Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2023 16:14
Behavioral task
behavioral1
Sample
hive.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
hive.exe
Resource
win10v2004-20220901-en
General
-
Target
hive.exe
-
Size
764KB
-
MD5
2f9fc82898d718f2abe99c4a6fa79e69
-
SHA1
9d336b8911c8ffd7cc809e31d5b53796bb0cc7bb
-
SHA256
88f7544a29a2ceb175a135d9fa221cbfd3e8c71f32dd6b09399717f85ea9afd1
-
SHA512
19f0879b1c54d305ab7a97a0d46ab79c103d4687fe37d5f9ef1934904eea48a1c66b1ac2de3dace6dc0d91623309287044c198cb0b3fc9f8453fbc9d1c0cae8b
-
SSDEEP
12288:CinNFNkY/yU97ppM4NSBG81Np2C9H4S3iDjlLtc4wCIITIQaOI6NrwacVYV+4MsT:CinN3n/y67jM4v4kCSPDjlLtbwt8IQLH
Malware Config
Extracted
C:\HOW_TO_DECRYPT.txt
hive
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
Signatures
-
Detects Go variant of Hive Ransomware 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4316-132-0x0000000000150000-0x00000000003B3000-memory.dmp hive_go behavioral2/memory/4316-133-0x0000000000150000-0x00000000003B3000-memory.dmp hive_go -
Hive
A ransomware written in Golang first seen in June 2021.
-
Drops file in Drivers directory 8 IoCs
Processes:
hive.exedescription ioc process File opened for modification C:\Windows\SysWOW64\drivers\UMDF\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\UMDF\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\drivers\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\drivers\UMDF\HOW_TO_DECRYPT.txt hive.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
hive.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\ConfirmInitialize.tiff hive.exe File opened for modification C:\Users\Admin\Pictures\EnableMount.tiff hive.exe File opened for modification C:\Users\Admin\Pictures\InstallTest.tiff hive.exe File opened for modification C:\Users\Admin\Pictures\RequestOpen.tiff hive.exe File opened for modification C:\Users\Admin\Pictures\ResolveGet.tiff hive.exe File opened for modification C:\Users\Admin\Pictures\SubmitTest.tiff hive.exe File opened for modification C:\Users\Admin\Pictures\TraceLock.tiff hive.exe -
Processes:
resource yara_rule behavioral2/memory/4316-132-0x0000000000150000-0x00000000003B3000-memory.dmp upx behavioral2/memory/4316-133-0x0000000000150000-0x00000000003B3000-memory.dmp upx -
Drops startup file 3 IoCs
Processes:
hive.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW_TO_DECRYPT.txt hive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini hive.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
Processes:
hive.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini hive.exe File opened for modification C:\Users\Admin\Documents\desktop.ini hive.exe File opened for modification C:\Users\Admin\Music\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Public\Libraries\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini hive.exe File opened for modification C:\Users\Admin\Videos\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini hive.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini hive.exe File opened for modification C:\Users\Admin\Searches\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini hive.exe File opened for modification C:\Users\Public\Music\desktop.ini hive.exe File opened for modification C:\Users\Public\Pictures\desktop.ini hive.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-929662420-1054238289-2961194603-1000\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini hive.exe File opened for modification C:\Program Files\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini hive.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini hive.exe File opened for modification C:\Users\Public\Videos\desktop.ini hive.exe File opened for modification C:\Users\Public\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini hive.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini hive.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini hive.exe File opened for modification C:\Users\Public\Documents\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Public\Desktop\desktop.ini hive.exe File opened for modification C:\Users\Admin\Links\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini hive.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini hive.exe File opened for modification C:\Program Files (x86)\desktop.ini hive.exe -
Drops file in System32 directory 64 IoCs
Processes:
hive.exedescription ioc process File created C:\Windows\SysWOW64\pt-BR\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\pt-PT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0012\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_LogResource\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\IME\IMEJP\APPLETS\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_hdc.inf_amd64_6e00e835fbceac58\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_c62e9f8067f98247\I386\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\LogFiles\SAM\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\FxsTmp\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\heat.inf_amd64_b73306c081719f1f\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netbvbda.inf_amd64_06bc8afcd2617abf\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\netl1e64.inf_amd64_8d5ca5ab1472fc44\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\scmvolume.inf_amd64_6957cfb7d6fea5c7\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\PerceptionSimulation\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\ndisimplatform.inf_amd64_b6b644565437983a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\tdibth.inf_amd64_e1022e6b4f7ab56d\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\termmou.inf_amd64_c4c8f901e3534194\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_display.inf_amd64_c7457a37d16eaadf\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\net8187se64.inf_amd64_99a4ca261f585f17\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_c62e9f8067f98247\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\prnms010.inf_amd64_9e410195c3b236c9\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\sdbus.inf_amd64_55c0c78952233d0c\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\InstallShield\setupdir\000a\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\Ipmi\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\wbem\xml\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmelsa.inf_amd64_f187fca538857daa\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmtdkj3.inf_amd64_9658f2eb83f061c9\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\sru\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\amdi2c.inf_amd64_d7ae71f8eb52c084\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_mcx.inf_amd64_fcbcc3807cbf63ec\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmnis1u.inf_amd64_64035dd8a7571ba7\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\megasr.inf_amd64_72258921635be994\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\InstallShield\setupdir\000b\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\LogFiles\WMI\RtBackup\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\IME\IMETC\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\MailContactsCalendarSync\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCClassResources\WindowsPackageCab\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\en-US\Licenses\_Default\Professional\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\avc.inf_amd64_0eaf27d749819837\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_firmware.inf_amd64_36e4e17f210128ab\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_fsvirtualization.inf_amd64_078671a0cdfe2870\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmsun1.inf_amd64_5b6db32fd04403a3\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\MUI\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PnpDevice\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\wsynth3dvsc.inf_amd64_1a08a3b6cd493e1f\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\Speech\Common\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0007\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\NetLbfo\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_PackageResource\en-US\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_RegistryResource\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\wbem\en\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\hidirkbd.inf_amd64_20ad4886826af1d2\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\TrustedPlatformModule\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\c_ucm.inf_amd64_c30468a947db0fa8\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmtdkj6.inf_amd64_5a503c811e650e70\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\storfwupdate.inf_amd64_e57f4de14d125fac\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\System32\DriverStore\FileRepository\whyperkbd.inf_amd64_6c54f73a58d5fb2c\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\Dism\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DSCResources\MSFT_WaitForSome\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0003\HOW_TO_DECRYPT.txt hive.exe -
Drops file in Program Files directory 64 IoCs
Processes:
hive.exedescription ioc process File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_KMS_Client_AE-ul-oob.xrm-ms hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power View Excel Add-in\Microsoft.Reporting.Common.dll.Xqn9CnktK_ingpgMFEO0Lnf0OGR_3kIajztmwd75xT0.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderSmallTile.contrast-black_scale-100.png hive.exe File created C:\Program Files (x86)\Google\Update\Install\HOW_TO_DECRYPT.txt hive.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\Glyph_0xe7d6.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-256_altform-unplated_contrast-black_devicefamily-colorfulunplated.png hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\Blog.dotx.Xqn9CnktK_ingpgMFEO0LnomeUunig0sVlZpiISK4z0.hive hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\warning.gif hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-black_scale-140.png.Xqn9CnktK_ingpgMFEO0Ln_aAgypvBZQsr9fNDr0iG0.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE hive.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001F-0409-1000-0000000FF1CE.xml.Xqn9CnktK_ingpgMFEO0LlAlUcrwzT5RmatCCfKtPmU.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Config\DefaultConfiguration.json hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\StoreLogo.scale-150_contrast-white.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\es-es\ui-strings.js hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\Flash.mpp hive.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Sigma\Other.DATA hive.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\epl-v10.html.Xqn9CnktK_ingpgMFEO0LhN5xV9LRUIIZr36n3KNJFA.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\Interceptor.tlb hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Retail-ul-phn.xrm-ms.Xqn9CnktK_ingpgMFEO0LrQNlLVZM5JS0mXN8VFT3X8.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordVL_MAK-ppd.xrm-ms.Xqn9CnktK_ingpgMFEO0LhMWTMjg4G12MojBsciz60s.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Spatial.NetFX35.V7.dll.Xqn9CnktK_ingpgMFEO0Lk9NckZARgki-vtBSH8D6mo.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteSectionGroupLargeTile.scale-125.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\ScreenSketchAppService.winmd hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\nub.png hive.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\gimap.jar.Xqn9CnktK_ingpgMFEO0LqXjGYHAr9J3dJLt0wBDOms.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.167.21\msedgeupdateres_en-GB.dll.Xqn9CnktK_ingpgMFEO0LndNXda25b48UB_85YPKSUk.hive hive.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_ja.dll.Xqn9CnktK_ingpgMFEO0Lhpttzmcjfcw96zUzOGwgB0.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNotePageWideTile.scale-400.png hive.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.properties.Xqn9CnktK_ingpgMFEO0Loy0qNyrhGhn0IulXaWYQ3o.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECHO\PREVIEW.GIF hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-white\MedTile.scale-200.png hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fi-fi\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\fi-fi\ui-strings.js.Xqn9CnktK_ingpgMFEO0Lu3kdQnLIch4xfB9_H5FRFM.hive hive.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Snippets\ShouldNotBeNullOrEmpty.snippets.ps1xml hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Trial-pl.xrm-ms.Xqn9CnktK_ingpgMFEO0Lo_MDuazaD5qo9Q_DQdv-hc.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\SETLANG.HXS.Xqn9CnktK_ingpgMFEO0Lq0O-gxo_-AYIDTm6nzV0XE.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Times New Roman-Arial.xml.Xqn9CnktK_ingpgMFEO0Lm79eLV3zkxOEubLkwWXBFw.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageLargeTile.scale-125.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-100_kzf8qxf38zg5c\Assets\Images\SkypeLogo.scale-100.png hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sv-se\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Store.Purchase\Resources\XboxResourceDictionary.xaml hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\pl-pl\ui-strings.js hive.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\ShapeCollector.exe.mui hive.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\locale\com-sun-tools-visualvm-modules-startup_ja.jar.Xqn9CnktK_ingpgMFEO0LhadtGWsJ8sLOcfAGFPSxTM.hive hive.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\uz-Latn-UZ\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\arrow-right-pressed.gif hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\cs-cz\ui-strings.js hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\bun.png hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdXC2RVL_MAKC2R-pl.xrm-ms hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\OUTLFLTR.DLL hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN097.XML hive.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailWideTile.scale-400.png hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RADIAL\THMBNAIL.PNG.Xqn9CnktK_ingpgMFEO0LvEvxZRB8ygDp0yiIw3OrX4.hive hive.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libskiptags_plugin.dll hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-32_contrast-black.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ja-jp\ui-strings.js.Xqn9CnktK_ingpgMFEO0LmjqPqg0Z2x5OobzWyuIi1Q.hive hive.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\SlowMotionEditor\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageLargeTile.scale-150.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\close-2.svg.Xqn9CnktK_ingpgMFEO0LoW78GydBHgHX5tz9PTtvB8.hive hive.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\PhotosSmallTile.scale-100.png hive.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\IC_WelcomeBanner.scale-400.png hive.exe -
Drops file in Windows directory 64 IoCs
Processes:
hive.exedescription ioc process File created C:\Windows\ServiceProfiles\LocalService\AppData\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Speech\Engines\TTS\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\ReachFramework\v4.0_4.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Resources.Writer\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.ApplicationServer.Applications\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\ro-RO\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Logs\CBS\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\common\controls\ListControl\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\debugger\Cursor\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.Windows.OOBENetworkConnectionFlow_cw5n1h2txyewy\speech\0804\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\sr-Latn-RS\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\IME\IMEJP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\ISymWrapper\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.ApplicationServer.Applications\v4.0_4.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Reflection.Extensions\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows Sidebar\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\microsoft.windows.narratorquickstart_8wekyb3d8bbwe\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\WmiApRpl\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\Security\App_LocalResources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemResources\Windows.UI.PCShell\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\header\Remote\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\microsoft.system.package.metadata\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Vss\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\App_LocalResources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.WindowsRuntime.UI.Xaml\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\Assets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Editor\v4.0_3.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\MiguiControls.Resources\v4.0_1.0.0.0_en_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics\v4.0_3.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Core.Activities\v4.0_3.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.ZipFile\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.MicrosoftEdgeDevToolsClient_8wekyb3d8bbwe\23\dom\Styles\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\TAPISRV\0409\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\Security\Roles\App_LocalResources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.Interop\v4.0_2.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices.AccountManagement\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Primitives\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\SMSvcHost 3.0.0.0\0000\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ASP.NETWebAdminFiles\Security\Users\App_LocalResources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Office.Tools.Word.Implementation\v4.0_10.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Globalization.Calendars\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WPF\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemResources\Windows.UI.Cred\pris\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\DVD\EFI\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\MUI\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data.OracleClient\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Activities.Resources\v4.0_3.0.0.0_en_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Console\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Handles\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Threading.Tasks\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Resources\Themes\aero\Shell\NormalColor\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Media\Garden\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\App_LocalResources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\Cache\abfc9659683fa5cd2867fe6923a3a71430bd6a7c\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\PNRPSvc\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Engine\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.DurableInstancing\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.DataVisualization\v4.0_4.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\SystemApps\Microsoft.XboxGameCallableUI_cw5n1h2txyewy\Control\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\Misc\PCAT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\lt-LT\HOW_TO_DECRYPT.txt hive.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4040 2548 WerFault.exe 2992 5108 WerFault.exe explorer.exe -
Delays execution with timeout.exe 64 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 2764 timeout.exe 3096 timeout.exe 1504 timeout.exe 1140 timeout.exe 4840 timeout.exe 2436 timeout.exe 5068 timeout.exe 64 timeout.exe 564 timeout.exe 3668 timeout.exe 1264 timeout.exe 5060 timeout.exe 2452 timeout.exe 412 timeout.exe 1980 timeout.exe 1888 timeout.exe 732 timeout.exe 3860 timeout.exe 3832 timeout.exe 3348 timeout.exe 4068 timeout.exe 3524 timeout.exe 3324 timeout.exe 1664 timeout.exe 4576 timeout.exe 4500 timeout.exe 4772 timeout.exe 940 timeout.exe 3472 timeout.exe 4108 timeout.exe 3432 timeout.exe 3676 timeout.exe 2992 timeout.exe 1704 timeout.exe 4752 timeout.exe 1140 timeout.exe 2316 timeout.exe 3760 timeout.exe 384 timeout.exe 4140 timeout.exe 4060 timeout.exe 4888 timeout.exe 4664 timeout.exe 4692 timeout.exe 5032 timeout.exe 2516 timeout.exe 1464 timeout.exe 952 timeout.exe 2732 timeout.exe 1872 timeout.exe 4248 timeout.exe 404 timeout.exe 2816 timeout.exe 3372 timeout.exe 1484 timeout.exe 684 timeout.exe 4612 timeout.exe 4064 timeout.exe 1424 timeout.exe 3916 timeout.exe 4080 timeout.exe 4000 timeout.exe 420 timeout.exe 1360 timeout.exe -
Modifies registry class 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-929662420-1054238289-2961194603-1000\{405324E0-5A3E-4352-8B90-889ACBFE1E0C} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
hive.exepid process 4316 hive.exe 4316 hive.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
explorer.exedescription pid process Token: SeShutdownPrivilege 5108 explorer.exe Token: SeCreatePagefilePrivilege 5108 explorer.exe Token: SeShutdownPrivilege 5108 explorer.exe Token: SeCreatePagefilePrivilege 5108 explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
explorer.exepid process 5108 explorer.exe 5108 explorer.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
explorer.exepid process 5108 explorer.exe 5108 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
hive.execmd.exedescription pid process target process PID 4316 wrote to memory of 4436 4316 hive.exe cmd.exe PID 4316 wrote to memory of 4436 4316 hive.exe cmd.exe PID 4316 wrote to memory of 4436 4316 hive.exe cmd.exe PID 4316 wrote to memory of 4508 4316 hive.exe cmd.exe PID 4316 wrote to memory of 4508 4316 hive.exe cmd.exe PID 4316 wrote to memory of 4508 4316 hive.exe cmd.exe PID 4436 wrote to memory of 4776 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4776 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4776 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 2904 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 2904 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 2904 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 5040 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 5040 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 5040 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 5060 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 5060 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 5060 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4000 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4000 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4000 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4964 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4964 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4964 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 2452 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 2452 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 2452 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3684 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3684 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3684 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4108 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4108 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4108 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3452 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3452 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3452 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4064 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4064 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4064 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 1316 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 1316 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 1316 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4200 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4200 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4200 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 2516 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 2516 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 2516 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 1424 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 1424 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 1424 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 1484 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 1484 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 1484 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3468 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3468 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3468 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3348 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3348 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3348 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4892 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4892 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 4892 4436 cmd.exe timeout.exe PID 4436 wrote to memory of 3096 4436 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\hive.exe"C:\Users\Admin\AppData\Local\Temp\hive.exe"1⤵
- Drops file in Drivers directory
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c hive.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4776
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2904
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:5040
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5060
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4000
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2452
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3684
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4108
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3452
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4064
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1316
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4200
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2516
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1424
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1484
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3468
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3348
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4892
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3096
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:420
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2940
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3476
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2316
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:952
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3916
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1248
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3224
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3760
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1504
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1864
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3100
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4888
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4772
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3600
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1140
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1264
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4900
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2436
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2448
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:384
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4248
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1664
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:5044
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5068
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4664
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3932
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4072
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1464
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1476
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4364
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4576
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:412
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4408
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:404
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4068
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4236
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2308
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1980
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:564
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1920
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4904
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4840
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:440
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:940
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2992
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4080
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3348
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4892
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3432
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4644
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3716
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1656
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3524
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4756
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:952
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3856
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2816
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3472
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3324
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3676
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:64
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4476
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1888
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3668
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4692
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3068
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5032
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4140
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3864
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:816
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4412
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1360
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:732
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2732
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1140
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1264
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4968
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:684
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2764
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2108
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1952
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1028
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4500
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3740
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1840
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3860
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3616
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3832
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4688
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:5084
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1704
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3172
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3372
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4416
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4060
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2068
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4752
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1152
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2284
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1872
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4612
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4388
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4784
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4116
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shadow.bat >NUL 2>NUL2⤵PID:4508
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 424 -p 2548 -ip 25481⤵PID:4324
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2548 -s 77041⤵
- Program crash
PID:4040
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5108 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5108 -s 21442⤵
- Program crash
PID:2992
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 356 -p 5108 -ip 51081⤵PID:4872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.Xqn9CnktK_ingpgMFEO0Lh_Of3iKTSxmUxNS7LwSbFw.hive
Filesize622KB
MD555e9dfb7d042d271c23449f83abc6056
SHA1dc1fae00c5d748dfd3217b34ae666f517621f45b
SHA25658aa59d72ac71f657937aa736bf456dbd0fa4ea6fd6b382062c4afa0466d59f6
SHA512807f9c5f6c9e211c530152a5e970fd8a2caca28a153cc7e4032f2164ad4a625a569c1c21cf287a09eb2a91b3cc8dc7d40db237d70e80818537b4184da1529b19
-
Filesize
162B
MD5fca5799115172398c63263fad7e854b1
SHA12874a1c796f511f94bed6ae020f4b20c38c59cf1
SHA25627323f85f788e124f6024486f7d2a3dee9a1e88f2fc1617625b8612e47657663
SHA512a03fecd20d94def5ea75015613d40656d85094eb5584993cd2d082b17badeef6833ae214dc1e8058bda0afe29d8a4cd9a805a2519b1ea76f2bc1cdb274a1841b
-
Filesize
57B
MD5df5552357692e0cba5e69f8fbf06abb6
SHA14714f1e6bb75a80a8faf69434726d176b70d7bd8
SHA256d158f9d53e7c37eadd3b5cc1b82d095f61484e47eda2c36d9d35f31c0b4d3ff8
SHA512a837555a1175ab515e2b43da9e493ff0ccd4366ee59defe6770327818ca9afa6f3e39ecdf5262b69253aa9e2692283ee8cebc97d58edd42e676977c7f73d143d