Resubmissions
23-12-2022 20:19
221223-y39gvahb28 1023-12-2022 19:54
221223-ymz88scc8w 1023-12-2022 19:42
221223-yerbcsha78 10Analysis
-
max time kernel
1621s -
max time network
1657s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-12-2022 20:19
Behavioral task
behavioral1
Sample
211xahcou.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
hive.exe
Resource
win7-20220812-en
Behavioral task
behavioral3
Sample
sjl8j6ap3.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win7-20220812-en
General
-
Target
hive.exe
-
Size
764KB
-
MD5
2f9fc82898d718f2abe99c4a6fa79e69
-
SHA1
9d336b8911c8ffd7cc809e31d5b53796bb0cc7bb
-
SHA256
88f7544a29a2ceb175a135d9fa221cbfd3e8c71f32dd6b09399717f85ea9afd1
-
SHA512
19f0879b1c54d305ab7a97a0d46ab79c103d4687fe37d5f9ef1934904eea48a1c66b1ac2de3dace6dc0d91623309287044c198cb0b3fc9f8453fbc9d1c0cae8b
-
SSDEEP
12288:CinNFNkY/yU97ppM4NSBG81Np2C9H4S3iDjlLtc4wCIITIQaOI6NrwacVYV+4MsT:CinN3n/y67jM4v4kCSPDjlLtbwt8IQLH
Malware Config
Extracted
C:\HOW_TO_DECRYPT.txt
hive
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
Signatures
-
Detects Go variant of Hive Ransomware 3 IoCs
Processes:
resource yara_rule behavioral2/memory/816-54-0x0000000000CE0000-0x0000000000F43000-memory.dmp hive_go behavioral2/memory/816-64-0x0000000000CE0000-0x0000000000F43000-memory.dmp hive_go behavioral2/memory/816-124-0x0000000000CE0000-0x0000000000F43000-memory.dmp hive_go -
Hive
A ransomware written in Golang first seen in June 2021.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops file in Drivers directory 28 IoCs
Processes:
hive.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\drivers\es-ES\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\de-DE\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\it-IT\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\ja-JP\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\ja-JP\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\ja-JP\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\it-IT\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\it-IT\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\es-ES\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\es-ES\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\fr-FR\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\fr-FR\HOW_TO_DECRYPT.txt hive.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
hive.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\UndoLimit.tiff hive.exe -
Processes:
resource yara_rule behavioral2/memory/816-54-0x0000000000CE0000-0x0000000000F43000-memory.dmp upx behavioral2/memory/816-64-0x0000000000CE0000-0x0000000000F43000-memory.dmp upx behavioral2/memory/816-124-0x0000000000CE0000-0x0000000000F43000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 948 cmd.exe -
Drops startup file 3 IoCs
Processes:
hive.exedescription ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.qh8GyO8f-e0GBeFPcVpwf8eGKPum8-p511ZHH0iYOEM.hive hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini hive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW_TO_DECRYPT.txt hive.exe -
Loads dropped DLL 1 IoCs
Processes:
pid Process 1232 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
Processes:
hive.exedescription ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini hive.exe File opened for modification C:\Users\Admin\Music\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Public\Music\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini hive.exe File opened for modification C:\Users\Public\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\NWV1K27G\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\INLM2B61\desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini hive.exe File opened for modification C:\Users\Public\Videos\desktop.ini hive.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QAI10AFD\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini hive.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6THCX874\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini hive.exe File opened for modification C:\Users\Public\Documents\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini hive.exe File opened for modification C:\Users\Public\Libraries\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini hive.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini hive.exe File opened for modification C:\Users\Admin\Searches\desktop.ini hive.exe File opened for modification C:\Users\Admin\Videos\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini hive.exe File opened for modification C:\Program Files\desktop.ini hive.exe File opened for modification C:\Program Files (x86)\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini hive.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\desktop.ini hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini hive.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\8PENRVY0\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini hive.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini hive.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini hive.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini hive.exe File opened for modification C:\Users\Public\Downloads\desktop.ini hive.exe -
Drops file in System32 directory 64 IoCs
Processes:
hive.exedescription ioc Process File created C:\Windows\System32\DriverStore\FileRepository\mdmmoto1.inf_amd64_neutral_bf4b404852955eb4\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\migration\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnep304.inf_amd64_ja-jp_27c560b15d9928c0\Amd64\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\en-US\Licenses\OEM\Enterprise\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\it-IT\Licenses\_Default\ProfessionalE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-DirectoryServices-ADAM-DL\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\oobe\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnlx00z.inf_amd64_neutral_aea50acf04a2db1d\Amd64\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\wiasa002.inf_amd64_neutral_6429a42f1243419a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\es-ES\Licenses\eval\HomePremiumN\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\it-IT\Licenses\_Default\Enterprise\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmcrtix.inf_amd64_neutral_e91a5dc0655e200a\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\Speech\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\de-DE\Licenses\_Default\Professional\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\_Default\Enterprise\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnep00g.inf_amd64_neutral_2926840e245f88f6\Amd64\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnne30a.inf_amd64_ja-jp_b2245ba886355a9f\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\de-DE\Licenses\_Default\HomePremium\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\nb-NO\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\wiabr007.inf_amd64_neutral_442d902f3f3dd5b7\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\wbem\tmf\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\eval\HomeBasicE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\LogFiles\Scm\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\migration\WSMT\rras\replacementmanifests\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\tpm.inf_amd64_neutral_d5bb6575cf91cd73\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Speech\SpeechUX\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\_Default\HomePremiumN\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\it-IT\Licenses\eval\EnterpriseE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\blbdrive.inf_amd64_neutral_1aa816fe7dc98c3f\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnlx00d.inf_amd64_neutral_ce7a0b4e23e432ad\Amd64\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\_Default\HomeBasicN\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnky009.inf_amd64_neutral_8e54c9ff272b72f1\Amd64\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\wdmaudio.inf_amd64_neutral_423894ded0ba8fdf\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\IME\IMESC5\applets\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\Msdtc\Trace\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\slmgr\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\battery.inf_amd64_neutral_cb8fa151a7b7cb80\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\wbem\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmmetri.inf_amd64_neutral_f89b8a357327f615\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-Sxs\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mchgr.inf_amd64_neutral_407146dba80d1566\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\DriverStore\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Tasks\Microsoft\Windows\PLA\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\migwiz\dlmanifests\BITSExtensions-Server\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\ehstorcertdrv.inf_amd64_neutral_2e1cecffae9c899a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\spp\tokens\channels\OCUR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnfx002.inf_amd64_neutral_b6dd354531184f64\Amd64\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\com\dmp\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\bg-BG\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LIXMVQOA\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmgl007.inf_amd64_neutral_935cd017fcb965ee\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnbr006.inf_amd64_neutral_f156853def526447\Amd64\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\slmgr\040C\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\kscaptur.inf_amd64_neutral_6cb3fb6811a3f83d\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\wpdmtphw.inf_amd64_neutral_a7a22bb0bb81abb0\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netirda.inf_amd64_neutral_93a886f96cea2847\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\OEM\Ultimate\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnkm004.inf_amd64_neutral_d2aee42dc9c393ea\Amd64\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnrc005.inf_amd64_neutral_31e08a1c2f933124\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\termkbd.inf_amd64_neutral_e561157e16aa2357\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\InstallShield\setupdir\0019\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-NetworkBridge\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\zh-HK\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\flpydisk.inf_amd64_neutral_f54222cc59267e1e\HOW_TO_DECRYPT.txt hive.exe -
Drops file in Program Files directory 64 IoCs
Processes:
hive.exedescription ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\GIFIMP32.FLT.qh8GyO8f-e0GBeFPcVpwf2ZeK-FuFf1dXnPC5BV1LlE.hive hive.exe File opened for modification C:\Program Files\Java\jre7\bin\javafx-font.dll hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187847.WMF hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EquityLetter.Dotx hive.exe File created C:\Program Files (x86)\Adobe\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\glow.png hive.exe File opened for modification C:\Program Files\Mozilla Firefox\update-settings.ini.qh8GyO8f-e0GBeFPcVpwf4y_AiVJFRwFll2SiFxFCSY.hive hive.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\init.js hive.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\gadget.xml hive.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\VSTAClientPkgUI.dll.qh8GyO8f-e0GBeFPcVpwf13XgbXGb9EqR_qCRNYyzGc.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0318448.WMF hive.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\helpmap.txt hive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXEV.DLL hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199469.WMF hive.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+10.qh8GyO8f-e0GBeFPcVpwfz9ncsx2lcZDMthFE8YgbHs.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_OFF.GIF.qh8GyO8f-e0GBeFPcVpwf9yeTzc7_R9ukk0yv8bCwgQ.hive hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.felix.gogo.runtime_0.10.0.v201209301036.jar.qh8GyO8f-e0GBeFPcVpwfzIhP5h9dF4OtFtLoVhh_3s.hive hive.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX9.x3d.qh8GyO8f-e0GBeFPcVpwf_nZ2qd89d4FnnwQ03qBTWQ.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153398.WMF.qh8GyO8f-e0GBeFPcVpwf9t8O_1C_zZZ31EF5fV3VQM.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_03.MID.qh8GyO8f-e0GBeFPcVpwf6VMx0JNJydwv6_9NB8ENxU.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01905_.WMF.qh8GyO8f-e0GBeFPcVpwfy8w4C8vlXJcm5xFG4j-TEw.hive hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\default.jfc.qh8GyO8f-e0GBeFPcVpwf7T29wt64LxIaZ25vFoPi2I.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\HEADER.GIF hive.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\gadget.xml hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15060_.GIF.qh8GyO8f-e0GBeFPcVpwfz8DqlV9c6YNkaL4UKvFBHc.hive hive.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground_PAL.wmv hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jayapura hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE04050_.WMF.qh8GyO8f-e0GBeFPcVpwfyAPb7IzFswybc9F02rvtkI.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_02.MID.qh8GyO8f-e0GBeFPcVpwfzwILQETzWlS4ByrUwc8wGQ.hive hive.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\hr.pak hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html hive.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\MDIParent.zip hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21422_.GIF.qh8GyO8f-e0GBeFPcVpwf0DDoW6n3OQww2HhgMIoGDg.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ACCSBAR.POC.qh8GyO8f-e0GBeFPcVpwf8kO5KM04LZQ-zRvQPd4aRI.hive hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app.nl_zh_4.4.0.v20140623020002.jar hive.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt55.ths hive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\JOURNAL\PREVIEW.GIF.qh8GyO8f-e0GBeFPcVpwfxJkwFUgGYpEeJT643uXVlc.hive hive.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_top.png hive.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\formautofill@mozilla.org.xpi.qh8GyO8f-e0GBeFPcVpwfylgUg0bTaUyv64eoGlY-BA.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152606.WMF.qh8GyO8f-e0GBeFPcVpwf2vhwoJ2vpNkyNYpF9RFrDo.hive hive.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InputPersonalization.exe.mui hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_MoveDrop32x32.gif hive.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONBttnWD.dll.qh8GyO8f-e0GBeFPcVpwf90A2qaKE44ixOI6U7Myd28.hive hive.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\ja-JP\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Projects.accdt hive.exe File opened for modification C:\Program Files (x86)\Windows Media Player\setup_wm.exe hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107302.WMF hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\ORG97R.SAM hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Earthy.gif hive.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\settings.css hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\AUTHORS.txt.qh8GyO8f-e0GBeFPcVpwf_oiMOvwh78B2T157emrBBg.hive hive.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\Center hive.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX8.x3d hive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\STOCKS.XML hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\JNGLE_01.MID.qh8GyO8f-e0GBeFPcVpwf7zRUyVinb4zmHQDLG15YEs.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EquityResume.Dotx hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01251_.WMF.qh8GyO8f-e0GBeFPcVpwf37euwvAIgBGPr1vR6J-jXQ.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0211981.WMF.qh8GyO8f-e0GBeFPcVpwf6oxgnzfQMFtqVcbup-7LC8.hive hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe hive.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.SF.qh8GyO8f-e0GBeFPcVpwf7k9dfqKKo96bFrbngtH5ic.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15275_.GIF hive.exe -
Drops file in Windows directory 64 IoCs
Processes:
hive.exedescription ioc Process File created C:\Windows\winsxs\x86_microsoft-windows-d..ctshow-dv.resources_31bf3856ad364e35_6.1.7600.16385_en-us_181bfd47120ca6b5\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Diagnostics.Tracing\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-w..ifffilter.resources_31bf3856ad364e35_6.1.7600.16385_de-de_658df068054b382b\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..lekanjifinderapplet_31bf3856ad364e35_6.1.7600.16385_none_e289f7e8aa22b966\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-dskquoui.resources_31bf3856ad364e35_6.1.7600.16385_es-es_35c01d0bf226ff78\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sysdm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_1ed9c3fcc95f0507\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_prnlx006.inf.resources_31bf3856ad364e35_6.1.7600.16385_es-es_bf74a39f319db515\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\msil_microsoft.backgroun..anagement.resources_31bf3856ad364e35_6.1.7600.16385_it-it_11985fe24a3d35aa\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.PowerShel#\ec50af274bf7a15fb59ac1f0d353b7ea\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_prnsh002.inf.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_0f2cb9128443af7d\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-e..epassword.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_2fc95f039968eb20\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\msil_microsoft.powershel..hicalhost.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_76e1c4dbaacbb8a6\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-m..ntmanager.resources_31bf3856ad364e35_6.1.7600.16385_en-us_9902227058f81032\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\msil_ehcir_31bf3856ad364e35_6.1.7601.17514_none_e28a10782a08d2e0\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..oryservices-ntdsapi_31bf3856ad364e35_6.1.7600.16385_none_ceb39c895289e648\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-runas.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_542c3061536b37f6\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\3082\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_keyboard.inf.resources_31bf3856ad364e35_6.1.7600.16385_it-it_17488c5a503a28d4\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-m..-autoplay.resources_31bf3856ad364e35_6.1.7600.16385_es-es_ceede0acc5a8b4c4\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-newdev.resources_31bf3856ad364e35_6.1.7600.16385_es-es_cecbfd173661bff0\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-photoviewer.resources_31bf3856ad364e35_6.1.7600.16385_de-de_76444428a8bffc83\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Microsoft.PowerShel#\9206dc8156588e608d405729c833edc5\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-com-complus-ui_31bf3856ad364e35_6.1.7600.16385_none_0c9cb55c61e99805\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-wincal-adm.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_141d4c7ecab99cac\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_netevbda.inf.resources_31bf3856ad364e35_6.1.7600.16385_en-us_4e431077c8934fdd\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-p..peeradmin.resources_31bf3856ad364e35_6.1.7600.16385_es-es_154ab1b84efb5f29\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nddeapi.resources_31bf3856ad364e35_6.1.7600.16385_es-es_3a54789eb04d7626\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_usbstor.inf.resources_31bf3856ad364e35_6.1.7600.16385_de-de_aa4a814ccfd56ba1\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-msmpeg2vdec_31bf3856ad364e35_7.1.7601.16492_none_e0355b6859cad0e7\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ntlanman.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_c686c1311f544cad\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-w..ure-ws232.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_0c87415f91a2fd6b\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\wow64_microsoft-windows-rasbase.resources_31bf3856ad364e35_6.1.7600.16385_de-de_1b70574614d51987\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-w..mcore-dll.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_06667c6a4875a305\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\PresentationFramework.resources\3.0.0.0_de_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_mdmmotou.inf_31bf3856ad364e35_6.1.7600.16385_none_25536ccb9426fbd8\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-uxtheme.resources_31bf3856ad364e35_6.1.7600.16385_es-es_15c1b26da8206889\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_srpuxnativesnapin.resources_31bf3856ad364e35_6.1.7600.16385_de-de_a7ab41da233a2ef8\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-eventviewer.resources_31bf3856ad364e35_6.1.7600.16385_it-it_0d45c6504da51061\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\wow64_microsoft-windows-wow64.resources_31bf3856ad364e35_6.1.7600.16385_de-de_3b1fca098d4be46b\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.GroupPoli#\4795e3a744b493733f9f2696a5cd8a67\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-help-basics.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_417f6f55559db4ba\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-security-pku2u_31bf3856ad364e35_6.1.7600.16385_none_7e462a69ffcb5639\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Serialization.Formatters.Soap\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.Commands.UpdateDiagReport\6.1.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-help-offline.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_212088cbe2b96bae\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_prngt004.inf.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_dda72e86020ad6ee\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\wow64_security-malware-wi..er-events.resources_31bf3856ad364e35_6.1.7600.16385_it-it_71b28386208303bb\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-b..roxy-main.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_0ce7c1c7ed016c9a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..w-devenum.resources_31bf3856ad364e35_6.1.7600.16385_it-it_843d1a87ba66b3cc\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..ce-server.resources_31bf3856ad364e35_6.1.7600.16385_it-it_11559dde0f2ef1f1\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_prnlx003.inf.resources_31bf3856ad364e35_6.1.7600.16385_de-de_4b92e8e3c63aeff0\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..indetails.resources_31bf3856ad364e35_6.1.7600.16385_en-us_5a9bfb846ea663ab\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_netfx-mscorsec_dll_b03f5f7f11d50a3a_6.1.7600.16385_none_e638a346b112adf9\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\msil_taskscheduler.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_c46250e3eeebe311\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\wow64_microsoft-windows-i..lprovider.resources_31bf3856ad364e35_6.1.7600.16385_es-es_f6d000b8d3c30c6e\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-nlasvc.resources_31bf3856ad364e35_6.1.7600.16385_en-us_6f4a9d30b46e61ed\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d2d.resources_31bf3856ad364e35_7.1.7601.16492_zh-tw_4a38b7a6d13610ff\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-recover_31bf3856ad364e35_6.1.7600.16385_none_e2083f75ce4c0619\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_netfx-aspnet_webadmin_images_b03f5f7f11d50a3a_6.1.7600.16385_none_3b995fcfc0e586ab\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_netl1e64.inf_31bf3856ad364e35_6.1.7600.16385_none_97e8f61adcecb187\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-c..vider-dll.resources_31bf3856ad364e35_6.1.7600.16385_it-it_376bf74662a3c1b5\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\x86_microsoft-windows-sysdmremote.resources_31bf3856ad364e35_6.1.7600.16385_it-it_3cdf861d140e9daf\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\ehiTVMSMusic\32c163c5b3420fb95f4bc8b5a365a6bd\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\winsxs\amd64_microsoft-windows-wininit-adm.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_625722f458afdec8\HOW_TO_DECRYPT.txt hive.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1644 1232 WerFault.exe 12 -
Delays execution with timeout.exe 64 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid Process 112 timeout.exe 1712 timeout.exe 524 timeout.exe 1800 timeout.exe 868 timeout.exe 556 timeout.exe 468 timeout.exe 1512 timeout.exe 1476 timeout.exe 1936 timeout.exe 2024 timeout.exe 1620 timeout.exe 1592 timeout.exe 1996 timeout.exe 988 timeout.exe 520 timeout.exe 1952 timeout.exe 844 timeout.exe 1608 timeout.exe 1328 timeout.exe 1764 timeout.exe 1736 timeout.exe 768 timeout.exe 1780 timeout.exe 1456 timeout.exe 1324 timeout.exe 1856 timeout.exe 1700 timeout.exe 1704 timeout.exe 892 timeout.exe 1260 timeout.exe 1924 timeout.exe 1140 timeout.exe 1812 timeout.exe 1520 timeout.exe 1544 timeout.exe 912 timeout.exe 1996 timeout.exe 556 timeout.exe 1704 timeout.exe 1332 timeout.exe 1832 timeout.exe 1308 timeout.exe 844 timeout.exe 1732 timeout.exe 1712 timeout.exe 524 timeout.exe 1264 timeout.exe 1504 timeout.exe 1484 timeout.exe 1684 timeout.exe 1264 timeout.exe 1736 timeout.exe 1092 timeout.exe 1840 timeout.exe 1840 timeout.exe 1652 timeout.exe 1964 timeout.exe 840 timeout.exe 1940 timeout.exe 1672 timeout.exe 1572 timeout.exe 1876 timeout.exe 2024 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid Process 1764 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
hive.exepid Process 816 hive.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid Process Token: SeBackupPrivilege 1228 vssvc.exe Token: SeRestorePrivilege 1228 vssvc.exe Token: SeAuditPrivilege 1228 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
hive.execmd.execmd.exedescription pid Process procid_target PID 816 wrote to memory of 948 816 hive.exe 28 PID 816 wrote to memory of 948 816 hive.exe 28 PID 816 wrote to memory of 948 816 hive.exe 28 PID 816 wrote to memory of 948 816 hive.exe 28 PID 816 wrote to memory of 976 816 hive.exe 30 PID 816 wrote to memory of 976 816 hive.exe 30 PID 816 wrote to memory of 976 816 hive.exe 30 PID 816 wrote to memory of 976 816 hive.exe 30 PID 948 wrote to memory of 1712 948 cmd.exe 33 PID 948 wrote to memory of 1712 948 cmd.exe 33 PID 948 wrote to memory of 1712 948 cmd.exe 33 PID 948 wrote to memory of 1712 948 cmd.exe 33 PID 976 wrote to memory of 1764 976 cmd.exe 32 PID 976 wrote to memory of 1764 976 cmd.exe 32 PID 976 wrote to memory of 1764 976 cmd.exe 32 PID 976 wrote to memory of 1764 976 cmd.exe 32 PID 948 wrote to memory of 1796 948 cmd.exe 35 PID 948 wrote to memory of 1796 948 cmd.exe 35 PID 948 wrote to memory of 1796 948 cmd.exe 35 PID 948 wrote to memory of 1796 948 cmd.exe 35 PID 948 wrote to memory of 1332 948 cmd.exe 36 PID 948 wrote to memory of 1332 948 cmd.exe 36 PID 948 wrote to memory of 1332 948 cmd.exe 36 PID 948 wrote to memory of 1332 948 cmd.exe 36 PID 948 wrote to memory of 1832 948 cmd.exe 37 PID 948 wrote to memory of 1832 948 cmd.exe 37 PID 948 wrote to memory of 1832 948 cmd.exe 37 PID 948 wrote to memory of 1832 948 cmd.exe 37 PID 948 wrote to memory of 1868 948 cmd.exe 38 PID 948 wrote to memory of 1868 948 cmd.exe 38 PID 948 wrote to memory of 1868 948 cmd.exe 38 PID 948 wrote to memory of 1868 948 cmd.exe 38 PID 948 wrote to memory of 1060 948 cmd.exe 39 PID 948 wrote to memory of 1060 948 cmd.exe 39 PID 948 wrote to memory of 1060 948 cmd.exe 39 PID 948 wrote to memory of 1060 948 cmd.exe 39 PID 948 wrote to memory of 864 948 cmd.exe 40 PID 948 wrote to memory of 864 948 cmd.exe 40 PID 948 wrote to memory of 864 948 cmd.exe 40 PID 948 wrote to memory of 864 948 cmd.exe 40 PID 948 wrote to memory of 1484 948 cmd.exe 41 PID 948 wrote to memory of 1484 948 cmd.exe 41 PID 948 wrote to memory of 1484 948 cmd.exe 41 PID 948 wrote to memory of 1484 948 cmd.exe 41 PID 948 wrote to memory of 956 948 cmd.exe 42 PID 948 wrote to memory of 956 948 cmd.exe 42 PID 948 wrote to memory of 956 948 cmd.exe 42 PID 948 wrote to memory of 956 948 cmd.exe 42 PID 948 wrote to memory of 1952 948 cmd.exe 43 PID 948 wrote to memory of 1952 948 cmd.exe 43 PID 948 wrote to memory of 1952 948 cmd.exe 43 PID 948 wrote to memory of 1952 948 cmd.exe 43 PID 948 wrote to memory of 1928 948 cmd.exe 44 PID 948 wrote to memory of 1928 948 cmd.exe 44 PID 948 wrote to memory of 1928 948 cmd.exe 44 PID 948 wrote to memory of 1928 948 cmd.exe 44 PID 948 wrote to memory of 1964 948 cmd.exe 45 PID 948 wrote to memory of 1964 948 cmd.exe 45 PID 948 wrote to memory of 1964 948 cmd.exe 45 PID 948 wrote to memory of 1964 948 cmd.exe 45 PID 948 wrote to memory of 1672 948 cmd.exe 46 PID 948 wrote to memory of 1672 948 cmd.exe 46 PID 948 wrote to memory of 1672 948 cmd.exe 46 PID 948 wrote to memory of 1672 948 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\hive.exe"C:\Users\Admin\AppData\Local\Temp\hive.exe"1⤵
- Drops file in Drivers directory
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\cmd.execmd /c hive.bat >NUL 2>NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1712
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1796
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1332
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1832
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1868
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1060
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:864
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1484
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:956
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1952
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1928
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1672
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1780
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1784
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:532
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1400
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1512
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1504
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1688
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1572
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:520
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1720
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:524
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:868
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1940
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1812
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1000
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1800
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:556
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:864
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1484
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:956
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1952
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1684
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:824
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1732
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1520
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1264
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1620
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1056
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1736
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:392
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1704
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1508
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1588
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1388
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1092
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1340
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1876
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1260
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1764
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1592
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:840
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1760
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1840
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:980
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1924
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1012
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1712
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:864
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:280
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:956
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1064
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:580
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:532
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1400
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:972
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:804
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1700
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1732
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1512
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1552
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1264
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:988
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1936
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1056
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1736
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1648
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1704
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1504
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:892
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1096
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1856
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1656
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1260
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1720
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:792
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1592
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:868
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1832
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1944
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1476
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1940
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1868
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1840
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1000
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:768
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1560
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:584
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2024
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1308
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1924
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:556
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1956
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1652
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:280
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:956
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1116
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1748
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:824
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1780
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1348
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:844
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:912
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1672
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1608
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1664
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1996
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1512
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1552
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1264
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:988
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1936
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1140
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1788
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:960
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1496
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:156
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1504
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:892
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1096
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1856
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1656
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1544
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1764
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:524
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1332
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:840
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:588
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1456
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:468
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1768
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1324
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1960
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1832
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:112
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1940
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1060
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:768
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1560
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:584
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2024
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1308
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1924
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:556
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1956
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1124
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1296
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:956
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1116
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:532
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1288
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1780
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1348
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:844
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:912
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1672
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1608
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1664
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1328
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1316
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1280
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1996
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c shadow.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1764
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1232 -s 20601⤵
- Program crash
PID:1644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a8f09f00132dede0794f7e57e92cb72f
SHA1ce391fea7da5ad0d3a95f253f28a90c5ec035ddb
SHA256bec9c841bcd93864d0cc2dbf3c8a219db63b31ff743c6d3af0157e06b0ee0de9
SHA5126513962e4870315ffaa2fcf890273b99fd8aeddd1e614d693c3e8b6e8adbdc8f6308f06f40c63b1cbf728bcf00a9f85defa64130410d20bc56554392bd072fe4
-
Filesize
162B
MD5fca5799115172398c63263fad7e854b1
SHA12874a1c796f511f94bed6ae020f4b20c38c59cf1
SHA25627323f85f788e124f6024486f7d2a3dee9a1e88f2fc1617625b8612e47657663
SHA512a03fecd20d94def5ea75015613d40656d85094eb5584993cd2d082b17badeef6833ae214dc1e8058bda0afe29d8a4cd9a805a2519b1ea76f2bc1cdb274a1841b
-
Filesize
57B
MD5df5552357692e0cba5e69f8fbf06abb6
SHA14714f1e6bb75a80a8faf69434726d176b70d7bd8
SHA256d158f9d53e7c37eadd3b5cc1b82d095f61484e47eda2c36d9d35f31c0b4d3ff8
SHA512a837555a1175ab515e2b43da9e493ff0ccd4366ee59defe6770327818ca9afa6f3e39ecdf5262b69253aa9e2692283ee8cebc97d58edd42e676977c7f73d143d
-
Filesize
953KB
MD52f4759c23abcd639ac3ca7f8fa9480ac
SHA19a3fece585fa01b7b941e124ead0c39c8ce9bc7c
SHA2566d66fa59407862e0fddfcb36472fe810eb308653321ca0e374ac870f9aa8cec6
SHA5126ab14d6a8d3e9a751d68133e734cc804de2b50a7ef223d484d0f727cdfbd00d48f6e0666c3b86a0daf9ca42c0b726f6c2a088e5bb32c993748abfea7b5904ec6