Analysis
-
max time kernel
138s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
09-01-2023 16:14
Behavioral task
behavioral1
Sample
hive.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
hive.exe
Resource
win10v2004-20220901-en
General
-
Target
hive.exe
-
Size
764KB
-
MD5
2f9fc82898d718f2abe99c4a6fa79e69
-
SHA1
9d336b8911c8ffd7cc809e31d5b53796bb0cc7bb
-
SHA256
88f7544a29a2ceb175a135d9fa221cbfd3e8c71f32dd6b09399717f85ea9afd1
-
SHA512
19f0879b1c54d305ab7a97a0d46ab79c103d4687fe37d5f9ef1934904eea48a1c66b1ac2de3dace6dc0d91623309287044c198cb0b3fc9f8453fbc9d1c0cae8b
-
SSDEEP
12288:CinNFNkY/yU97ppM4NSBG81Np2C9H4S3iDjlLtc4wCIITIQaOI6NrwacVYV+4MsT:CinN3n/y67jM4v4kCSPDjlLtbwt8IQLH
Malware Config
Extracted
C:\HOW_TO_DECRYPT.txt
hive
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
Signatures
-
Detects Go variant of Hive Ransomware 2 IoCs
Processes:
resource yara_rule behavioral1/memory/788-54-0x0000000000FA0000-0x0000000001203000-memory.dmp hive_go behavioral1/memory/788-62-0x0000000000FA0000-0x0000000001203000-memory.dmp hive_go -
Hive
A ransomware written in Golang first seen in June 2021.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops file in Drivers directory 28 IoCs
Processes:
hive.exedescription ioc process File created C:\Windows\SysWOW64\drivers\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\de-DE\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\de-DE\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\es-ES\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\it-IT\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\ja-JP\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\fr-FR\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\es-ES\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\fr-FR\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\it-IT\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\ja-JP\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\it-IT\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\HOW_TO_DECRYPT.txt hive.exe -
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
hive.exedescription ioc process File renamed C:\Users\Admin\Pictures\LimitTrace.png => C:\Users\Admin\Pictures\LimitTrace.png.aBkx0vZGQLVfuKUfBAYwnhRjWXjfTxVnbWFiWwQFoS4.hive hive.exe File opened for modification C:\Users\Admin\Pictures\LimitTrace.png.aBkx0vZGQLVfuKUfBAYwnhRjWXjfTxVnbWFiWwQFoS4.hive hive.exe File renamed C:\Users\Admin\Pictures\TraceConvert.tif => C:\Users\Admin\Pictures\TraceConvert.tif.aBkx0vZGQLVfuKUfBAYwnjDpbBJ_phMjb1wi_XJyciI.hive hive.exe File opened for modification C:\Users\Admin\Pictures\TraceConvert.tif.aBkx0vZGQLVfuKUfBAYwnjDpbBJ_phMjb1wi_XJyciI.hive hive.exe File renamed C:\Users\Admin\Pictures\WaitFind.raw => C:\Users\Admin\Pictures\WaitFind.raw.aBkx0vZGQLVfuKUfBAYwnmpa1cnWjCU48T1cFZKtrU0.hive hive.exe File opened for modification C:\Users\Admin\Pictures\WaitFind.raw.aBkx0vZGQLVfuKUfBAYwnmpa1cnWjCU48T1cFZKtrU0.hive hive.exe -
Processes:
resource yara_rule behavioral1/memory/788-54-0x0000000000FA0000-0x0000000001203000-memory.dmp upx behavioral1/memory/788-62-0x0000000000FA0000-0x0000000001203000-memory.dmp upx -
Drops startup file 3 IoCs
Processes:
hive.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.aBkx0vZGQLVfuKUfBAYwnr_uLWc0modxSIgPDLEjTiU.hive hive.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
Processes:
hive.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5P6A77JB\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5WOXX0V9\desktop.ini hive.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1214520366-621468234-4062160515-1000\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini hive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini hive.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini hive.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini hive.exe File opened for modification C:\Users\Public\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\VYXNV57O\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C01KGG1N\desktop.ini hive.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini hive.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini hive.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini hive.exe File opened for modification C:\Users\Public\Pictures\desktop.ini hive.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\CYEXZCX2\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Public\Downloads\desktop.ini hive.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\9M5JJ10P\desktop.ini hive.exe File opened for modification C:\Users\Admin\Music\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini hive.exe File opened for modification C:\Users\Admin\Links\desktop.ini hive.exe File opened for modification C:\Users\Public\Desktop\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini hive.exe File opened for modification C:\Program Files\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini hive.exe File opened for modification C:\Users\Public\Music\desktop.ini hive.exe File opened for modification C:\Users\Public\Videos\desktop.ini hive.exe File opened for modification C:\Users\Admin\Videos\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini hive.exe -
Drops file in System32 directory 64 IoCs
Processes:
hive.exedescription ioc process File created C:\Windows\System32\DriverStore\FileRepository\umpass.inf_amd64_neutral_e3be362bfab667d2\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\TroubleshootingPack\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\MUI\040C\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmti.inf_amd64_neutral_4443b423d18c3ffc\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\config\systemprofile\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\eval\ProfessionalE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnky305.inf_amd64_ja-jp_4d77cc4802b17ec3\Amd64\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\NDF\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-shmig-DL\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\averfx2swtv_noavin_x64.inf_amd64_neutral_86943dd17860e449\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmcom1.inf_amd64_neutral_96c22c683482d8bd\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netw5v64.inf_amd64_neutral_a6b778ba802632cc\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnky308.inf_amd64_ja-jp_d90af802b607044a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\wialx004.inf_amd64_neutral_0a3a62ae6ed43127\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netr7364.inf_amd64_neutral_68988e550e69a417\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\en-US\Licenses\_Default\Starter\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-ActiveDirectory-WebServices-DL\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\hdaudio.inf_amd64_neutral_ce7bc199c85ae0a0\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\MUI\0410\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\es-ES\Licenses\eval\Starter\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\sppui\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\restore\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnky003.inf_amd64_neutral_fe7ea176f20ab839\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmairte.inf_amd64_neutral_0feacd08cb9c7fe3\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmgl008.inf_amd64_neutral_d225e15af1a594cd\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\Printing_Admin_Scripts\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnlx00y.inf_amd64_neutral_977318f2317f5ddd\Amd64\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnms001.inf_amd64_neutral_9b214cd9b78760aa\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\es-ES\Licenses\OEM\Starter\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\pt-PT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\fdc.inf_amd64_neutral_bbcfca39fdc02275\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\Printing_Admin_Scripts\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\migration\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\it-IT\Licenses\_Default\StarterE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnlx00v.inf_amd64_neutral_86ff307c66080d00\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\InstallShield\setupdir\0010\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmags64.inf_amd64_neutral_e68956e24e287714\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\migwiz\replacementmanifests\microsoft-windows-ndis\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\000b\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmtdkj2.inf_amd64_neutral_0cf7696e2236ca4e\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-PerformanceCounterInfrastructure-DL\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\en-US\Licenses\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\OEM\StarterN\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\cpu.inf_amd64_neutral_ae5de2e1bf2793c3\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\InstallShield\setupdir\0804\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\en-US\Licenses\OEM\HomeBasicE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnok302.inf_amd64_ja-jp_708c81a8b0ad8846\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-TapiSetup\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\ks.inf_amd64_neutral_2b583ce4a6a029a1\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0015\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\en-US\Licenses\_Default\Professional\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\es-ES\Licenses\OEM\UltimateN\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\es-ES\Licenses\eval\HomeBasicN\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-NetworkLoadBalancing-Core\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\vhdmp.inf_amd64_neutral_c3910bbf4fbccf97\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\0C0A\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\umbus.inf_amd64_neutral_2d4257afa2e35253\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\migwiz\dlmanifests\Microsoft-Windows-OfflineFiles-DL\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Dism\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\en-US\Licenses\eval\HomeBasic\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\en-US\Licenses\eval\StarterE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\eval\HomePremium\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\it-IT\Licenses\OEM\Enterprise\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnky006.inf_amd64_neutral_522043c34551b0c0\HOW_TO_DECRYPT.txt hive.exe -
Drops file in Program Files directory 64 IoCs
Processes:
hive.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04385_.WMF hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00441_.WMF.aBkx0vZGQLVfuKUfBAYwntzHZgsaLJgOvPNEVpg6UXc.hive hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-common.xml hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mn\LC_MESSAGES\vlc.mo hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ta\LC_MESSAGES\vlc.mo hive.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bg-desk.png hive.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Barbados.aBkx0vZGQLVfuKUfBAYwnpRgMzveFwJEsdSADcEEjGk.hive hive.exe File opened for modification C:\Program Files\Mozilla Firefox\xul.dll.sig.aBkx0vZGQLVfuKUfBAYwntVgfoWSgOgoSfVMyz1pLzc.hive hive.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\drag.png hive.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification.ja_5.5.0.165303.jar hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Recife.aBkx0vZGQLVfuKUfBAYwnoAdWEjWjEwjmDnW34qtWgA.hive hive.exe File opened for modification C:\Program Files\Java\jre7\bin\jawt.dll.aBkx0vZGQLVfuKUfBAYwntc4OmScjJxVXVxmj9ZcrDk.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsMacroTemplate.html hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WITHCOMP.XML hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-visual_ja.jar hive.exe File opened for modification C:\Program Files\Microsoft Office\Office14\Custom.propdesc hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15302_.GIF hive.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\slideShow.js hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler_zh_CN.jar hive.exe File opened for modification C:\Program Files\Windows Media Player\wmpconfig.exe hive.exe File opened for modification C:\Program Files\Java\jre7\lib\net.properties.aBkx0vZGQLVfuKUfBAYwnq1VMkVOLfsPqFQk01ToZCs.hive hive.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\Chkr.dll.aBkx0vZGQLVfuKUfBAYwnjsqFdsN4dJThHsdMexEMm8.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099189.JPG.aBkx0vZGQLVfuKUfBAYwnlFGD4RH-0Q_muWeChLMmnk.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR4F.GIF hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-multitabs_zh_CN.jar hive.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\it-IT\FreeCell.exe.mui hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\org-openide-filesystems_ja.jar.aBkx0vZGQLVfuKUfBAYwnoXirSolNkxv75aV2Qh16hM.hive hive.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\PhotoAcq.dll.mui hive.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\msdatl3.dll hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.TLB hive.exe File opened for modification C:\Program Files (x86)\Windows Media Player\es-ES\setup_wm.exe.mui hive.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_sun.png hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\config.ini.aBkx0vZGQLVfuKUfBAYwnoydPo_cdhlBB9VeJu7eZV0.hive hive.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\HOW_TO_DECRYPT.txt hive.exe File created C:\Program Files (x86)\Google\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\PREVIEW.GIF.aBkx0vZGQLVfuKUfBAYwns9iT8DuQJID-F7UJu6v1ww.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME26.CSS hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01176_.WMF.aBkx0vZGQLVfuKUfBAYwnpfXXqpwGlN_wV0dh-aCdVc.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\PublicFunctions.js.aBkx0vZGQLVfuKUfBAYwniNCH9NeCJdJD7LGvta2PGc.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXLIRMV.XML.aBkx0vZGQLVfuKUfBAYwnl-2K_a3VkB0KcxLUNJaXHk.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\SessionMember.ico.aBkx0vZGQLVfuKUfBAYwnuwjvil8mLYCpWxnuOrnSmM.hive hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\resources.jar hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\libaccess_output_shout_plugin.dll.aBkx0vZGQLVfuKUfBAYwnjA5pstGc2M1PL68xwEb-G4.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD09664_.WMF hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY00170_.WMF hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCDRESNL.ICO hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\WebToolImagesMask16x16.bmp hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro.zh_CN_5.5.0.165303.jar.aBkx0vZGQLVfuKUfBAYwnkky6F6xBYtMzyZrypI_Vww.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382926.JPG hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SMIMEE.CFG hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02228_.WMF.aBkx0vZGQLVfuKUfBAYwnu9vIVk1HL9LHqHmu9pS1XU.hive hive.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Algiers hive.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\NBMapTIP.dll.mui hive.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\css\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00157_.WMF hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0299611.WMF hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsPreviewTemplate.html hive.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\gadget.xml hive.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\flyout.html hive.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt.aBkx0vZGQLVfuKUfBAYwnmY9SP9_t-ZhPZWECXK8XQo.hive hive.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net.nl_zh_4.4.0.v20140623020002.jar hive.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107290.WMF hive.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\msmdlocal.dll.aBkx0vZGQLVfuKUfBAYwnlU-7ZyPRM0GfSWhKYbGcBI.hive hive.exe -
Drops file in Windows directory 64 IoCs
Processes:
hive.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\App_Data\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\System.Data.Services.Design.resources\3.5.0.0_fr_b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\System.Runtime.Serialization.Formatters.Soap.resources\2.0.0.0_de_b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Data.Linq\b357f35e860204c5b74e1388f97db058\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\Windows\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Workflow.Act#\b2a2c534c407bbe46e8536445d0ada50\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Serialization\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\PresentationCore.resources\3.0.0.0_fr_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Speech\Engines\SR\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.Office.BusinessData.Intl\14.0.0.0__71e9bce111e9429c\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\SYSTEM.CONFIGURATION.resources\2.0.0.0_it_b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\System.Data.Entity.resources\3.5.0.0_de_b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Confe64a9051#\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security.Cryptography.Encoding\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.WasHosting\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\AspNetMMCExt\51f5ebc7dec87fb0c89540ed15a5c2b6\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Security\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\6.1.0.0_fr_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.Commands.UpdateDiagRootcause\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\inf\SMSvcHost 4.0.0.0\0008\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\inf\wsearchidxpi\0409\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\SrpUxSnapIn.resources\6.1.0.0_fr_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Security.#\e166ff6b4e2f181ace48ef30fcc1b55c\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\System.Security.resources\2.0.0.0_es_b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\system.runtime.serialization.resources\3.0.0.0_de_b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.WSMan.Run#\86550fdda6994a9c192d7a0b9b59ee5b\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\System.Security.resources\2.0.0.0_de_b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Build.Con#\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_64\mcupdate\6.1.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\microsoft.build.utilities.resources\2.0.0.0_it_b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.Ink\b0d0daea6a1d9a111a0f33a9a868bcf7\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Data.Common\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\UIAutomationClient.resources\3.0.0.0_ja_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\System.Data.SqlXml.resources\2.0.0.0_es_b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\system.workflow.componentmodel.resources\3.0.0.0_fr_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Net.Http\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.ApplicationId.Framework\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Routing\v4.0_4.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Xml.ReaderWriter\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\UIAutomationClientsideProviders\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\inf\ESENT\0409\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\inf\TermService\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SQL\en\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\ReachFramework\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\WindowsBase\3.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ehome\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Office.Word.AddInProxy.v9.0\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\System.Runtime.Serialization.Formatters.Soap.resources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Acti31fd6628#\588dc6be6980380dbe4ef726ff795778\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.Cmdlets.Resources\6.1.0.0_it_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Microsoft.V9921e851#\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\BDATunePIA\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security.Cryptography.X509Certificates\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\loadmxf\6.1.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SoftwareProtectionPlatform\Cache\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC\Extensibility\7.0.3300.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics\1.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\GAC_MSIL\System.Data.Services.Design.resources\3.5.0.0_de_b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\ehiVidCtl\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\cs-CZ\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Serialization.Formatters\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 452 1284 WerFault.exe -
Delays execution with timeout.exe 64 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 1096 timeout.exe 632 timeout.exe 964 timeout.exe 1752 timeout.exe 560 timeout.exe 860 timeout.exe 1064 timeout.exe 1056 timeout.exe 1980 timeout.exe 1068 timeout.exe 1304 timeout.exe 1724 timeout.exe 1068 timeout.exe 632 timeout.exe 452 timeout.exe 1736 timeout.exe 1304 timeout.exe 1088 timeout.exe 1608 timeout.exe 1204 timeout.exe 944 timeout.exe 1332 timeout.exe 1608 timeout.exe 1824 timeout.exe 532 timeout.exe 1884 timeout.exe 1204 timeout.exe 1384 timeout.exe 1972 timeout.exe 1344 timeout.exe 1676 timeout.exe 336 timeout.exe 1692 timeout.exe 1756 timeout.exe 748 timeout.exe 1904 timeout.exe 1744 timeout.exe 1148 timeout.exe 1812 timeout.exe 1960 timeout.exe 2036 timeout.exe 864 timeout.exe 1332 timeout.exe 1632 timeout.exe 952 timeout.exe 840 timeout.exe 1948 timeout.exe 1468 timeout.exe 1100 timeout.exe 1572 timeout.exe 1660 timeout.exe 1464 timeout.exe 1092 timeout.exe 1360 timeout.exe 868 timeout.exe 1952 timeout.exe 860 timeout.exe 1676 timeout.exe 1092 timeout.exe 1632 timeout.exe 1444 timeout.exe 1472 timeout.exe 884 timeout.exe 1960 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 692 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
hive.exepid process 788 hive.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1168 vssvc.exe Token: SeRestorePrivilege 1168 vssvc.exe Token: SeAuditPrivilege 1168 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
hive.execmd.execmd.exedescription pid process target process PID 788 wrote to memory of 620 788 hive.exe cmd.exe PID 788 wrote to memory of 620 788 hive.exe cmd.exe PID 788 wrote to memory of 620 788 hive.exe cmd.exe PID 788 wrote to memory of 620 788 hive.exe cmd.exe PID 788 wrote to memory of 1312 788 hive.exe cmd.exe PID 788 wrote to memory of 1312 788 hive.exe cmd.exe PID 788 wrote to memory of 1312 788 hive.exe cmd.exe PID 788 wrote to memory of 1312 788 hive.exe cmd.exe PID 620 wrote to memory of 748 620 cmd.exe timeout.exe PID 620 wrote to memory of 748 620 cmd.exe timeout.exe PID 620 wrote to memory of 748 620 cmd.exe timeout.exe PID 620 wrote to memory of 748 620 cmd.exe timeout.exe PID 1312 wrote to memory of 692 1312 cmd.exe vssadmin.exe PID 1312 wrote to memory of 692 1312 cmd.exe vssadmin.exe PID 1312 wrote to memory of 692 1312 cmd.exe vssadmin.exe PID 1312 wrote to memory of 692 1312 cmd.exe vssadmin.exe PID 620 wrote to memory of 1904 620 cmd.exe timeout.exe PID 620 wrote to memory of 1904 620 cmd.exe timeout.exe PID 620 wrote to memory of 1904 620 cmd.exe timeout.exe PID 620 wrote to memory of 1904 620 cmd.exe timeout.exe PID 620 wrote to memory of 1608 620 cmd.exe timeout.exe PID 620 wrote to memory of 1608 620 cmd.exe timeout.exe PID 620 wrote to memory of 1608 620 cmd.exe timeout.exe PID 620 wrote to memory of 1608 620 cmd.exe timeout.exe PID 620 wrote to memory of 1572 620 cmd.exe timeout.exe PID 620 wrote to memory of 1572 620 cmd.exe timeout.exe PID 620 wrote to memory of 1572 620 cmd.exe timeout.exe PID 620 wrote to memory of 1572 620 cmd.exe timeout.exe PID 620 wrote to memory of 1972 620 cmd.exe timeout.exe PID 620 wrote to memory of 1972 620 cmd.exe timeout.exe PID 620 wrote to memory of 1972 620 cmd.exe timeout.exe PID 620 wrote to memory of 1972 620 cmd.exe timeout.exe PID 620 wrote to memory of 1344 620 cmd.exe timeout.exe PID 620 wrote to memory of 1344 620 cmd.exe timeout.exe PID 620 wrote to memory of 1344 620 cmd.exe timeout.exe PID 620 wrote to memory of 1344 620 cmd.exe timeout.exe PID 620 wrote to memory of 2036 620 cmd.exe timeout.exe PID 620 wrote to memory of 2036 620 cmd.exe timeout.exe PID 620 wrote to memory of 2036 620 cmd.exe timeout.exe PID 620 wrote to memory of 2036 620 cmd.exe timeout.exe PID 620 wrote to memory of 884 620 cmd.exe timeout.exe PID 620 wrote to memory of 884 620 cmd.exe timeout.exe PID 620 wrote to memory of 884 620 cmd.exe timeout.exe PID 620 wrote to memory of 884 620 cmd.exe timeout.exe PID 620 wrote to memory of 1056 620 cmd.exe timeout.exe PID 620 wrote to memory of 1056 620 cmd.exe timeout.exe PID 620 wrote to memory of 1056 620 cmd.exe timeout.exe PID 620 wrote to memory of 1056 620 cmd.exe timeout.exe PID 620 wrote to memory of 1204 620 cmd.exe timeout.exe PID 620 wrote to memory of 1204 620 cmd.exe timeout.exe PID 620 wrote to memory of 1204 620 cmd.exe timeout.exe PID 620 wrote to memory of 1204 620 cmd.exe timeout.exe PID 620 wrote to memory of 632 620 cmd.exe timeout.exe PID 620 wrote to memory of 632 620 cmd.exe timeout.exe PID 620 wrote to memory of 632 620 cmd.exe timeout.exe PID 620 wrote to memory of 632 620 cmd.exe timeout.exe PID 620 wrote to memory of 840 620 cmd.exe timeout.exe PID 620 wrote to memory of 840 620 cmd.exe timeout.exe PID 620 wrote to memory of 840 620 cmd.exe timeout.exe PID 620 wrote to memory of 840 620 cmd.exe timeout.exe PID 620 wrote to memory of 1948 620 cmd.exe timeout.exe PID 620 wrote to memory of 1948 620 cmd.exe timeout.exe PID 620 wrote to memory of 1948 620 cmd.exe timeout.exe PID 620 wrote to memory of 1948 620 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hive.exe"C:\Users\Admin\AppData\Local\Temp\hive.exe"1⤵
- Drops file in Drivers directory
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\cmd.execmd /c hive.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:748
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1904
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1608
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1572
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1972
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1344
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2036
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:884
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1056
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1204
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:632
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:840
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1948
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1960
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1980
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1444
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1664
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1008
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:868
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:772
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1676
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1744
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:532
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:944
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1752
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:664
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1468
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:560
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1660
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1332
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1068
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:452
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1100
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1608
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:860
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1092
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1632
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1304
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1148
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1824
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1736
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1676
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:336
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1748
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1692
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1616
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1752
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:664
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1468
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1464
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1756
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1724
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1884
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:864
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1952
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1332
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1068
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:860
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1092
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1632
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1204
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1812
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:632
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1384
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1960
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:952
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1064
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1444
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1472
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1096
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1360
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1304
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c shadow.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:692
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1284 -s 26281⤵
- Program crash
PID:452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
162B
MD5fca5799115172398c63263fad7e854b1
SHA12874a1c796f511f94bed6ae020f4b20c38c59cf1
SHA25627323f85f788e124f6024486f7d2a3dee9a1e88f2fc1617625b8612e47657663
SHA512a03fecd20d94def5ea75015613d40656d85094eb5584993cd2d082b17badeef6833ae214dc1e8058bda0afe29d8a4cd9a805a2519b1ea76f2bc1cdb274a1841b
-
Filesize
57B
MD5df5552357692e0cba5e69f8fbf06abb6
SHA14714f1e6bb75a80a8faf69434726d176b70d7bd8
SHA256d158f9d53e7c37eadd3b5cc1b82d095f61484e47eda2c36d9d35f31c0b4d3ff8
SHA512a837555a1175ab515e2b43da9e493ff0ccd4366ee59defe6770327818ca9afa6f3e39ecdf5262b69253aa9e2692283ee8cebc97d58edd42e676977c7f73d143d