“to defend against. key takeaways : - effective playbooks are recycled. the core script, first seen years ago, is still being used today, proving that adversaries will not abandon a tool that works. - playbooks evolve. the base script was augmented with newer powershell commands, …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
99%
“the commented kill chain : why old ransomware playbooks never die during a ransomware intrusion, we encountered a script that was filled with clear comments for what each command and function did. it was immediately, jarringly out of place, as at huntress we typically observe mal…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1112Modify Registry
96%
“to prevent any early launch anti - malware ( elam ) drivers from loading. this preemptively neuters a critical layer of protection before the main operating system even starts. this is complemented by disabling other low - level drivers like the microsoft security filter driver (…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1112Modify Registry
96%
“time protection, the script launches a volley of registry edits. these commands are not subtle ; they directly target the policy settings for defender ' s core engines, setting values like disableantispyware and disableantivirus to effectively turn off the primary scanning and pr…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
94%
“defences and removing volume shadow copies ( which benefits ransomware by eradicating local ‘ copies ’ of files ). then they moved laterally to the domain controller. - the attacker ’ s intended finale was to detonate c : \ temp \ file. exe - n = 15 - p = f — an executable with c…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1080Taint Shared Content
92%
“the commented kill chain : why old ransomware playbooks never die during a ransomware intrusion, we encountered a script that was filled with clear comments for what each command and function did. it was immediately, jarringly out of place, as at huntress we typically observe mal…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1112Modify Registry
85%
“next, with the section labeled rem disable wd tasks, the attacker cripples defender ' s ability to maintain itself. by using schtasks to disable tasks for scheduled scans, cache maintenance, and cleanups, the script ensures that even if defender wasn ' t fully disabled, it could …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1112Modify Registry
85%
“tactics focus on removing the visible traces of microsoft defender to maintain an illusion of normalcy. the first three commands are designed to remove the " scan with microsoft defender " option that appears when a user right - clicks on a file, folder, or drive. this prevents a…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
82%
“policies, is an enduring defense. then it doesn ’ t matter how this attack is carried out ( by a script, binary, interactive shell, etc. ) — you can always detect it. by strengthening defenses against these common techniques, you ’ ll be able to prevent ransomware as we did in th…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1070Indicator Removal
82%
“tactics focus on removing the visible traces of microsoft defender to maintain an illusion of normalcy. the first three commands are designed to remove the " scan with microsoft defender " option that appears when a user right - clicks on a file, folder, or drive. this prevents a…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053.005Scheduled Task
78%
“next, with the section labeled rem disable wd tasks, the attacker cripples defender ' s ability to maintain itself. by using schtasks to disable tasks for scheduled scans, cache maintenance, and cleanups, the script ensures that even if defender wasn ' t fully disabled, it could …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1686.003Windows Host Firewall
72%
“will rarely set them specifically to “ allow ” ( 6 ) or to “ noaction ” ( 9 ) — both of which mean that defender will not try to contain any detected threat. this is an excellent indicator that is easy to monitor in several different data sources. sigma rules : powershell defende…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
“\ control \ wmi \ autologger \ defenderapilogger " / v " start " / t reg _ dword / d " 0 " / f reg add " hklm \ system \ currentcontrolset \ control \ wmi \ autologger \ defenderauditlogger " / v " start " / t reg _ dword / d " 0 " / f if microsoft defender is disabled legitimate…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1490Inhibit System Recovery
59%
“defences and removing volume shadow copies ( which benefits ransomware by eradicating local ‘ copies ’ of files ). then they moved laterally to the domain controller. - the attacker ’ s intended finale was to detonate c : \ temp \ file. exe - n = 15 - p = f — an executable with c…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1564.006Run Virtual Instance
46%
“defences and removing volume shadow copies ( which benefits ransomware by eradicating local ‘ copies ’ of files ). then they moved laterally to the domain controller. - the attacker ’ s intended finale was to detonate c : \ temp \ file. exe - n = 15 - p = f — an executable with c…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1685Disable or Modify Tools
45%
“malice. the most critical additions are : - subversion of security controls. where the old script simply turned defender off, the new playbook uses set - mppreference to reprogram its logic. setting the default action for high - severity threats to ‘ 6 ’ ( allow ) tells the secur…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053.005Scheduled Task
43%
“malice. the most critical additions are : - subversion of security controls. where the old script simply turned defender off, the new playbook uses set - mppreference to reprogram its logic. setting the default action for high - severity threats to ‘ 6 ’ ( allow ) tells the secur…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1564.006Run Virtual Instance
40%
“the commented kill chain : why old ransomware playbooks never die during a ransomware intrusion, we encountered a script that was filled with clear comments for what each command and function did. it was immediately, jarringly out of place, as at huntress we typically observe mal…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1685Disable or Modify Tools
40%
“time protection, the script launches a volley of registry edits. these commands are not subtle ; they directly target the policy settings for defender ' s core engines, setting values like disableantispyware and disableantivirus to effectively turn off the primary scanning and pr…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1679Selective Exclusion
35%
“the commented kill chain : why old ransomware playbooks never die during a ransomware intrusion, we encountered a script that was filled with clear comments for what each command and function did. it was immediately, jarringly out of place, as at huntress we typically observe mal…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1112Modify Registry
33%
“will rarely set them specifically to “ allow ” ( 6 ) or to “ noaction ” ( 9 ) — both of which mean that defender will not try to contain any detected threat. this is an excellent indicator that is easy to monitor in several different data sources. sigma rules : powershell defende…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1685Disable or Modify Tools
33%
“time protections and edr telemetry. a primary evolution is the direct assault on microsoft defender for endpoint ( mde ). while the original script focused on the standard defender antivirus, newer attacks use commands like reg add "... services \ sense " / v " start " / d " 4 " …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
When a clearly commented script revealed an attacker's tactics, Huntress prevented encryption. Read on to learn more about the evolution of recycled ransomware playbooks used by multiple threat actors.