| File name: | Ransomware.Hive.zip |
| Full analysis: | https://app.any.run/tasks/ec801fa4-1a60-4700-b43c-b0afce88f873 |
| Verdict: | Malicious activity |
| Analysis date: | February 12, 2024, 08:18:34 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=AES Encrypted |
| MD5: | 33DC6CF9108FA7A395D632C29021791C |
| SHA1: | 61CCFFBFB8F2458BE139AA1D3C9DD715F25CD06D |
| SHA256: | AF9E8F301A3677B457345921D7EE765A842ECEB7DF107714EAFFC6193BFC6BBE |
| SSDEEP: | 196608:xUPLIETGA/+0vcL5o/Vu0vlQ77Z0SOJM7j:xmJ6ANa6/Vu0q3+SOw |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | 0x0009 |
| ZipCompression: | Unknown (99) |
| ZipModifyDate: | 2022:08:06 14:25:50 |
| ZipCRC: | 0x15387ab7 |
| ZipCompressedSize: | 780687 |
| ZipUncompressedSize: | 782394 |
| ZipFileName: | hive.bin_exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 128 | C:\Windows\system32\vssvc.exe | C:\Windows\System32\VSSVC.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 680 | timeout 1 | C:\Windows\System32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 844 | C:\Windows\system32\cmd.exe /c shadow.bat >NUL 2>NUL | C:\Windows\System32\cmd.exe | — | 1.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1036 | timeout 1 | C:\Windows\System32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1340 | timeout 1 | C:\Windows\System32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1572 | timeout 1 | C:\Windows\System32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1596 | timeout 1 | C:\Windows\System32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1624 | timeout 1 | C:\Windows\System32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1772 | timeout 1 | C:\Windows\System32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1808 | timeout 1 | C:\Windows\System32\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Ransomware.Hive.zip | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3700) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3304 | 1.exe | C:\Users\admin\AppData\Local\VirtualStore\8nA8ackAXsGhP37KPvajsw.key.hive | — | |
MD5:— | SHA256:— | |||
| 3304 | 1.exe | C:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\AccLR.cab.8nA8ackAXsGhP37KPvajs4JCcJyBmuAITikm2pUXMlk.hive | — | |
MD5:— | SHA256:— | |||
| 3304 | 1.exe | C:\MSOCache\All Users\{90140000-0015-040C-0000-0000000FF1CE}-C\AccLR.cab.8nA8ackAXsGhP37KPvajs_gv7pJQjaVOIgquebmL2wA.hive | — | |
MD5:— | SHA256:— | |||
| 3304 | 1.exe | C:\MSOCache\HOW_TO_DECRYPT.txt | text | |
MD5:80207D0F8EA42BDFEAF9F5C586230ACA | SHA256:25EDEFB3B0678DFE0D927FF48CE67254359BA379DF9468F634D02C026F0E7131 | |||
| 3304 | 1.exe | C:\MSOCache\All Users\{90140000-0015-040C-0000-0000000FF1CE}-C\branding.xml.8nA8ackAXsGhP37KPvajsxKPgii4OEp0ysEngWtWeRw.hive | xml | |
MD5:DCA1DCEC5C73F5CCB5E4E99865AC3464 | SHA256:7EB00091F60A7EC10E83FE86AEE5D9E50ED2D60FC1504BF1DF9A5EBC7738607B | |||
| 3304 | 1.exe | C:\MSOCache\All Users\{90140000-0015-0411-0000-0000000FF1CE}-C\HOW_TO_DECRYPT.txt | text | |
MD5:80207D0F8EA42BDFEAF9F5C586230ACA | SHA256:25EDEFB3B0678DFE0D927FF48CE67254359BA379DF9468F634D02C026F0E7131 | |||
| 3304 | 1.exe | C:\MSOCache\All Users\{90140000-0015-040C-0000-0000000FF1CE}-C\HOW_TO_DECRYPT.txt | text | |
MD5:80207D0F8EA42BDFEAF9F5C586230ACA | SHA256:25EDEFB3B0678DFE0D927FF48CE67254359BA379DF9468F634D02C026F0E7131 | |||
| 3304 | 1.exe | C:\Users\admin\Desktop\shadow.bat | text | |
MD5:DF5552357692E0CBA5E69F8FBF06ABB6 | SHA256:D158F9D53E7C37EADD3B5CC1B82D095F61484E47EDA2C36D9D35F31C0B4D3FF8 | |||
| 3304 | 1.exe | C:\MSOCache\All Users\HOW_TO_DECRYPT.txt | text | |
MD5:80207D0F8EA42BDFEAF9F5C586230ACA | SHA256:25EDEFB3B0678DFE0D927FF48CE67254359BA379DF9468F634D02C026F0E7131 | |||
| 3304 | 1.exe | C:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\AccessMUI.msi.8nA8ackAXsGhP37KPvajs1So8geX4Dtt-rGQYwo9u2Y.hive | executable | |
MD5:B68BD80A5A3B703BABC7FB19BAF104AB | SHA256:1CB1E08D560E9E6C62A7E48680A218D022F0D331EB52F3CE66504A167FAD652F | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |