Analysis
-
max time kernel
143s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe
-
Size
3.1MB
-
MD5
f5d7efaec3c1274b0aaa704a6caa1671
-
SHA1
ec5c25e1cee1dca5c75baf5a6e3bec69441959dc
-
SHA256
5baa791a0bcaff60080472bfa434631bc7524b8a10989ed6e7b200f010cb8e1d
-
SHA512
dab0a8060e9012706ae6ba46adeb2f18e5edecdc187e856989236dd0edb46ed7912cee97cee1c9fb075724c5d736b07e418991d1a3793bee6770d51618dd607f
-
SSDEEP
49152:imfcJ4D5NnqxkGcfxPxZHPlCJKC732T4rOB3IJ2LL8JcL8LBetlyQ1D11:imfcO1Nq6GcfRdF
Malware Config
Extracted
C:\Program Files\GyDM_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Deletes Windows Defender Definitions 2 TTPs 1 IoCs
Uses mpcmdrun utility to delete all AV definitions.
pid Process 2892 MpCmdRun.exe -
Disables service(s) 3 TTPs
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 2392 wevtutil.exe 2520 wevtutil.exe 900 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 1848 powershell.exe 2772 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WdFilter\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msadcfr.dll.mui 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\bookicon.gif.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_HehDfS0_zoc0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7.png.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_gF-t4mE6dYA0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-attach.xml.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_R9YeWv6yyhw0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\OOFTMPL.CFG.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_sd2grmw9Evc0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\Chagos.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_7hltoNiKb_A0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01152_.WMF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_gMEnIyFbL280.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Library\SOLVER\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Media Player\ja-JP\wmpnssui.dll.mui 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Opulent.thmx.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_R89yO_ZyXLM0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMFormServices\Microsoft.Office.InfoPath.xml.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_KZn0tltB6hk0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Documentation\1033\License Agreements\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Ndjamena.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_qDscf9xgzbg0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jre7\lib\jsse.jar.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_UxplRvsEzX00.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\README.TXT.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_sic-JHGMX5s0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Bermuda.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_WEaomFSnQ240.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\MMHMM.WAV.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_oTbWMcMDRWg0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\NAVBAR11.POC.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_HgAhLdAFvSQ0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\BIN\1033\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Calendar\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.win32.nl_zh_4.4.0.v20140623020002.jar.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_q5be37jNZhQ0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GR8GALRY.GRA.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_oM6qkbuzTw00.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Lindeman.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_eh8JKNR2vw40.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-sampler_ja.jar.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_KtJ7I5LwBSc0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\28.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\34.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\msdaprsr.dll.mui 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-actions.xml.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_EcJ-3X7Abno0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\vlc.mo.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_93IuGdvBVrY0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01293_.GIF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_CrIcMeFGGAU0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\TAB_OFF.GIF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_gVZyN5IY9tA0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\BUTTON.GIF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_sad93IO6dTI0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\DVD Maker\offset.ax 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-netbeans-modules-print.xml_hidden.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_tZlKb5WnoQg0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18202_.WMF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_kYyUsv9WqLk0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_FkNOheHrIA00.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSGR3ES.LEX.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_II5X5JdWnhk0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\THOCR.PSP.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_rByLu-G_QRM0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+6.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_d6H4qmBOUPo0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs-nio2_ja.jar.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_ryOBtdtqxg00.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR8B.GIF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_3c7jinr68X40.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\POSTCD98.POC.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_7AFoXwdHgUY0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\css\settings.css 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.jpg 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\eclipse.inf.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_NzBzrBqZN5k0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\fr-FR\chkrzm.exe.mui.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_rK5YK0luTiE0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Mail\ja-JP\msoeres.dll.mui 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR38F.GIF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_STa7bYd6T-Q0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_right_hover.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\MANIFEST.MF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_zzx-36UaD200.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-progress-ui.jar.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_7DY4GQcQH9c0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\as90.xsl.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_0Pw7x_yTmcQ0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08868_.WMF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_q3izn1q1XOk0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152560.WMF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_KNiFlWJOIqs0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195260.WMF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_OOSIn-EG0JQ0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Apex.thmx.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_IZdWjoq-2vs0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10263_.GIF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_Ky_TM-hGv9Y0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic.ja_5.5.0.165303.jar.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_PrM7GUI_C8k0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eo\LC_MESSAGES\vlc.mo.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_Gl31gjUxK_Y0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Orange Circles.htm 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21314_.GIF.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_eztJimfaQWc0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OIS_K_COL.HXK.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_x76vfR2RFuk0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_windy.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt.4mRbaPL2QyS-RgIkZ_YLt3IGyEDOTMCQQGX4utEYylT_24eFNiJ3g3I0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2980 sc.exe 2684 sc.exe 2568 sc.exe 2644 sc.exe 2200 sc.exe 2096 sc.exe 2732 sc.exe 2600 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1384 vssadmin.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1848 powershell.exe 2772 powershell.exe 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 2392 wevtutil.exe Token: SeBackupPrivilege 2392 wevtutil.exe Token: SeSecurityPrivilege 2520 wevtutil.exe Token: SeBackupPrivilege 2520 wevtutil.exe Token: SeSecurityPrivilege 900 wevtutil.exe Token: SeBackupPrivilege 900 wevtutil.exe Token: SeIncreaseQuotaPrivilege 2228 wmic.exe Token: SeSecurityPrivilege 2228 wmic.exe Token: SeTakeOwnershipPrivilege 2228 wmic.exe Token: SeLoadDriverPrivilege 2228 wmic.exe Token: SeSystemProfilePrivilege 2228 wmic.exe Token: SeSystemtimePrivilege 2228 wmic.exe Token: SeProfSingleProcessPrivilege 2228 wmic.exe Token: SeIncBasePriorityPrivilege 2228 wmic.exe Token: SeCreatePagefilePrivilege 2228 wmic.exe Token: SeBackupPrivilege 2228 wmic.exe Token: SeRestorePrivilege 2228 wmic.exe Token: SeShutdownPrivilege 2228 wmic.exe Token: SeDebugPrivilege 2228 wmic.exe Token: SeSystemEnvironmentPrivilege 2228 wmic.exe Token: SeRemoteShutdownPrivilege 2228 wmic.exe Token: SeUndockPrivilege 2228 wmic.exe Token: SeManageVolumePrivilege 2228 wmic.exe Token: 33 2228 wmic.exe Token: 34 2228 wmic.exe Token: 35 2228 wmic.exe Token: SeIncreaseQuotaPrivilege 2352 wmic.exe Token: SeSecurityPrivilege 2352 wmic.exe Token: SeTakeOwnershipPrivilege 2352 wmic.exe Token: SeLoadDriverPrivilege 2352 wmic.exe Token: SeSystemProfilePrivilege 2352 wmic.exe Token: SeSystemtimePrivilege 2352 wmic.exe Token: SeProfSingleProcessPrivilege 2352 wmic.exe Token: SeIncBasePriorityPrivilege 2352 wmic.exe Token: SeCreatePagefilePrivilege 2352 wmic.exe Token: SeBackupPrivilege 2352 wmic.exe Token: SeRestorePrivilege 2352 wmic.exe Token: SeShutdownPrivilege 2352 wmic.exe Token: SeDebugPrivilege 2352 wmic.exe Token: SeSystemEnvironmentPrivilege 2352 wmic.exe Token: SeRemoteShutdownPrivilege 2352 wmic.exe Token: SeUndockPrivilege 2352 wmic.exe Token: SeManageVolumePrivilege 2352 wmic.exe Token: 33 2352 wmic.exe Token: 34 2352 wmic.exe Token: 35 2352 wmic.exe Token: SeIncreaseQuotaPrivilege 2352 wmic.exe Token: SeSecurityPrivilege 2352 wmic.exe Token: SeTakeOwnershipPrivilege 2352 wmic.exe Token: SeLoadDriverPrivilege 2352 wmic.exe Token: SeSystemProfilePrivilege 2352 wmic.exe Token: SeSystemtimePrivilege 2352 wmic.exe Token: SeProfSingleProcessPrivilege 2352 wmic.exe Token: SeIncBasePriorityPrivilege 2352 wmic.exe Token: SeCreatePagefilePrivilege 2352 wmic.exe Token: SeBackupPrivilege 2352 wmic.exe Token: SeRestorePrivilege 2352 wmic.exe Token: SeShutdownPrivilege 2352 wmic.exe Token: SeDebugPrivilege 2352 wmic.exe Token: SeSystemEnvironmentPrivilege 2352 wmic.exe Token: SeRemoteShutdownPrivilege 2352 wmic.exe Token: SeUndockPrivilege 2352 wmic.exe Token: SeManageVolumePrivilege 2352 wmic.exe Token: 33 2352 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2500 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 32 PID 2496 wrote to memory of 2500 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 32 PID 2496 wrote to memory of 2500 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 32 PID 2496 wrote to memory of 2500 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 32 PID 2500 wrote to memory of 2892 2500 net.exe 34 PID 2500 wrote to memory of 2892 2500 net.exe 34 PID 2500 wrote to memory of 2892 2500 net.exe 34 PID 2500 wrote to memory of 2892 2500 net.exe 34 PID 2496 wrote to memory of 2464 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 35 PID 2496 wrote to memory of 2464 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 35 PID 2496 wrote to memory of 2464 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 35 PID 2496 wrote to memory of 2464 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 35 PID 2464 wrote to memory of 2280 2464 net.exe 37 PID 2464 wrote to memory of 2280 2464 net.exe 37 PID 2464 wrote to memory of 2280 2464 net.exe 37 PID 2464 wrote to memory of 2280 2464 net.exe 37 PID 2496 wrote to memory of 2416 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 38 PID 2496 wrote to memory of 2416 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 38 PID 2496 wrote to memory of 2416 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 38 PID 2496 wrote to memory of 2416 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 38 PID 2416 wrote to memory of 2148 2416 net.exe 40 PID 2416 wrote to memory of 2148 2416 net.exe 40 PID 2416 wrote to memory of 2148 2416 net.exe 40 PID 2416 wrote to memory of 2148 2416 net.exe 40 PID 2496 wrote to memory of 2680 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 41 PID 2496 wrote to memory of 2680 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 41 PID 2496 wrote to memory of 2680 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 41 PID 2496 wrote to memory of 2680 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 41 PID 2680 wrote to memory of 2720 2680 net.exe 43 PID 2680 wrote to memory of 2720 2680 net.exe 43 PID 2680 wrote to memory of 2720 2680 net.exe 43 PID 2680 wrote to memory of 2720 2680 net.exe 43 PID 2496 wrote to memory of 2776 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 44 PID 2496 wrote to memory of 2776 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 44 PID 2496 wrote to memory of 2776 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 44 PID 2496 wrote to memory of 2776 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 44 PID 2776 wrote to memory of 2832 2776 net.exe 46 PID 2776 wrote to memory of 2832 2776 net.exe 46 PID 2776 wrote to memory of 2832 2776 net.exe 46 PID 2776 wrote to memory of 2832 2776 net.exe 46 PID 2496 wrote to memory of 2860 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 47 PID 2496 wrote to memory of 2860 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 47 PID 2496 wrote to memory of 2860 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 47 PID 2496 wrote to memory of 2860 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 47 PID 2860 wrote to memory of 3008 2860 net.exe 49 PID 2860 wrote to memory of 3008 2860 net.exe 49 PID 2860 wrote to memory of 3008 2860 net.exe 49 PID 2860 wrote to memory of 3008 2860 net.exe 49 PID 2496 wrote to memory of 2840 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 50 PID 2496 wrote to memory of 2840 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 50 PID 2496 wrote to memory of 2840 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 50 PID 2496 wrote to memory of 2840 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 50 PID 2840 wrote to memory of 2792 2840 net.exe 52 PID 2840 wrote to memory of 2792 2840 net.exe 52 PID 2840 wrote to memory of 2792 2840 net.exe 52 PID 2840 wrote to memory of 2792 2840 net.exe 52 PID 2496 wrote to memory of 2580 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 53 PID 2496 wrote to memory of 2580 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 53 PID 2496 wrote to memory of 2580 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 53 PID 2496 wrote to memory of 2580 2496 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 53 PID 2580 wrote to memory of 2688 2580 net.exe 55 PID 2580 wrote to memory of 2688 2580 net.exe 55 PID 2580 wrote to memory of 2688 2580 net.exe 55 PID 2580 wrote to memory of 2688 2580 net.exe 55 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\net.exenet.exe stop "NetMsmqActivator" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UI0Detect" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2832
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "NetMsmqActivator" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2600
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2980
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UI0Detect" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2200
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1044
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1988
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:2668
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:916
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:992
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1368
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1768
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:848
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1536
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1312
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:1148
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:576
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1384
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Program Files\Windows Defender\MpCmdRun.exe"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All3⤵
- Deletes Windows Defender Definitions
PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2888
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
4Disable or Modify Tools
2Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51baa273d4db8d917553db9f7f30cfa1e
SHA1c6e9e81aeb6e1b75317874b79a0b94ecdf235bf6
SHA256df70bc8ecc225eba78e05789f7922efd830321899b700d9770d385f10bbfbf79
SHA512798efefc754d9c031066e050155f8cae2f82c585ef2b8725807ff72e58cf4ac0ef13419e4a623bb3d1d1cf34bd6b89420bdf1de066acc8b833a7110cdfbf62ec
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e46a7039dc843ba8c06b76bde2725690
SHA192646d8ee73b5b210f5acc2e1b5746fe95cd4ca9
SHA256905b2f4f489a7eb5547813724bfc5a686af33bc547b7ffe9439d45479387ef66
SHA512c44b0f5431d5ade2c5bdd2e88fb3b00b184a3853ed9986208265c041ac12a82ef1c6d44c59d22cae3bb9df1c3a74d416a0844bee02322b8ba595f194745fbe27