Analysis
-
max time kernel
61s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 20:57
Behavioral task
behavioral1
Sample
211xahcou.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Hive.elf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
hive.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
hive_linux_elf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
linux_hive.elf
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
sjl8j6ap3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
windows_25bfec0c3c81ab55cf85a57367c14cc6803a03e2e9b4afd72e7bbca9420fe7c5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
zi1ysv64h.exe
Resource
win10v2004-20241007-en
General
-
Target
hive.exe
-
Size
764KB
-
MD5
2f9fc82898d718f2abe99c4a6fa79e69
-
SHA1
9d336b8911c8ffd7cc809e31d5b53796bb0cc7bb
-
SHA256
88f7544a29a2ceb175a135d9fa221cbfd3e8c71f32dd6b09399717f85ea9afd1
-
SHA512
19f0879b1c54d305ab7a97a0d46ab79c103d4687fe37d5f9ef1934904eea48a1c66b1ac2de3dace6dc0d91623309287044c198cb0b3fc9f8453fbc9d1c0cae8b
-
SSDEEP
12288:CinNFNkY/yU97ppM4NSBG81Np2C9H4S3iDjlLtc4wCIITIQaOI6NrwacVYV+4MsT:CinN3n/y67jM4v4kCSPDjlLtbwt8IQLH
Malware Config
Extracted
C:\$Recycle.Bin\HOW_TO_DECRYPT.txt
hive
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
Signatures
-
Detects Go variant of Hive Ransomware 7 IoCs
resource yara_rule behavioral3/memory/4468-2-0x0000000000850000-0x0000000000AB3000-memory.dmp hive_go behavioral3/memory/4468-1-0x0000000000850000-0x0000000000AB3000-memory.dmp hive_go behavioral3/memory/4468-2041-0x0000000000850000-0x0000000000AB3000-memory.dmp hive_go behavioral3/memory/4468-4289-0x0000000000850000-0x0000000000AB3000-memory.dmp hive_go behavioral3/memory/4468-6344-0x0000000000850000-0x0000000000AB3000-memory.dmp hive_go behavioral3/memory/4468-10203-0x0000000000850000-0x0000000000AB3000-memory.dmp hive_go behavioral3/memory/4468-15451-0x0000000000850000-0x0000000000AB3000-memory.dmp hive_go -
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW_TO_DECRYPT.txt hive.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini hive.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\Users\Public\Documents\desktop.ini hive.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini hive.exe File opened for modification C:\Users\Public\Desktop\desktop.ini hive.exe File opened for modification C:\Program Files\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini hive.exe File opened for modification C:\Users\Public\Pictures\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini hive.exe File opened for modification C:\Users\Admin\Documents\desktop.ini hive.exe File opened for modification C:\Users\Admin\Links\desktop.ini hive.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Admin\Music\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini hive.exe File opened for modification C:\Users\Admin\Videos\desktop.ini hive.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini hive.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini hive.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini hive.exe File opened for modification C:\Users\Public\Libraries\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini hive.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini hive.exe File opened for modification C:\Users\Admin\Searches\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini hive.exe File opened for modification C:\Users\Public\Downloads\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini hive.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini hive.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini hive.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini hive.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini hive.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini hive.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini hive.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini hive.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini hive.exe File opened for modification C:\Users\Public\Music\desktop.ini hive.exe File opened for modification C:\Users\Public\desktop.ini hive.exe -
resource yara_rule behavioral3/memory/4468-0-0x0000000000850000-0x0000000000AB3000-memory.dmp upx behavioral3/memory/4468-2-0x0000000000850000-0x0000000000AB3000-memory.dmp upx behavioral3/memory/4468-1-0x0000000000850000-0x0000000000AB3000-memory.dmp upx behavioral3/memory/4468-2041-0x0000000000850000-0x0000000000AB3000-memory.dmp upx behavioral3/memory/4468-4289-0x0000000000850000-0x0000000000AB3000-memory.dmp upx behavioral3/memory/4468-6344-0x0000000000850000-0x0000000000AB3000-memory.dmp upx behavioral3/memory/4468-10203-0x0000000000850000-0x0000000000AB3000-memory.dmp upx behavioral3/memory/4468-15451-0x0000000000850000-0x0000000000AB3000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-96.png hive.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\dcpr.dll hive.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\PresentationFramework.resources.dll hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-30.png hive.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.Windows.Forms.resources.dll hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\rss.gif hive.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge_elf.dll hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\pt-br\ui-strings.js.xr_3B3Rbm-rhknkTZmPAJ599K2uJoc47lvfDJd-3oXk.hive hive.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt.xr_3B3Rbm-rhknkTZmPAJ-lUv7rRI3Q9tDBn07RlFR0.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\sql70.xsl.xr_3B3Rbm-rhknkTZmPAJ6hy9Xz4mLZtfkY8rduwNV4.hive hive.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxAccountsLargeTile.scale-100.png hive.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hans\System.Xaml.resources.dll hive.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\vlc.mo.xr_3B3Rbm-rhknkTZmPAJ7zhadiv7ScX9VTCNBLEoT0.hive hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\HomeBanner_Dark.pdf.xr_3B3Rbm-rhknkTZmPAJ9DC7-3uRRphhIJGPaXWJWg.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\msedge_100_percent.pak.DATA.xr_3B3Rbm-rhknkTZmPAJ9vr-l8AX4h7LDCo2cSh-GQ.hive hive.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\PresentationFramework.Aero.dll hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\japanese_over.png hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power View Excel Add-in\Microsoft.ReportingServices.AdHoc.Excel.Client.Entry.Interfaces.dll hive.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\MedTile.scale-125.png hive.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-white\MedTile.scale-125.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Advertising.Xaml_10.1808.3.0_x64__8wekyb3d8bbwe\Microsoft.Advertising\ormma.js hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\OrientationControlInnerCircleHover.png hive.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\System.Windows.Forms.Design.resources.dll.xr_3B3Rbm-rhknkTZmPAJxn79lDx5fFepZschWWy41I.hive hive.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Retail-pl.xrm-ms hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\en-gb\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\close.svg hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\AdobePiStd.otf hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL077.XML.xr_3B3Rbm-rhknkTZmPAJ_aewVhcoEdaU6bFah9_eEQ.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxBlockMap.xml hive.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PSReadline\2.0.0\Microsoft.PowerShell.PSReadline.dll.xr_3B3Rbm-rhknkTZmPAJ8Y_iskFhWFuRA5l3zzsDEI.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\fr-CA.pak hive.exe File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\it\Microsoft.Build.Engine.resources.dll hive.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\msdia90.dll hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-200_8wekyb3d8bbwe\AppxBlockMap.xml hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-30_contrast-black.png hive.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Threading.Tasks.Parallel.dll.xr_3B3Rbm-rhknkTZmPAJw8VTNip5zA_geQg5GzWASA.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Data.Edm.NetFX35.dll hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hr-hr\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Res.dll hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vreg\proof.es-es.msi.16.es-es.vreg.dat.xr_3B3Rbm-rhknkTZmPAJ0DApRDoC-00Qeoh26B8TSM.hive hive.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\goopdateres_fil.dll.xr_3B3Rbm-rhknkTZmPAJ34A5aLJVeF1Da5g2yICgBk.hive hive.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\msedgeupdateres_am.dll.xr_3B3Rbm-rhknkTZmPAJzKWwnoW6B1MYULYq1sg-Cs.hive hive.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\MOFL.DLL hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_Grace-ppd.xrm-ms hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\SmallTile.scale-100.png hive.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\System.Xaml.resources.dll.xr_3B3Rbm-rhknkTZmPAJ_Qc5UNNUQ1LRb0sOHyZjH8.hive hive.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\editpdf.svg.xr_3B3Rbm-rhknkTZmPAJ-k4OFFnhzROcrGyPeiEwnM.hive hive.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\optimization_guide_internal.dll hive.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Grace-ppd.xrm-ms hive.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\charsets.jar.xr_3B3Rbm-rhknkTZmPAJ3ofHwAUB-449_pJ1wMTPCw.hive hive.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\Ratings\Yelp9.scale-200.png hive.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\HOW_TO_DECRYPT.txt hive.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\kk-KZ\View3d\HOW_TO_DECRYPT.txt hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\SkypeTile.scale-200.png hive.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.ServiceProcess.dll hive.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\System.Windows.Forms.Primitives.resources.dll.xr_3B3Rbm-rhknkTZmPAJ7zCVY4PoPFd2qnt6v3Hhlo.hive hive.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe.xr_3B3Rbm-rhknkTZmPAJ1i9UEHAH5djsU9RMawSGC8.hive hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-20_altform-unplated.png hive.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\GamesXboxHubSplashScreen.scale-100.png hive.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\Microsoft.Ink.dll hive.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\iexplore.exe.mui hive.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\INF\RemoteAccess\0411\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\UGTHRSVC\0411\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Media\Cityscape\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\Resources\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\XamlViewer\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\.NET Data Provider for Oracle\0000\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\WPF\es-ES\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ASP.NETWebAdminFiles\Images\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.ConfigCI.Commands.Resources\v4.0_10.0.0.0_ja_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\ServiceModelOperation 3.0.0.0\0407\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Logs\CBS\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\Security\Roles\App_LocalResources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.Tpm.Commands\v4.0_10.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\MSDTC\040C\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\TermService\0C0A\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\Windows Workflow Foundation 3.0.0.0\0000\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Logs\DISM\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\wsearchidxpi\0411\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ImmersiveControlPanel\images\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ImmersiveControlPanel\pris\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.Security.ApplicationId.PolicyManagement.PolicyEngineApi.Interop\v4.0_10.0.0.0__31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\MSDTC Bridge 4.0.0.0\0410\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\ServiceModelService 3.0.0.0\0407\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Installer\$PatchCache$\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ASP.NETWebAdminFiles\Security\Roles\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\lv-LV\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\cs-CZ\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\ServiceModelOperation 3.0.0.0\0000\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\CbsTemp\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\MUI\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\EFI\pt-BR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v3.5\MOF\it\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\3082\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.ConfigCI.Commands.Resources\v4.0_10.0.0.0_ja_31bf3856ad364e35\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Security.ApplicationId.PolicyManagement.PolicyEngineApi.Interop\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\Windows\IndexStore\en-US\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\MSDTC\0000\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\SMSvcHost 3.0.0.0\0407\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v3.0\WPF\ja-JP\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\WmiApRpl\0009\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ImmersiveControlPanel\microsoft.system.package.metadata\Autogen\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\1036\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ASP.NETWebAdminFiles\App_GlobalResources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Help\mui\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\MSDTC\0C0A\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\SMSvcHost 3.0.0.0\0000\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\Windows Workflow Foundation 4.0.0.0\0000\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WPF\Fonts\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Boot\PCAT\uk-UA\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\es\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\ImmersiveControlPanel\SystemSettings\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework\v3.5\ja\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\fr-FR\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\MSDTC\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\MSDTC Bridge 3.0.0.0\0411\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\SMSvcHost 3.0.0.0\040C\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\es\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\MSDTC Bridge 3.0.0.0\0000\HOW_TO_DECRYPT.txt hive.exe File created C:\Windows\INF\UGatherer\0409\HOW_TO_DECRYPT.txt hive.exe -
System Location Discovery: System Language Discovery 1 TTPs 48 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 45 IoCs
pid Process 4040 timeout.exe 4668 timeout.exe 2624 timeout.exe 2376 timeout.exe 5048 timeout.exe 2828 timeout.exe 3200 timeout.exe 2024 timeout.exe 4428 timeout.exe 3948 timeout.exe 1976 timeout.exe 4720 timeout.exe 4276 timeout.exe 2676 timeout.exe 4736 timeout.exe 3272 timeout.exe 4392 timeout.exe 4688 timeout.exe 4792 timeout.exe 4408 timeout.exe 8 timeout.exe 4496 timeout.exe 2032 timeout.exe 1556 timeout.exe 2076 timeout.exe 2032 timeout.exe 2220 timeout.exe 3196 timeout.exe 1712 timeout.exe 5080 timeout.exe 1128 timeout.exe 4960 timeout.exe 2284 timeout.exe 4056 timeout.exe 4252 timeout.exe 3448 timeout.exe 700 timeout.exe 4112 timeout.exe 4396 timeout.exe 624 timeout.exe 2968 timeout.exe 1440 timeout.exe 2668 timeout.exe 4328 timeout.exe 4824 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4468 hive.exe 4468 hive.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4468 wrote to memory of 2116 4468 hive.exe 90 PID 4468 wrote to memory of 2116 4468 hive.exe 90 PID 4468 wrote to memory of 2116 4468 hive.exe 90 PID 4468 wrote to memory of 2372 4468 hive.exe 91 PID 4468 wrote to memory of 2372 4468 hive.exe 91 PID 4468 wrote to memory of 2372 4468 hive.exe 91 PID 2116 wrote to memory of 2828 2116 cmd.exe 94 PID 2116 wrote to memory of 2828 2116 cmd.exe 94 PID 2116 wrote to memory of 2828 2116 cmd.exe 94 PID 2116 wrote to memory of 1976 2116 cmd.exe 95 PID 2116 wrote to memory of 1976 2116 cmd.exe 95 PID 2116 wrote to memory of 1976 2116 cmd.exe 95 PID 2116 wrote to memory of 1556 2116 cmd.exe 96 PID 2116 wrote to memory of 1556 2116 cmd.exe 96 PID 2116 wrote to memory of 1556 2116 cmd.exe 96 PID 2116 wrote to memory of 4720 2116 cmd.exe 97 PID 2116 wrote to memory of 4720 2116 cmd.exe 97 PID 2116 wrote to memory of 4720 2116 cmd.exe 97 PID 2116 wrote to memory of 4276 2116 cmd.exe 98 PID 2116 wrote to memory of 4276 2116 cmd.exe 98 PID 2116 wrote to memory of 4276 2116 cmd.exe 98 PID 2116 wrote to memory of 2676 2116 cmd.exe 99 PID 2116 wrote to memory of 2676 2116 cmd.exe 99 PID 2116 wrote to memory of 2676 2116 cmd.exe 99 PID 2116 wrote to memory of 4396 2116 cmd.exe 100 PID 2116 wrote to memory of 4396 2116 cmd.exe 100 PID 2116 wrote to memory of 4396 2116 cmd.exe 100 PID 2116 wrote to memory of 624 2116 cmd.exe 101 PID 2116 wrote to memory of 624 2116 cmd.exe 101 PID 2116 wrote to memory of 624 2116 cmd.exe 101 PID 2116 wrote to memory of 2076 2116 cmd.exe 102 PID 2116 wrote to memory of 2076 2116 cmd.exe 102 PID 2116 wrote to memory of 2076 2116 cmd.exe 102 PID 2116 wrote to memory of 4040 2116 cmd.exe 103 PID 2116 wrote to memory of 4040 2116 cmd.exe 103 PID 2116 wrote to memory of 4040 2116 cmd.exe 103 PID 2116 wrote to memory of 4688 2116 cmd.exe 104 PID 2116 wrote to memory of 4688 2116 cmd.exe 104 PID 2116 wrote to memory of 4688 2116 cmd.exe 104 PID 2116 wrote to memory of 3200 2116 cmd.exe 105 PID 2116 wrote to memory of 3200 2116 cmd.exe 105 PID 2116 wrote to memory of 3200 2116 cmd.exe 105 PID 2116 wrote to memory of 4960 2116 cmd.exe 106 PID 2116 wrote to memory of 4960 2116 cmd.exe 106 PID 2116 wrote to memory of 4960 2116 cmd.exe 106 PID 2116 wrote to memory of 4112 2116 cmd.exe 107 PID 2116 wrote to memory of 4112 2116 cmd.exe 107 PID 2116 wrote to memory of 4112 2116 cmd.exe 107 PID 2116 wrote to memory of 2968 2116 cmd.exe 108 PID 2116 wrote to memory of 2968 2116 cmd.exe 108 PID 2116 wrote to memory of 2968 2116 cmd.exe 108 PID 2116 wrote to memory of 1440 2116 cmd.exe 109 PID 2116 wrote to memory of 1440 2116 cmd.exe 109 PID 2116 wrote to memory of 1440 2116 cmd.exe 109 PID 2116 wrote to memory of 2284 2116 cmd.exe 110 PID 2116 wrote to memory of 2284 2116 cmd.exe 110 PID 2116 wrote to memory of 2284 2116 cmd.exe 110 PID 2116 wrote to memory of 4668 2116 cmd.exe 112 PID 2116 wrote to memory of 4668 2116 cmd.exe 112 PID 2116 wrote to memory of 4668 2116 cmd.exe 112 PID 2116 wrote to memory of 2024 2116 cmd.exe 113 PID 2116 wrote to memory of 2024 2116 cmd.exe 113 PID 2116 wrote to memory of 2024 2116 cmd.exe 113 PID 2116 wrote to memory of 4736 2116 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\hive.exe"C:\Users\Admin\AppData\Local\Temp\hive.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c hive.bat >NUL 2>NUL2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2828
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1976
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1556
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4720
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4276
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2676
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4396
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:624
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2076
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4040
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4688
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3200
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4960
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4112
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2968
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1440
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2284
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4668
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2024
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4736
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3272
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4792
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4056
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4408
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2032
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2668
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4428
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:8
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2220
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2624
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3196
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4252
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2376
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1712
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5080
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1128
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3448
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4496
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3948
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4328
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2032
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4392
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:700
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4824
-
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shadow.bat >NUL 2>NUL2⤵
- System Location Discovery: System Language Discovery
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD580207d0f8ea42bdfeaf9f5c586230aca
SHA1747481fe2b0b6d81c3b19ba62d1e49eab6a5461f
SHA25625edefb3b0678dfe0d927ff48ce67254359ba379df9468f634d02c026f0e7131
SHA51273f68ce9e98d2346be1762bd54bb06ef83ae939dfbcf9b786d9b773fa454352613387d264b7a87a1c08950226553817bf01f5aa4107bc12de36a1689e2137304
-
Filesize
129B
MD5cb396269ac279b793349266635b7e42b
SHA1d5a694b65028e8a18d15131793f813f5565ebffd
SHA2561b4aaffa52e664b52c5a9aaaaa52f51b59836382ee32a89f6b53495a43b154f0
SHA5125bb07806a572b2bdb9262666bdcb3416f15dc951faeff02b6beb299d843b336edb0d5f950b45ea1e1cabf503bfc1ca4ff395440342efaf5ddb80a5f8efa9f865
-
Filesize
162B
MD5fca5799115172398c63263fad7e854b1
SHA12874a1c796f511f94bed6ae020f4b20c38c59cf1
SHA25627323f85f788e124f6024486f7d2a3dee9a1e88f2fc1617625b8612e47657663
SHA512a03fecd20d94def5ea75015613d40656d85094eb5584993cd2d082b17badeef6833ae214dc1e8058bda0afe29d8a4cd9a805a2519b1ea76f2bc1cdb274a1841b
-
Filesize
57B
MD5df5552357692e0cba5e69f8fbf06abb6
SHA14714f1e6bb75a80a8faf69434726d176b70d7bd8
SHA256d158f9d53e7c37eadd3b5cc1b82d095f61484e47eda2c36d9d35f31c0b4d3ff8
SHA512a837555a1175ab515e2b43da9e493ff0ccd4366ee59defe6770327818ca9afa6f3e39ecdf5262b69253aa9e2692283ee8cebc97d58edd42e676977c7f73d143d