Overview
overview
10Static
static
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
10Ransomware...KB.exe
windows7-x64
10Ransomware...KB.exe
windows10-2004-x64
7Resubmissions
31/03/2025, 00:22
250331-apdw1ssjs8 1028/03/2025, 22:52
250328-2tfd7avl15 1025/03/2025, 14:57
250325-sb3mbsxxht 10Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
RansomwareSamples/Avaddon_09_06_2020_1054KB.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
RansomwareSamples/Avaddon_09_06_2020_1054KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
RansomwareSamples/Avos_18_07_2021_403KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RansomwareSamples/Avos_18_07_2021_403KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
RansomwareSamples/Babik_04_01_2021_31KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
RansomwareSamples/Babik_04_01_2021_31KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
RansomwareSamples/Babuk_20_04_2021_79KB.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
RansomwareSamples/Babuk_20_04_2021_79KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
RansomwareSamples/BlackKingdom_23_03_2021_12460KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
RansomwareSamples/BlackKingdom_23_03_2021_12460KB.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
RansomwareSamples/BlackMatter_02_08_2021_67KB.exe
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
RansomwareSamples/BlackMatter_02_08_2021_67KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
RansomwareSamples/Conti_22_12_2020_186KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
RansomwareSamples/Conti_22_12_2020_186KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
RansomwareSamples/Cuba_08_03_2021_1130KB.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
RansomwareSamples/Cuba_08_03_2021_1130KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
RansomwareSamples/DarkSide_01_05_2021_30KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
RansomwareSamples/DarkSide_01_05_2021_30KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
RansomwareSamples/DarkSide_16_01_2021_59KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
RansomwareSamples/DarkSide_16_01_2021_59KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
RansomwareSamples/DarkSide_18_11_2020_17KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
RansomwareSamples/DarkSide_18_11_2020_17KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
RansomwareSamples/DearCry_13_03_2021_1292KB.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
RansomwareSamples/DearCry_13_03_2021_1292KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
RansomwareSamples/Hades_29_03_2021_1909KB.exe
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
RansomwareSamples/Hades_29_03_2021_1909KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
RansomwareSamples/Hive_17_07_2021_808KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
RansomwareSamples/Hive_17_07_2021_808KB.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral29
Sample
RansomwareSamples/LockBit_14_02_2021_146KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
RansomwareSamples/LockBit_14_02_2021_146KB.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
RansomwareSamples/MAKOP_27_10_2020_115KB.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
RansomwareSamples/MAKOP_27_10_2020_115KB.exe
Resource
win10v2004-20250314-en
General
-
Target
RansomwareSamples/Hive_17_07_2021_808KB.exe
-
Size
808KB
-
MD5
504bd1695de326bc533fde29b8a69319
-
SHA1
67f0c8d81aefcfc5943b31d695972194ac15e9f2
-
SHA256
a0b4e3d7e4cd20d25ad2f92be954b95eea44f8f1944118a3194295c5677db749
-
SHA512
18c5b28bafb13edf47f6a2b803d9d9a914945f037b266a765f2a324842c5ef04ebda27eba31851d2d63e00779a42900e0edfe4ad5bd817eb4f43fa4d4e3a4767
-
SSDEEP
24576:lafTGwLNdRk4RBtr/ioF4/I+CMx3cMt3/4KFG8Qz4YwY:IT7dRFr/ioFjicMtvV4z
Malware Config
Extracted
C:\$Recycle.Bin\HOW_TO_DECRYPT.txt
hive
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
Signatures
-
Detects Go variant of Hive Ransomware 15 IoCs
resource yara_rule behavioral27/memory/1780-495-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-496-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-2765-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-4107-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-4319-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-11860-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-11862-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-11869-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-11875-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-11882-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-11892-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-11899-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-11925-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-11931-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go behavioral27/memory/1780-11957-0x0000000000960000-0x0000000000C39000-memory.dmp hive_go -
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Drops file in Drivers directory 29 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\UMDF\de-DE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\UMDF\fr-FR\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\fr-FR\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\it-IT\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\UMDF\es-ES\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\en-US\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\es-ES\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\UMDF\it-IT\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\de-DE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\UMDF\de-DE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\de-DE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\etc\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\UMDF\es-ES\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\ja-JP\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\UMDF\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\UMDF\en-US\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\UMDF\it-IT\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\ja-JP\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\es-ES\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\UMDF\fr-FR\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\UMDF\ja-JP\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\en-US\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\UMDF\en-US\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\UMDF\ja-JP\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\fr-FR\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\drivers\UMDF\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\drivers\it-IT\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe -
Boot or Logon Autostart Execution: Print Processors 1 TTPs 7 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File created C:\Windows\System32\spool\prtprocs\x64\ja-JP\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\spool\prtprocs\x64\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\spool\prtprocs\x64\de-DE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\spool\prtprocs\x64\en-US\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\spool\prtprocs\x64\es-ES\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\spool\prtprocs\x64\fr-FR\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\spool\prtprocs\x64\it-IT\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Deletes itself 1 IoCs
pid Process 2900 cmd.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.0-dXY_GImzev2cMrtBtC3u0fjaEyxdJxTFC157Nw72Q.hive Hive_17_07_2021_808KB.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe -
Loads dropped DLL 1 IoCs
pid Process 1208 Process not Found -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\Music\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6GFIGH6G\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\Links\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Public\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\3W44XPEP\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Public\Desktop\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\GY8QW6M2\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Public\Videos\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\L7XNHY48\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GUJ7UW2N\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\Documents\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\GKATPXW1\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\Searches\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\75GKCLJR\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Public\Music\desktop.ini Hive_17_07_2021_808KB.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8O71085\desktop.ini Hive_17_07_2021_808KB.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\System32\NetworkList\Icons\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppLocker\es-ES\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\en-US\Licenses\OEM\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\_Default\EnterpriseN\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\ja-JP\Licenses\_Default\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\es-ES\Licenses\OEM\StarterN\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\it-IT\Licenses\eval\ProfessionalN\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\sl-SI\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prnle004.inf_amd64_neutral_beb9bf23b7202bff\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\termmou.inf_amd64_neutral_207a02df8e9e6552\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\lt-LT\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\manifeststore\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\wbem\de-DE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\spp\tokens\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prncs302.inf_amd64_ja-jp_96eca15be06b1482\Amd64\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\en-US\Licenses\_Default\HomeBasicE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\netnvma.inf_amd64_neutral_99bb33c9a5bedaea\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prnrc004.inf_amd64_neutral_bbd3435eeaf576ee\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\oobe\en-US\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\_Default\HomePremiumN\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\ja-JP\Licenses\eval\Ultimate\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prnlx00x.inf_amd64_neutral_808baf4e08594a59\Amd64\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\migwiz\dlmanifests\Microsoft-Windows-DHCPServerMigPlugin-DL\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\es-ES\Licenses\OEM\UltimateE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\es-ES\Licenses\_Default\EnterpriseN\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\es-ES\Licenses\_Default\HomePremium\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmairte.inf_amd64_neutral_0feacd08cb9c7fe3\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmwhql0.inf_amd64_neutral_23613e3dd9401f10\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prngt002.inf_amd64_neutral_df2060d80de9ff13\Amd64\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prngt003.inf_amd64_neutral_8c9aae54a5673a35\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prnky302.inf_amd64_ja-jp_dd74fe49601b74f6\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\uk-UA\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prnca00e.inf_amd64_neutral_651eeed98428be5e\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prnep00e.inf_amd64_neutral_edc631ff41a34218\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\WindowsPowerShell\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\Tasks\Microsoft\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\es-ES\Licenses\OEM\HomeBasic\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\fr-FR\Licenses\eval\Professional\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\migwiz\replacementmanifests\microsoft-activedirectory-webservices\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\de-DE\Licenses\_Default\HomePremium\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\_Default\EnterpriseE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\mdmdcm5.inf_amd64_neutral_0bb09f3e5a59f3a8\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prnep004.inf_amd64_neutral_63b22bfb6b93eaba\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\wdi\perftrack\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prnep00d.inf_amd64_neutral_dd61103f3a2743d4\Amd64\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prnky307.inf_amd64_ja-jp_e40bd14f18e8ff7d\Amd64\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\GroupPolicy\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\wbem\en-US\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\XPSViewer\it-IT\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\es-ES\Licenses\OEM\EnterpriseE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\wvmic.inf_amd64_neutral_b94eb92e8150fa35\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\de-DE\Licenses\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\FileRepository\prnrc00b.inf_amd64_neutral_3338d41663aad5fa\Amd64\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\de-DE\Licenses\_Default\HomePremiumN\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\InstallShield\setupdir\0012\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\da-DK\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\de-DE\Licenses\eval\StarterE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\eval\HomePremiumN\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\fr-FR\Licenses\eval\Starter\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\ja-JP\Licenses\eval\HomePremiumE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\eval\HomeBasicN\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\SysWOW64\fr-FR\Licenses\OEM\HomePremiumE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\System32\DriverStore\fr-FR\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe -
resource yara_rule behavioral27/memory/1780-0-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-495-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-496-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-2765-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-4107-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-4319-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-11860-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-11862-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-11869-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-11875-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-11882-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-11892-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-11899-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-11925-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-11931-0x0000000000960000-0x0000000000C39000-memory.dmp upx behavioral27/memory/1780-11957-0x0000000000960000-0x0000000000C39000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Media Player\it-IT\setup_wm.exe.mui Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\pt-PT.pak Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\w2k_lsa_auth.dll Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-13.0-dXY_GImzev2cMrtBtC3hf1HI4ZkPl55ujULAYwOhg.hive Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\librawvid_plugin.dll Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\doclib.gif.0-dXY_GImzev2cMrtBtC3sCFP29oTZxbhVvOMf3QqnU.hive Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\PipelineSegments.store Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199423.WMF Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR8B.GIF Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\feature.properties Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Urumqi Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\forms_super.gif Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0234000.WMF Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14710_.GIF Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\DESKSAM.SAM Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\TAB_OFF.GIF Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Port_Moresby Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\de-DE\Minesweeper.exe.mui Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libkaraoke_plugin.dll.0-dXY_GImzev2cMrtBtC3sS4zVbgrego-kmBTU1FAx4.hive Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_nl.dll.0-dXY_GImzev2cMrtBtC3tyi8Ze1wOoijipSDBcKk10.hive Hive_17_07_2021_808KB.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4_1.0.800.v20140827-1444.jar Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Kentucky\Monticello Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Eucla.0-dXY_GImzev2cMrtBtC3rWMrSiQtSRIQnirvYp_QXI.hive Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\play_hov.png Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BROCHURE.XML Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_autodel_plugin.dll.0-dXY_GImzev2cMrtBtC3gjPB--Wk2Um8_Di8uTXFgE.hive Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe.0-dXY_GImzev2cMrtBtC3hdPu8L1HCxUDsrBqsXJQTQ.hive Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\System.IO.Log.Resources.dll Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21364_.GIF Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_decreaseindent.gif Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer_dot.png Hive_17_07_2021_808KB.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-spi-quicksearch.xml Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Cuiaba.0-dXY_GImzev2cMrtBtC3rdmc2A07J9t4jN31HjUHxE.hive Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Office Classic.xml Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\MENUS.JS Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Module.zip Hive_17_07_2021_808KB.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\Microsoft.Build.Framework.dll Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-execution_zh_CN.jar.0-dXY_GImzev2cMrtBtC3mt-C0HpDHVaJ_MTdOhO6WY.hive Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0298653.WMF Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\vlc.mo.0-dXY_GImzev2cMrtBtC3kSVgE9TkSpwDqQ_VhrBySw.hive Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Mazatlan.0-dXY_GImzev2cMrtBtC3lQtEpGfrAhPsbkktJXfoF4.hive Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Common Files\System\MSMAPI\1033\MSMAPI32.DLL Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\DiscussionToolIconImages.jpg Hive_17_07_2021_808KB.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\DEEPBLUE\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\msdaprsr.dll.mui Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\(120DPI)grayStateIcon.png Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\IA32.api Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange.css Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Windows Media Player\es-ES\WMPDMCCore.dll.mui Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\Panel_Mask_PAL.wmv Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Nairobi Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libaddonsvorepository_plugin.dll Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\updater_zh_CN.jar.0-dXY_GImzev2cMrtBtC3p_5KvhcwgAv3q7oWIWYYQQ.hive Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\drag.png Hive_17_07_2021_808KB.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\NOTICE.0-dXY_GImzev2cMrtBtC3iBzdCIJh4dqU08G0B7hTnY.hive Hive_17_07_2021_808KB.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-util-lookup.xml Hive_17_07_2021_808KB.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\winsxs\amd64_server-help-h1s.itprobasic.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_74b939d8d498413b\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\wow64_microsoft-windows-iis-legacyscripts_31bf3856ad364e35_6.1.7600.16385_none_e49008e2c548c75f\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\CustomMarshalers\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-simpletcp.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_6bd130b2144a5b5c\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-dot3gpui.resources_31bf3856ad364e35_6.1.7600.16385_it-it_a86f16ef6c33773c\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-ie-jsprofilercore_31bf3856ad364e35_8.0.7600.16385_none_253839ca09b4c8e4\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-n..erclasses.resources_31bf3856ad364e35_6.1.7600.16385_it-it_01aa3f2e82f177c1\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.VisualStudio.Tools.Applications.Hosting.v10.0\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Data7706cdc8#\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\msil_microsoft.windows.d..rootcause.resources_31bf3856ad364e35_6.1.7600.16385_en-us_5b7a5a7744697513\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.Office.Interop.PowerPoint\14.0.0.0__71e9bce111e9429c\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Runtime\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\AuditPolicyGPManage#\a0a453714c9ec8d6954490f711f5158a\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..rvice_mof.resources_31bf3856ad364e35_6.1.7600.16385_de-de_d835bdc71c586c2f\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\wow64_microsoft-windows-i..-windows6compat-dll_31bf3856ad364e35_6.1.7600.16385_none_b322a2e6a790e88a\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\DigitalLocker\it-IT\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ic-module.resources_31bf3856ad364e35_6.1.7600.16385_es-es_e84325a814020a94\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml.Linq\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-help-games.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_d4d9cd5e8517dde4\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-w32time-adm.resources_31bf3856ad364e35_6.1.7600.16385_en-us_09ce9d65c6af2076\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-wlangpclient_31bf3856ad364e35_6.1.7600.16385_none_149a38d4ea4a4001\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_mchgr.inf_31bf3856ad364e35_6.1.7601.17514_none_7320af8f6febd179\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\wow64_microsoft-windows-security-ntlm-mof_31bf3856ad364e35_6.1.7600.16385_none_8aa0c2aae4765631\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-shutdown-event-tracker_31bf3856ad364e35_6.1.7600.16385_none_02aa6dd4294b8d5f\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-wpfcorecomp.resources_31bf3856ad364e35_6.1.7601.17514_it-it_40c62b25b8bd3ab4\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_net1qx64.inf.resources_31bf3856ad364e35_6.1.7600.16385_it-it_f51c3d403243f4e4\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-autoplay.resources_31bf3856ad364e35_6.1.7601.17514_ja-jp_c771398d4802be43\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-s..ce-common.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_32649e3ddcc6caec\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-clip.resources_31bf3856ad364e35_6.1.7600.16385_de-de_ac6caba705727bf7\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..anagement.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_51314604af708c86\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-i..onal-codepage-10003_31bf3856ad364e35_6.1.7600.16385_none_800d8a46e266419d\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_6.1.7600.16385_da-dk_793bb4aa96902fa7\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\Microsoft.NET\Framework\v3.5\SQL\ja\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Comp46f2b404#\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-e..eady_eula.resources_31bf3856ad364e35_6.1.7600.16385_it-it_227e33fb04382aa3\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-wab-core.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b02e6588f8dfd610\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_srpuxnativesnapin.resources_31bf3856ad364e35_6.1.7600.16385_en-us_509c17d312183abd\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\wow64_microsoft-windows-pcw.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_9f360ff648a30232\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.InteropServices.WindowsRuntime\v4.0_4.0.0.0__b03f5f7f11d50a3a\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.BackgroundIntelligentTransfer.Management.Resources\1.0.0.0_it_31bf3856ad364e35\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-n..g-napclientconfigui_31bf3856ad364e35_6.1.7601.17514_none_77a9817a9e2ba67e\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\assembly\GAC_MSIL\Policy.12.0.Microsoft.Office.Interop.InfoPath.Xml\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-computerdefaults_31bf3856ad364e35_6.1.7600.16385_none_626b9352dcfa715c\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-smartcardksp.resources_31bf3856ad364e35_6.1.7600.16385_it-it_efb448111f69bd7c\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-s..serverbox.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_cc22387ebe8106ea\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Pres#\fee2bbfe0b8f5988a3ab7a9db85c7a30\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-help-desk.resources_31bf3856ad364e35_6.1.7600.16385_it-it_62e0a28e66b486d2\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-n..lperclass.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_51b106148d4e401f\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0993a1b8823a4e79\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\assembly\GAC_MSIL\Sentinel.v3.5Client\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-t..omruntime.resources_31bf3856ad364e35_6.1.7600.16385_en-us_d4aac73d55c29ea7\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\SubsetList\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.Transactions.Bridge.Dtc\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-e..epassword.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_8be7fa8751c65c56\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..rpautoreg.resources_31bf3856ad364e35_6.1.7600.16385_de-de_31904980c1dd2d73\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-rdbss.resources_31bf3856ad364e35_6.1.7600.16385_en-us_80ebfc2d811a0b36\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-s..controllerextension_31bf3856ad364e35_6.1.7600.16385_none_483a81802f69e278\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-wmpnssui.resources_31bf3856ad364e35_6.1.7600.16385_it-it_c96a1a39ebaee887\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\msil_wsatconfig.resources_b03f5f7f11d50a3a_6.1.7600.16385_fr-fr_7f2e16702f6d41d1\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-setup-events.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_70f27182b75f2540\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_devicepairingproxy.resources_31bf3856ad364e35_6.1.7600.16385_en-us_80ad95b776ebcd13\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\x86_microsoft-windows-i..trolpanel.resources_31bf3856ad364e35_6.1.7600.16385_es-es_d6d6b535339f7c73\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe File created C:\Windows\winsxs\amd64_microsoft-windows-help-ripbsyn.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_e1659d4abad790f8\HOW_TO_DECRYPT.txt Hive_17_07_2021_808KB.exe -
Delays execution with timeout.exe 64 IoCs
pid Process 2064 timeout.exe 2516 timeout.exe 2156 timeout.exe 1960 timeout.exe 1016 timeout.exe 1688 timeout.exe 284 timeout.exe 1456 timeout.exe 2372 timeout.exe 1696 timeout.exe 2552 timeout.exe 1300 timeout.exe 2232 timeout.exe 1844 timeout.exe 884 timeout.exe 2764 timeout.exe 1716 timeout.exe 704 timeout.exe 828 timeout.exe 1648 timeout.exe 836 timeout.exe 1560 timeout.exe 1984 timeout.exe 3052 timeout.exe 1532 timeout.exe 1324 timeout.exe 2856 timeout.exe 1676 timeout.exe 1484 timeout.exe 2760 timeout.exe 2612 timeout.exe 1668 timeout.exe 320 timeout.exe 596 timeout.exe 1056 timeout.exe 2628 timeout.exe 1716 timeout.exe 2984 timeout.exe 1344 timeout.exe 2692 timeout.exe 776 timeout.exe 1820 timeout.exe 1756 timeout.exe 2080 timeout.exe 1984 timeout.exe 2516 timeout.exe 1528 timeout.exe 2332 timeout.exe 1292 timeout.exe 1140 timeout.exe 1956 timeout.exe 2156 timeout.exe 2540 timeout.exe 3064 timeout.exe 268 timeout.exe 1088 timeout.exe 2604 timeout.exe 2740 timeout.exe 1088 timeout.exe 2316 timeout.exe 408 timeout.exe 1368 timeout.exe 1060 timeout.exe 1108 timeout.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2736 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1780 Hive_17_07_2021_808KB.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2652 vssvc.exe Token: SeRestorePrivilege 2652 vssvc.exe Token: SeAuditPrivilege 2652 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2900 1780 Hive_17_07_2021_808KB.exe 32 PID 1780 wrote to memory of 2900 1780 Hive_17_07_2021_808KB.exe 32 PID 1780 wrote to memory of 2900 1780 Hive_17_07_2021_808KB.exe 32 PID 1780 wrote to memory of 2108 1780 Hive_17_07_2021_808KB.exe 33 PID 1780 wrote to memory of 2108 1780 Hive_17_07_2021_808KB.exe 33 PID 1780 wrote to memory of 2108 1780 Hive_17_07_2021_808KB.exe 33 PID 2900 wrote to memory of 2740 2900 cmd.exe 34 PID 2900 wrote to memory of 2740 2900 cmd.exe 34 PID 2900 wrote to memory of 2740 2900 cmd.exe 34 PID 2108 wrote to memory of 2736 2108 cmd.exe 35 PID 2108 wrote to memory of 2736 2108 cmd.exe 35 PID 2108 wrote to memory of 2736 2108 cmd.exe 35 PID 2900 wrote to memory of 3012 2900 cmd.exe 38 PID 2900 wrote to memory of 3012 2900 cmd.exe 38 PID 2900 wrote to memory of 3012 2900 cmd.exe 38 PID 2900 wrote to memory of 704 2900 cmd.exe 39 PID 2900 wrote to memory of 704 2900 cmd.exe 39 PID 2900 wrote to memory of 704 2900 cmd.exe 39 PID 2900 wrote to memory of 2332 2900 cmd.exe 40 PID 2900 wrote to memory of 2332 2900 cmd.exe 40 PID 2900 wrote to memory of 2332 2900 cmd.exe 40 PID 2900 wrote to memory of 3004 2900 cmd.exe 41 PID 2900 wrote to memory of 3004 2900 cmd.exe 41 PID 2900 wrote to memory of 3004 2900 cmd.exe 41 PID 2900 wrote to memory of 2764 2900 cmd.exe 42 PID 2900 wrote to memory of 2764 2900 cmd.exe 42 PID 2900 wrote to memory of 2764 2900 cmd.exe 42 PID 2900 wrote to memory of 1088 2900 cmd.exe 43 PID 2900 wrote to memory of 1088 2900 cmd.exe 43 PID 2900 wrote to memory of 1088 2900 cmd.exe 43 PID 2900 wrote to memory of 1016 2900 cmd.exe 44 PID 2900 wrote to memory of 1016 2900 cmd.exe 44 PID 2900 wrote to memory of 1016 2900 cmd.exe 44 PID 2900 wrote to memory of 1756 2900 cmd.exe 45 PID 2900 wrote to memory of 1756 2900 cmd.exe 45 PID 2900 wrote to memory of 1756 2900 cmd.exe 45 PID 2900 wrote to memory of 668 2900 cmd.exe 46 PID 2900 wrote to memory of 668 2900 cmd.exe 46 PID 2900 wrote to memory of 668 2900 cmd.exe 46 PID 2900 wrote to memory of 1864 2900 cmd.exe 47 PID 2900 wrote to memory of 1864 2900 cmd.exe 47 PID 2900 wrote to memory of 1864 2900 cmd.exe 47 PID 2900 wrote to memory of 1056 2900 cmd.exe 48 PID 2900 wrote to memory of 1056 2900 cmd.exe 48 PID 2900 wrote to memory of 1056 2900 cmd.exe 48 PID 2900 wrote to memory of 2316 2900 cmd.exe 49 PID 2900 wrote to memory of 2316 2900 cmd.exe 49 PID 2900 wrote to memory of 2316 2900 cmd.exe 49 PID 2900 wrote to memory of 2408 2900 cmd.exe 50 PID 2900 wrote to memory of 2408 2900 cmd.exe 50 PID 2900 wrote to memory of 2408 2900 cmd.exe 50 PID 2900 wrote to memory of 704 2900 cmd.exe 51 PID 2900 wrote to memory of 704 2900 cmd.exe 51 PID 2900 wrote to memory of 704 2900 cmd.exe 51 PID 2900 wrote to memory of 1716 2900 cmd.exe 52 PID 2900 wrote to memory of 1716 2900 cmd.exe 52 PID 2900 wrote to memory of 1716 2900 cmd.exe 52 PID 2900 wrote to memory of 1484 2900 cmd.exe 53 PID 2900 wrote to memory of 1484 2900 cmd.exe 53 PID 2900 wrote to memory of 1484 2900 cmd.exe 53 PID 2900 wrote to memory of 2516 2900 cmd.exe 54 PID 2900 wrote to memory of 2516 2900 cmd.exe 54 PID 2900 wrote to memory of 2516 2900 cmd.exe 54 PID 2900 wrote to memory of 3012 2900 cmd.exe 56 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Hive_17_07_2021_808KB.exe"C:\Users\Admin\AppData\Local\Temp\RansomwareSamples\Hive_17_07_2021_808KB.exe"1⤵
- Drops file in Drivers directory
- Boot or Logon Autostart Execution: Print Processors
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\cmd.execmd /c hive.bat >NUL 2>NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2740
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:3012
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:704
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2332
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:3004
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2764
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1088
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1016
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1756
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:668
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1864
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1056
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2316
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2408
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:704
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1716
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1484
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2516
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:3012
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1984
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2360
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1456
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1300
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1956
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:884
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:860
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2956
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2868
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3052
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2452
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2080
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1984
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:292
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2448
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2976
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2128
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2712
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2156
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2516
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2664
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2616
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1668
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2024
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:3064
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2232
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2156
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1600
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1844
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1532
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1576
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1608
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1784
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2484
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2628
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:3068
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2760
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2064
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2720
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2640
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2612
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1368
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1960
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1060
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:484
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1016
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:616
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1528
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1688
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1716
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2616
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1108
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1668
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2456
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:320
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:388
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:704
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2540
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2312
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1968
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2440
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1292
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1324
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1696
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2000
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:884
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:284
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1964
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1244
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2984
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:852
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1812
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:268
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2856
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1660
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1588
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1152
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1456
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2332
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1228
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:828
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2384
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2636
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2400
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2800
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:408
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:220
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2372
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2692
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1648
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1140
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2744
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2912
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2836
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1088
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:836
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:916
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2552
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1560
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2992
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:596
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2700
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2304
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2600
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:776
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:2172
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:2604
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1344
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1676
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:1776
-
-
C:\Windows\system32\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
PID:1820
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:536
-
-
C:\Windows\system32\timeout.exetimeout 13⤵PID:304
-
-
-
C:\Windows\system32\cmd.execmd /c shadow.bat >NUL 2>NUL2⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2736
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee4ad142674725d6d9b58c9c3bb836dc
SHA1ac9bac37131c72a549d2bf3fbd233061906d5fab
SHA256fc1f1ed6a6692d18788de47420ead7e8a1b534b015db69a39052a0a2fc30c776
SHA512a34c547d13880b578703f52b7d3d61b1893536966204d80a9e0f60aee8851bd9f70e3d0ceb1601aa11901c6315f57128c49f2000cc4fcbc67ed92e4628e45da3
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
Filesize
232B
MD56358d970c3edccb57eae7dbf9f42d58f
SHA125b994c3b5604f4f67e1ac6250bc2f14ce690380
SHA2569e36401051e677f69a82ab8fbdebd6b16210ee40612c8c7fa45ceb5d7757fe50
SHA51244819fec7e90b903eece750d0a2de531520ed9e637e17e4a57786f9a61c6d4b95ff6072fc3530a9d35d8dc756bcfe20f80a6a07a72d35cf24b305053ae389131
-
Filesize
57B
MD5df5552357692e0cba5e69f8fbf06abb6
SHA14714f1e6bb75a80a8faf69434726d176b70d7bd8
SHA256d158f9d53e7c37eadd3b5cc1b82d095f61484e47eda2c36d9d35f31c0b4d3ff8
SHA512a837555a1175ab515e2b43da9e493ff0ccd4366ee59defe6770327818ca9afa6f3e39ecdf5262b69253aa9e2692283ee8cebc97d58edd42e676977c7f73d143d
-
Filesize
1.2MB
MD5ffeccd3cb8bc0821a43a372d85e4b63c
SHA1a708eb6453a8be653d2a9f673881b23d116eeacb
SHA2567598f4a28131e0eeb1f1d09660da8772002b27d969e92b3e377771a1d5534239
SHA5128128f4f201aff580d5a0eadeb5978f319473eb2daf2a58032c84630809554be32e1fc7fce46b850481956eebb6ef241ac65c39ca9c6ef2ed3eaa3d4e534a7290