680 wrote to memory of 5004 4680 cmd.exe 104 PID 4680 wrote to memory of 5004 4680 cmd.exe 104 PID 4680 wrote to memory of 4936 4680 cmd.exe 105 PID 4680 wrote to memory of 4936 4680 cmd.exe 105 PID 4680 wrote to memory of 4936 4680 cmd.exe 105 PID 4680 wrote to memory of 3696 4680 cmd.exe 106 PID 4680 wrote to memory of 3696 4680 cmd.exe 106 PID 4680 wrote to memory of 3696 4680 cmd.exe 106 PID 4680 wrote to memory of 740 4680 cmd.exe 107 PID 4680 wrote to memory of 740 4680 cmd.exe 107 PID 4680 wrote to memory of 740 4680 cmd.exe 107 PID 4680 wrote to memory of 4312 4680 cmd.exe 108 PID 4680 wrote to memory of 4312 4680 cmd.exe 108 PID 4680 wrote to memory of 4312 4680 cmd.exe 108 PID 4680 wrote to memory of 1488 4680 cmd.exe 109 PID 4680 wrote to memory of 1488 4680 cmd.exe 109 PID 4680 wrote to memory of 1488 4680 cmd.exe 109 PID 4680 wrote to memory of 1072 4680 cmd.exe 110 PID 4680 wrote to memory of 1072 4680 cmd.exe 110 PID 4680 wrote to memory of 1072 4680 cmd.exe 110 PID 4680 wrote to memory of 548 4680 cmd.exe 111 PID 4680 wrote to memory of 548 4680 cmd.exe 111 PID 4680 wrote to memory of 548 4680 cmd.exe 111 PID 4680 wrote to memory of 4664 4680 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\hive.exe"C:\Users\Admin\AppData\Local\Temp\hive.exe"1⤵
- Drops file in Drivers directory
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c hive.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3748
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4496
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1860
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1400
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1512
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2832
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2684
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2872
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2260
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2700
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3888
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:5004
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4936
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3696
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:740
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4312
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1488
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1072
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:548
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4664
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3912
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4348
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3948
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2312
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3172
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4280
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5096
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:896
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4588
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4192
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2460
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3404
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2868
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2176
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4848
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:5068
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4224
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3176
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4444
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4080
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4292
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3076
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1780
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3464
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1084
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3772
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1588
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1628
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4104
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4472
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2524
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1472
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1748
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1968
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3748
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4496
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4204
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1100
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1168
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2700
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3224
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3696
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1684
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3804
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1436
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3872
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1624
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4056
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4532
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:624
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2532
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:480
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3432
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3760
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3268
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1440
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3008
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3144
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2816
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2672
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3404
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:432
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4036
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3000
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4928
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4108
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4016
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4224
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4020
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3528
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2948
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2332
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:620
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1336
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2608
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2188
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3976
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4420
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4636
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1648
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3680
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3928
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1588
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4852
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4456
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4688
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4696
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2224
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4208
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4484
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1392
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4284
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1624
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4056
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4796
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4384
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3924
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4672
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2244
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3728
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1644
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1388
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4776
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1764
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shadow.bat >NUL 2>NUL2⤵PID:3380
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 404 -p 2440 -ip 24401⤵PID:4808
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2440 -s 58321⤵
- Program crash
PID:2768
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1464 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1464 -s 23162⤵
- Program crash
PID:4660
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 532 -p 1464 -ip 14641⤵PID:1576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.3jD7JMBxjbc7AsOUtpq499xZd7hh-P8cFVncY8vUclY.hive
Filesize622KB
MD554ac69fa48c4818ceccbc2e57e9fed8b
SHA10d628cd634c74320cdb939b01641682ee7db9af2
SHA25649be9453491b3b3551d8cde235010f5f36b29843cb4fcef357d5fa00424f50e2
SHA512f42106446575f702919d6cc42336f18070503f224d8dc1ff9c21e792968a2b9a685e6ae1a23628aceeb759b1a68efb11be6222ebf5a6be2be8f5851874e74857
-
Filesize
162B
MD5fca5799115172398c63263fad7e854b1
SHA12874a1c796f511f94bed6ae020f4b20c38c59cf1
SHA25627323f85f788e124f6024486f7d2a3dee9a1e88f2fc1617625b8612e47657663
SHA512a03fecd20d94def5ea75015613d40656d85094eb5584993cd2d082b17badeef6833ae214dc1e8058bda0afe29d8a4cd9a805a2519b1ea76f2bc1cdb274a1841b
-
Filesize
57B
MD5df5552357692e0cba5e69f8fbf06abb6
SHA14714f1e6bb75a80a8faf69434726d176b70d7bd8
SHA256d158f9d53e7c37eadd3b5cc1b82d095f61484e47eda2c36d9d35f31c0b4d3ff8
SHA512a837555a1175ab515e2b43da9e493ff0ccd4366ee59defe6770327818ca9afa6f3e39ecdf5262b69253aa9e2692283ee8cebc97d58edd42e676977c7f73d143d