Analysis
-
max time kernel
150s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25-05-2023 17:45
Behavioral task
behavioral1
Sample
211xahcou.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
Hive.elf
Resource
win10-20230220-en
Behavioral task
behavioral3
Sample
hive.exe
Resource
win10-20230220-en
Behavioral task
behavioral4
Sample
hive_linux_elf
Resource
win10-20230220-en
Behavioral task
behavioral5
Sample
linux_hive.elf
Resource
win10-20230220-en
Behavioral task
behavioral6
Sample
sjl8j6ap3.exe
Resource
win10-20230220-en
Behavioral task
behavioral7
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win10-20230220-en
General
-
Target
hive.exe
-
Size
764KB
-
MD5
2f9fc82898d718f2abe99c4a6fa79e69
-
SHA1
9d336b8911c8ffd7cc809e31d5b53796bb0cc7bb
-
SHA256
88f7544a29a2ceb175a135d9fa221cbfd3e8c71f32dd6b09399717f85ea9afd1
-
SHA512
19f0879b1c54d305ab7a97a0d46ab79c103d4687fe37d5f9ef1934904eea48a1c66b1ac2de3dace6dc0d91623309287044c198cb0b3fc9f8453fbc9d1c0cae8b
-
SSDEEP
12288:CinNFNkY/yU97ppM4NSBG81Np2C9H4S3iDjlLtc4wCIITIQaOI6NrwacVYV+4MsT:CinN3n/y67jM4v4kCSPDjlLtbwt8IQLH
Malware Config
Extracted
C:\Program Files\HOW_TO_DECRYPT.txt
hive
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
Signatures
-
Detects Go variant of Hive Ransomware 15 IoCs
resource yara_rule behavioral3/memory/2008-119-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-120-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-121-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-123-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-800-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-1522-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-2801-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-3409-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-4359-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-5434-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-6480-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-7205-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-7720-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-8558-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go behavioral3/memory/2008-9364-0x00000000002A0000-0x0000000000503000-memory.dmp hive_go -
Hive
A ransomware written in Golang first seen in June 2021.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\CheckpointExpand.tiff hive.exe -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini hive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW_TO_DECRYPT.txt hive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\HOW_TO_DECRYPT.txt hive.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral3/memory/2008-118-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-119-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-120-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-121-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-123-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-800-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-1522-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-2801-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-3409-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-4359-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-5434-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-6480-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-7205-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-7720-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-8558-0x00000000002A0000-0x0000000000503000-memory.dmp upx behavioral3/memory/2008-9364-0x00000000002A0000-0x0000000000503000-memory.dmp upx -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\Music\desktop.ini hive.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini hive.exe File opened for modification C:\Users\Public\Videos\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini hive.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini hive.exe File opened for modification C:\Users\Admin\Documents\desktop.ini hive.exe File opened for modification C:\Users\Admin\Searches\desktop.ini hive.exe File opened for modification C:\Program Files\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini hive.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-640001698-3754512395-3275565439-1000\desktop.ini hive.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI hive.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini hive.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini hive.exe File opened for modification C:\Users\Admin\Videos\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini hive.exe File opened for modification C:\Users\Public\Music\desktop.ini hive.exe File opened for modification C:\Users\Public\Downloads\desktop.ini hive.exe File opened for modification C:\Users\Public\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu Places\desktop.ini hive.exe File opened for modification C:\Users\Admin\Links\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini hive.exe File opened for modification C:\Users\Public\Pictures\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini hive.exe File opened for modification C:\Users\Public\Libraries\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini hive.exe File opened for modification C:\Users\Public\Desktop\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini hive.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini hive.exe File opened for modification C:\Users\Public\Documents\desktop.ini hive.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini hive.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Web.Entity.Resources.dll hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Framework.1.3_1.3.24201.0_x86__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat hive.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_es.dll hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.Proof.Culture.msi.16.fr-fr.xml.kfxxz-QGE1auwbGK2iA7i7Oy_klmyAB2HD4itVxYCws.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-convert-l1-1-0.dll.kfxxz-QGE1auwbGK2iA7i-AkD8HFnNk72KTlF47WRjg.hive hive.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Fues\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\6918_20x20x32.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-il\ui-strings.js hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_16.511.8780.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-64.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\selector.js hive.exe File created C:\Program Files\Microsoft Office\root\vfs\Windows\assembly\GAC_MSIL\Microsoft.AnalysisServices.SPClient.Interfaces\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\sandbox.luac hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libau_plugin.dll hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\mux\libmux_asf_plugin.dll hive.exe File created C:\Program Files\Common Files\System\msadc\de-DE\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-cn\ui-strings.js hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSectionSmallTile.scale-400.png hive.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarWideTile.scale-400.png hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\de-de\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Retail-ppd.xrm-ms hive.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.ja_5.5.0.165303\feature.properties.kfxxz-QGE1auwbGK2iA7i-lUwhXqJgpbYPdApb-VdnQ.hive hive.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\DailyChallenges\Popup\FUE4_Image.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\ThemePreview\CardBacks\Western.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\SmallTile.scale-200_contrast-black.png hive.exe File opened for modification C:\Program Files\Common Files\System\msadc\ja-JP\msdaremr.dll.mui hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Assets\Logos\SplashScreen\PaintSplashScreen.scale-125.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\OneNoteSmallTile.scale-400.png hive.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmiregistry.exe hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe hive.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\mlib_image.dll hive.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\WindowsBase.resources.dll hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Marquee.xml.kfxxz-QGE1auwbGK2iA7i_POHwF1JmZXb_TqoYlkhBE.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.PasswordManager.dll hive.exe File created C:\Program Files\WindowsApps\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\ui-strings.js hive.exe File created C:\Program Files\Common Files\microsoft shared\ink\he-IL\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs_ja.jar.kfxxz-QGE1auwbGK2iA7i19H1bT_4r5igUfEHhDJsXE.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\large\nr_60x42.png hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\it-it\ui-strings.js hive.exe File opened for modification C:\Program Files\Mozilla Firefox\AccessibleMarshal.dll hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\manifestAssets\Icon.targetsize-256.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\SharpDXEngine\Rendering\Shaders\Builtin\HLSL\FullScreenQuad.fx hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2017.125.40.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.contrast-white_targetsize-36.png hive.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1702.301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\VoiceRecorderMedTile.scale-125.png hive.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe.kfxxz-QGE1auwbGK2iA7iznAeAyYvHo_WWePnSA6sH8.hive hive.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.16112.11621.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-20_altform-unplated.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-48_altform-unplated_contrast-black.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Tiles\shadow.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_x64__8wekyb3d8bbwe\TEE\en-US.Calendar.ot hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_x64__8wekyb3d8bbwe\Assets\contrast-black\WideLogo.scale-100_contrast-black.png hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\pl-pl\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] hive.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.help.webapp.nl_zh_4.4.0.v20140623020002.jar.kfxxz-QGE1auwbGK2iA7i8znqqAZvzlooqFkw6B5GTU.hive hive.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\sunmscapi.jar.kfxxz-QGE1auwbGK2iA7izJPY-vLTFsIrqQGrDfLf0E.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Content\desktop\en-US\doc_offline_accessibility.xml hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-36_contrast-white.png hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\AccessRuntime2019_eula.txt.kfxxz-QGE1auwbGK2iA7i0uOmLrjszZ-0Kk03iZZTlo.hive hive.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\xjc.exe hive.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\System.Printing.resources.dll hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\gameEnd_background_symbols.jpg hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\OneNotePageMedTile.scale-150.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\large\tj_60x42.png hive.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\DVD\PCAT\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\hr-HR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\IME\IMEKR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\IME\IMETC\DICTS\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\Resources\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Branding\Basebrd\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\CbsTemp\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Downloaded Program Files\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\DVD\EFI\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Globalization\Time Zone\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\Windows\ContentStore\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET Memory Cache 4.0\0C0A\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\qps-ploc\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\OEM\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\IME\IMEKR\HELP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET Data Provider for Oracle\0000\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET Data Provider for SqlServer\040C\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\AppPatch\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\DVD\PCAT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\DVD\PCAT\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\de-DE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET CLR Data\0410\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET Data Provider for Oracle\0410\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NETFramework\0411\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\nl-NL\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\qps-ploc\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\sv-SE\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\fr-CA\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\Corporate\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\mui\040C\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\OEM\ContentStore\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\AppPatch\Custom\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\hu-HU\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\Windows\IndexStore\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET CLR Networking\0409\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET Data Provider for SqlServer\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\AppPatch\Custom\Custom64\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\bg-BG\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Branding\ShellBrd\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Globalization\Sorting\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\IME\IMEJP\help\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\Resources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Branding\Basebrd\it-IT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Globalization\ELS\Transliteration\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Fonts\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\Windows\ContentStore\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET Memory Cache 4.0\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\hu-HU\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET CLR Data\0409\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET CLR Networking 4.0.0.0\0000\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\IME\IMEJP\DICTS\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET CLR Networking\0407\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET CLR Networking 4.0.0.0\0411\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NETFramework\0C0A\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\da-DK\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\lt-LT\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\da-DK\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\GameBarPresenceWriter\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Globalization\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NETFramework\040C\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\Windows\HOW_TO_DECRYPT.txt hive.exe -
Delays execution with timeout.exe 64 IoCs
pid Process 4956 timeout.exe 1324 timeout.exe 96 timeout.exe 5004 timeout.exe 4336 timeout.exe 5092 timeout.exe 4352 timeout.exe 4392 timeout.exe 4092 timeout.exe 1216 timeout.exe 2016 timeout.exe 5024 timeout.exe 4104 timeout.exe 2580 timeout.exe 3412 timeout.exe 4344 timeout.exe 4792 timeout.exe 4380 timeout.exe 3288 timeout.exe 4728 timeout.exe 1504 timeout.exe 3952 timeout.exe 3688 timeout.exe 4700 timeout.exe 4776 timeout.exe 4892 timeout.exe 4032 timeout.exe 4160 timeout.exe 1080 timeout.exe 2132 timeout.exe 3996 timeout.exe 5008 timeout.exe 4424 timeout.exe 4400 timeout.exe 2164 timeout.exe 5080 timeout.exe 2580 timeout.exe 4788 timeout.exe 5088 timeout.exe 4196 timeout.exe 3928 timeout.exe 5040 timeout.exe 3288 timeout.exe 4760 timeout.exe 3984 timeout.exe 1136 timeout.exe 1480 timeout.exe 2540 timeout.exe 4176 timeout.exe 2992 timeout.exe 220 timeout.exe 4040 timeout.exe 4412 timeout.exe 5076 timeout.exe 4104 timeout.exe 2628 timeout.exe 220 timeout.exe 2832 timeout.exe 200 timeout.exe 2100 timeout.exe 2492 timeout.exe 1276 timeout.exe 312 timeout.exe 2168 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4052 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2008 hive.exe 2008 hive.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 4744 vssvc.exe Token: SeRestorePrivilege 4744 vssvc.exe Token: SeAuditPrivilege 4744 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2276 2008 hive.exe 66 PID 2008 wrote to memory of 2276 2008 hive.exe 66 PID 2008 wrote to memory of 2276 2008 hive.exe 66 PID 2008 wrote to memory of 2444 2008 hive.exe 67 PID 2008 wrote to memory of 2444 2008 hive.exe 67 PID 2008 wrote to memory of 2444 2008 hive.exe 67 PID 2444 wrote to memory of 4052 2444 cmd.exe 70 PID 2444 wrote to memory of 4052 2444 cmd.exe 70 PID 2444 wrote to memory of 4052 2444 cmd.exe 70 PID 2276 wrote to memory of 4300 2276 cmd.exe 71 PID 2276 wrote to memory of 4300 2276 cmd.exe 71 PID 2276 wrote to memory of 4300 2276 cmd.exe 71 PID 2276 wrote to memory of 3544 2276 cmd.exe 73 PID 2276 wrote to memory of 3544 2276 cmd.exe 73 PID 2276 wrote to memory of 3544 2276 cmd.exe 73 PID 2276 wrote to memory of 4116 2276 cmd.exe 74 PID 2276 wrote to memory of 4116 2276 cmd.exe 74 PID 2276 wrote to memory of 4116 2276 cmd.exe 74 PID 2276 wrote to memory of 2016 2276 cmd.exe 75 PID 2276 wrote to memory of 2016 2276 cmd.exe 75 PID 2276 wrote to memory of 2016 2276 cmd.exe 75 PID 2276 wrote to memory of 2100 2276 cmd.exe 76 PID 2276 wrote to memory of 2100 2276 cmd.exe 76 PID 2276 wrote to memory of 2100 2276 cmd.exe 76 PID 2276 wrote to memory of 3196 2276 cmd.exe 77 PID 2276 wrote to memory of 3196 2276 cmd.exe 77 PID 2276 wrote to memory of 3196 2276 cmd.exe 77 PID 2276 wrote to memory of 4196 2276 cmd.exe 78 PID 2276 wrote to memory of 4196 2276 cmd.exe 78 PID 2276 wrote to memory of 4196 2276 cmd.exe 78 PID 2276 wrote to memory of 1276 2276 cmd.exe 79 PID 2276 wrote to memory of 1276 2276 cmd.exe 79 PID 2276 wrote to memory of 1276 2276 cmd.exe 79 PID 2276 wrote to memory of 4104 2276 cmd.exe 80 PID 2276 wrote to memory of 4104 2276 cmd.exe 80 PID 2276 wrote to memory of 4104 2276 cmd.exe 80 PID 2276 wrote to memory of 4392 2276 cmd.exe 81 PID 2276 wrote to memory of 4392 2276 cmd.exe 81 PID 2276 wrote to memory of 4392 2276 cmd.exe 81 PID 2276 wrote to memory of 5040 2276 cmd.exe 82 PID 2276 wrote to memory of 5040 2276 cmd.exe 82 PID 2276 wrote to memory of 5040 2276 cmd.exe 82 PID 2276 wrote to memory of 3396 2276 cmd.exe 83 PID 2276 wrote to memory of 3396 2276 cmd.exe 83 PID 2276 wrote to memory of 3396 2276 cmd.exe 83 PID 2276 wrote to memory of 4252 2276 cmd.exe 84 PID 2276 wrote to memory of 4252 2276 cmd.exe 84 PID 2276 wrote to memory of 4252 2276 cmd.exe 84 PID 2276 wrote to memory of 3004 2276 cmd.exe 85 PID 2276 wrote to memory of 3004 2276 cmd.exe 85 PID 2276 wrote to memory of 3004 2276 cmd.exe 85 PID 2276 wrote to memory of 4032 2276 cmd.exe 86 PID 2276 wrote to memory of 4032 2276 cmd.exe 86 PID 2276 wrote to memory of 4032 2276 cmd.exe 86 PID 2276 wrote to memory of 3872 2276 cmd.exe 87 PID 2276 wrote to memory of 3872 2276 cmd.exe 87 PID 2276 wrote to memory of 3872 2276 cmd.exe 87 PID 2276 wrote to memory of 2100 2276 cmd.exe 88 PID 2276 wrote to memory of 2100 2276 cmd.exe 88 PID 2276 wrote to memory of 2100 2276 cmd.exe 88 PID 2276 wrote to memory of 4956 2276 cmd.exe 89 PID 2276 wrote to memory of 4956 2276 cmd.exe 89 PID 2276 wrote to memory of 4956 2276 cmd.exe 89 PID 2276 wrote to memory of 4792 2276 cmd.exe 90 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\hive.exe"C:\Users\Admin\AppData\Local\Temp\hive.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c hive.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4300
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3544
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4116
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2016
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2100
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3196
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4196
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1276
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4104
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4392
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5040
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3396
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4252
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3004
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4032
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3872
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2100
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4956
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4792
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4160
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1412
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4296
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4380
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3492
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:408
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4092
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3144
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1136
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1080
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1324
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:760
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4104
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2504
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4424
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4108
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1216
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:1272
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3688
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:732
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2168
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2580
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5004
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2132
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2832
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2628
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1480
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2540
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:5032
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:780
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4444
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4160
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2832
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:700
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3452
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4176
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4400
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3964
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2992
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4952
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:220
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2016
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4156
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3288
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4976
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3212
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4336
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4948
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:312
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3320
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:220
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4760
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:644
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3144
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:5020
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:204
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3864
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4788
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2580
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5092
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4700
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4732
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4352
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4040
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4776
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3996
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:400
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3412
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:96
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1504
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:700
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4860
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3384
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4320
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2832
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3952
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3960
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5024
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3288
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4188
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2132
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3984
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5088
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:3452
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3928
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5008
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:2740
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2164
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4892
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4412
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2492
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5076
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4344
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:5080
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:4728
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵PID:4108
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:200
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shadow.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:4052
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
1KB
MD580207d0f8ea42bdfeaf9f5c586230aca
SHA1747481fe2b0b6d81c3b19ba62d1e49eab6a5461f
SHA25625edefb3b0678dfe0d927ff48ce67254359ba379df9468f634d02c026f0e7131
SHA51273f68ce9e98d2346be1762bd54bb06ef83ae939dfbcf9b786d9b773fa454352613387d264b7a87a1c08950226553817bf01f5aa4107bc12de36a1689e2137304
-
Filesize
162B
MD5fca5799115172398c63263fad7e854b1
SHA12874a1c796f511f94bed6ae020f4b20c38c59cf1
SHA25627323f85f788e124f6024486f7d2a3dee9a1e88f2fc1617625b8612e47657663
SHA512a03fecd20d94def5ea75015613d40656d85094eb5584993cd2d082b17badeef6833ae214dc1e8058bda0afe29d8a4cd9a805a2519b1ea76f2bc1cdb274a1841b
-
Filesize
57B
MD5df5552357692e0cba5e69f8fbf06abb6
SHA14714f1e6bb75a80a8faf69434726d176b70d7bd8
SHA256d158f9d53e7c37eadd3b5cc1b82d095f61484e47eda2c36d9d35f31c0b4d3ff8
SHA512a837555a1175ab515e2b43da9e493ff0ccd4366ee59defe6770327818ca9afa6f3e39ecdf5262b69253aa9e2692283ee8cebc97d58edd42e676977c7f73d143d