Resubmissions
23-12-2022 20:19
221223-y39gvahb28 1023-12-2022 19:54
221223-ymz88scc8w 1023-12-2022 19:42
221223-yerbcsha78 10Analysis
-
max time kernel
143s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-12-2022 19:54
Behavioral task
behavioral1
Sample
hive.exe
Resource
win7-20220812-en
General
-
Target
hive.exe
-
Size
764KB
-
MD5
2f9fc82898d718f2abe99c4a6fa79e69
-
SHA1
9d336b8911c8ffd7cc809e31d5b53796bb0cc7bb
-
SHA256
88f7544a29a2ceb175a135d9fa221cbfd3e8c71f32dd6b09399717f85ea9afd1
-
SHA512
19f0879b1c54d305ab7a97a0d46ab79c103d4687fe37d5f9ef1934904eea48a1c66b1ac2de3dace6dc0d91623309287044c198cb0b3fc9f8453fbc9d1c0cae8b
-
SSDEEP
12288:CinNFNkY/yU97ppM4NSBG81Np2C9H4S3iDjlLtc4wCIITIQaOI6NrwacVYV+4MsT:CinN3n/y67jM4v4kCSPDjlLtbwt8IQLH
Malware Config
Extracted
C:\HOW_TO_DECRYPT.txt
hive
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
Signatures
-
Detects Go variant of Hive Ransomware 2 IoCs
Processes:
resource yara_rule behavioral1/memory/936-54-0x00000000001D0000-0x0000000000433000-memory.dmp hive_go behavioral1/memory/936-55-0x00000000001D0000-0x0000000000433000-memory.dmp hive_go -
Hive
A ransomware written in Golang first seen in June 2021.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
hive.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\ResetDismount.tiff hive.exe File opened for modification C:\Users\Admin\Pictures\UseLimit.tiff hive.exe -
Processes:
resource yara_rule behavioral1/memory/936-54-0x00000000001D0000-0x0000000000433000-memory.dmp upx behavioral1/memory/936-55-0x00000000001D0000-0x0000000000433000-memory.dmp upx -
Drops startup file 2 IoCs
Processes:
hive.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini hive.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
Processes:
hive.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini hive.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini hive.exe File opened for modification C:\Users\Public\Videos\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\O0UAU3O6\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\P35Q2WMD\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FIOPHPFJ\desktop.ini hive.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini hive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini hive.exe File opened for modification C:\Program Files (x86)\desktop.ini hive.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini hive.exe File opened for modification C:\Users\Public\Desktop\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini hive.exe File opened for modification C:\Users\Public\Documents\desktop.ini hive.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini hive.exe File opened for modification C:\Users\Public\Libraries\desktop.ini hive.exe File opened for modification C:\Users\Public\desktop.ini hive.exe File opened for modification C:\Users\Admin\Documents\desktop.ini hive.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini hive.exe File opened for modification C:\Users\Admin\Videos\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Program Files\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini hive.exe File opened for modification C:\Users\Public\Pictures\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\31F8NSAV\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AA1AI21V\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\9W0XRO68\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1FJGZ2IT\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Admin\Links\desktop.ini hive.exe File opened for modification C:\Users\Admin\Music\desktop.ini hive.exe File opened for modification C:\Users\Public\Downloads\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini hive.exe -
Drops file in System32 directory 64 IoCs
Processes:
hive.exedescription ioc process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitsTransfer\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\DriverStore\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0005\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0012\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\LogFiles\Windows Portable Devices\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\MUI\040C\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Printing_Admin_Scripts\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitsTransfer\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\0410\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitsTransfer\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\IME\IMEJP10\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WCN\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\TroubleshootingPack\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Dism\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0009\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\000e\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\NetworkList\Icons\StockIcons\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Printing_Admin_Scripts\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WCN\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDiagnostics\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0007\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\001f\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Speech\SpeechUX\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Dism\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0011\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Speech\Engines\SR\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Speech\SpeechUX\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\DriverStore\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0006\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Printing_Admin_Scripts\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Setup\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Speech\Common\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\DriverStore\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Dism\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\IME\IMETC10\applets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\IME\imekr8\dicts\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0003\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Printing_Admin_Scripts\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Speech\SpeechUX\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WCN\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\AdvancedInstallers\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Speech\SpeechUX\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Tasks\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Tasks\Microsoft\Windows\SyncCenter\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitsTransfer\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Speech\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\IME\IMESC5\applets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Speech\Engines\SR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WCN\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Dism\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\IME\IMEJP10\APPLETS\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0010\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0816\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\LogFiles\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\DriverStore\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\NetworkList\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Setup\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Setup\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Tasks\Microsoft\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WCN\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\MUI\0411\HOW_TO_DECRYPT.txt hive.exe -
Drops file in Program Files directory 64 IoCs
Processes:
hive.exedescription ioc process File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Web.Entity.Design.Resources.dll hive.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\FPLACE.DLL hive.exe File opened for modification C:\Program Files (x86)\Internet Explorer\DiagnosticsTap.dll hive.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\settings.js hive.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\msdasqlr.dll.mui hive.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\PurblePlace.dll.YBMQVfFpMxNTShaqJgy8UZVDBoOE1ZZAEsUQskDQuGk.hive hive.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\settings.css hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105506.WMF hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382960.JPG hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107730.WMF.YBMQVfFpMxNTShaqJgy8UbTtPV8FwYdm4hIp47AWCRI.hive hive.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\navBack.png hive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\VBHW6.CHM.YBMQVfFpMxNTShaqJgy8UQsO9hp9wTZXfbIZBfZp5Xw.hive hive.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\47.png hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libugly_resampler_plugin.dll hive.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\WMPDMC.exe.mui hive.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\pe.dll hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libblend_plugin.dll.YBMQVfFpMxNTShaqJgy8Ufqhp5QbWX4ALwggCHR2KFo.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18185_.WMF hive.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\currency.html hive.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Vevay.YBMQVfFpMxNTShaqJgy8UfhS0B5pEzoOA6c3xbF2-kE.hive hive.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msado26.tlb hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR8F.GIF.YBMQVfFpMxNTShaqJgy8UcjFhgMFwUsDzWTxCd42tmQ.hive hive.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\sqloledb.rll hive.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help.base.nl_zh_4.4.0.v20140623020002.jar hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-heapwalker.xml hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02413_.WMF hive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\PROOF\MSWDS_FR.LEX.YBMQVfFpMxNTShaqJgy8UdcX2Eu2JXAG8c-7NcFXqVY.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00413_.WMF.YBMQVfFpMxNTShaqJgy8UcOPZcynbz9Fn3yOnKLB4BM.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0240157.WMF.YBMQVfFpMxNTShaqJgy8UcH9DtNABVJYwO4I7SgcQjA.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00486_.WMF.YBMQVfFpMxNTShaqJgy8UcqLYwk-0TtG10XLd3J52Uc.hive hive.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationRight_SelectionSubpicture.png hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui_5.5.0.165303.jar hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+5.YBMQVfFpMxNTShaqJgy8UazYjSSVacE38BfhF8pFyHw.hive hive.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_es.properties hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\org-openide-filesystems_zh_CN.jar.YBMQVfFpMxNTShaqJgy8Ufvhbk-WbaoX2ejwMlCRF3Q.hive hive.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\settings.html hive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\QUAD\PREVIEW.GIF hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0149887.WMF hive.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-BoldIt.otf.YBMQVfFpMxNTShaqJgy8URzpGEnwYGZvCIba9r6H6S0.hive hive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\ICE.ELM.YBMQVfFpMxNTShaqJgy8UZNQ57raHiVuY8NMLSB2YwU.hive hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jce.jar hive.exe File created C:\Program Files\Java\jre7\lib\zi\Antarctica\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app.nl_ja_4.4.0.v20140623020002.jar hive.exe File opened for modification C:\Program Files\Java\jre7\lib\jce.jar hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-selector-api.xml.YBMQVfFpMxNTShaqJgy8UVVruG99gqpBPowsSZhlGwQ.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107182.WMF hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\VeriSignLogo.jpg hive.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\msdasql.dll hive.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sl.pak.YBMQVfFpMxNTShaqJgy8UbxEQRX-g3tM1M-VcrBMPHU.hive hive.exe File opened for modification C:\Program Files\Java\jre7\COPYRIGHT hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png hive.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\System.Printing.dll hive.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\en-US\weather.html hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Guayaquil hive.exe File created C:\Program Files\Microsoft Games\Purble Place\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Java\jre7\bin\jdwp.dll.YBMQVfFpMxNTShaqJgy8UYJLsH0kj7I4ZDBNZfXkeAU.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ACTIP10.HLP.YBMQVfFpMxNTShaqJgy8UeV5jO4bTisnLA6DJUQC8HI.hive hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.docs.zh_CN_5.5.0.165303.jar hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_pt_BR.properties.YBMQVfFpMxNTShaqJgy8UWWM4pySRa0XZTWPkoSwAhI.hive hive.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\Gadget_Star_Full.png hive.exe -
Drops file in Windows directory 64 IoCs
Processes:
hive.exedescription ioc process File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.DataVisualization\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\AppPatch\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\1030\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Tasks.v4.0\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Collections\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Net.Ping\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Workflow.Activities\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Resources\Themes\Aero\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\NetworkService\Documents\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.VisualBasic.Activities.Compiler\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Entity\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\PCHEALTH\ERRORREP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v3.5\1036\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.ApplicationServer.Applications\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Diagnostics.Tools\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Resources.Reader\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v3.5\es\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v3.5\MOF\es\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Resources\Themes\Aero\Shell\NormalColor\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Globalization\MCT\MCT-ZA\Wallpaper\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\RedistList\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Net.Sockets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.CompilerServices.VisualC\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\History\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\DigitalLocker\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\WindowsFormsIntegration\v4.0_4.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Speech\Engines\SR\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\App_Code\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Channels\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\SendTo\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\App_Code\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\ko-KR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Prefetch\ReadyBoot\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\Fonts\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\App_Data\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\GAC\es\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.InteropServices\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Serialization.Json\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ModemLogs\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Security\App_LocalResources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Net.NameResolution\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.WasHosting\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ComponentModel.TypeConverter\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\IME\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemDrawing\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Routing\v4.0_4.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Services\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Globalization\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\IME\IMESC5\HELP\HOW_TO_DECRYPT.txt hive.exe -
Delays execution with timeout.exe 60 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 676 timeout.exe 1232 timeout.exe 1332 timeout.exe 1252 timeout.exe 572 timeout.exe 1756 timeout.exe 828 timeout.exe 552 timeout.exe 1448 timeout.exe 1656 timeout.exe 896 timeout.exe 1716 timeout.exe 1996 timeout.exe 1640 timeout.exe 1172 timeout.exe 1532 timeout.exe 1652 timeout.exe 988 timeout.exe 1524 timeout.exe 1084 timeout.exe 792 timeout.exe 572 timeout.exe 956 timeout.exe 1252 timeout.exe 1020 timeout.exe 1564 timeout.exe 1952 timeout.exe 1692 timeout.exe 1688 timeout.exe 316 timeout.exe 1692 timeout.exe 1676 timeout.exe 792 timeout.exe 1504 timeout.exe 1636 timeout.exe 1968 timeout.exe 948 timeout.exe 1676 timeout.exe 2044 timeout.exe 1708 timeout.exe 1368 timeout.exe 2040 timeout.exe 1548 timeout.exe 1888 timeout.exe 992 timeout.exe 892 timeout.exe 1128 timeout.exe 1888 timeout.exe 1752 timeout.exe 1324 timeout.exe 1996 timeout.exe 1556 timeout.exe 1964 timeout.exe 808 timeout.exe 288 timeout.exe 904 timeout.exe 1964 timeout.exe 904 timeout.exe 1232 timeout.exe 1212 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1736 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
hive.exepid process 936 hive.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 964 vssvc.exe Token: SeRestorePrivilege 964 vssvc.exe Token: SeAuditPrivilege 964 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
hive.execmd.execmd.exedescription pid process target process PID 936 wrote to memory of 1412 936 hive.exe cmd.exe PID 936 wrote to memory of 1412 936 hive.exe cmd.exe PID 936 wrote to memory of 1412 936 hive.exe cmd.exe PID 936 wrote to memory of 1412 936 hive.exe cmd.exe PID 936 wrote to memory of 2032 936 hive.exe cmd.exe PID 936 wrote to memory of 2032 936 hive.exe cmd.exe PID 936 wrote to memory of 2032 936 hive.exe cmd.exe PID 936 wrote to memory of 2032 936 hive.exe cmd.exe PID 1412 wrote to memory of 2044 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 2044 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 2044 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 2044 1412 cmd.exe timeout.exe PID 2032 wrote to memory of 1736 2032 cmd.exe vssadmin.exe PID 2032 wrote to memory of 1736 2032 cmd.exe vssadmin.exe PID 2032 wrote to memory of 1736 2032 cmd.exe vssadmin.exe PID 2032 wrote to memory of 1736 2032 cmd.exe vssadmin.exe PID 1412 wrote to memory of 1564 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1564 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1564 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1564 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1524 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1524 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1524 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1524 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1172 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1172 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1172 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1172 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 992 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 992 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 992 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 992 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1952 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1952 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1952 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1952 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1676 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1676 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1676 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1676 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1964 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1964 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1964 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1964 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1996 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1996 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1996 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1996 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1888 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1888 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1888 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1888 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1232 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1232 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1232 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1232 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1020 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1020 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1020 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1020 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1532 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1532 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1532 1412 cmd.exe timeout.exe PID 1412 wrote to memory of 1532 1412 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hive.exe"C:\Users\Admin\AppData\Local\Temp\hive.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\cmd.execmd /c hive.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2044
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1564
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1524
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1172
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:992
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1952
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1676
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1996
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1888
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1232
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1020
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1532
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1212
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1752
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1556
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:828
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1324
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:892
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1252
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:552
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1756
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1636
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:956
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1656
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1368
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:904
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1708
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:792
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:572
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1692
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:948
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:896
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1716
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1084
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2040
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:676
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1548
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1128
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1968
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1676
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1996
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1888
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1232
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1640
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:808
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1448
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1688
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1652
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:288
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:988
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1332
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1252
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1504
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:904
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:316
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:792
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:572
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c shadow.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1736
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5ede5431cd4f439ea426dfe3a60fb82e2
SHA18f2d05e7cc85d37c6c6814250aba4109d40c7ccd
SHA25621c4beb2fcaa8eeb92f68c05e04dc3b0a7772892c3e8dff23f0f5786a7989268
SHA5129a0435aec201c47c1377573c0ace1382e7788bdc8a24914385e4234bed18ba3d72b7634c7691158a17c37d2f1669675dfa821cd75154141810f342d52bd46aa1
-
Filesize
162B
MD5fca5799115172398c63263fad7e854b1
SHA12874a1c796f511f94bed6ae020f4b20c38c59cf1
SHA25627323f85f788e124f6024486f7d2a3dee9a1e88f2fc1617625b8612e47657663
SHA512a03fecd20d94def5ea75015613d40656d85094eb5584993cd2d082b17badeef6833ae214dc1e8058bda0afe29d8a4cd9a805a2519b1ea76f2bc1cdb274a1841b
-
Filesize
57B
MD5df5552357692e0cba5e69f8fbf06abb6
SHA14714f1e6bb75a80a8faf69434726d176b70d7bd8
SHA256d158f9d53e7c37eadd3b5cc1b82d095f61484e47eda2c36d9d35f31c0b4d3ff8
SHA512a837555a1175ab515e2b43da9e493ff0ccd4366ee59defe6770327818ca9afa6f3e39ecdf5262b69253aa9e2692283ee8cebc97d58edd42e676977c7f73d143d