Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe
-
Size
2.5MB
-
MD5
760ccfdb30fe7eaab9cd4c7450d73c24
-
SHA1
5eb8513686554a871a8dea173f0c175eeec74f38
-
SHA256
2f0944e818cdf3f006a5b25ea2c39a2a7c914682a2653c60f22e971f3d84c709
-
SHA512
25050f6fa163acec8de703210439d004ce1a752dea70ca6c7daea8c5d19c46647f573e1934609e5aeeee787dd6ef180701304f9f695fa30193f2d9704aaaa5c5
-
SSDEEP
24576:pT6Gyv2Cc+qVzsnjRaPTbGQtIYph4qDqz15QAml7+GgEEtKBM7i4ArwRV6LUEFga:pCXo8m04Td2xDoCLyv1D1
Malware Config
Extracted
C:\Program Files\UZEP_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Disables service(s) 3 TTPs
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 5512 wevtutil.exe 512 wevtutil.exe 2236 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 3648 powershell.exe 5928 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdFilter\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-32_altform-unplated_contrast-white.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\fr-ma\ui-strings.js.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_-XZKbsr4lr40.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\am_get.svg.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_wXCy5EIJ9V00.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\images\splashscreen.scale-200.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected]_ONvcbmD_ZReH960YhR80.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\NIRMALA.TTF.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_40CGjLjf8E80.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Videos\Help\RoundedFreehand3D.mp4 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.targetsize-60_altform-unplated.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\uk-UA\TabTip32.exe.mui 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Internet Explorer\fr-FR\ieinstal.exe.mui.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_1lAREbjKPic0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\7-Zip\readme.txt.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_sV74hc_2XWs0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppPackageAppList.scale-125.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\ScreenSketchSquare71x71Logo.scale-100_contrast-white.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-16.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\create_stream.html.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD__MvAuDIgFkI0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-36_altform-unplated_contrast-black.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\ccloud.png.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_X4t4D0v5WMc0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_ONwxeEKnF5w0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-pl.xrm-ms.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_eB1CjtES1PM0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdVL_MAK-pl.xrm-ms.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_J619jk24_Wo0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\32.jpg 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\SmallTile.scale-125.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\Weather_TileWide.scale-200.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\Wide310x150\PaintWideTile.scale-150.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File created C:\Program Files\Java\jdk-1.8\include\UZEP_HOW_TO_DECRYPT.txt 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File created C:\Program Files\Microsoft Office\root\Office16\Library\Analysis\UZEP_HOW_TO_DECRYPT.txt 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\jpeg.md.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_jnkO80GH5cM0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp-pl.xrm-ms.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_tAsErIqJyyo0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color120.jpg 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\WideLogo.scale-125_contrast-black.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\s_checkbox_selected_18.svg.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_04u14nhVHgw0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\cs-cz\UZEP_HOW_TO_DECRYPT.txt 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-black\MixedRealityPortalAppList.targetsize-48_altform-unplated_contrast-black.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\resources.b783ffe3.pri 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\hu-hu\ui-strings.js.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_yBxUO5PVVXI0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA6\UZEP_HOW_TO_DECRYPT.txt 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\AccessMessageDismissal.txt.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_bJX8-AqIcMc0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\Icon_Xbox_PhotosSplashWideTile.scale-200.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\CalculatorMedTile.contrast-black_scale-100.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\ja-jp\ui-strings.js.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_geNMsyigMgA0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\winamp2.xml.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_cvMe18rZiRo0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\resources.pri 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosLargeTile.contrast-white_scale-200.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\AppxManifest.xml 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\de-de\ui-strings.js.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_bSOQwj6bM2E0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\tr-tr\UZEP_HOW_TO_DECRYPT.txt 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrlatinlm.dat 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL106.XML.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_pXMdPQRMco00.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.scale-125.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\AppxSignature.p7x 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\themes\dark\s_opencarat_18.svg.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_rBpoaZ1Laug0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Microsoft_WebMediaExtensions.winmd 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-72_altform-lightunplated.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\A12_Spinner.gif.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_pbEW-hRfDlw0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-white\WideTile.scale-125.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\hr-hr\ui-strings.js.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_Z9WgXBlf_PQ0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\fi-fi\ui-strings.js.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_lKDjsViguTI0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\fr-ma\ui-strings.js.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_g7vEL_Owxu80.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageBadgeLogo.scale-125_contrast-white.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSplashLogo.scale-400.png 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_reportabuse-default_18.svg.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_vtdNBwKGt5A0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\rhp_world_icon_hover.png.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_IJap6Yz3OK00.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\es-ES\msdaremr.dll.mui.91urhrOeLOtr1WvDpU3X57bUF4wHm8O4Rjq_ONvcbmD_4dwxboUqndk0.gtqbv 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\micaut.dll.mui 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5540 sc.exe 4944 sc.exe 2184 sc.exe 2548 sc.exe 2080 sc.exe 740 sc.exe 228 sc.exe 6004 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4368 PING.EXE 5144 cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4344 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4368 PING.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3648 powershell.exe 3648 powershell.exe 3648 powershell.exe 5928 powershell.exe 5928 powershell.exe 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 5512 wevtutil.exe Token: SeBackupPrivilege 5512 wevtutil.exe Token: SeSecurityPrivilege 512 wevtutil.exe Token: SeBackupPrivilege 512 wevtutil.exe Token: SeSecurityPrivilege 2236 wevtutil.exe Token: SeBackupPrivilege 2236 wevtutil.exe Token: SeIncreaseQuotaPrivilege 3420 wmic.exe Token: SeSecurityPrivilege 3420 wmic.exe Token: SeTakeOwnershipPrivilege 3420 wmic.exe Token: SeLoadDriverPrivilege 3420 wmic.exe Token: SeSystemProfilePrivilege 3420 wmic.exe Token: SeSystemtimePrivilege 3420 wmic.exe Token: SeProfSingleProcessPrivilege 3420 wmic.exe Token: SeIncBasePriorityPrivilege 3420 wmic.exe Token: SeCreatePagefilePrivilege 3420 wmic.exe Token: SeBackupPrivilege 3420 wmic.exe Token: SeRestorePrivilege 3420 wmic.exe Token: SeShutdownPrivilege 3420 wmic.exe Token: SeDebugPrivilege 3420 wmic.exe Token: SeSystemEnvironmentPrivilege 3420 wmic.exe Token: SeRemoteShutdownPrivilege 3420 wmic.exe Token: SeUndockPrivilege 3420 wmic.exe Token: SeManageVolumePrivilege 3420 wmic.exe Token: 33 3420 wmic.exe Token: 34 3420 wmic.exe Token: 35 3420 wmic.exe Token: 36 3420 wmic.exe Token: SeIncreaseQuotaPrivilege 4444 wmic.exe Token: SeSecurityPrivilege 4444 wmic.exe Token: SeTakeOwnershipPrivilege 4444 wmic.exe Token: SeLoadDriverPrivilege 4444 wmic.exe Token: SeSystemProfilePrivilege 4444 wmic.exe Token: SeSystemtimePrivilege 4444 wmic.exe Token: SeProfSingleProcessPrivilege 4444 wmic.exe Token: SeIncBasePriorityPrivilege 4444 wmic.exe Token: SeCreatePagefilePrivilege 4444 wmic.exe Token: SeBackupPrivilege 4444 wmic.exe Token: SeRestorePrivilege 4444 wmic.exe Token: SeShutdownPrivilege 4444 wmic.exe Token: SeDebugPrivilege 4444 wmic.exe Token: SeSystemEnvironmentPrivilege 4444 wmic.exe Token: SeRemoteShutdownPrivilege 4444 wmic.exe Token: SeUndockPrivilege 4444 wmic.exe Token: SeManageVolumePrivilege 4444 wmic.exe Token: 33 4444 wmic.exe Token: 34 4444 wmic.exe Token: 35 4444 wmic.exe Token: 36 4444 wmic.exe Token: SeIncreaseQuotaPrivilege 4444 wmic.exe Token: SeSecurityPrivilege 4444 wmic.exe Token: SeTakeOwnershipPrivilege 4444 wmic.exe Token: SeLoadDriverPrivilege 4444 wmic.exe Token: SeSystemProfilePrivilege 4444 wmic.exe Token: SeSystemtimePrivilege 4444 wmic.exe Token: SeProfSingleProcessPrivilege 4444 wmic.exe Token: SeIncBasePriorityPrivilege 4444 wmic.exe Token: SeCreatePagefilePrivilege 4444 wmic.exe Token: SeBackupPrivilege 4444 wmic.exe Token: SeRestorePrivilege 4444 wmic.exe Token: SeShutdownPrivilege 4444 wmic.exe Token: SeDebugPrivilege 4444 wmic.exe Token: SeSystemEnvironmentPrivilege 4444 wmic.exe Token: SeRemoteShutdownPrivilege 4444 wmic.exe Token: SeUndockPrivilege 4444 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 5240 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 88 PID 624 wrote to memory of 5240 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 88 PID 624 wrote to memory of 5240 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 88 PID 5240 wrote to memory of 5224 5240 net.exe 90 PID 5240 wrote to memory of 5224 5240 net.exe 90 PID 5240 wrote to memory of 5224 5240 net.exe 90 PID 624 wrote to memory of 3444 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 91 PID 624 wrote to memory of 3444 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 91 PID 624 wrote to memory of 3444 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 91 PID 3444 wrote to memory of 4360 3444 net.exe 93 PID 3444 wrote to memory of 4360 3444 net.exe 93 PID 3444 wrote to memory of 4360 3444 net.exe 93 PID 624 wrote to memory of 4916 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 94 PID 624 wrote to memory of 4916 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 94 PID 624 wrote to memory of 4916 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 94 PID 4916 wrote to memory of 5588 4916 net.exe 96 PID 4916 wrote to memory of 5588 4916 net.exe 96 PID 4916 wrote to memory of 5588 4916 net.exe 96 PID 624 wrote to memory of 5012 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 97 PID 624 wrote to memory of 5012 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 97 PID 624 wrote to memory of 5012 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 97 PID 5012 wrote to memory of 3332 5012 net.exe 99 PID 5012 wrote to memory of 3332 5012 net.exe 99 PID 5012 wrote to memory of 3332 5012 net.exe 99 PID 624 wrote to memory of 5600 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 100 PID 624 wrote to memory of 5600 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 100 PID 624 wrote to memory of 5600 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 100 PID 5600 wrote to memory of 5520 5600 net.exe 102 PID 5600 wrote to memory of 5520 5600 net.exe 102 PID 5600 wrote to memory of 5520 5600 net.exe 102 PID 624 wrote to memory of 6120 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 103 PID 624 wrote to memory of 6120 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 103 PID 624 wrote to memory of 6120 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 103 PID 6120 wrote to memory of 1456 6120 net.exe 105 PID 6120 wrote to memory of 1456 6120 net.exe 105 PID 6120 wrote to memory of 1456 6120 net.exe 105 PID 624 wrote to memory of 3608 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 106 PID 624 wrote to memory of 3608 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 106 PID 624 wrote to memory of 3608 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 106 PID 3608 wrote to memory of 2460 3608 net.exe 108 PID 3608 wrote to memory of 2460 3608 net.exe 108 PID 3608 wrote to memory of 2460 3608 net.exe 108 PID 624 wrote to memory of 1720 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 109 PID 624 wrote to memory of 1720 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 109 PID 624 wrote to memory of 1720 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 109 PID 1720 wrote to memory of 6080 1720 net.exe 111 PID 1720 wrote to memory of 6080 1720 net.exe 111 PID 1720 wrote to memory of 6080 1720 net.exe 111 PID 624 wrote to memory of 4944 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 112 PID 624 wrote to memory of 4944 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 112 PID 624 wrote to memory of 4944 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 112 PID 624 wrote to memory of 2184 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 114 PID 624 wrote to memory of 2184 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 114 PID 624 wrote to memory of 2184 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 114 PID 624 wrote to memory of 2548 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 116 PID 624 wrote to memory of 2548 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 116 PID 624 wrote to memory of 2548 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 116 PID 624 wrote to memory of 2080 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 119 PID 624 wrote to memory of 2080 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 119 PID 624 wrote to memory of 2080 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 119 PID 624 wrote to memory of 740 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 121 PID 624 wrote to memory of 740 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 121 PID 624 wrote to memory of 740 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 121 PID 624 wrote to memory of 228 624 2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5240 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:5224
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵
- System Location Discovery: System Language Discovery
PID:4360
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:5588
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "vmicvss" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵
- System Location Discovery: System Language Discovery
PID:3332
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵
- System Location Discovery: System Language Discovery
PID:5520
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:1456
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:2460
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UnistoreSvc_280a9" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_280a9" /y3⤵
- System Location Discovery: System Language Discovery
PID:6080
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4944
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2184
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:740
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:228
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6004
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UnistoreSvc_280a9" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5540
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:6132
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- System Location Discovery: System Language Discovery
PID:5356
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:3268
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:4972
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:5372
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:372
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:5400
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:3980
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:5968
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:5604
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:920
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2224
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2200
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:4908
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:4712
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:3632
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:5984
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:5772
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1136
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:3732
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:4276
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:5280
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:4904
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5512
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:4968
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5928
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe C:\UZEP_HOW_TO_DECRYPT.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:4344
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\2025-03-07_760ccfdb30fe7eaab9cd4c7450d73c24_frostygoop_hive_sliver_snatch.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5144 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 5 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4368
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Indicator Removal
2Clear Windows Event Logs
1File Deletion
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c4bfe3cc5113f57dc2e5b89c7374e048
SHA13a43c21e9401fb7d6d9cd3941aa853eb407b0b6b
SHA2564dedc0a2be54c954d754e5e597b72bb54fdd706a0039b01b0ff9107fe4c10acb
SHA512e8dbc2b6f7142cf9ba075861026edf795ea5f6bd852e286fce821ada6f2caf4dc7ba7ecafe44a1b0dc937ab7dc67d8ea787d6518c9ee67db8b88b1557ff847c3
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD54abe093b2b317bfc5bf493b8399bd7a3
SHA1b338974cd7da375113cd97d994e6c2ba8b55f3b0
SHA256fca602b361e2881221a1e0294d5297066446445105e24d3443014c29280e1261
SHA51247c97feee82427381a4bc0f402d7d96416f257ec500dbb4f21ab83750d76f96f9660e4745b451c9bab7daef505cac7b0abf93e0dd7d61a16c4efe50c9f7b9568
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82